Page |1

NEVADA R-5 SCHOOL DISTRICT Computer Network – Technology Resources ACCEPTABLE USE POLICY

The Nevada R-5 School District is offering Internet access to Teacher, Student and Parent use for the following educational purposes: 1. The Internet has been established for a limited educational purpose. The term “educational purpose” includes classroom activities, career development, parent communications and limited high-quality research activities. 2. The Internet has not been established as a public access service or public forum. The Nevada R-5 School District has the right to place reasonable restrictions on the materials you access or post through the system. 3. You may not use the Internet for commercial purposes. This means you may not offer, provide, or purchase products or services through the Internet. 4. You may not use the Internet for political lobbying or blogging in any form.

The following uses of the District’s Internet systems are considered unacceptable: 1. Personal Safety (Restrictions are for everyone) a. Users will not post personal contact information about themselves or other people. Personal contact information includes address, telephone number, school address, work address, a picture, etc. b. Users will promptly disclose to their teacher or other school employees any message they receive that is inappropriate or a cause for concern. 2. Illegal Activities a. Users will not attempt to gain unauthorized access to the District’s system or to any other computer system throughout the District’s Network, or go beyond their authorized access. This includes attempting to log in through another person’s account or access another person’s files. These actions are illegal, even if only for the purpose of “browsing”. b. Users will not make deliberate attempts to disrupt the computer system performance or destroy data by spreading computer viruses or by any other means. These actions are illegal. c. Users will not use the District’s system to engage in any other illegal act, such as arranging for drug sale or the purchase of alcohol, engaging in criminal gang activity, threatening the safety of persons, solicitation in any form, gambling, etc.

Page |2

3. System Security a. Users are responsible for the use of their individual account and should take all reasonable precautions to prevent others from being able to use their account. Under no conditions should a user provide their password to another person. Each user is responsible for any activity done through their individually assigned login user name (USER ID) and password. b. Users will immediately notify a teacher or the system administrator if they have identified a possible security problem. Users will not go looking for security problems, because this may be construed as an illegal attempt to gain access. All network users are restricted to TCP ports 80, 8080, 55880, 53 or 137-139. c. Users will avoid the inadvertent spread of computer viruses by following the District’s virus protection procedures. All individual media brought into the school by students must be virus scanned before use in any Nevada R-5 computers. Instructors allowing these types of media (e.g. CDs, DVDs, Flash Drives, SD Cards) are responsible for checking the student’s media. d. No student owned device shall be permitted access to the District’s WLAN (Wireless Local Area Network). Any attempt being made will be considered a direct violation of the District’s AUP and appropriate disciplinary/legal action will be taken. e. No student owned device shall be permitted access to the District’s LAN (Local Area Network). Any attempt being made will be considered a direct violation of the District’s AUP and appropriate disciplinary/legal action will be taken. 4. Inappropriate Language a. Restrictions against Inappropriate Language apply to public messages, private messages, and material posted on District’s Web pages. b. Users will not use obscene, profane, lewd, vulgar, rude, inflammatory, threatening, or disrespectful language. c. Users will not post information that, if acted upon, could cause damage or a danger or disruption. d. Users will not engage in personal attacks, including prejudicial or discriminatory attacks. e. Users will not harass or bully another person. Harassment or bullying is persistently acting in a manner that distresses or annoys another person. If a user is told by a person to stop sending them messages, they must stop. f. Users will not knowingly or recklessly post false or defamatory information about a person or organization. 5. Respect for Privacy a. Users will not repost a message that was sent to them privately without permission of the person who sent them the message. b. Users will not post private information about any other person.

Page |3

6. Respecting Resource Limits a. Users will use the system only for educational and professional or career development activities and limited, high quality research activities. Printing large quantities of dark field pages is restricted. b. Any peer-to-peer file-sharing (e.g. LimeWire, Bit Torrent, Gnutella) is explicitly prohibited. c. All material stored on the District’s computer system must be educationally related or it is subject to being deleted and/or quarantined for further actions depending on the material’s content. d. All material stored on the District’s computer system (e.g. servers and hard drives) becomes the property of the District and can be viewed at any time by authorized personnel. e. All District owned email accounts are property of the District and will be archived for up to 5 years. This information can be searched at any time by authorized personnel. f. Any attempt by students to send and/or receive e-mail from services other than those assigned by teachers for educational uses, or authorized Nevada R-5 personnel will be considered a violation of the AUP. g. All network users are prohibited from using chat programs, instant messaging or posting blogs unless it is approved by District personnel. h. Any use of Public Proxy services are prohibited (e.g. The Cloak, Anonymizer, Access For All) 7. Plagiarism and Copyright Infringement a. Users will not plagiarize works that they find on the Internet. Plagiarism is taking the ideas or writings of others and presenting them as if they were original to the user. b. Users will respect the rights of copyright owners. Copyright infringement occurs when an individual inappropriately reproduces a work that is protected by a copyright. If a work contains language that specifies acceptable use of that work, the user should follow the expressed requirements. If the user is unsure whether or not they can use a work, they should request permission form the copyright owner. c. Users will not access file-sharing sites for illegal downloads of games, music, movies, etc. 8. Inappropriate Access to Material a. Users will not use the District’s system to access material that is profane or obscene (pornography), that advocates illegal acts, or that advocates violence or discriminations towards other people (hate literature). b. If a user inadvertently accesses such information, they should immediately disclose the inadvertent access to their teacher or another District’s employee. This will protect users against allegations that they have intentionally violated the AUP. c. Users must be aware some resources accessed on the Internet have posted false or fabricated information on their websites. Not all Internet information should be assumed to be truthful or accurate. d. Users using any Web Search provider (e.g. Google, MSN, Yahoo) to search for inappropriate content or language will not be permitted

AUP Rev May 2016.pdf

Users will immediately notify a teacher or the system administrator if they have. identified a possible security problem. Users will not go looking for security.

71KB Sizes 1 Downloads 230 Views

Recommend Documents

iPad AUP 2017-18.pdf
... safety and security​, and use​ of the iPad. Furthermore, I understand that if I do not follow these guidelines, I am subject to the consequences described.

Whistleblowing Policy for Schools Sept 2013 rev May 2017 FINAL.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Whistleblowing ...

AUP – Internet Student Regulation.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. AUP – Internet ...

Student AUP Agreement.pdf
STUDENT ACCEPTABLE USE AND INTERNET SAFETY AGREEMENT. Sumter School District is pleased to announce the establishment of Internet services for ...

AUP Student 2016-2017.pdf
Use of school‐issued mobile devices off the school network may be monitored. Repair and Replacement Costs. In the case that technology equipment is ...

AUP Technology Form Students-English.pdf
Whoops! There was a problem loading more pages. Retrying... AUP Technology Form Students-English.pdf. AUP Technology Form Students-English.pdf. Open.

Form AUP 1.pdf
Page 1 of 1. Form AUP 1. Parent Permission Form for Student Use (Grades 5-12). of the Monroe County School District's Computer Network. After reading and ...

Grade K-2 AUP (English).pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Grade K-2 AUP ...

NCPS ICT AUP - 2014-2015.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. NCPS ICT AUP ...Missing:

AUP Opt Out Form - Grades 8-12.pdf
Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. AUP Opt Out Form - Grades 8-12.pdf. AUP

Rev. Cover Master_Pre-Press Rev. Master.qxd - Semantic Scholar
ditional market and state institutions reinforce disincentives for more sustainable ... become core business across a range of policy sectors. ..... Australia: the application of a justice and community fairness .... Washington, DC: Island Press.

rev redact.pdf
Page 2 of 14. Proto-Revelation 70CE/71CE. Author: Unknown Author- ”Author A” Version 1.0 and 2.0. Introduction. This is a simple redacted version of the Book of Revelation. In going through. Revelation, it became apparent that there were four or

Acceptable Use Policy (AUP) for Using the ...
district computer facilities, district software, and electronic information resources referred to as the HTPS network (Hillsborough. Township Public Schools Network). I also acknowledge that policies and procedures which require classroom teachers an

K-12 AUP 2015-17.pdf
... collaborate in a safe and structured. manner with their class. Web‐based learning tools provide free access to storytelling, concept mapping, video editing and.

Forum April REV - Widener University
Despite the lack of success in mobilizing support from the predominately white, mainstream protection- and conservation-oriented .... ocean near Los Angeles. Popular subsistence and recre- ational fish continue to be ... improve the long-term profita

Elevregistreringsblankett Rev B.pdf
Ja/Si ○ Nej/No. Jag/vi godkänner att bilder pÃ¥ eleven fÃ¥r publiceras pÃ¥ skolans hemsida och informationsmaterial. (Yo/nosotros aceptamos que fotos de los ...

Türev tek.PDF
Page. 1. /. 25. Loading… Page 1 of 25. Page 1 of 25. Page 2 of 25. Page 3 of 25. Page 3 of 25. Main menu. Displaying Türev tek.PDF. Page 1 of 25.

math rev sharex.pdf
2.There are 10 blue and 8 yellow balls. Find the probability of selecting at. random. a. 2 yellow balls. b. 1 blue ball. 3.The sum of three consecutive odd. numbers is 187. Find the numbers. Page 3 of 3. math rev sharex.pdf. math rev sharex.pdf. Open

Forum April REV - Widener University
and EJ have very real applications. Our perception is that this is not the case for most ecologists. In fact, the ..... healthy ecosystems and the services they provide, so rec- onciling these two often conflicting aims is imperative. It ..... Modern

QCM30 Rev B.pdf
6965 El Camino Real, Ste 105 Carlsbad, CA 92009 Phone: 760-929-8677 Fax: ... See Engineering-Technical Info for Solder Re-flow and Tape and Reel Specs.

MAX232, MAX232I (Rev. L) - GitHub
Jun 10, 2014 - 1. POST OFFICE BOX 655303 •DALLAS, TEXAS 75265. D Meets or Exceeds TIA/EIA-232-F and ITU .... All voltages are with respect to network GND. 2. ..... machine, or process in which TI components or services are used.

MATH…Week of: May 15 - May 19
Period 1: CH 6 TEST TODAY. Introduce Next Unit (Ratios). Period 2-4: Introduction of. Fraction Project. Science…Week of: February 6-February 10. Classwork.

May 2018
May 1, 2018 - Baked Chicken Breast W/Lemon. Pasta or Mashed Potato. Fruit & vegetable salad. 24. Sweet and Sour Chicken. Chow Mein. Egg Fried Rice.