12.07.2015 Views

JOHN PAUL II HIGH SCHOOL - John Paul II HS

JOHN PAUL II HIGH SCHOOL - John Paul II HS

JOHN PAUL II HIGH SCHOOL - John Paul II HS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 13 - TECHNOLOGY RESPONSIBLE USE POLICYSECTION 13.01INTRODUCTIONThis document is intended to educate students, faculty, and staff of JP<strong>II</strong><strong>HS</strong> on the ethics and rules of technology use. All students, faculty, and staffare expected to read and comply with this document. In order to make use of JP<strong>II</strong><strong>HS</strong> computer and network resources, students must agree to followthe guidelines established in this policy by returning the signature page from the Student Handbook properly completed.SECTION 13.02ACCESSAccess to JP<strong>II</strong><strong>HS</strong> technology, the JP<strong>II</strong><strong>HS</strong> network, the Internet, computers, and other technology resources, shall be made available to students,faculty, and staff primarily for instructional and administrative purposes and in accordance with administrative regulations. Limited personal useof the system shall be permitted if the use:a) Imposes no tangible cost on the JP<strong>II</strong><strong>HS</strong>.b) Does not unduly burden the JP<strong>II</strong><strong>HS</strong> computer or network resources.c) Has no adverse effect on an employee’s job performance or a student’s academic performance.SECTION 13.03JP<strong>II</strong><strong>HS</strong> PROPERTYThe equipment, software and network resources provided through JP<strong>II</strong><strong>HS</strong> are and remain the property of JP<strong>II</strong><strong>HS</strong>. Users of JP<strong>II</strong><strong>HS</strong> equipmentshall comply with all policies, procedures, and guidelines of JP<strong>II</strong><strong>HS</strong> and access may be denied to any student, employee, or community memberwho fails to comply with JP<strong>II</strong><strong>HS</strong> policies, procedures, and guidelines. The person in whose name a system account, hardware or software isissued will be responsible for its proper use at all times.SECTION 13.04JP<strong>II</strong><strong>HS</strong> SOFTWAREAll software used in JP<strong>II</strong><strong>HS</strong> computers must be legally licensed with proper documentation and approved by the JP<strong>II</strong><strong>HS</strong> Technology Department.Software will only be installed by personnel approved by the Technology Department.SECTION 13.05PERSONAL SOFTWAREPersonal software may not be installed on JP<strong>II</strong><strong>HS</strong> technology.SECTION 13.06PERSONAL COMPUTERSNon-authorized personal computers and peripheral equipment may not be used at JP<strong>II</strong><strong>HS</strong>. JP<strong>II</strong><strong>HS</strong> licensed software may not be loaded on non-JP<strong>II</strong><strong>HS</strong> computers unless the licensing agreement includes provisions for that action. JP<strong>II</strong><strong>HS</strong> licensed software must be removed from personalcomputers and returned to JP<strong>II</strong><strong>HS</strong> upon leaving JP<strong>II</strong><strong>HS</strong> employment. JP<strong>II</strong><strong>HS</strong> accepts no liability for loss or damage to these personal computersor peripheral equipment.SECTION 13.07MONITORED USEJP<strong>II</strong><strong>HS</strong> technology use by students, faculty, and staff is not private and may be monitored at any time by designated JP<strong>II</strong><strong>HS</strong> staff to ensureappropriate use. JP<strong>II</strong><strong>HS</strong> reserves the right to inspect user directories for inappropriate materials or executable files and programs that areunauthorized and may affect the operation of the network. Such files are subject to removal when found. Additionally, JP<strong>II</strong><strong>HS</strong> reserves the right tomonitor access to and use of email, the Internet, or other network or computer-related activities, engage in routine computer maintenance andhousekeeping, carry out internal investigations, prepare responses to request for public records, or disclose messages, data, or files to lawenforcement or other legal authorities. JP<strong>II</strong><strong>HS</strong> reserves the right to confiscate and analyze any electronic device that may connect to or utilizeJP<strong>II</strong><strong>HS</strong> network resources.<strong>John</strong> <strong>Paul</strong> <strong>II</strong> High School Student Handbook 2012-2013 45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!