period of time after that concussion occurs, particularly if the athlete suffers another concussionbefore completely recovering from the first one. This can lead to prolonged recovery, or even tosevere brain swelling (second impact syndrome) with devastating and even fatal consequences. It iswell known that adolescent or teenage athletes will often fail to report symptoms of injuries.<strong>Concussion</strong>s are no different. As a result, education of administrators, coaches, parents and students isthe key to student-athlete’s safety.If you think your child has suffered a concussionAny athlete even suspected of suffering a concussion should be removed from the game or practiceimmediately. No athlete may return to activity after an apparent head injury or concussion, regardlessof how mild it seems or how quickly symptoms clear, without medical clearance. Close observationof the athlete should continue for several hours. IHSA Policy requires athletes to provide their schoolwith written clearance from either a physician licensed to practice medicine in all its branches or acertified athletic trainer working in conjunction with a physician licensed to practice medicine in allits branches prior to returning to play or practice following a concussion or after being removed froman interscholastic contest due to a possible head injury or concussion and not cleared to return to thatsame contest. In accordance with state law, all IHSA member schools are required to follow thispolicy.You should also inform your child’s coach if you think that your child may have a concussion.Remember it’s better to miss one game than miss the whole season. And when in doubt, the athletesits out.For current and up-to-date information on concussions you can go to:http://www.cdc.gov/<strong>Concussion</strong>InYouthSports/Adapted by the Illinois High School Association from the CDC and the 3 rd International Conferenceon <strong>Concussion</strong> in Sport, Document created 7/1/2011.Adopted by the <strong>Mercer</strong> <strong>County</strong> School Board of Education on April 18 th , 2012.
6:235-E2InstructionExhibit - Authorization for Electronic Network AccessEach staff member must sign this Authorization as a condition for using the District’s ElectronicNetwork connection. Each student and his or her parent(s)/guardian(s) must sign the Authorizationbefore being granted unsupervised access. Please read this document carefully before signing.All use of the Internet shall be consistent with the District’s goal of promoting educational excellenceby facilitating resource sharing, innovation, and communication. This Authorization does not attemptto state all required or proscribed behavior by users. However, some specific examples are provided.The failure of any user to follow the terms of the Authorization for Electronic Network Accesswill result in the loss of privileges, disciplinary action, and/or appropriate legal action. Thesignatures at the end of this document are legally binding and indicate the parties who signed haveread the terms and conditions carefully and understand their significance.Terms and ConditionsAcceptable Use - Access to the District’s electronic network must be: (a) for the purpose ofeducation or research, and be consistent with the District’s educational objectives, or (b) for alegitimate business use.Privileges - The use of the District’s electronic networks is a privilege, not a right, and inappropriateuse will result in a cancellation of those privileges. The system administrator will make all decisionsregarding whether or not a user has violated the terms of access privileges and may deny, revoke, orsuspend access at any time. His or her decision is final.Unacceptable Use - The user is responsible for his or her actions and activities involving thenetwork. Some examples of unacceptable uses are:a. Using the network for any illegal activity, including violation of copyright or other contracts,or transmitting any material in violation of any State or federal law;b. Unauthorized downloading of software, regardless of whether it is copyrighted or de-virused;c. Downloading copyrighted material for other than personal use;d. Using the network for private financial or commercial gain;e. Wastefully using resources, such as file space;f. Hacking or gaining unauthorized access to files, resources or entities;g. Invading the privacy of individuals, that includes the unauthorized disclosure, dissemination,and use of information about anyone that is of a personal nature including a photograph;h. Using another user’s account or password;i. Posting material authored or created by another without his/her consent;j. Posting anonymous messages;k. Using the network for commercial or private advertising;l. Accessing, submitting, posting, publishing, or displaying any defamatory, inaccurate,abusive, obscene, profane, sexually oriented, threatening, racially offensive, harassing, orillegal material; andm. Using the network while access privileges are suspended or revoked.Network Etiquette - You are expected to abide by the generally accepted rules of network etiquette.These include, but are not limited to, the following:a. Be polite. Do not become abusive in your messages to others.b. Use appropriate language. Do not swear, or use vulgarities or any other inappropriatelanguage.