IDEAS NEHS Technology Policy for Students

Technology Policy for Students    All IDEAS students much print and sign a copy of this policy before using any technology at NEHS.  The form can be given to any IDEAS staff member.

I.D.E.A.S. at North Eugene


Professional Conduct Guidelines & Information Systems Acceptable Use Policy

Policy Statement

At the School of I.D.E.A.S., the primary purpose of the computer systems, network and the Internet is to support research and education in and among academic institutions by providing access to unique resources and the opportunity for collaborative work. Your 4J personal user account and school-owned technology should not be used for personal objectives, rather it must be used in support of education and research and be consistent with the educational objectives of I.D.E.A.S. The following serve as general guidelines and should not be considered all-inclusive. It is our expectation at I.D.E.A.S. that students will make good choices while using the computer systems.

In order to use I.D.E.A.S.-owned technology, students must adhere to the following code of conduct:
 Make the primary use of technology and network infrastructure educational purpose
 Treat I.D.E.A.S.-owned technology (i.e. laptops, video cameras, cameras, flip cameras, microphones, projectors, vernier probeware, etc.) with respect, returning all equipment in the same condition you received it to ensure that future I.D.E.A.S. students will have the same quality of equipment necessary to complete class work
 Report any system problems or misuse to your instructor.
 If you are not sure about the acceptability of a use, ask an I.D.E.A.S. staff member

The following are NOT allowed without permission from network management, or instructors:

Individual Workstation (Desktop or Laptop)
 Changing the background image on a computer
 Storing files on the computer (upload personal files to GoogleDocs or save to a thumb drive instead of saving them to the computer)
 Using any logon and password other than your User Account
 Booting from a floppy disk, CD, or other device
 Use of command prompt
 Eating or drinking near the computer

 Accessing non-educational sites (i.e. YouTube, myspace, Facebook, personal email, chat rooms, Java games, web-based games, forums, msg. services, etc.)
 Downloading freeware
 Downloading music, videos or games
 Streaming music. Using YouTube or Pandora to stream music slows down the internet for all users – thus, it is not allowed
 Playing online games
 Impersonating another user by using their account
 Writing inappropriate content, profanity, or anything with malicious intent
 Infiltration of computer systems security for testing or troubleshooting without network management supervision
 Modifying or tampering with information or files accessed by hacking
 Intentional introduction and distribution of virus programs to workstation or network
 Possession and/or installation of destructive or invasive programs

 Printing personal documents without prior permission
 Printing more than 5 pages without prior permission
 Using resources unwisely (i.e. print to the incorrect printer, printing an excessive amount of documents)

I.D.E.A.S. Technology Policy

Failure to follow the technology code of conduct may result in these consequences:
1. First offense
a. Initial warning; teacher/student conference during class or at the start of class the next day
b. Deduction to work ethic score in that class (amount is instructor’s discretion)
2. Second offense and Additional Offenses:
a. Phone call or email sent home
b. Deduction to work ethic score in that class (amount is instructor’s discretion)
c. May lose use of the computer for the rest of that class (if caught during the last half hour of class, then also could lose computer use for the next day of class)
d. Removal from the school of IDEAS as computers are an important tool that must be used correctly

The following are a violation of school district policies and may result in immediate disciplinary consequences and loss of all technology privileges:
 Accessing another person’s account or sharing one’s password
 Damage, vandalism, or alteration of any sort to technology equipment
 Transmission of any material in violation of any U.S. or state regulation is prohibited. This includes, but is not limited to: copyrighted material, threatening or obscene material, or material protected by trade secret. Use for commercial activities by for-profit institutions is not acceptable. Use for product advertisement or political lobbying is also prohibited
 Bypassing the district filter to access filtered websites
 Knowingly accessing or sharing in appropriate materials
 Using profanity, obscenity or other language that may be offensive to another user
 Installation of unlicensed or unapproved software or hardware.
 Cyberbullying (The use of any electronic communication device to convey a message in any form (text, image, audio or video) that disrupts or prevents a safe and positive educational environment, or places a person in reasonable fear of physical harm.)
Please cut along the dotted line and keep this policy as a reference. Then sign below to show that you have read and understand the I.D.E.A.S. Technology Policy, a code of conduct related to I.D.E.A.S.-owned technology, and agree to follow this policy.