2020欧洲杯体育足球比分

2020欧洲杯体育足球比分


counter
Technology

L. District Acceptable Use Policy

All district employees’ and students computer or network access shall be governed by the State of Delaware’s Acceptable Use Policy (AUP) currently managed by the Department of Technology and Information (DTI). Every employee and student shall read and acknowledge this document on an annual basis by signature. Each building is responsible for compiling a list of those who have agreed and not agreed to the policy. This list will be housed in the office of each building as stated in section C2, existing policies govern student and employee behavior. The following uses of the District system are considered unacceptable:

1. Personal Safety (Restrictions are for students only)

   a. Users will not post personal contact information about themselves or other people unless such posting involves valid applications for college or employment application and is approved by an appropriate staff member. Personal contact information includes address, telephone, school address, work address, etc.

   b. Users will not agree to meet with someone they have met online without their parent's approval and participation.

   c. Users will promptly disclose to their teacher or other school employees any message they receive that is inappropriate or makes them feel uncomfortable.

2. Illegal Activities

   a. Users will not attempt to gain unauthorized access to the District system or to any other computer system through the District System, or go beyond their authorized access. This includes attempting to log in through another person's account or access another person's files. These actions are illegal, even if only for the purposes of "browsing".

   b. Users will not make deliberate attempts to disrupt the computer system performance or destroy data by spreading computer viruses or by any other means. These actions are illegal.

   c. Users will not use the District system to engage in any other illegal act, such as arranging for a drug sale or the purchase of alcohol, engaging in criminal gang activity, threatening the safety of person, etc.

3. System Security

   a. Users are responsible for the use of their individual account and should take all reasonable precautions to prevent others from being able to use their account. Under no conditions should a user provide their password to another person. If a personal account user is unable to supervise his/her workstation, the user should lock the computer or log off.

   b. Users will immediately notify the school's system administrator if they have identified a possible security problem. Users will not go looking for security problems, because this may be construed as an illegal attempt to gain access.

   c. Users will avoid the inadvertent spread of computer viruses by following the District virus protection procedures if they download software.

4. Inappropriate Language

   a. Restrictions against inappropriate language apply to public messages, private messages, and material posted on Web pages.

   b. Users will not use obscene, profane, lewd, vulgar, rude, inflammatory, threatening, or disrespectful language.

   c. Users will not post information that, if acted upon, could cause damage or a danger of disruption.

   d. Users will not engage in personal attacks, including prejudicial or discriminatory attacks.

   e. Users will not harass another person. Harassment is persistently acting in a manner that distresses or annoys another person. If a user is told by a person to stop sending them messages, they must stop.

   f. Users will not knowingly or recklessly post false or defamatory information about a person or organization.

5. Respect for Privacy

   a. Users will not repost a message that was sent to them privately without permission of the person who sent them the message.

   b. Users will not post private information and/or pictures about another person.

6. Respecting Resource Limits

   a. Users will be respectful of the limited system storage resources and will actively manage their files.

   b. Users will use the system only for educational and professional or career development activities, and limited, high-quality, self-discovery activities.

   c. Individual users will not install applications to local hard drives.

   d. Users will not post chain letters or engage in "spamming". Spamming is sending an annoying or unnecessary message to a large number of people.

   e. Staff users will subscribe only to discussion group mail lists that are relevant to their education or professional/career development.

7. Plagiarism and Copyright Infringement

   a. Users will not plagiarize electronic works. Plagiarism is taking the ideas or works of others and presenting them as if they were original to the user.

   b. Users will respect the rights of copyright owners. Copyright infringement occurs when an individual inappropriately reproduces a work, including electronic media. If a work contains language that specifies acceptable use of that work, the user should follow the expressed requirements. If the user is unsure whether or not they can use a work, they should request permission from the copyright owner.

8. Inappropriate Access to Material and Inappropriate Network Usage

   a. Users will not use the District system to access material that is pornographic in nature, profane or obscene that advocates illegal acts, or that advocates violence or discrimination towards other people (hate literature). For students, a special exception may be made for the purpose of such access to conduct research and follows the guidelines in section J2. District employees may access the above material only in the context of legitimate research.

   b. If a user inadvertently accesses such information, he/she should immediately disclose the inadvertent access in a manner specified in the District handbook. This will protect users against an allegation that they have intentionally violated the Acceptable Use Policy.

  c. Steps shall be taken by the district to promote the safety and security of the district’s users of its online computer network when using electronic mail, chat rooms, instant messaging, and other forms of direct electronic communication.

   d. As required by the Children’s Internet Protection Act, prevention of inappropriate network usage includes: (1) unauthorized access, including so-called ‘hacking,’ and other unlawful activities; and (2) unauthorized disclosure, use, and dissemination of personal identification information regarding minors.

9. Internet Safety Policy

   a. The Children’s Internet Protection Act (CIPA) requires all LEAs that receive erate funding comply with the revised regulations. The Milford School District receives e-rate funding and must comply with the revised regulations.

   b. The revised regulations require that the district shall adopt and teach an internet safety curriculum to students and reflect the adoption of that internet safety curriculum.

   c. The curriculum must include the following topic areas:

       i. Safety on the internet
       ii. Appropriate behavior while online, on social networking web sites, and in chat rooms; and
      iii. Cyberbullying awareness and response

   d. DTI (Department of Technology and Information) files e-rate applications on behalf of all Delaware LEAs. DTI will need to certify on the application that the school district is in compliance with CIPA and the revised regulation concerning the Internet Safety Policy.

   e. Annually after review and verification of each school district’s revised Internet Safety Policy, DCET/DOE will inform DTI that the LEAs policy is in compliance so that DTI can certify compliance on the e-rate application.


​​​​​​​This document was based on POC Approval by DTI: Cabinet Secretary – State Chief Information Officer, June 5, 2006. The document DTI 0042.02 was modified to reflect the needs of the Milford School District community and permission to use in this manner was granted by the author. Information on the State-funded Internet Safety Curriculum, iSAFE, can be found at http://www.dcet.k12.us/instructiona/internetsafety/index.shtml. LEAs may elect to use the curriculum or select one that they prefer.

AMENDED: 3/17/08; 9/28/09; 7/14/14


Educational Excellence for the Success of All Students