Download Print this page

Lenovo Thinkpad X131e Chromebook Policy Handbook page 10

Chromebook
Hide thumbs Also See for Thinkpad X131e Chromebook:

Advertisement

Legal Propriety:
● All students and staff must comply with trademark and copyright laws and all license
agreements. Ignorance of the law is not immunity. If you are unsure, ask the network
administrator if you are in compliance with the law.
● Plagiarism is a violation of HW Mountz discipline code. Give credit to all sources used,
whether quoted or summarized. This includes all forms of media on the Internet, such
as graphics, movies, music, and text.
Email:
● Students in need of email for academic reasons will only be allowed email access
through an address assigned by the district. This email access will be through a Google
Gmail system managed by the Spring Lake School District. The interface is heavily
monitored by network administrators and is subject to filtering or inappropriate
content.
● Always use appropriate language.
● Do not transmit language/material that is profane, obscene, abusive, or offensive to
others.
● Do not send mass e-mails, chain letters, or spam.
● No private chatting during class without permission is allowed.
● Email is subject to inspection at any time by school administration.
● Students will only be able to communicate with other HW Mountz students and faculty.
Consequences:
● The student or staff member whose name a system account and/or computer hardware
is issued will be responsible at all times for its inappropriate use. Non-compliance with
the policies of the Chromebook Policy Handbook or HW Mountz's Acceptable Use Policy
will result in disciplinary action as outlined by the discipline code and/or other school
policies for the user unless there is proof that another is responsible.
● Electronic mail, network usage, and all stored files shall not be considered confidential
and may be monitored at any time by the network administrator or other school
administrators to ensure appropriate use. HW Mountz School fully cooperates with
local, state, or federal officials in any investigation concerning or relating to violations of
computer crime laws.
10

Advertisement

loading