Matching

Students will use computers in conformity with laws of the United States and the State of Texas. Violations include, but are not limited to, the following:

1- Criminal Acts       (C)

2- Libel Laws             (A)

3- Copyright Violations          (B)

True or False

a) Publicly defaming people through either published (or the publishing of) material on the Internet, email, etc.

b) Copying, selling, or distributing copyrighted material without the express written permission of the author or publisher (users should assume that all materials available on the Internet are protected by copyright); engaging in plagiarism (using others’ words or ideas as your own).

c) “hacking” or attempting to access computer systems without authorization, harassing email, cyber bullying, cyber stalking, child pornography, vandalism, and/or unauthorized tampering with computer systems.

_F__ 4. Email and other electronic communication by students is confidential.

__T_ 5. Electronic communication may be monitored at any time by designated District staff to ensure appropriate use for educational or administrative purposes.

__F_ 6. Students may allow others to use their account names and passwords or use those of others. ___ 7. Be polite and use appropriate language in email messages, online postings, and other digital communications.

__T_ 8. Not use computers, handheld computers, cell phones, personal digital devices, or the Internet to post or send hate or harassing mail, pornography; make discriminatory or derogatory remarks about others; or engage in bullying, harassment, or other antisocial behaviors either at school or at home.

_T__ 9. Students will be held responsible for how they represent themselves and their schools and District in all online activities, including on social network sites such as Facebook or MySpace.

__F_ 10. Students are encouraged to pretend to be someone else when online to protect their own information.

_F__ 11. Students will avoid using any technology in such a way that would disrupt the activities of others.

_T__ 12. Students will use technology resources productively and responsibly for school-related purposes.

_T__ 13. Students will not attempt to bypass, or circumvent, District security settings or Internet filters.

_F__ 14. As long as it is for educational purposes only, students are exempt from copyright laws.

__T_ 15. Inappropriate use of technology and computer systems can result in ISS and other consequences.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s