|
||||||||||||||||||||||||||||||||
Home |
Acceptable Use Policy |
|||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||
Inappropriate Use | ||||||||||||||||||||||||||||||||
While electronic information resources offer tremendous opportunities of
educational value, they also offer persons with illegal or unethical
purposes avenues for reaching students, teachers, and others, including
parents. Activities not permitted include, but are not limited to: · using the network for commercial advertising; · using copyrighted material in reports without permission; · using the network to lobby for votes; · using the network to access a file that contains pornographic material; · using the network to send/receive messages that are racist; · using the network to send/receive inflammatory or offensive messages or images; · creating a computer virus and placing it on the network; · uploading, creating or knowingly forwarding a virus. · using the network to send/receive a message that violates with the school’s code of conduct, which can include cyber bullying; · using the network to send/receive messages that are sexist and/or contain obscenities; · using the network to request home phone numbers and later, making obscene phone calls to the numbers; · using the network to provide addresses or other personal information that others may use inappropriately; · making purchases or conducting other personal business; · using the network for sending and receiving a large number of personal messages; · using another’s password to login through that person’s account, pretending to be another using or forging an e-mail to make it appear as if it came from somewhere or some other than the actual source; · using the network to send/receive a message with someone else’s name on it; · posting anonymous messages or using fake names; · sending threats of violence toward persons or property; · harassing, insulting or attacking others; · damaging, degrading or disrupting computer hardware, networks or system performance; · the downloading, installation or execution of any unauthorized programs; · duplicating, distributing or using illegal software · using the network to access peer to peer file sharing networks such as Kazaa, Limewire, Audio Galaxy and Morpheus. |
||||||||||||||||||||||||||||||||
All users should be aware that the inappropriate use of electronic information resources can be a violation of local, state, and federal laws. Violators will be prosecuted. | ||||||||||||||||||||||||||||||||
During Registration, all students and parents are required to sign a contract accepting the Acceptable Use of Electronic Resources Policy. | ||||||||||||||||||||||||||||||||