Unacceptable Uses of Network. The following are considered examples of unacceptable uses and constitute a violation of this policy. Additional unacceptable uses can occur other than those specifically listed or enumerated herein: A. Uses that violate the law or encourage others to violate the law, including but not limited to transmitting offensive or harassing messages; offering for sale, use, or purchase any substance the possession or use of which is prohibited by the District’s student discipline policy, local, State, or federal law; viewing, transmitting, or downloading pornographic materials or materials that encourage others to violate local, State, or federal law; information pertaining to the manufacture of weapons; intruding into the networks or computers of others; and downloading or transmitting confidential, trade secret information, or copyrighted materials; B. Uses that cause harm to others or damage their property, person, or reputation, including but not limited to engaging in defamation (harming another’s reputation by lies); employing another’s password or some other user identifier that misleads message recipients into believing that someone other than you is communicating; reading another person’s communications; sharing another person’s pictures, private information, or messages without their permission; or otherwise using his or her access to the network or the internet; C. Uploading a worm, virus, other harmful form of programming or vandalism; participating in “hacking” activities or any form of unauthorized access to other computers, networks, or other information. Users will immediately notify the school's system administrator if they have identified a possible security problem. Users will not go looking for security problems, because this may be construed as an illegal attempt to gain access. D. Uses amounting to harassment, sexual harassment, bullying, or cyber-bullying defined as using a computer, computer system, or computer network to convey a message in any format, including audio or video, text, graphics photographic, or any combination thereof, that is intended to harm another individual. E. Uses that jeopardize the security of student access and of the computer network or other networks on the internet; uses that waste District resources including downloading very large files without permission from a teacher, unnecessary printing, and consuming excess file space on shared drives. F. Uses that are commercial transactions, including commercial or private advertising. Students and other users may not sell or buy anything over the internet. Students and others should not give personal information to others, including credit card numbers and social security numbers. G. The promotion of election or political campaigns, issues dealing with private or charitable organizations or foundations, ballot issues, or proselytizing in a way that presents such opinions as the view of the District. ▇. ▇▇▇▇▇▇▇, receiving, viewing, or downloading obscene materials, materials harmful to minors, or materials that depict the sexual exploitation of minors. I. Disclosing identifying personal information or arranging to meet persons met on the internet or by electronic communications; sharing one’s password with others or allowing them to use one’s account. ▇. ▇▇▇▇▇▇▇▇▇▇▇, installing, or copying software or other files without authorization of the Superintendent or the Superintendent’s designee. K. Posting or sending messages anonymously or using a name other than one’s own. L. Attempting to bypass internal or external security systems or controls using District equipment. Students and staff may only access the internet using the District network. M. Plagiarism of material accessed online. Teachers will instruct students in appropriate research and citation practices. N. Using the network while access privileges are revoked.
Appears in 1 contract
Sources: Policy Manual
Unacceptable Uses of Network. The following are considered examples of unacceptable uses and constitute a violation of this policy. Additional unacceptable uses can occur other than those specifically listed or enumerated herein:
A. Uses that violate the law or encourage others to violate the law, including but not limited to transmitting offensive or harassing messages; offering for sale, use, or purchase any substance the possession or use of which is prohibited by the District’s student discipline policy, local, State, or federal law; viewing, transmitting, or downloading pornographic materials or materials that encourage others to violate local, State, or federal law; information pertaining to the manufacture of weapons; intruding into the networks or computers of others; and downloading or transmitting confidential, trade secret information, or copyrighted materials;
B. Uses that cause harm to others or damage their property, person, or reputation, including but not limited to engaging in defamation (harming another’s reputation by lies); employing another’s password or some other user identifier that misleads message recipients into believing that someone other than you is communicating; reading another person’s communications; sharing another person’s pictures, private information, or messages without their permission; or otherwise using his or her access to the network or the internet;
C. Uploading a worm, virus, other harmful form of programming or vandalism; participating in “hacking” activities or any form of unauthorized access to other computers, networks, or other information. Users will immediately notify the school's system administrator if they have identified a possible security problem. Users will not go looking for security problems, because this may be construed as an illegal attempt to gain access.
D. Uses amounting to harassment, sexual harassment, bullying, or cyber-bullying defined as using a computer, computer system, or computer network to convey a message in any format, including audio or video, text, graphics photographic, or any combination thereof, that is intended to harm another individual.
E. Uses that jeopardize the security of student access and of the computer network or other networks on the internet; uses that waste District resources including downloading very large files without permission from a teacher, unnecessary printing, and consuming excess file space on shared drives.
F. Uses that are commercial transactions, including commercial or private advertising. Students and other users may not sell or buy anything over the internet. Students and others should not give personal information to others, including credit card numbers and social security numbers.
G. The promotion of election or political campaigns, issues dealing with private or charitable organizations or foundations, ballot issues, or proselytizing in a way that presents such opinions as the view of the District.
▇. ▇▇▇▇▇▇▇H. Sending, receiving, viewing, or downloading obscene materials, materials harmful to minors, or materials that depict the sexual exploitation of minors.
I. Disclosing identifying personal information or arranging to meet persons met on the internet or by electronic communications; sharing one’s password with others or allowing them to use one’s account.
▇. ▇▇▇▇▇▇▇▇▇▇▇J. Downloading, installing, or copying software or other files without authorization of the Superintendent or the Superintendent’s designee.
K. Posting or sending messages anonymously or using a name other than one’s own.
L. Attempting to bypass internal or external security systems or controls using District equipment. Students and staff may only access the internet using the District network.
M. Plagiarism of material accessed online. Teachers will instruct students in appropriate research and citation practices.
N. Using the network while access privileges are revoked.
Appears in 1 contract
Sources: Policy Manual