Supporting the Schools of El Segundo, California
 
 
 
         
    The El Segundo Education Foundation's  
     
  Summer Academy 2014  
         

 

Home
Policies
Contacts
Registration

Elementary School Courses
Middle School Courses

High School Non-Credit Courses
High School Credit Recovery Courses
High School Advanced Credit Courses  

Acceptable Use Policy  
The Acceptable Use of Technology for the Summer Academy is the same as the policies of El Segundo Unified School District with minor adaptations.
Information resources offer access to computers and people throughout the world. Students and staff have access to electronic mail and college and university libraries, information and news from a variety of sources and research institutions, software of all types, and discussion groups on a wide variety of topics,
and much more.

Please be advised that all activity conducted on El Segundo computers or networks, including emails, can be monitored by the Superintendent or his designee. Monitoring may occur at any time without advance notice or consent. Please be advised all activities and exchanges conducted via personal cell phone, iPad, iTouch, laptops, or any other personal electronic device while on school grounds, during school hours, or during school related activities, are bound by the terms of this Student Acceptable Use policy. Any student who engages in cyberbullying on school premises, or off campus in a manner that causes or is likely to cause a substantial disruption of a school activity or school attendance, shall be subject to discipline in accordance with district policies and regulations. If the student is using a social networking site or service that has terms of use that prohibit posting of harmful material, the director also may file a complaint with the Internet site or service to have the material removed.
 
Inappropriate Use

While electronic information resources offer tremendous opportunities of educational value, they also offer persons with illegal or unethical purposes avenues for reaching students, teachers, and others, including parents. Activities not permitted include, but are not limited to:
· using the network for commercial advertising;
· using copyrighted material in reports without permission;
· using the network to lobby for votes;
· using the network to access a file that contains pornographic material;
· using the network to send/receive messages that are racist;
· using the network to send/receive inflammatory or offensive messages or images;
· creating a computer virus and placing it on the network;
· uploading, creating or knowingly forwarding a virus.
· using the network to send/receive a message that violates with the school’s code of conduct, which can include cyber bullying;
· using the network to send/receive messages that are sexist and/or contain obscenities;
· using the network to request home phone numbers and later, making obscene phone calls to the numbers;
· using the network to provide addresses or other personal information that others may use inappropriately;
· making purchases or conducting other personal business;
· using the network for sending and receiving a large number of personal messages;
· using another’s password to login through that person’s account, pretending to be another using or forging an e-mail to make it appear as if it came from 
                 somewhere or some other than the actual source;
· using the network to send/receive a message with someone else’s name on it;
· posting anonymous messages or using fake names;
· sending threats of violence toward persons or property;2011-2012 EL SEGUNDO HIGH SCHOOL HANDBOOK V 1 y 2 42 of 42e
· harassing, insulting or attacking others;
· damaging, degrading or disrupting computer hardware, networks or system performance;
· the downloading, installation or execution of any unauthorized programs;
· duplicating, distributing or using illegal software
· using the network to access peer to peer file sharing networks such as Kazaa, Limewire, Audio Galaxy and Morpheus.
 
All users should be aware that the inappropriate use of electronic information resources can be a violation of local, state, and federal laws. Violators will be prosecuted.
During Registration, all students and parents are required to sign a contract accepting the Acceptable Use of Electronic Resources Policy.