MODEL ACCEPTABLE USE POLICY
INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS

The school's information technology resources, including email and Internet access, are provided for educational purposes. Adherence to the following policy is necessary for continued access to the school's technological resources:

Students must

  1. Respect and protect the privacy of others.
  2. Respect and protect the integrity, availability, and security of all electronic resources.
  3. Respect and protect the intellectual property of others.
  4. Respect and practice the principles of community.
Students may, if in accord with the policy above
  1. Design and post web pages and other material from school resources.
  2. Use direct communications such as IRC, online chat, or instant messaging with a teacher's permission.
  3. Install or download software, if also in conformity with laws and licenses, and under the supervision of a teacher.
  4. Use the resources for any educational purpose.

Consequences for Violation. Violations of these rules may result in disciplinary action, including the loss of a student's privileges to use the school's information technology resources.

Supervision and Monitoring. School and network administrators and their authorized employees monitor the use of information technology resources to help ensure that uses are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any data found on the school's information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property. They may also use this information in disciplinary actions, and will furnish evidence of crime to law enforcement.

I ACKNOWLEDGE AND UNDERSTAND MY OBLIGATIONS:

__________________________________________    __________________________
Student      Date
__________________________________________     __________________________
Parent/Guardian      Date

PARENTS, PLEASE DISCUSS THESE RULES WITH YOUR STUDENT TO ENSURE HE OR SHE UNDERSTANDS THEM.

THESE RULES ALSO PROVIDE A GOOD FRAMEWORK FOR YOUR STUDENT'S USE OF COMPUTERS AT HOME, AT LIBRARIES, OR ANYWHERE.

FOR MORE INFORMATION, SEE www.cybercrime.gov.