Inappropriate Use. The following are examples of inappropriate use of technology resources that may result in loss of privileges or disciplinary action. a. Using the resources for any illegal purpose, including threatening school safety; b. Accessing the resources to knowingly alter, damage, or delete District property or information, or to breach any other electronic equipment, network, or electronic communications system in violation of the law or District policy; c. Damaging electronic communication systems or electronic equipment, including knowingly or intentionally introducing a virus to a device or network, or not taking proper security steps to prevent a device or network from becoming vulnerable; d. Disabling or attempting to disable or bypass any Internet filtering device; e. Using someone’s account without permission; f. Pretending to be someone else when posting, transmitting, or receiving messages; g. Attempting to read, delete, copy, modify, or interfere with another user ’s posting, transmission, or receipt ofelectronic media; h. Using resources to engage in conduct that harasses or bullies others; i. Sending, posting, or possessing materials that are abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal, including material that constitutes cyberbullying and “sexting”; j. Using inappropriate language such as cursing, vulgarity, ethnic or racial slurs, and any other inflammatory language; k. Posting personal information about yourself or others, such as addresses, phone numbers, or photographs, without permission, or responding to requests for personally identifiable information or contact from unknown individuals; l. Making appointments to meet in person people met online; if a request for such a meeting is received, it should be immediately reported to a teacher or administrator; m. Violating others’ intellectual property rights, including downloading or using copyrighted information without permission from the copyright holder; n. Wasting school resources through the improper use of the District’s technology resources, including sending spam; and o. Downloading unauthorized applications or software or gaining unauthorized access to restricted information orresources.
Appears in 1 contract
Sources: Student Agreement for Acceptable Use of Technology Resources
Inappropriate Use. The following are examples of inappropriate use of technology resources that may result in loss of privileges or disciplinary action.
a. : • Using the resources for any illegal purpose, including threatening school safety;
b. ; • Accessing the resources to knowingly alter, damage, or delete District property or information, or to breach any other electronic equipment, network, or electronic communications system in violation of the law or District policy;
c. ; • Damaging electronic communication communications systems or electronic equipment, including knowingly or intentionally introducing a virus to a device or network, or not taking proper security steps to prevent a device or network from becoming vulnerable;
d. ; • Disabling or attempting to disable or bypass any Internet filtering device;
e. ; • Using someone’s account without permission;
f. ; • Pretending to be someone else when posting, transmitting, or receiving messages;
g. ; • Attempting to read, delete, copy, modify, or interfere with another user user’s posting, transmission, or receipt ofelectronic of electronic media;
h. ; • Using resources to engage in conduct that harasses or bullies others;
i. ; • Sending, posting, or possessing materials that are abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal, including material that constitutes cyberbullying and “sexting”;
j. ” • Using inappropriate language such as cursing, vulgarity, ethnic or racial slurs, and any other inflammatory language;
k. ; • Posting personal information about yourself or others, such as addresses, phone numbers, or photographs, without permission, or responding to requests for personally identifiable information or contact from unknown individuals;
l. ; • Any malicious attempt to harm or destroy District equipment or data of another user of the District’s system, or any of the agencies or other networks that are connected to the Internet is prohibited; • Deliberate attempts to degrade or disrupt system performance are violations of District policy and administrative regulations and may constitute criminal activity under applicable state and federal laws. Such prohibited activity includes, but is not limited to, the uploading or creating computer viruses; • Vandalism as defined above will result in the cancellation of system use privileges and will require restitution for costs associated with the system restoration, as well as other appropriate consequences. • Making appointments to meet in person people met online; if a request for such a meeting is received, it should be immediately reported to a teacher or administrator;
m. ; • Violating others’ intellectual property rights, including downloading or using copyrighted information without permission from the copyright holder;
n. ; • Wasting school resources through the improper use of the District’s technology resources, including sending spam; and
o. and • Downloading unauthorized applications or software or gaining unauthorized access to restricted information orresourcesor resources.
Appears in 1 contract
Sources: Student Agreement for Acceptable Use of Technology Resources
Inappropriate Use. The following are examples of inappropriate use of technology resources that may result in loss of privileges or disciplinary action.
a. : Using the resources for any illegal purpose, including threatening school safety;
b. ; Accessing the resources to knowingly alter, damage, or delete District property or information, or to breach any other electronic equipment, network, or electronic communications system in violation of the law or District policy;
c. ; Damaging electronic communication communications systems or electronic equipment, including knowingly or intentionally introducing a virus to a device or network, or not taking proper security steps to prevent a device or network from becoming vulnerable;
d. ; Disabling or attempting to disable or bypass any Internet filtering device;
e. ; Using someone’s account without permission;
f. ; Pretending to be someone else when posting, transmitting, or receiving messages;
g. ; Attempting to read, delete, copy, modify, or interfere with another user user’s posting, transmission, or receipt ofelectronic of electronic media;
h. ; Using resources to engage in conduct that harasses or bullies others;
i. ; Sending, posting, or possessing materials that are abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another’s reputation, or illegal, including material that constitutes cyberbullying and “sexting”;
j. ” Using inappropriate language such as cursing, vulgarity, ethnic or racial slurs, and any other inflammatory language;
k. ; Posting personal information about yourself or others, such as addresses, phone numbers, or photographs, without permission, or responding to requests for personally identifiable information or contact from unknown individuals;
l. ; Any malicious attempt to harm or destroy District equipment or data of another user of the District’s system, or any of the agencies or other networks that are connected to the Internet is prohibited; Deliberate attempts to degrade or disrupt system performance are violations of District policy and administrative regulations and may constitute criminal activity under applicable state and federal laws. Such prohibited activity includes, but is not limited to, the uploading or creating computer viruses; Vandalism as defined above will result in the cancellation of system use privileges and will require restitution for costs associated with the system restoration, as well as other appropriate consequences. Making appointments to meet in person people met online; if a request for such a meeting is received, it should be immediately reported to a teacher or administrator;
m. ; Violating others’ intellectual property rights, including downloading or using copyrighted information without permission from the copyright holder;
n. ; Wasting school resources through the improper use of the District’s technology resources, including sending spam; and
o. and Downloading unauthorized applications or software or gaining unauthorized access to restricted information orresourcesor resources.
Appears in 1 contract
Sources: Student Agreement for Acceptable Use of Technology Resources