2 minute read

NETWORK USAGE POLICY

• Photographing/videotaping tests or exams: Students cannot take photographs or videos of any tests or exams without the teacher’s permission. Students who receive electronic copies of tests or exams from other students should delete these files from all electronic devices and inform their teacher.

Software Conflicts: Students share the responsibility of ensuring their laptops are functional for academic use, especially in the classroom.

• If student-installed software causes the laptop to malfunction, students must uninstall the software. • Peer-to-peer software sharing is strongly discouraged as this free software is one of the major sources of virus infection on student laptops. It is highly recommended peer-topeer sharing software be removed from student laptops. Students are encouraged to purchase music, movies, and TV shows online. • IT Desk personnel will not help install or provide assistance for software not purchased by the school. • The IT Desk can re-image a laptop that continues to malfunction for any reason. • Students are expected to keep their anti-virus software running and up to date.

Password Privacy: Laptop passwords must be kept private. Here are some password guidelines and etiquette to follow:

• No effort should ever be made to obtain another user's password. • No effort should be made to watch another user enter a password. When another user logs in, you should look away until they have finished typing and are successfully logged in. • No effort should be made to guess another user's password. • Software should never be installed on a computer to capture another password. • Students should never work on a computer logged in under another account unless they have expressly asked to do so, been given permission, and are in the presence of the other student. • No effort should ever be made to read another person’s private email without permission. • Efforts to obtain administrator and teacher passwords will be dealt with severely. This may include suspension and expulsion. • Students who hear of or are aware of any user or network security breaches must inform the IT staff.

Desktop Backgrounds: Desktop backgrounds are public spaces and are viewable by many people. Students are permitted to customize their laptop desktops but are expected to use good judgment in their choices and be consistent with community standards.

Personal File Sharing: Students are responsible for any files they make available to or share with others. Methods of sharing include, but are not limited to, memory keys, external drives, and cloud services such as OneDrive, DropBox, iCloud, Google Drive, etc. Students must ensure they do not violate the content restriction guidelines listed above when sharing files.

Network Usage Policy

Network Policies: Students are using a school-owned computer on the school network. Student laptops are being managed, tracked, and monitored on the network. Students must not interfere in this process.

• Students cannot disable domain administrator access to the laptop.