Computers, netbooks, and networks add much to your school experience.
Jan 02, 2016
Be determined to claim the benefits that computers have to offer.
Be careful to avoid choices that lead to damaging outcomes.
As a high school student, you are privileged to have access to an individual account on the school network.
Your account has a unique username and password.
When you log into the school network, you will find software for:
• Word Processing• Spreadsheets• Electronic
Presentations• And more
Using these programs can enrich how you learn by:
• Improving the quality of your assignments
• Increasing how efficiently you use your time
• Building your technology skills for future needs and opportunities
• Keeping you aware of your course progress• Relaying teachers’ messages• Keeping you updated on school
information• Using premier resources made available
through your District.
Using these resources can help you by . . .
The Internet can enrich your learning by providing abundant access to:
by linking with the World Wide Web.
ideas information
creative works communication
To gain Internet privileges, you and your parent/guardian should have read and discuss the details of the Electronic Information Services Policy for our school district.
By returning the EIS contract you assume the responsibilities and risks connected to Internet use.
Ask your teacher to clarify any questions you may have.
Know the guidelines for acceptable use of computers and networks at our school.
Follow the guidelines with the firm standard of “no exceptions.”
NO EXCEPTIONS NO EXCEPTIONS NO EXEPTIONS NO EXCEPTIONSN
O E
XC
EPTIO
NS N
O E
XC
EPTIO
NS
NO
EX
CEPTIO
NS
N
O E
XC
EPTIO
NS
NO EXCEPTIONS NO EXCEPTIONS NO EXEPTIONS NO EXCEPTIONS
School District
Highlights of Electronic Information Services Policy and Procedures*
See actual document for complete text.
E I S
Illegal Tactics
WastingResources
ForwardingInvasionof Privacy
Downloading SavingFiles
Disclaimer
TechnologyTools
OffendingDegrading
Feesor Charges
Gain
Sharing WeighEthics
Hacking Vandalism
Purposes
Accounts
Password
AnonymousMessages
ThreatsLanguage
Lackof Privacy
IntellectualProperty
Features(Restricted)
ReportsReferrals
The consequences for unacceptable use of computers at school are clear.
Depending on the nature of your violation,
1. You will lose your Internet rights
2. You will lose your school network account
3. You will be suspended from school
4. You will be referred to legal authorities
Sooner or later, other damaging consequences come into focus.
Most teachers assume that you can use Internet and technology as part of your class participation. What now?
You are bored because other students are working on computers during class and you can’t. What will happen to your grade?
You have things to do after school that take all your time. You do not have a computer available at your home. How will your complete your assignments?
You miss out on learning activities that build your technology skills. So what?
You see yourself as a good person, but your teacher, administrator and parents see you as a rule-breaker who can’t be trusted. Are they wrong?
You have polluted the technology environment instead of keeping it healthy and safe. Do the actions of just one person make a difference?
You are molding your moral development as a teenager. Are you robbing yourself of healthy development by ignoring the rights and needs of others?
We ask that you follow all of the EIS guidelines when using computers at school.
We want our system to function well and be safe and healthy for all users,
especially you.
And beyond the walls and wires of our building, we hope that you will continue to
•Support good values
•Consider the rights and needs of others
•Follow ethical standards for technology use
whenever and wherever you use a computer.
whenever wherever
Your behavior is a reflection of who you are.
It’s always there.
It’s always right.
Please choose carefully.
Resources
Bolin, Frances Schoonmaker. Growing Up Caring. Peoria: Glencoe, 1990.
CGUHSD School Board Policies and Procedures. “Student Electronic Information Services Policy” (EIS), http://help/Reference/Technology/EISUsePolicy-Students.htm (June, 2004).
Westminster College Information Technology Security Policy: Responsible Use of College Computing and Network
Resources. “Password Construction.” http://www.westminstercollege.edu/support/ResponsibleUse.pdf.(4 August, 2003).
Willard, Nancy E. Computer Ethics, Etiquette & Safety for the 21st-Century Student. Eugene: International Society for
Technology in Education, 2002.