Mrs. McCormack's Grade 8 Class

ACCEPTABLE USE POLICY
Home | NEWSLETTER | MEET THE TEACHER | UPCOMING ASSIGNMENTS & EVENTS | TODAY'S HOMEWORK | CLASS WEB PAGES | ACCEPTABLE USE POLICY | HOMEWORK POLICY | USEFUL LINKS | TIMETABLE

internet: The Network is provided for students/users to conduct research and communication for academic purposes only as determined by the District curricula. Independent access to network services is provided to students/users who agree to act in a considerate and responsible manner. Access is a privilege, not a right, and entails responsibility. Students are responsible for appropriate behavior/communication on school computer networks, just as they are in classrooms or school buildings.

Network storage areas may be treated like school lockers. All network administrators/teachers may review files and communications to maintain system integrity and ensure responsible use of the Internet by requesting a search history of websites visited to ensure that such use meets the District intent as a tool for academic purposes. Files stored on District servers are not private.

Communications are public and often uncensored and students may come in contact with material that is controversial or inaccurate from all around the world. The District has no control over the nature or content of information from other computer systems and disclaims any responsibility to exercise such control. The District is also not responsible for the accuracy or appropriateness of information retrieved,or for lost, damaged or unavailable information. Outside of school, families must bear the responsibility for such guidance as they also must do with information sources such as television, telephone, movies, radio and other potentially offensive media. Parents may revoke their students' Internet/E-mail privileges at any time by notifying the school in writing.

The following are not permitted:

1. Sending, accessing, downloading or displaying offensive messages or pictures.

2. Using obscene language.

3. Harassing, insulting or attacking others.

4. Damaging computers, systems or networks.

5. Violating copyright laws.

6. Using passwords of others.

7. Sharing passwords of others.

8. Trespassing in others' folders, work or files.

9. Employing the network for commercial purposes.

10. Providing personal information such as names, addresses, phone numbers, card numbers,etc.