The Acceptable Use of Technology for the
Summer Academy is the same as the policies of El Segundo Unified
School District with minor adaptations. |
Information resources offer access to
computers and people throughout the world. Students and staff have
access to electronic mail and college and university libraries,
information and news from a variety of sources and research
institutions, software of all types, and discussion groups on a wide
variety of topics,
and much more.
Please be advised that all activity conducted on El Segundo
computers or networks, including emails, can be monitored by the
Superintendent or his designee. Monitoring may occur at any time
without advance notice or consent. Please be advised all activities
and exchanges conducted via personal cell phone, iPad, iTouch,
laptops, or any other personal electronic device while on school
grounds, during school hours, or during school related activities,
are bound by the terms of this Student Acceptable Use policy. Any
student who engages in cyberbullying on school premises, or off
campus in a manner that causes or is likely to cause a substantial
disruption of a school activity or school attendance, shall be
subject to discipline in accordance with district policies and
regulations. If the student is using a social networking site or
service that has terms of use that prohibit posting of harmful
material, the director also may file a complaint with the Internet
site or service to have the material removed. |
|
Inappropriate Use |
While electronic information resources offer
tremendous opportunities of educational value, they also offer persons
with illegal or unethical purposes avenues for reaching students,
teachers, and others, including parents. Activities not permitted
include, but are not limited to:
· using the network for commercial advertising;
· using copyrighted material in reports without permission;
· using the network to lobby for votes;
· using the network to access a file that contains pornographic
material;
· using the network to send/receive messages that are racist;
· using the network to send/receive inflammatory or offensive messages
or images;
· creating a computer virus and placing it on the network;
· uploading, creating or knowingly forwarding a virus.
· using the network to send/receive a message that violates with the
school’s code of conduct, which can include cyber bullying;
· using the network to send/receive messages that are sexist and/or
contain obscenities;
· using the network to request home phone numbers and later, making
obscene phone calls to the numbers;
· using the network to provide addresses or other personal information
that others may use inappropriately;
· making purchases or conducting other personal business;
· using the network for sending and receiving a large number of personal
messages;
· using another’s password to login through that person’s account,
pretending to be another using or forging an e-mail to make it appear as
if it came from somewhere or some other than the actual source;
· using the network to send/receive a message with someone else’s name
on it;
· posting anonymous messages or using fake names;
· sending threats of violence toward persons or property;
· harassing, insulting or attacking others;
· damaging, degrading or disrupting computer hardware, networks or
system performance;
· the downloading, installation or execution of any unauthorized
programs;
· duplicating, distributing or using illegal software
· using the network to access peer to peer file sharing networks such as
Kazaa, Limewire, Audio Galaxy and Morpheus. |
All users should be aware that the inappropriate
use of electronic information resources can be a violation of local,
state, and federal laws. Violators will be prosecuted. |
During Registration, all students and parents are
required to sign a contract accepting the Acceptable Use of Electronic
Resources Policy. |
|