Download Acceptable Use Policy (AUP)

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Net bias wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Malware wikipedia , lookup

Hacker wikipedia , lookup

Wireless security wikipedia , lookup

Distributed firewall wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Computer security wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Acceptable Use
Policy (AUP)
What does it actually say?
Why is it necessary?
Acceptable Use Policy



“AUP”
Signed by you and your parent
District-wide policy
… responsibility for appropriate
use
With the use of electronic networks, including both
the Internet and the Intranet, the Humble Independent
School District is expanding learning access for
students, staff, parents and the entire Humble ISD
community. With this opportunity comes the
responsibility for appropriate use.
…responsible, ethical and legal
manner
Humble ISD users are expected to act in a
responsible, ethical and legal manner, in
accordance with the missions and purposes of the
networks they use on the Internet and with the
laws of Texas and the United States.
…authorized individuals only
School computer systems are for use by
authorized individuals only. Any
unauthorized access to these systems is
prohibited and is subject to criminal and
civil penalties.
Transmitting material in violation
... is prohibited
•illegal activity
•violating software copyright
•degrading or disrupting equipment or system performance
•vandalizing the data of another user
•wastefully using finite resources
•gaining unauthorized access to resources or entities
•invading the privacy of individuals
•using an account owned by another user without authorization
•intentionally transmitting viruses
•installing software onto computers
... use moral and ethical guidelines ...
regarding network use.
Students are expected to use moral and ethical
guidelines in making appropriate decisions
regarding network use. Use of the district network
is not a right, but a privilege, and inappropriate
use will result in cancellation of that privilege.
School and district administrators will decide
what is inappropriate use on the network and their
decision is final. Violations will be dealt with in
accordance with the Humble ISD Student Code of
Conduct policy.
… a security risk will be denied access
...
Security is a high priority due to the number of users.
Identified security problems should be reported to a
system administrator or appropriate teacher immediately
and not shared with other users. Attempts to log on as
another user may result in cancellation of user privileges.
Any user identified as a security risk will be denied
access to the system.
Vandalism will result in cancellation
of user privileges
Vandalism is defined as any deliberate attempt to
harm or destroy data or property of another user, the
Internet/Intranet, or other networks. This includes
the creation of or the uploading of computer
viruses to the Internet/Intranet or host site.
Vandalism will result in cancellation of user
privileges.
installation of any program … must be
approved...
Use of computer software is governed by copyright
laws and network configurations. Care must be taken
to avoid copyright violations and disruptions of the
network related to incompatible or corrupted
software; therefore, installation of any program or
application onto any computer with access to the
Humble ISD electronic network must be approved
by the Superintendent or his designees.
Definitions of Computer Violations
•Inappropriate Use of the Computer
•Instant Messaging
•MP3 Files
•Downloading
•Sharing Log-in (Username and/or Password)
•Games/Web sites not Curriculum Related
•E-mail
Inappropriate Use of the Computer

Definition
Includes any file sharing
program and/or viewing
any site containing
pornography, extreme
violence, drugs, or
weapons

Justification
Inappropriate use of the
network, nonacademic, allows
students to share files,
network security
(allows outside access
to our network files)
Instant Messaging

Definition
The use of any Internetbased chat program

Justification
Non-academic, network
security, student
safety, district/campus
liability
MP3 Files

Definition
Downloading, saving, or
listening to MP3 files,
unless instructed to do so

Justification
Copyright violation,
takes up campus
server space
Downloading

Definition
Saving or installing an
executable program to the
computer

Justification
Takes up campus server
space, network
security, nonacademic,
district/campus liability
Sharing Log-in
(Username and/or Password)

Definition
Giving another student
access to your computer
account

Justification
Student accountability,
accessing of other
student folders can
lead to cheating and
destruction of student
files
Games/Web sites not Curriculum
Related

Definition
Viewing any site or playing a
game that you were not
instructed to

Justification
Non-academic, misuse
of system resources
E-mail

Definition
The use of any Internetbased mail program
unless instructed and
supervised by a teacher

Justification
Non-academic, network
security,
district/campus
liability, student safety