HP Student Tablet PC Handbook page 9

Student tablet pc
Table of Contents

Advertisement

i. Using another user's account, password, or ID card or allowing another
user to access your account, password, or ID.
j. Coaching, helping, joining or acquiescing in any unauthorized ac vity on
the network.
k. Pos ng anonymous, unlawful, or inappropriate messages or informa on
on a district-owned system.
l. Engaging in sexual harassment or using any language of a sexual or
otherwise objec onable nature (e. g., racist, terroris c, abusive, threatening,
demeaning, stalking, or slanderous) in public or private messages.
m. Falsifying permission and/or authoriza on of iden fi ca on documents.
n. Obtaining copies of or modifying fi les, data, or passwords belonging to
other users on the network without authoriza on.
o. Knowingly placing a computer virus on a computer or network.
p. Transmission of any material that is in viola on of any federal or state
law. This includes, but is not limited to confi den al informa on, copyrighted
material, threatening or obscene material, and computer viruses.
3. Acceptable Use Guidelines
a. General Guidelines
(1) Students are responsible for the ethical and educa onal use of technology
in the District and when a district owned device is used out of district.
(2) Students will have access to available forms of electronic media and
communica on that is in support of educa on and research, and in support of
the educa onal goals and objec ves of the District.
(3) All technology policies and restric ons must be followed.
(4) Access to the District's computer online services is a privilege and not a
right. Each student will be required to sign and adhere to the Acceptable Use
Guidelines Agreement.
(5) When placing, removing, or restric ng access to data or online services,
school offi cials shall apply the same criteria of educa onal suitability used for
other educa on resources.
(6) Parents concerned with the District's computer online services at their
child's school should refer to the EFA (LOCAL): Instruc onal Resources:
Instruc onal Material Selec on and Adop on policy and follow the stated
procedure.
(7) Any parent wishing to restrict their children's access to any District computer
online services will need to provide this restric on request in wri ng. Parents
will assume responsibility for imposing restric ons only on their own children.
Page 15
b. Network E que e
(1) Be polite.
(2) Use appropriate language.
(3) Do not reveal personal data (i.e. home address, phone number, or phone
numbers of other people).
(4) Remember that the other users of technology are human beings whose
culture, language, and humor have diff erent points of reference from your
own.
(5) Users should be discrete when forwarding e-mail, and it should only be
done on a need-to-know basis.
c. E-Mail
(1) E-mail may be used for educa onal or administra ve purposes only.
Students are provided a Gaggle e-mail account if e-mail is required in the
course in which they are enrolled.
(2) E-mail transmissions, stored data, transmi ed data, or any other use of
district-owned technology by students or any other user is subject to being
monitored at any me by designated staff to ensure appropriate use.
(3) All e-mail and all contents are property of the District.
4. Consequences
The student in whose name a system account and/or computer hardware is
issued will be responsible at all mes for its appropriate use.
Noncompliance with the guidelines published here, in the Student Handbook
/ Student Code of Conduct, and in Board policy CQ may result in suspension
or termina on of technology privileges and disciplinary ac on. Use or
possession of hacking so ware is strictly prohibited and violators will be
subject to consequences in the Student Handbook / Student Code of Conduct.
Viola ons of applicable state and federal law, including the Texas Penal Code,
Computer Crimes, Chapter 33, may result in criminal prosecu on, as well as
disciplinary ac on by the District.
The District cooperates fully with local, state, or federal offi cials in any
inves ga on concerning or rela ng to viola ons of computer crime laws.
In addi on, contents of e-mail and network communica ons are governed
by the Texas Public Informa on Act, and therefore, may be subject to public
disclosure as required by law.
Any a empt to alter data, the confi gura on of a computer, or the fi les
of another user without the consent of the individual, campus or district
administrator, will be considered an act of vandalism and subject to
disciplinary ac on in accordance with the Student Handbook / Student Code
of Conduct.
Page 16

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

2700 series

Table of Contents