Matching
Students will use computers in conformity with laws of the United States and the State of Texas. Violations include, but are not limited to, the following:
1- Criminal Acts
2- Libel Laws
3- Copyright Violations
True or False
a) Publicly defaming people through either published (or the publishing of) material on the Internet, email, etc.
b) Copying, selling, or distributing copyrighted material without the express written permission of the author or publisher (users should assume that all materials available on the Internet are protected by copyright); engaging in plagiarism (using others’ words or ideas as your own).
c) “hacking” or attempting to access computer systems without authorization, harassing email, cyber bullying, cyber stalking, child pornography, vandalism, and/or unauthorized tampering with computer systems.
___ 4. Email and other electronic communication by students is confidential.
___ 5. Electronic communication may be monitored at any time by designated District staff to ensure appropriate use for educational or administrative purposes.
___ 6. Students may allow others to use their account names and passwords or use those of others. ___ 7. Be polite and use appropriate language in email messages, online postings, and other digital communications.
___ 8. Not use computers, handheld computers, cell phones, personal digital devices, or the Internet to post or send hate or harassing mail, pornography; make discriminatory or derogatory remarks about others; or engage in bullying, harassment, or other antisocial behaviors either at school or at home.
___ 9. Students will be held responsible for how they represent themselves and their schools and District in all online activities, including on social network sites such as Facebook or MySpace.
___ 10. Students are encouraged to pretend to be someone else when online to protect their own information. ___ 11. Students will avoid using any technology in such a way that would disrupt the activities of others. ___ 12. Students will use technology resources productively and responsibly for school-related purposes. ___ 13. Students will not attempt to bypass, or circumvent, District security settings or Internet filters.
___ 14. As long as it is for educational purposes only, students are exempt from copyright laws. ___ 15. Inappropriate use of technology and computer systems can result in ISS and other consequences.
No comments:
Post a Comment