motives the avenues for reaching students, teachers, parents and members of the community. Additionally,
<br />these resources present tempting opportunities for users to explore areas that are either confidential, have
<br />restricted access, or are inappropriate to the classroom or workplace. It is the purpose of this policy to outline
<br />acceptable behavior with respect to use of ROP technology and, electronic resources.
<br />PERSONAL RESPONSIBILITY
<br />Access to electronic resources requires students to maintain consistently high levels of personal responsibility,
<br />as delineated in ROP's student conduct policy.
<br />Acceptable student use of ROP electronic resources includes respect for, and protection of, password/account
<br />code security, as well as restricted databases, files and information banks. Personal passwords/account codes
<br />will be created for students and employees using electronic resources to conduct research or complete work.
<br />These passwords/account codes shall not be shared with others, nor shall students or employees use another
<br />party's password except in the authorized maintenance and monitoring of the network. Strict control of
<br />passwords/account codes protects employees and students both from misuse and from wrongful accusations of
<br />misuse, of electronic resources in violation of ROP policy or state/federal law. Students or employees who
<br />misuse electronic resources or who violate laws will be disciplined at a level appropriate to the seriousness of
<br />the violation.
<br />Access to electronic research is an expensive and time -intensive resource. Students are allowed to conduct
<br />electronic network -based activities that are classroom or workplace -related. Personal activities interfere with the
<br />educational/professional computer time and use for which the hardware and software are intended.
<br />II. ACCEPTABLE USE
<br />The use of North Orange County ROP technology and the ROP's electronic network system is a privilege that
<br />may be revoked at any time. Behaviors that shall result in revocation of access shall include, but will not be
<br />limited to the following:
<br />Damage, vandalism, or theft of system hardware or software; hacking, i.e., the unauthorized
<br />review, duplication, dissemination, removal, damage, and/or alteration of files, passwords, computer
<br />systems, programs, or other property obtained through unauthorized means; electronic vandalism, i.e.,
<br />any malicious attempt to alter, harm or destroy equipment or data of another user, the ROP information
<br />service, or the other networks that are connected to the Internet; alteration of system software;
<br />Placement of unlawful information, computer viruses or harmful programs on, or through the computer
<br />system; entry into restricted information on systems or network files in violation of password/account
<br />code restrictions; obtaining, downloading, viewing or otherwise gaining access to materials that may
<br />be deemed unlawful, harmful, abusive, obscene, pornographic, harassing/demeaning of others,
<br />threatening, descriptive of destructive devices, or otherwise objectionable under current ROP policy or
<br />legal definitions;
<br />Violation of other users' right to privacy; using another person's name to send or receive messages on the
<br />network;
<br />Access to unauthorized and/or inappropriate sites; sending or receiving personal messages; and use of
<br />the network for personal gain or to engage in political activity.
<br />Use of Email
<br />Access to electronic mail (email) is a privilege intended to assist students in efficiently communicating with others
<br />and in conducting work or school activities. The ROP email system is designed solely for educational and work -
<br />related purposes, and all email files are subject to review by ROP and school personnel. Unauthorized uses of
<br />email include, but are not limited to, chain letters, chat rooms, blogs, or social networking websites such as
<br />Facebook.com, with the exception of those bulletin boards, chat groups, or blogs created by teachers for specific
<br />instructional purposes.
<br />Each student who receives a password/account code will participate in an orientation or training course regarding
<br />proper behavior and use of the network. The password/account may be suspended or closed upon the finding
<br />of user misuse of the technology system or its resources.
<br />
|