0% found this document useful (0 votes)
101 views19 pages

Technology Acceptable Use Policy (AUP)

Uploaded by

NESTOR SANDOVAL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views19 pages

Technology Acceptable Use Policy (AUP)

Uploaded by

NESTOR SANDOVAL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Technology Acceptable Use

Policy (AUP)

Technology Acceptable Use


Policy (AUP)
Student Edition

I. OVERVIEW

Access to information technology is critical to our institution's educational


mission and purpose. It is employed in a variety of contexts, including instruction,
activity, service, research, and operation. This policy establishes guidelines for the
use of technology in the classroom. It is critical for students to realize that these
regulations are designed to supplement, not replace, existing school policies.
Education leaders must follow legislative standards for employee conduct
regulations, which include permissible use of technology, relationships, and
communication.

PSHN-Umiray Extension stresses the use of technology in education for


learners and teachers to learn, interact, communicate, and acquire skills for job, life,
and citizenship. To promote its mission and goals, the school supports the proper
use of computers, networks, and technological resources. Before accessing the
school's network and other technology, as well as any individually owned devices,
students should read and understand the policies. Technology as a privilege entails
personal responsibility. Before utilizing school electronic tools, students must
understand and agree to the requirements outlined in this policy.

To support educational objectives and improve student accomplishment, the


school provides computer equipment, services, and internet connection. The school
is responsible for providing current hardware, software, peripherals, internet access,
proper internet safety instruction, a safe environment, ongoing technology
professional development, monitoring network activity, and allowing system
administrators and teachers to review and adjust policies as needed. Access to
resources is regarded a privilege that can be revoked at any time. Failure to comply
will result in disciplinary action. The policy covers all PSHN-Umiray Extension
technologies, including computers, equipment, personal devices, and virtual learning
platforms. The school has the right to make decisions about appropriate use
practices and to change this policy at any time.
II. DEFINITIONS

Bandwidth is the quantity of data that can be transmitted in a given length of time.

Cyberbullying occurs when someone sends insulting or threatening texts and/or


pictures via a technical medium in order to mock or belittle another person.

Information Systems refers all electronic methods used to produce, store, access,
transfer, and utilise data, information, or communications in the course of
administrative, educational, research, or service operations.

Mobile Device refers to any portable electronic device that performs some of the
features of a computer, a cell phone, a music player, and a camera.

The network refers to the computers, mobile devices, and other digital electronic
equipment at the school (such as printers/copiers, interactive whiteboards,
projectors, and so on), as well as the wired and/or wireless communications network
on which they function.

School systems and networks (collectively, "System") refer to any arrangement of


hardware and/or software utilized on or off school grounds.

The word "user" refers to anyone who uses or seeks to use technology owned by
the institution. This covers all students, instructors, staff, parents, and visitors to the
school.

III. SCOPE

The System is exclusively meant for educational and instructional purposes.


Incidental, personal usage is permitted only if it is acceptable for a school context, is
not detrimental to the school's operations or mission, and is not excessive or to the
exclusion of the student's studies or school. This document's policies are meant to
encompass all available technologies, not just those expressly stated.
This Student Acceptable Use Policy describes the principles and practices
that students are expected to follow when using school technology or personal
devices on campus. Technology and the internet are designed to be used for
instructional purposes.

 All network activity or use of school technology may be monitored and


recorded.
 In compliance with our policies and regulatory restrictions, access to online
material over the network may be restricted.
 Online and offline, students are required to follow the same principles for good
behavior and polite behavior.
 It will not be permitted to engage in dishonorable content.
 Misappropriation of school resources may result in disciplinary action.
 We make a reasonable effort to guarantee students' online safety and
security, but we will not be held liable for any loss or damages caused by the
abuse of school technology.

IV. RESPONSIBILITIES

A. School Responsibilities
1. To develop and publish a school-wide Acceptable Use Policy.
2. To review it annually and amend the policy at any time.
3. To be free from liability for presence of unacceptable materials
4. To comply with Government and Department Regulations
5. To assist authorities in criminal investigations
6. To be free of financial obligations imposed as a result of unlawful system use
7. To oversee resources including scheduling
8. to impose realistic constraints on systems and technologies
9. To maintain the system on a regular basis
10. To search individual Internet activity with reasonable suspension
11. To be the owner of all files on the school network
12. To be free from liability for the presence of inappropriate items on the school's
computer system.
13. To offer a filtration mechanism as a safeguard.
14. To give personnel with opportunity for technological training
15. To bypass passwords to determine activity
16. To publish student works on its websites
17. To restrict student/staff access

B. Student Responsibilities
1. Students shall respect and use all PSHN-Umiray Extension technological
equipment properly.
2. While using the network and the Internet, students shall respect the privacy of
others.
3. Malicious network/Internet use is forbidden. No student may use harsh
language or harass or abuse another student.
4. Students will not use the Internet to post personal information about
themselves or others.
5. Students learn that cyberbullying is a crime that can result in lawsuits,
penalties, or jail time.
6. Students shall not mention PSHN-Umiray Extension or its staff members in e-
mails, blogs, wikis, texts, social media, networks, and so on.
7. Students will not consent to meet with someone they met on the Internet.
8. Students shall immediately notify their teacher if they acquire any content that
is improper or makes them feel uncomfortable.
9. Personal iPods, smartphones, smartwatches, camera phones, digital
cameras, gaming devices, laptop computers, or any other gadget are not
permitted in school, on school buses, or on field trips. Devices will be seized,
and parents will be responsible for bringing them to school.
10. Students must ensure that any flash drives, zip drives, DVDs, or other media
brought from home include the necessary files.
11. Students will not edit, alter, or meddle with the settings of any school
computer or device.
12. Students will not conduct personal or private business on the
network/Internet. Vanity searches are included.
13. During the school day, students will NOT order any goods or services from
the Internet, nor will they react to any e-mail solicitations from websites.
14. Students will NOT download, copy, modify, or transmit any software or
documentation available on the Internet or on school-owned devices. This is a
breach of copyright laws and a misuse of other people's information.
15. Students must reference (give credit to the author) any information obtained
from the Internet due to copyright regulations. Failure to do so is plagiarism,
which can lead to failing grades, penalties, or other legal consequences.
16. Students should be aware that information obtained through the Internet is not
necessarily reliable. Cross-referencing information obtained from the Internet
with other sources is recommended.
17. Without the special approval or direction of the supervising teacher, students
will NOT play games or use computer resources for non-academic purposes.

C. Parental Responsibilities
1. Parents should discuss expectations and family values with their children to
guide their technology-related activities. While filtering software and teacher
supervision can help students avoid objectionable material, parental help is
crucial for moral responsibility.
2. Students are not authorized to place any online orders. Families are
responsible for any expenditures incurred by students if this occurs.
3. PSHN-Umiray Extension's stringent content screening prevents students from
joining any mailing lists that become available over the Internet. However, if a
student joins a list, any penalties are the parents' responsibility.
4. Personal e-mail is not authorized at school. The school is not liable for any
Internet activity that occurs at home, although it has the right to intervene if
the school's reputation is compromised.
5. The Internet is a fluid environment, allowing constant change in information
availability. Teachers cannot guarantee accuracy, and parents and students
should verify information with reliable sources, whether at home or school.
6. Parents must be aware of copyright laws, as failure to cite material, unlawful
downloads, and illegal copies constitute plagiarism. Parents bear
responsibility for fines.
7. Parents must supervise internet use at home, ensuring age-appropriate
downloads and compliance with codes on devices like iPads, gaming devices,
and smartwatches.

D. Individual Responsibilities

1. Must adhere to security measures

2. Reporting unlawful acts

3. To report inappropriate language or objectionable Internet behavior

4. To report equipment or system damage or tampering

5. To report privacy breaches

V. OWNERSHIP

All electronic files generated, sent, received, or kept on PSHN-Umiray


Extension owned, leased, or administered equipment or otherwise under PSHN-
Umiray Extension custody and control are PSHN-Umiray Extension property.

VI. PRIVACY

Electronic files on PSHN-Umiray Extension's equipment are not private and


can be accessed by IT employees without user knowledge. Electronic file content
may also be accessed by appropriate personnel in accordance with directives from
the School Head. The School has the right to monitor and track online and
technology-related behaviors, and to investigate reports of inappropriate actions.
Inspecting emails, messages, on-campus web browsing, and files saved on school-
owned technology is possible. Students should have limited expectations of privacy
when using their own technology on school property or at events. The school will not
interfere with student technology use unless it violates policy, law, or compromises
the safety and well-being of the school community. Internet access is filtered and
monitored, with the school retaining the right to monitor activities that utilize school-
owned technology. This filtering aims to block offensive, obscene, and inappropriate
images and content, including pornography.

VII. SECURITY

PSHN-Umiray Extension proprietary information stored on electronic and


computing devices, whether owned or leased by PSHN-Umiray Extension, the
employee, or a third party, remains the sole property of PSHN-Umiray Extension. All
proprietary information must be protected through legal or technical means. Users
must report theft, loss, or unauthorized disclosure of PSHN-Umiray Extension
proprietary information and computer security weaknesses, as well as potential
misuse or violation of the agreement.

The Password Policy requires system and user-level passwords to be secure.


Authorized users must not share login IDs, PINs, or security tokens. Access to other
individuals is prohibited, and authorized users can access proprietary information
only for job duties. All PCs, laptops, and workstations should be secured with a
password-protected screensaver with an automatic activation feature set at 10
minutes or less. Users must lock down their devices when unattended, and
employees must log off or restart their PCs after their shift.

VIII. PERSONAL SAFETY


1. If you see a message or image causing concern for your personal safety
online, immediately report it to an adult, such as a teacher or staff at school or
a parent at home.
2. Users should not share personal information without adult permission on the
internet, including phone numbers, addresses, and financial details.
3. Users must acknowledge internet communication risks and safeguard
personal information to avoid anonymity and potential harm.
4. Users should never agree to meet someone they met online in real life unless
they have parental consent.
5. Set privacy settings on social networking websites to limit access to pictures
and profile information to only friends. Avoid accepting unknown "friends" and
configure accounts to notify of photo tagging.
6. Students should save repeated and harassing messages to help authorities
track, locate, and prosecute cyberstalkers and bullies.
7. Passwords should be upper- and lower-case letters, with a minimum of one
number or special character. They should be unguessable and not derived
from personal information, and students should not share passwords with
friends.
8. Students should avoid opening electronic files from unknown or suspicious
senders or websites, as they can cause harm. Authorized users should
exercise caution when opening email attachments from unknown senders, as
they may contain viruses, e-mail bombs, or Trojan Horse codes.
9. Security users must take reasonable safeguards to prevent security threats
transmission over the school network, including avoiding infected files and
programs, and avoiding unknown or untrusted origins.
10. Students should maintain up-to-date antivirus, antispyware, operating
systems, and application software on personal devices and disable file
sharing and peer-to-peer networking.

IX. GENERAL USE

A. Email
DepEd offers students email accounts for school communication, requiring
appropriate language, privacy, and following school policies. Monitoring and archived
usage ensures safe, mindful, and courteous conduct.

B. Social / Tools & Apps / Collaborative Content

PSHN-Umiray EXtension enhances education by offering web sites for


communication, collaboration, sharing, and messaging, requiring appropriate
conduct online and offline.

C. School-Issued Netbooks and other devices

PSHN-Umiray EXtension offers netbook computers to students, but they must


follow policies. Netbooks have cameras, but privacy is not guaranteed. Students
must bring fully charged netbooks daily, and unattended ones should be delivered to
the main office. IT staff can provide repairs, and parents/guardians are responsible
for any damages not covered by warranty. Repairs due to inappropriate handling or
treatment will be billed to the student.

D. Other Devices

PSHN-Umiray EXtension provides learning devices, but users must follow


acceptable use policies, treat them with care, and report any issues to IT staff. They
may be financially responsible for damages. School-issued devices are monitored,
and personal devices can be used if approved by a teacher.

E. Plagiarism
Users should not plagiarize or use content without citing its creator, and
should not take credit for non-creative content or misrepresent themselves.
Research conducted online should be appropriately cited.

F. Cyberbullying

Cyberbullying includes harassment, dissing, flaming, denigrating,


impersonating, outing, tricking, excluding, and cyberstalking. Avoiding such
behaviors can result in severe disciplinary action, loss of privileges, and even
criminal charges. Monitor and retain online activities.

G. Vandalism or Mischief:

Tampering or theft of system components may be criminal under government


laws. School computer/network/Internet accounts may be prosecuted, and the
school will comply with authorities for legal action.

H. Modification of Computer:

Unauthorized modification of computer settings or configurations may lead to


discipline or revocation of access.

I. Downloads

It is crucial for users to obtain express permission from IT staff before


downloading.exe programs or other file types. Download only from reputable sites
and for educational purposes to ensure network security.

J. Netiquette

 Use internet, network resources, and online sites courteously and respectfully.
 Recognize and use trusted sources for online research, as valuable content
may contain unverified, incorrect, or inappropriate information.
 Users should avoid posting content that parents, teachers, future colleges, or
employers may see, as it can be shared and spread unintentionally.
 Students must avoid intentionally using computers to harass others with
language, images, threats, or obscene content.

K. Internet usage

Internet usage must support educational and research objectives aligned with
PSHN-Umiray Extension mission. Exhibit excellent behavior on the network as a
representation of your school and community. Be polite!

L. Purposes and Use Expectations for Technology

School-owned technologies, including the school network and internet


connection, are primarily used for educational purposes, including academic
research, classroom activities, career development, and communication with
experts. Recreational uses are allowed, but must be prohibited unless they interfere
with the school's educational process or if a teacher directs a student to cease an
activity. The school is not responsible for damages, injuries, or claims resulting from
responsible technology use. Senior school students in the boarding program may
use school technology for recreational purposes in dorms and outside school hours.

M. Respect for the Privacy of Others and Personal Safety

Students cannot use another user's account with special privileges outside its
terms. They cannot voluntarily post personal information online. PSHN-Umiray
Extension respect its reputation for excellence. No person or organization, including
students, may use the school's name, logo, mascot, or representation on non-school
websites without express permission from the institution. This includes pictures of
people wearing clothes with the Academy's name, emblem, or logo, as well as listing
the school's name or employees on social networking platforms, dating websites,
and rating websites.
X. ACCEPTABLE USE
I will:

1. Use school technology for educational activities and research.


2. Follow the same rules for courteous, responsible conduct as I am expected to
follow in person.
3. Treat school resources with care and notify personnel if there is an issue with
their operation.
4. Encourage good, productive dialogue if communicative or collaborative tools
are permitted.
5. If I come across threatening/bullying, improper, or dangerous content
(pictures, messages, postings) online, I will notify a teacher or another
member of staff.
6. Use school technology strictly for instructional purposes at acceptable times
and in allowed locations.
7. Cite sources when accessing internet sites and resources for research;
ensure there is no infringement of intellectual property rights.
8. Follow all license agreements.
9. Recognize and respect the usage of educational technologies as a privilege.
10. Be vigilant in order to safeguard my own and others' safety.
11. Contribute to the security of school resources. This is by no means a
complete list. When utilizing educational technology, users should exercise
their best judgment.

XI. UNACCEPTABLE USE

1. Giving out personal information about another individual, including their home
address and phone number, is absolutely prohibited.
2. Any commercial or for-profit usage of the network is strictly prohibited.
3. Excessive usage of the network for personal purposes will result in
disciplinary action.
4. Any use of the network for commercial advertising or political lobbying is
prohibited.
5. Users must not knowingly seek information on, get copies of, or edit files,
other data, or passwords belonging to other users, or misrepresent other
users on the network.
6. No usage of the network shall be used to interfere with others' use of the
network. Hardware and/or software must not be destroyed, tampered with, or
mistreated in any manner.
7. It is prohibited to use the network maliciously to construct programs that
annoy other users, penetrate a computer or computing system, and/or
damage the software components of a computer or computing system.
8. On the network, hate mail, chain letters, harassment, racist statements, and
other antisocial actions are prohibited.
9. It is not permitted to install any software, including shareware and freeware,
on PSHN-Umiray Extension computers without permission.
10. The network is prohibited from accessing pornographic material, inappropriate
text files, or files threatening the local area network's integrity.
11. The PSHN-Umiray Extension network prohibits downloading entertainment
software or files not related to its mission and objectives. This includes
freeware, shareware, copyrighted software, and all forms not directly related
to the extension's instructional and administrative purposes.
12. Copyright owner's permission is required for downloading, copying,
duplicating, and distributing copyrighted materials, with educational
distribution permitted by law.
13. It is prohibited to use the network for any illegal purpose.
14. It is strictly prohibited to use profanity, vulgarity, racial remarks, or any
language that may be objectionable to another user.
15. Unless expressly approved by a teacher for instructional purposes, playing
games is prohibited.
16. Unless expressly allowed by the system administrator, establishing network or
Internet connections to live communications, including voice and/or video
(relay chat), is prohibited.
XII. DISCLAIMER

1. The PSHN-Umiray Extension cannot be held accountable for the information


that is retrieved via the network.
2. This system lacks facilities for private or confidential electronic
communications. Administrators monitor all mail and report messages
supporting illegal activities to authorities.
3. PSHN-Umiray Extension cannot be held responsible for damages, including
data loss, due to delays, non-delivery, or service interruptions. Use of
obtained information is at user's risk.
4. The PSHN-Umiray Extension does not guarantee the content of advice or
information received by users, any costs incurred, or any damages caused by
their network access choices.
5. The PSHN-Umiray Extension reserves the right to change its policies and
rules at any time.

XIII. VIOLATIONS

Violations of the Student Responsible Use Policy can lead to network privilege
loss and disciplinary action. Students must use the system in accordance with school
policies and rules, and violations may result in disciplinary action, loss of privileges,
or misuse of resources. Internet and technology usage are privileges, not rights, and
violations can result in parental notification, student loss, and potential suspension.
Electronic footprints can be traced, and even if not deleted, it is always possible to
know if someone did something wrong.

Violations of this Acceptable Use Policy Violations of this policy may have
disciplinary repercussions, including:

●Suspension of network, technology, or computer privileges in extreme cases

● Notification to parents/guardian in most cases


● Detention or suspension from school and school-related activities

●Legal action and/or prosecution

XIV. REVIEW AND ACCEPTANCE

All PSHN-Umiray Extensions’ stuents, parents and staff is responsible for


review and acceptance of Policy. To ensure proper use of technology resources,
students and parents must sign the Student Acceptable Use Policy – User
Agreement Form annually. This form indicates adherence to the rules governing
internet and other technology access. The school reserves the right to issue
additional rules and penalties for violations. Violations may result in financial
restitution and may request additional forms before electronic device distribution.

XV. Technology Acceptable Use Agreement

Parent/Guardian (please check each item)


_____I/We, the undersigned parents/guardians, have read, understand, and agree to
abide by the provisions of the Technology Acceptable Use Policy, as provided
by PSHN-Umiray Extension.

_____I/We, the undersigned parents/guardians, have read, understand, and agree to


abide by the provisions of the Social Media Policy, as provided by PSHN-
Umiray Extension.

_____I/We, the undersigned, further acknowledge and accept full responsibility for
any violation of these policies made by my/our child/children. I/We understand
that these policies apply at school, at school related activities, and even at
home.

_____I/We recognize that PSHN-Umiray Extension reserve the right to adjust this
policy at any time during the School Year.

Any violation of this policy will result in disciplinary actions including, but not
limited to, suspension from Internet Use/Technology privileges, parent conferences,
and depending on the seriousness of an offense, possible legal action.

_______________________________________ ___________________
Signature Over Printed Name of Parent/Guardian Date

_______________________________________ ___________________
Signature Over Printed Name of Parent/Guardian Date

For student

I, the undersigned student, have read, understand, and agree to abide by the
provisions of the Technology Acceptable Use Policy and the Social Media Policy as
provided by the PSHN-Umiray Extension.

___________________________________ __________________
Student Name Grade and Section

___________________________________ __________________
Student Signature Date

References:
Coe-Brown Northwood Academy (2022). Coe-Brown Northwood Academy Student
Acceptable Use Policy. Retrieved from:
https://coebrown.org/wp-content/uploads/2022/07/Students-Acceptable-Use-
Policy-Updated-2022.pdf

National Center for Education Statistics (2005). Forum Unified Education Technology
Suite. Retrieved from: https://nces.ed.gov/pubs2005/tech_suite/app_a.asp

Our Own English High School (2022). Acceptable Use Policy (Students). Retrieved
from:
https://www.gemsoo-sharjah.com/-/media/project/gems/oos_our_own_english
_high_school_sharjah_girls/_files-and-documents/key-documents-and-
policies/2022-23-school-policies/acceptable-use-policy-student.pdf

Purplesec (2022). Acceptable use of information systems. A Veteran Led Offensive


& Defensive Cyber Security Company. Retrieved from:
https://purplesec.us/resources/cyber-security-policy-templates/acceptable-
use/

Saint Mary School (2018). 2018-2019 Acceptable Use Policy. Retrieved from:
https://www.stmarybethelct.org/2018_19_AcceptableUsePolicy.pdf

Shady Side Academy (2021). Technology Acceptable Use Policy (AUP) Student
Edition. Retrieved from:
https://resources.finalsite.net/images/v1626194825/shadyside/max4naanwybv
qtkfnr5w/AcceptableUsePolicy2021.pdf
St. Mary’s Academy (n.d.). Responsible Use Policy. Retrieved from:
https://www.stmaryspdx.org/academics/technology/tech-forms-documents/
responsible-use-policy

St. Mary Academy (n.d.) St. Mary Academy Acceptable Use Policy for Computers
and Related Technology. Retrieved from: https://stmaryknights.org/school-
documents/forms/604-acceptableusepolicy-pdf/file

The Education People (2022). Acceptable Use of Technology Policy Templates for
Educational Settings 2022-23. Retrieved from:
https://www.theeducationpeople.org/media/5127/template_acceptable-use-
policies_2022-23.docx

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy