AUP Model
Purpose
- Access and use technology to support learning
- Help prepare students for success
- Parents can decide not to let their child use the technology.
Defining Use
- Respect and protect privacy of others
- use only your account and password
- keep passwords and information private
- Respect and protect security
- Report problems to teacher
- Obey all restrictions
- Don’t go to places without permission
- Respect and protect items that belong to others
- don’t copy things that don’t belong to you
- give credit to the work of others
- Respect and practice working with others
- be kind and respectful
- report things that make you feel uncomfortable or unsafe
- don’t access inappropriate content
- don’t buy, sell, advertise using the school technology
- What you can/may do
- design and create web pages for school items
- use the computer and other tools for educational purposes
- must have teacher’s permission using the technology
Consequences for not following the rules
- Technology usage can be taken away.
- Suspension or Expulsion (kicked out of school)
Supervision and Monitoring
- Teachers and administrators can see everything that is done using the school resources including Google accounts.
- Information in accounts can be used as evidence if something is done that is wrong
- District will put safety filters to help protect students from inappropriate content
itsMasum.Com
[…]Wonderful story, reckoned we could combine a couple of unrelated information, nevertheless actually really worth taking a appear, whoa did one learn about Mid East has got far more problerms also […]
itsMasum.Com
[…]here are some links to sites that we link to due to the fact we consider they’re worth visiting[…]
itsMasum.Com
[…]Every after in a even though we decide on blogs that we read. Listed below are the most up-to-date web pages that we pick out […]
systeme d exploitation
[…]below youll locate the link to some web sites that we assume you need to visit[…]
deux categorie de logiciels malveillants malware
[…]Every after in a even though we pick out blogs that we study. Listed below would be the latest internet sites that we choose […]
salaire ingénieur cybersécurité
[…]the time to read or check out the content material or internet sites we have linked to below the[…]
formations rémunérées
[…]please take a look at the websites we stick to, which includes this 1, because it represents our picks in the web[…]
POLEN FÜHRERSCHEIN
[…]please pay a visit to the web sites we follow, including this one particular, as it represents our picks through the web[…]
nangs sydney
[…]one of our visitors just lately recommended the following website[…]
nangs delivery in Sydney
[…]here are some hyperlinks to web pages that we link to simply because we feel they may be worth visiting[…]
Nangs delivery
[…]that may be the end of this report. Here you will locate some web pages that we feel you will appreciate, just click the links over[…]
chauffe eau Tours
[…]just beneath, are a lot of absolutely not connected web pages to ours, even so, they’re surely worth going over[…]
website
[…]Sites of interest we’ve a link to[…]
url
[…]that could be the end of this post. Here youll find some websites that we think you will value, just click the hyperlinks over[…]
website
[…]although websites we backlink to beneath are considerably not associated to ours, we really feel they’re truly really worth a go by, so possess a look[…]