Page 42

Student Handbook 2016-2017

Unacceptable Uses of the Computer Network, School Mobile Devices or Internet The School reserves the right to take immediate action regarding activities (1) that create security and/or safety issues for the School, students, employees, schools, network or computer resources, or (2) that expend School resources on content the School in its sole discretion determines lacks legitimate educational content/purpose, or (3) other activities as determined by School as inappropriate. Examples of unacceptable uses of the School and/or School Mobile Devices and/or Internet include but are not limited to:  Violating any state or federal law or municipal ordinance, such as: Accessing or transmitting pornography of any kind, obscene depictions, harmful materials, materials that encourage others to violate the law, confidential information or copyrighted materials;  Criminal activities that can be punished under law;  Selling or purchasing illegal items or substances;  The unauthorized collection of email addresses (“harvesting”) of e-mail addresses from the Global Address 41 List and other School directories;  Obtaining and/or using anonymous email sites; spamming; spreading viruses;  Causing harm to others or damage to their property, such as: 1. Using profane, abusive, or impolite language; threatening, harassing, or making damaging or false statements about others or accessing, transmitting, or downloading offensive, harassing, or disparaging materials; 2. Deleting, copying, modifying, or forging other users' names, emails, files, or data; disguising one's identity, impersonating other users, or sending anonymous email; 3. Damaging computer equipment, files, data or the network in any way, including intentionally accessing, transmitting or downloading computer viruses or other harmful files or programs, or disrupting any computer system performance; 4. Using any School computer to pursue “hacking,” internal or external to the School, or attempting to access information protected by privacy laws; 5. The intentional altering of operating systems on School owned devices (also commonly referred to as “Jail Breaking”) for purposes of circumventing restrictions, filters, or evade monitoring; 6. Accessing, transmitting or downloading large amounts of data for the purpose of fabricating density on the School Network and/or School owned devices.  Engaging in uses that jeopardize access or lead to unauthorized access into others’ accounts or other computer networks, such as: 1. Using another’s account password(s) or identifier(s); 2. Interfering with other users' ability to access their account(s); or 3. Disclosing your own or anyone’s password to others or allowing them to use your or another’s account(s).  Using the network or Internet or School owned device for Commercial purposes: 1. Using the Internet for personal financial gain; 2. Using the Internet for personal advertising, promotion, or financial gain; or 3. Conducting for-profit business activities and/or engaging in non-government related fundraising or public relations activities such as solicitation for religious purposes, lobbying for personal political purposes.  Using the network, internet and/or School owned devices for cheating: 1. Students shall refrain from plagiarism. Page 3 of 5


Student Handbook 2016-2017
To see the actual publication please follow the link above