Abdul-Rahim Muhammad_AUP Presentation

Category: Education

Presentation Description

AUP Presentation


Presentation Transcript

Spring Branch ISD Guidelines:

Spring Branch ISD Guidelines Abdul-Rahim Muhammad EDTC 630 University of Maryland

Electronic Communications System:

Electronic Communications System What you will be observing today are highlights of Spring Branch’s acceptable use policy, termed, “SBISD Electronic Communication and Data Management Guidelines .” To begin, the District Superintendent or designee has the responsibility of overseeing Spring Branch’s electronic communications system . The District is responsible for training on the system’s proper and ethical use, and providing all users with copies of the acceptable use guidelines.


Copyrights There is a strong emphasis on copyrights and their protection. Copyrighted software must have the permission of the copyright holder in order to be used on the system. Any original work by a district student must have written guardian consent before being posted on a web page.

System Access:

System Access Access to the electronic communication system is given by the teacher to the students. The District recommends that passwords to the system are changed periodically. Finally, the guidelines state, Any system user identified as a security risk or as having violated District and/or campus computer use guidelines may be denied access to the District's system .

District Responsibilities:

District Responsibilities The Superintendent or designee will: 1. Disseminate and enforce the policies 2. Ensure the agreements are signed, filed with the principal or supervisor’s office, and abided by all users 3. Ensure supervisors of students are providing appropriate training on the system 4. Ensure that all software loaded on computers in the District is consistent with District standards and is properly licensed . 5. Be authorized to monitor all system activities 6. Set limits for data storage on the system

User Responsibilities:

User Responsibilities Users of the electronic communications system should understand that access to the system is a privilege. Therefore, it is their responsibility to know all the rules for system use. Users here mean all system users; students, teachers, and all given access within the district. The district will try to block all bad content that comes through the system, but users must take the initiative, as this blocking is not completely full-proof. Users have some freedom in use of the system (not strictly educational) but the user is accountable for proper use of the system. There is a list of inappropriate uses, such as downloading copyrighted software without permission from the copyright holder, and distributing personal information about themselves or others without guardian consent .

Consequences for Inappropriate Use:

Consequences for Inappropriate Use Consequences of misuse include suspension from access to the system, canceling of the system account , or disciplinary or legal action . These consequences depend on the severity of the action.

Vandalism, Hacking and Forgery:

Vandalism, Hacking and Forgery Special mention was given to vandalism in physical form, hacking (virtual), and forgery. These violations are obviously of the grave offense types, and were explicitly discussed in SBISD’s guidelines .

Objectionable Content:

Objectionable Content Students must notify the supervising teacher if he/she comes across material while using the system which is either inaccurate and/or objectionable . The student will first discontinue access, then notify the supervising teacher. However , the SBISD guidelines are vague on what “inaccurate” or “objectionable” means . There is a link to a Student Code of Conduct which may be more specific .

Chat rooms and Newsgroups:

Chat rooms and Newsgroups Students are allowed to participate in chat rooms and newsgroups. However, the guidelines do not make mention of social networking applications, such as Facebook, Twitter, blogs, wikis, an so on. This should be updated within the SBISD guidelines . The Student Code of Conduct also appears silent on these Web 2.0 technologies.

Network Etiquette:

Network Etiquette The SBISD lists some network etiquettes users of the system should follow. Examples include not typing in CAPS because it is considered shouting and rude , or pretending to be someone else when sending or receiving emails.

Termination of System Accounts:

Termination of System Accounts The Guidelines state , Termination of an employee's or a student's access for violation of District policies or regulations will be effective on the date the Principal or District Coordinator receives notice of student withdrawal or of revocation of system privileges, or on a future date if so specified in the notice .

Web Page Publication Requirements:

Web Page Publication Requirements SBISD’s guidelines have placed strong emphasis on proper website creation and publishing. Within its 7-page document, almost three pages have been devoted to rules, requirements, and procedures needed to be taken in order for a Web page to be published to the District’s computer system. The introduction to the section states , A Web page is created under the auspices of the campus principal or administrative department head. A Web page can be created by any web page creation software or straight HTML. However, pages must reflect good coding practices and will NOT be published if they do not meet acceptable requirements by the Web Development Committee . The sections in the Guidelines are: Requirements for Web Page Publication, Campus Web Site Content Requirements, and Department Web Site Content Requirements


Disclaimer SBISD’s disclaimer states: The District's system is provided on an as is, as available basis. The District does not make any warranties , whether expressed or implied, including, without limitation, those of merchantability and fitness for a particular purpose with respect to any services provided by the system and any information or software contained therein. The District does not warrant that the functions or services performed by, or that the information or software contained on the system will meet the system user's requirements, or that the system will be uninterrupted or error free, or that defects will be corrected. Opinions, advice, services, and all other information expressed by system users, information providers, service providers, or other third-party individuals in the system are those of the providers and not the District. The District will cooperate fully with local, state, or federal officials in any investigation concerning or relating to misuse of the District's electronic communications system.


References SBISD Electronic Communication and Data Management Guidelines taken from http :// www.springbranchisd.com/instruc/elec-data.htm *The Student Code of Conduct and other material can be obtained from http://www.springbranchisd.com/admin/administration/admin-index.htm Slide 1 Cover Slide Image taken from http :// www.acceptableusepolicy.org/wp- content/uploads/2011/03/Acceptable-Use-Policy-1024x1024.jpg Slide 2 Electronic Communications Systems Image taken from http :// www.ectinschools.org/images/design/starter/comm/image001.jpg Slide 3 Copyright symbol Image taken from http :// www.thinkstockphotos.com Slide 4 System Access Image taken from http ://vermontjudiciary.org/MasterImage/Wireless.jpg Slide 5 District Responsibilities Image taken from http :// www.hcad.org/maps/ISD/SpringBranch.gif Slide 6 User Responsibilities image taken from https://mycampus.asurams.edu/image/image_gallery?uuid=5d2d6c08-ae62-47d3-8f69-217bed0edcff&groupId=10124&t=1289273143468


References Slide 7 Consequences for Inappropriate Use image taken from http://electricka.com/etaf/2a_pseudo_components/alert_components/alert_images/warning_danger/Caution%202.jpg Slide 8 Vandalism, Hacking and Forgery Vandalism image taken from http ://www.nachi.org/images10/burnedlaptop.jpg Forgery image taken from http:// www.houstondocumentexaminer.com/wp-content/uploads/2011/05/forgery2-1024x466.jpg Hacking image taken from http:// chinalawandpolicy.com/wp-content/uploads/2010/04/hacked-computer-june08.jpg Slide 9 Objectionable Content image taken from http://indiacurrentaffairs.org/wp-content/uploads/2011/08/ Objectionable-Content-on-Websites.jpg


References Slide 10 Chat Rooms and Newsgroups Image taken from http://tychousa3.umuc.edu/EDTC630/1202/9040/class.nsf/ Chat?OpenForm&Class Slide 11 Net Etiquette Image taken from http ://wings.avkids.com/SPIT/Images/netiquette.gif Slide 12 Termination of System Accounts Image taken from http :// oit.boisestate.edu/accounts/files/2010/09/accounts.jpg Slide 13 Website Publication Requirements Image taken from http :// fc05.deviantart.net/fs48/f/2009/216/d/b/World_Wide_Web_by_e_designer.jpg Slide 14 Disclaimer Image taken from http :// eagleincomemarketing.com/wp- content/uploads/2011/06/Disclaimer-1.jpg

PowerPoint Presentation:

The End

authorStream Live Help