Dell Chromebook 11-3120 Handbook page 6

Table of Contents

Advertisement

The Upper Scioto Valley School District is pleased to make available to students access to interconnected computer
systems within the district and to the Internet, the worldwide network that provides various means of accessing
significant educational materials and opportunities.
In order for the school district to be able to continue to make its computer network and Internet access available,
all students must take responsibility for appropriate and lawful use of this access. Students must understand that
one student's misuse of the network and Internet access may jeopardize the ability of all students to enjoy such
access. While the school's teachers and other staff will make reasonable efforts to supervise student use of
network and Internet access, they must have student cooperation in exercising and promoting responsible use of
this access.
Below is the Acceptable Use and Internet Safety Policy of the Upper Scioto Valley School District and WOCO, the
data acquisition site that provides Internet access to the district. Upon reviewing, signing, and returning this policy
and agreement as the students have been directed, each student will be given the opportunity to have Internet
access at school and will agree to follow the policy. If a student is under 18 years of age, he or she must have his
or her parent or guardian read and sign the policy. The school district cannot provide access to any student who, if
18 or older, fails to sign and submit the policy to the school district or, if under 18, does not return the policy as
directed with the signatures of the student and his or her parents or guardians.
Listed below are the provisions of your agreement regarding computer network and Internet use. If you have any
questions about these provisions, you should contact the principal. If any user violates this policy, the student's
access will be denied, if not already provided, or withdrawn and he or she may be subject to additional disciplinary
action.
A. Personal Responsibility - By signing this policy, you are agreeing not only to follow the rules in this policy,
but are agreeing to report any misuse of the network to the person designated by the school for such
reporting. Misuse means any violations of this policy or any other use that is not included in the policy,
but has the effect of harming another or his or her property.
B. Term of the Permitted Use - A student who submits to the school, as directed, a properly signed policy
and follows the policy to which he or she has agreed will have the computer network and Internet access
during the course of the school year only. Students will be asked to sign a new policy each year during
which they are students at Upper Scioto Valley School District before they are given an access account.
a.
Acceptable Uses - Educational Purposes Only. The School District is providing access to its
computer networks and the Internet for only educational purposes. If you have any doubt about
whether a contemplated activity is educational, you may consult with the person designated by the
school to help you decide if a use is appropriate.
b.
Unacceptable Uses of Network. - Among the uses that are considered unacceptable and which
constitute a violation of this policy are the following:
i. Uses that violate the law or encourage others to violate the law. Don't transmit offensive
ii. Uses that cause harm to others or damage to their property. For example, don't engage in
Upper Scioto Valley School District
Acceptable Use Policy and Agreement
or harassing messages; offer for sale or use any substance which the possession of is
prohibited by the Student Discipline Policy; view, transmit, or download pornographic
materials or materials that encourage others to violate the law; intrude into the networks
or computers of others; and download or transmit confidential, trade secret information,
or copyrighted materials. Even if materials on the networks are not marked with the
copyright symbol, you should assume that all materials are protected unless there is
explicit permission on the materials to use them.
defamation (creating fake profiles or comments that harm someone's reputation); employ
another's password or some other user identifier that misleads message recipients into
believing that someone other than you is communicating or otherwise using his or her

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents