Research

Parts of an AUP: [|AUPs Should Be Designed To:]

1. Statement of Purpose **Eric** 2. Uses and Advantages **Lindsey** 3. Code of Conduct **Nick** 4. Consequences of Violating **Eric** 5. Unacceptable Uses **Nick** 6. Disclaimer/Privilege **Lindsey**

We should also have: In a [|handbook for writing AUP documents], the Virginia Department of Education indicate that there are three other areas needing to be addressed in an AUP:
 * a statement that the AUP is in compliance with state and national telecommunication rules and regulations **Nick**
 * a statement regarding the need to maintain personal safety and privacy while accessing the Internet I am going to include cyber-bullying in this section. If you think that is should go somewhere else, let me know. **Eric**
 * a statement regarding the need to comply with Fair Use Laws and other copyright regulations while accessing the Internet
 * Eric - if there is a part that I selected that you have all ready started, or even started thinking about already, feel free to put your name in my place. Nick**

Nick, you posted first so you are good to go. I got what I was planning to do. Eric

Eric and Nick - If you feel that there are other sections or parts that we need to include, add them to the list! Lindsey

7/16/09 Class Notes on Project:  1>  Cite your sources  2>  You can cut/paste from other districts-but avoid copying total sections  3>  Look to update policies to reflect today’s technologies  4>  Correct spelling, grammar, sentence construction is important  5>  Your initials by major areas (basically what sections we worked on ) We have to use proper APA format (examples of APA style can be found in digital dropbox)

__How to…__ [|What is acceptable?] [|Food for Thought] [|Wikipedia]

AUP Examples: [|West Jefferson Hills SD] [|Philadelphia School Disrict] [|Monmouth County Vocational School District] [|Carlisle School District] [|Lake Washington School District] [|W&J College] [|UASDTechnologyPolicy.pdf]

Here is the PA Distance Learning AUP: The use of technology is a privilege and an important part of PDLCS’ overall curriculum. PDLCS does not warrant that technology resources will meet any specific requirements the student, or other users may have, or that they will be error free or uninterrupted. PDLCS will, from time to time, make determinations on whether specific uses of technology are consistent with school policies for students and school employees. PDLCS always reserves the right to monitor and log technology use, to monitor file server space utilization by users, and to examine specific network usage (as may be deemed necessary) for maintenance, safety or security of the technology resources or the safety of the user. It is the policy of PDLCS to: · Prevent user access over its computer network to receive or transmit inappropriate material via Internet, electronic mail, or other forms of direct electronic communications; · Prevent unauthorized access and other unlawful online activity and damage to school resources; · Prevent unauthorized access and other unlawful online activity and/or damage to school resources; · Prevent unauthorized online disclosure, use, or dissemination of personal identification information of minors; and · Comply with the Children’s Internet Protection Act [Publ. L. No. 106-554 and 47 USC 254(h)].
 * TECHNOLOGY & INTERNET ACCEPTABLE USAGE POLICY **

To the extent practicable, technology protection measures are used to block or filter Internet access to any sites or other forms of electronic communications containing inappropriate information. Filtering and maintenance or blocking are applied to visual depictions of material deemed obscene, child pornography, or to any material deemed harmful to minors, as defined by the Children’s Internet Protection Act (CIPA). The filter serves to block minors from accessing inappropriate matter on the Internet and the World Wide Web. The installation of technology protection measures at the time of computer installation is mandatory and the Internet Filter will be set at a level determined by the Parent. Thereafter, it will be the Parent Educator’s responsibility to monitor the student’s computer usage for compliance with PDLCS’ policies and the Children’s Internet Protection Act. The technology protection measures may be disabled only for bona fide research or other lawful purposes. Additionally, it shall be the responsibility of all members of PDLCS staff to supervise and monitor usage of the online computer network and access to the Internet and ensure that the same is in accordance with this policy, including any e-mails and chat room discussions. By using the filter program, as well as staff monitoring student computer use, PDLCS is attempting to provide a safe and secure medium by which students can use the Internet, World Wide Web, electronic mail, chat rooms and other forms of direct electronic communications for educational purposes. To the extent practicable, steps are taken to promote the safety and security of users of the PDLCS private network. Other inappropriate network usage PDLCS intends to eliminate includes: · Unauthorized access, including so-called ‘hacking’, and other unlawful activities; and · Unauthorized disclosure, use, and dissemination of personal identification information regarding minors.
 * //__Access to Inappropriate Material__//**

By signing the Parent/Student Handbook Agreement Form, the parent and student agree: · To abide by all PDLCS policies relating to the use of technology; · To release all PDLCS employees from any and all claims of any nature arising from the use or inability to use the technology; · That the use of technology is a privilege; and · That use of the technology will be monitored and there is no expectation of privacy whatsoever in any use of the technology.

The parent and student further agree and understand that the user may have his/her privileges revoked or other disciplinary actions taken against them for actions and/or misuse such as, but not limited to, the following: <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Altering system technology, including but not limited to, software or hardware without the consent of PDLCS; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Placing unauthorized information, computer viruses or harmful programs on or through the computer system in either public or private files or messages; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Obtaining, viewing, downloading, transmitting, disseminating or otherwise gaining access to or disclosing materials the PDLCS believes may be unlawful, obscene, pornographic, abusive, or otherwise objectionable; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Using technology resources for commercial, political, or other unauthorized purposes since PDLCS technology resources are intended only for educational use; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Intentionally seeking information on, obtaining copies of, or modifying files, other data, or passwords belonging to other users; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Disrupting technology through abuse of the technology, including but not limited to, hardware or software; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Malicious uses of technology through hate mail, harassment, profanity, vulgar statements, or discriminating remarks; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Interfering with others’ use of technology; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Allowing anyone other than the account holders to use a PDLCS account; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Sending unsolicited mail messages, including the sending of “junk mail” or other advertising material to individuals who did not specifically request such material (“e-mail spam”); <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Creating or forwarding “chain letters” or other “pyramid schemes” of any type, whether or not the recipient wishes to receive such mailings; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Sending malicious e-mail, including, but not limited to, “mail bombing” (flooding a user or site with very large or numerous pieces of email); <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Unauthorized use, or forging, of mail header information; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Using a PDLCS or client account to collect replies to messages sent from another PDLCS account; and <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Other unlawful or inappropriate behavior. The user also acknowledges and agrees that he/she is solely responsible for the use of his/her accounts, passwords, and/or access privileges, and that misuse of such may result in appropriate disciplinary actions (including but not limited to suspension or expulsion), loss of access privileges, and/or appropriate legal action. The user must also know and further agrees that: <span style="font-size: 11pt; color: black; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Should the user transfer a file, shareware, or software that infects the technology resources with a virus and causes damage, the user will be liable for any and all repair costs; <span style="font-size: 11pt; color: black; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· The user will be liable to pay the cost or fee of any file, shareware, or software transferred or downloaded, whether intentional or accidental; <span style="font-size: 11pt; color: black; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Should the user intentionally destroy information or equipment that causes damage to technology resources, the user(s) will be liable for any and all costs; and <span style="font-size: 11pt; color: black; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Violation of this Internet Safety Policy is also a violation of the PDLCS Code of Conduct and may result in any in other scholastic disciplinary action, other than those specifically set forth above, including but not limited to suspension or expulsion.

The user must never use PDLCS, PDELA, or any other trademarked school name in internet activities outside of the Learning Management System (i.e. personal websites, chat rooms, etc.). CIPA defines the above referenced terms as follows: <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· A minor is anyone under the age of 17. <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· “Technology Protection Measure” means a specific technology that blocks or filters Internet access to visual depictions that are: <span style="font-size: 11pt; font-family: 'Courier New'; msolist: Ignore; mso-fareast-font-family: 'Courier New'; msofareastfontfamily: 'Courier New';">o Obscene, as that term is defined in section 1460 of Title 18, United States Code; <span style="font-size: 11pt; font-family: 'Courier New'; msolist: Ignore; mso-fareast-font-family: 'Courier New'; msofareastfontfamily: 'Courier New';">o Child Pornography, as that term is defined in section 1226 of Title 18, United States Code; or <span style="font-size: 11pt; font-family: 'Courier New'; msolist: Ignore; mso-fareast-font-family: 'Courier New'; msofareastfontfamily: 'Courier New';">o  “Harmful to minors” means any picture, image, graphic image file or other visual depiction that: <span style="font-size: 11pt; font-family: Wingdings; mso-bidi-font-family: Wingdings; msobidifontfamily: Wingdings; msolist: Ignore; mso-fareast-font-family: Wingdings; msofareastfontfamily: Wingdings;">§ Taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex or excretion; <span style="font-size: 11pt; font-family: Wingdings; mso-bidi-font-family: Wingdings; msobidifontfamily: Wingdings; msolist: Ignore; mso-fareast-font-family: Wingdings; msofareastfontfamily: Wingdings;">§ Depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act* or sexual contact*, actual or simulated normal or perverted sexual acts*, or a lewd exhibition of the genitals; and <span style="font-size: 11pt; font-family: Wingdings; mso-bidi-font-family: Wingdings; msobidifontfamily: Wingdings; msolist: Ignore; mso-fareast-font-family: Wingdings; msofareastfontfamily: Wingdings;">§ Taken as a whole, lacks serious literary, artistic, political, or scientific value for minors.
 * //__ Definitions __// **

*“Sexual act” and “sexual contact” have the meanings given such terms in section 2246 of Title 18, United States Code.

PDLCS offers a chat room and e-mail so that PDLCS parents and students have a forum in which to share ideas and exchange views regarding PDLCS with other parents, students, teachers and administrators. To protect all chat room and e-mail participants, all chat room sessions and network e-mails are monitored and recorded. PDLCS does not discourage criticism or healthy disagreements; however, PDLCS does expect each chat room and e-mail participant to act civilly throughout such conversations and will not tolerate vulgarity, name-calling or attacks upon other chat room participants in any way. If, for any reason, PDLCS does not believe that a chat room or e-mail participant is acting in a manner that will enhance or support the mission of the school, it reserves the right to remove that person from the chat room and e-mail network (except for access to his/her teacher(s)) in accordance with the penalty provisions provided below. Specifically, the school’s in-home computers and Internet connection should not be used for any of the following purposes and acting appropriately does not include: <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Making statements that are sexually explicit or grossly offensive, including blatant expression of bigotry, racism, hatred, or profanity; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Indulging in abusive, defamatory or harassing behavior or insults or personal attacks or threats of harm to anyone or promoting physical harm or injury to any group or individual; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Promoting or providing information about illegal activities. <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Indulging in activities that infringe upon anyone else’s copyright(s). Specifically, he/she cannot advocate illegal conduct or participate in illegal or fraudulent schemes. <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Using chat rooms to distribute unauthorized copies of copyrighted materials, including photographs, work, text, recordings, designs, or computer programs; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Impersonating someone else or falsely representing oneself; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Attempting to post or use computer programs that contain destructive features, including but not limited to: viruses, worms, Trojan horses, bot scripts; <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Posting or transmitting of unauthorized or unsolicited advertising, promotional materials or any other forms of solicitation of other users; and <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· Any other chat room behavior, which, at the sole discretion of the Administrator, does not support the mission of the school.
 * //__Terms and Conditions for Using Chat Rooms, Message Boards and Network E-Mail__//**

While this is not a complete listing of every behavior that may be inappropriate, it gives some guidance regarding the types of actions and communications that are prohibited. Violation of PDLCS’ chat room policy may result in a warning or a temporary or permanent ban from the chat room, depending on the severity of the infraction. The length of any temporary ban shall be at the sole discretion of the Administrator. A Permanent Ban may be reviewed and lifted or modified at the sole discretion of the Administrator no earlier than one month after the commencement of the Permanent Ban. If an infraction is severe enough, as deemed by the Administrator, the student may be scheduled for an expulsion hearing for misuse of the network.
 * //__Inappropriate Chat Room, Message Board and E-Mail Penalty System__//**
 * //__Permanent Bans__//**

Attempting to use a banned username while operating under a Temporary or Permanent Ban will result in the following: <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· The first offense will result in the alternate username(s) being permanently banned. Additionally, a warning will be added to the original username. <span style="font-size: 11pt; font-family: Symbol; mso-bidi-font-family: Symbol; msobidifontfamily: Symbol; msolist: Ignore; mso-fareast-font-family: Symbol; msofareastfontfamily: Symbol;">· The second offense will result in a permanent ban on all current and/or future usernames. In addition to the penalties above, students who violate any chat room/message board policy may be suspended or expelled in accordance with the PDLCS Code of Conduct disciplinary policy.
 * //__Alternate Usernames__//**
 * //__Student Misuse of the Chat Room and Message Boards__//**