Laserfiche WebLink
motives the avenues for reaching students, teachers, parents and members of the community. Additionally, <br />these resources present tempting opportunities for users to explore areas that are either confidential, have <br />restricted access, or are inappropriate to the classroom or workplace. It is the purpose of this policy to outline <br />acceptable behavior with respect to use of ROP technology and, electronic resources. <br />PERSONAL RESPONSIBILITY <br />Access to electronic resources requires students to maintain consistently high levels of personal responsibility, <br />as delineated in ROP's student conduct policy. <br />Acceptable student use of ROP electronic resources includes respect for, and protection of, password/account <br />code security, as well as restricted databases, files and information banks. Personal passwords/account codes <br />will be created for students and employees using electronic resources to conduct research or complete work. <br />These passwords/account codes shall not be shared with others, nor shall students or employees use another <br />party's password except in the authorized maintenance and monitoring of the network. Strict control of <br />passwords/account codes protects employees and students both from misuse and from wrongful accusations of <br />misuse, of electronic resources in violation of ROP policy or state/federal law. Students or employees who <br />misuse electronic resources or who violate laws will be disciplined at a level appropriate to the seriousness of <br />the violation. <br />Access to electronic research is an expensive and time -intensive resource. Students are allowed to conduct <br />electronic network -based activities that are classroom or workplace -related. Personal activities interfere with the <br />educational/professional computer time and use for which the hardware and software are intended. <br />II. ACCEPTABLE USE <br />The use of North Orange County ROP technology and the ROP's electronic network system is a privilege that <br />may be revoked at any time. Behaviors that shall result in revocation of access shall include, but will not be <br />limited to the following: <br />Damage, vandalism, or theft of system hardware or software; hacking, i.e., the unauthorized <br />review, duplication, dissemination, removal, damage, and/or alteration of files, passwords, computer <br />systems, programs, or other property obtained through unauthorized means; electronic vandalism, i.e., <br />any malicious attempt to alter, harm or destroy equipment or data of another user, the ROP information <br />service, or the other networks that are connected to the Internet; alteration of system software; <br />Placement of unlawful information, computer viruses or harmful programs on, or through the computer <br />system; entry into restricted information on systems or network files in violation of password/account <br />code restrictions; obtaining, downloading, viewing or otherwise gaining access to materials that may <br />be deemed unlawful, harmful, abusive, obscene, pornographic, harassing/demeaning of others, <br />threatening, descriptive of destructive devices, or otherwise objectionable under current ROP policy or <br />legal definitions; <br />Violation of other users' right to privacy; using another person's name to send or receive messages on the <br />network; <br />Access to unauthorized and/or inappropriate sites; sending or receiving personal messages; and use of <br />the network for personal gain or to engage in political activity. <br />Use of Email <br />Access to electronic mail (email) is a privilege intended to assist students in efficiently communicating with others <br />and in conducting work or school activities. The ROP email system is designed solely for educational and work - <br />related purposes, and all email files are subject to review by ROP and school personnel. Unauthorized uses of <br />email include, but are not limited to, chain letters, chat rooms, blogs, or social networking websites such as <br />Facebook.com, with the exception of those bulletin boards, chat groups, or blogs created by teachers for specific <br />instructional purposes. <br />Each student who receives a password/account code will participate in an orientation or training course regarding <br />proper behavior and use of the network. The password/account may be suspended or closed upon the finding <br />of user misuse of the technology system or its resources. <br />