SlideShare a Scribd company logo
Why do schools need an acceptable use policy?
Schools  are incorporating computers and use of the internet into the learning environment in multiple ways
The internet is    a powerful educational tool offering instant access to information
students and teachers  can  now access more information than any school  library  could ever provide before.
 
 
Educators   have to respond There have been efforts to censor information or b an  internet access. These approaches are becoming unrealistic in the age of digital information .
“” Teaching students responsible behavior,  asking them to sign an  agreement,  and providing written descriptions  of the consequences for wrongful actions” provide a different approach for educators. These agreements are called  Acceptable Use Policies  (AUP)
What is an acceptable use policy?
An AUP specifically outlines acceptable uses, rules of on-line behavior, and access privileges. Also covered are penalties for violations of the policy, including security violations and vandalism of the system A written agreement outlining the terms and conditions of Internet use
A legally binding document signed by the educator, parents and the student. Acceptable Use policies (AUP)
Most AUP’s   outline
INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS  The school's information technology resources, including email and Internet access, are provided for educational purposes. Adherence to the following policy is necessary for continued access to the school's technological resources:  Students must   Respect and protect the privacy of others.   Use only assigned accounts.  Not view, use, or copy passwords, data, or networks to which they are not authorized.  Not distribute private information about others or themselves.  Respect and protect the integrity, availability, and security of all electronic resources.   Observe all network security practices, as posted.  Report security risks or violations to a teacher or network administrator.  Not destroy or damage data, networks, or other resources that do not belong to them, without clear permission of the owner.  Conserve, protect, and share these resources with other students and Internet users.  Respect and protect the intellectual property of others.   Not infringe copyrights (no making illegal copies of music, games, or movies!).  Not plagiarize.  Respect and practice the principles of community.   Communicate only in ways that are kind and respectful.  Report threatening or discomforting materials to a teacher.  Not intentionally access, transmit, copy, or create material that violates the school's code of conduct (such as messages that are pornographic, threatening, rude, discriminatory, or meant to harass).  Not intentionally access, transmit, copy, or create material that is illegal (such as obscenity, stolen materials, or illegal copies of copyrighted works).  Not use the resources to further other acts that are criminal or violate the school's code of conduct.  Not send spam, chain letters, or other mass unsolicited mailings.  Not buy, sell, advertise, or otherwise conduct business, unless approved as a school project.  Students may, if in accord with the policy above  Design and post web pages and other material from school resources.  Use direct communications such as IRC, online chat, or instant messaging with a teacher's permission.  Install or download software, if also in conformity with laws and licenses, and under the supervision of a teacher.  Use the resources for any educational purpose.  Consequences for Violation.  Violations of these rules may result in disciplinary action, including the loss of a student's privileges to use the school's information technology resources.  Supervision and Monitoring.  School and network administrators and their authorized employees monitor the use of information technology resources to help ensure that uses are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any data found on the school's information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property. They may also use this information in disciplinary actions, and will furnish evidence of crime to law enforcement.  I ACKNOWLEDGE AND UNDERSTAND MY OBLIGATIONS:   __________________________________________    __________________________ Student      Date __________________________________________     __________________________ Parent/Guardian      Date  PARENTS, PLEASE DISCUSS THESE RULES WITH YOUR STUDENT TO ENSURE HE OR SHE UNDERSTANDS THEM. THESE RULES ALSO PROVIDE A GOOD FRAMEWORK FOR YOUR STUDENT'S USE OF COMPUTERS AT HOME, AT LIBRARIES, OR ANYWHERE.  FOR MORE INFORMATION, SEE www.cybercrime.gov.  MODEL ACCEPTABLE USE POLICY
AUP’s are not the perfect solution.  They do not absolve a school system of liability and they are not the only method of  dealing with student use of technology.
When designed and used appropriately, respecting the rights and responsibilities of the school, the educator and the student,  an AUP can be a useful tool in guiding technology uses by students in the educational setting.

More Related Content

PPT
Acceptable use policy
PPT
Acceptable use policy
PPTX
Acceptable use policy
PPT
Acceptable use policy CHFHS
PDF
Internet usage policy(1)
DOC
Internet policy[1]
PPT
Internet Acceptable Use Policy
DOCX
StudentAcceptableUsePolicySDPEdit
Acceptable use policy
Acceptable use policy
Acceptable use policy
Acceptable use policy CHFHS
Internet usage policy(1)
Internet policy[1]
Internet Acceptable Use Policy
StudentAcceptableUsePolicySDPEdit

What's hot (20)

PPT
Rachel nachman aup policy project
PPT
Acceptable use policy__ecomp_6204
PDF
Arlington Classics Academy - Acceptable Use Policy
KEY
Intro - digitalcitizens
PPTX
CIPA Children's Internet Protection Act
PPTX
Security
PPSX
D33 AUP
PPT
Understanding CIPA to Fight the Filter
DOCX
Social media policy
PPT
Telecommunications policy 2010 2011
PPT
Teaching Ethical and Legal use of Technology in the Classroom
PPTX
Legal and ethical issues for using technology in the classroom
PPTX
The legal, safe and ethical use of technology in the classroom
PPT
CIPA Overview
PPTX
Legal & ethical issues when implementing technology
PPTX
Legal, Ethical, and Social Issues in Educational Computing
PPT
Filtering in schools
PPTX
Et 508 week 3 faculty and staff training session
PPTX
Text me the answer fetc 2013
PPTX
Fall 2011 onslow connect parent meeting ppt
Rachel nachman aup policy project
Acceptable use policy__ecomp_6204
Arlington Classics Academy - Acceptable Use Policy
Intro - digitalcitizens
CIPA Children's Internet Protection Act
Security
D33 AUP
Understanding CIPA to Fight the Filter
Social media policy
Telecommunications policy 2010 2011
Teaching Ethical and Legal use of Technology in the Classroom
Legal and ethical issues for using technology in the classroom
The legal, safe and ethical use of technology in the classroom
CIPA Overview
Legal & ethical issues when implementing technology
Legal, Ethical, and Social Issues in Educational Computing
Filtering in schools
Et 508 week 3 faculty and staff training session
Text me the answer fetc 2013
Fall 2011 onslow connect parent meeting ppt
Ad

Similar to Acceptable use policy[1] (20)

PPTX
A Guide to Acceptable USe Policies in Education
PPTX
School policies, procedures and contracts
DOC
Ferrari v policy
DOC
Acceptable Internet Use In Schools
KEY
Tech Policies
PPTX
Acceptable use policy
PPTX
Aup ppt
PPTX
Aup presentation tomes
PPSX
Acceptable Use Policy
PPT
Technology acceptable use policy gr 7 day 1
PPT
CMS Technology acceptable use policy
DOCX
Presentation planning-sheet
PPS
AUR briefing 2011-12
PPT
Technology acceptable use policy for students 08202011[1]
PPT
Technology acceptable use policy for students 08202011[1]
PDF
Topic 5 Aup
DOCX
SAFETY ISSUES NOTES.docx
PPT
21st Century Learning Initiative Training Slideshow
PPT
Primary Au Pkids
PPTX
LEGAL ANND ETHICAL USE OF TECHNOLOGY
A Guide to Acceptable USe Policies in Education
School policies, procedures and contracts
Ferrari v policy
Acceptable Internet Use In Schools
Tech Policies
Acceptable use policy
Aup ppt
Aup presentation tomes
Acceptable Use Policy
Technology acceptable use policy gr 7 day 1
CMS Technology acceptable use policy
Presentation planning-sheet
AUR briefing 2011-12
Technology acceptable use policy for students 08202011[1]
Technology acceptable use policy for students 08202011[1]
Topic 5 Aup
SAFETY ISSUES NOTES.docx
21st Century Learning Initiative Training Slideshow
Primary Au Pkids
LEGAL ANND ETHICAL USE OF TECHNOLOGY
Ad

Acceptable use policy[1]

  • 1. Why do schools need an acceptable use policy?
  • 2. Schools are incorporating computers and use of the internet into the learning environment in multiple ways
  • 3. The internet is a powerful educational tool offering instant access to information
  • 4. students and teachers can now access more information than any school library could ever provide before.
  • 5.  
  • 6.  
  • 7. Educators have to respond There have been efforts to censor information or b an internet access. These approaches are becoming unrealistic in the age of digital information .
  • 8. “” Teaching students responsible behavior, asking them to sign an agreement, and providing written descriptions of the consequences for wrongful actions” provide a different approach for educators. These agreements are called Acceptable Use Policies (AUP)
  • 9. What is an acceptable use policy?
  • 10. An AUP specifically outlines acceptable uses, rules of on-line behavior, and access privileges. Also covered are penalties for violations of the policy, including security violations and vandalism of the system A written agreement outlining the terms and conditions of Internet use
  • 11. A legally binding document signed by the educator, parents and the student. Acceptable Use policies (AUP)
  • 12. Most AUP’s outline
  • 13. INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including email and Internet access, are provided for educational purposes. Adherence to the following policy is necessary for continued access to the school's technological resources: Students must Respect and protect the privacy of others. Use only assigned accounts. Not view, use, or copy passwords, data, or networks to which they are not authorized. Not distribute private information about others or themselves. Respect and protect the integrity, availability, and security of all electronic resources. Observe all network security practices, as posted. Report security risks or violations to a teacher or network administrator. Not destroy or damage data, networks, or other resources that do not belong to them, without clear permission of the owner. Conserve, protect, and share these resources with other students and Internet users. Respect and protect the intellectual property of others. Not infringe copyrights (no making illegal copies of music, games, or movies!). Not plagiarize. Respect and practice the principles of community. Communicate only in ways that are kind and respectful. Report threatening or discomforting materials to a teacher. Not intentionally access, transmit, copy, or create material that violates the school's code of conduct (such as messages that are pornographic, threatening, rude, discriminatory, or meant to harass). Not intentionally access, transmit, copy, or create material that is illegal (such as obscenity, stolen materials, or illegal copies of copyrighted works). Not use the resources to further other acts that are criminal or violate the school's code of conduct. Not send spam, chain letters, or other mass unsolicited mailings. Not buy, sell, advertise, or otherwise conduct business, unless approved as a school project. Students may, if in accord with the policy above Design and post web pages and other material from school resources. Use direct communications such as IRC, online chat, or instant messaging with a teacher's permission. Install or download software, if also in conformity with laws and licenses, and under the supervision of a teacher. Use the resources for any educational purpose. Consequences for Violation. Violations of these rules may result in disciplinary action, including the loss of a student's privileges to use the school's information technology resources. Supervision and Monitoring. School and network administrators and their authorized employees monitor the use of information technology resources to help ensure that uses are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any data found on the school's information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property. They may also use this information in disciplinary actions, and will furnish evidence of crime to law enforcement. I ACKNOWLEDGE AND UNDERSTAND MY OBLIGATIONS: __________________________________________    __________________________ Student      Date __________________________________________     __________________________ Parent/Guardian      Date PARENTS, PLEASE DISCUSS THESE RULES WITH YOUR STUDENT TO ENSURE HE OR SHE UNDERSTANDS THEM. THESE RULES ALSO PROVIDE A GOOD FRAMEWORK FOR YOUR STUDENT'S USE OF COMPUTERS AT HOME, AT LIBRARIES, OR ANYWHERE. FOR MORE INFORMATION, SEE www.cybercrime.gov. MODEL ACCEPTABLE USE POLICY
  • 14. AUP’s are not the perfect solution. They do not absolve a school system of liability and they are not the only method of dealing with student use of technology.
  • 15. When designed and used appropriately, respecting the rights and responsibilities of the school, the educator and the student, an AUP can be a useful tool in guiding technology uses by students in the educational setting.

Editor's Notes

  • #9: www.isafe.org
  • #11: ( Classroom Connect, December 1994-January, 1995 issue).
  • #13: www.isafe.org
  • #14: www.justice.gov/criminal/.../rules/ acceptableUsePolicy