top of page

Acceptable Technology Use Policy

What is an Acceptable Use Policy? Watch this!

https://www.youtube.com/watch?v=IbHxDIdS4q8

​

Responsible Citizenship

Before using technology within the classroom, it is imperative that students and parents are educated on digital citizenship. As a system, we intend to use technology in safe, legal, and responsible ways that embraced through the following conditions.

 

As a digital citizen, I will:

  • consider the information, images, names, etc. that I post online

  • not publish personal information (contact, mailing, family information)

  • not damage the device assigned to me

  • not bully or tease others using technology

  • report misconduct and/or abuse from others 

  • appropriately cite any and all uses of other materials 

​

My Digital Footprint

Examples of appropriate use of technology include but are not limited to the following:

 

Privacy

Any files saved on school technology are not to be considered private. As a system, we formally have the right to monitor, inspect, and review any information that has been transmitted and/or received at any given time. All files stored on any devices are property of our system and can be confiscated and/or searched without the user’s consent. Users should not use devices to store any personal information such as contact information, mailing addresses, family information, or schedules of any kind. 

 

Online Etiquette

As acceptable behaviors are expected within the classroom, acceptable behaviors are expected when using technology. Inappropriate language, images, and comments should not be used on the devices. Distributing and redistributing vulgar or provocative images, videos, jokes, comments, etc. is not prohibited. Any material that may be based on stereotypes based on religion, race, ethnicity, culture, or sexual orientation is not prohibited.  Failure to abide by these regulations may result in the loss of the device.

​

Blogging/Podcasting

The use of blogs and podcasts are often used in addition to classroom materials. Therefore, any language or comments that are considered inappropriate inside the classroom are also to be considered inappropriate on the blog and/or podcast. Comments made on any blog or podcast should follow the online etiquette expectations and regulations listed above. Any and all blog and/or podcast posts will be monitored by school officials and may be deleted if they are not considered to be educationally or morally appropriate. Failure to abide by these regulations may result in the loss of the device.

 

Plagiarism

Plagiarism can be defined as using the thought’s or ides of someone else as your own. Students are required to cite every Internet source used in academic assignments. This includes all images, videos, music, texts, etc. Failure to cite Internet sources will result in the same consequences of any other occurrence of plagiarism, as stated in the student handbook. Failure to abide by these regulations may result in the loss of the device.

​

Proxies

Using anonymous proxies to access filtered content is strictly prohibited. Failure to abide by these

regulations may result in the loss of the device.

 

Inappropriate Material

Students are strictly prohibited from accessing and/or distributing inappropriate materials. Sharing, taking, scanning, forwarding, and downloading any material that can be deemed inappropriate is not prohibited. Inappropriate material can be classified as any material that may contain vulgar, obscene, abusive, defamatory, sexually explicit, sexually suggesting, threatening, or illegal content. Failure to abide by these regulations may result in the loss of the device.

 

Images/Videos

Students are prohibited from taking photos and/or videos of faculty and staff members or other students without authoritative permission. Imaging and videoing done by students must be part of an academic assignment. Failure to abide by these regulations may result in the loss of the device. 

 

Malicious Use

Misuse or harm done to the system’s technology devices is strictly prohibited. Users should not partake in hacking activities or place viruses on the devices. Failure to abide by these regulations may result in the loss of the device. 

​

Additional Resources

The Essentials of an Acceptable Use Policy

https://resources.infosecinstitute.com/essentials-acceptable-use-policy/#gref

 

Bringing Acceptable-Use Policies into the 21st Century

https://www.educationworld.com/a_tech/bringing-acceptable-use-policies-into-21st-century.shtml

 

The Importance of an Acceptable Use Policy

https://www.itispivotal.com/post/the-importance-of-an-acceptable-use-policy

images.png
images.jpeg
Screen Shot 2018-08-30 at 6.40.37 PM.png

© 2023 by Annex. Proudly created with Wix.com

  • Grey Twitter Icon
  • Grey Facebook Icon
  • Grey Google+ Icon
  • Grey Instagram Icon
bottom of page