NVOT newtork/computer policy

advertisement
NORTHERN VALLEY REGIONAL HIGH SCHOOL
DISTRICT
TECHNOLOGY EDUCATION DEPARTMENT
NETWORK COMPUTING POLICY
The Northern Valley Regional High School District is responsible for securing its network and
computing systems to a reasonable and economically feasible degree against unauthorized access and/or
abuse, while making them accessible for authorized and legitimate users. This responsibility includes
informing users, both registered and unregistered, of expected standards of conduct and the disciplinary or
legal consequences for not adhering to them. Any attempt to violate the provisions of this policy will result
in disciplinary action, including but not limited to temporary revocation of user accounts, regardless of the
success or failure of the attempt. Permanent revocations can result from disciplinary actions taken by the
administrator called upon to investigate network abuses.
The users of the network are responsible for respecting and adhering to local, state, federal and
international laws. Any attempt to break those laws through the use of the network may result in litigation
against the offender by the proper authorities. If such an event should occur, this organization will fully
comply with the authorities to provide any information necessary for the litigation process.
SECTION 1: GENERAL COMPUTING POLICY
Once a user receives a user ID to be used to access the network and computer systems on that
network, they are solely responsible for all actions taken while using that user ID. It will be the
responsibility of the user to pay any fees accrued by that user or anyone using his user ID. Therefore, the
following actions are prohibited:
1.1
Applying for a user ID under false pretenses
1.2
Sharing your user ID with another person. If you do share your used ID with another person, you
will be solely responsible for any abuse by that person.
1.3
Deleting, examining, copying, or modifying of files and/or data belonging to other users without
their prior consent.
1.4
Attempting to evade or change resource quotas.
1.5
Impeding other users through mass consumption of system resources, after receipt of a request to
cease such activity.
1.6
Using facilities and/ or services for unauthorized commercial purposes.
1.7
Any unauthorized, deliberate action which damages or disrupts a computing system or network,
alters its normal performance, or causes a malfunction regardless of system location or time
duration.
SECTION 2: ELECTRONIC MAIL POLICY
Electronic mail (“e-mail”) is an electronic message sent by or to a user in correspondence with another
person having e-mail access. Messages received by the system are retained on the system until deleted by
the recipient. A canceled account will not retain its mail. Users are expected to remove old messages in a
timely fashion and the system administrators may remove such messages if not attended to regularly by the
user. When a user sends electronic mail (e-mail), his name and user ID are included in each mail message.
The user is responsible for all electronic mail from his user ID. Therefore, the following are prohibited:
2.1
Forging or attempting to forge electronic mail messages.
2.2
Attempting to read, delete, copy, modify or view without permission, other users’ e-mail.
2.3
Attempting to send harassing, obscene and/or other threatening e-mail to another user.
2.4
Attempting to send unsolicited junk mail, “for-profit” messages, or chain letters.
SECTION 3: NETWORK AND COMPUTING SYSTEM
A user of the network may be allowed to access only authorized networks or the computer systems attached
to those networks. Therefore, the following are prohibited:
3.1
Using systems and/or networks in an attempt to gain unauthorized access to remote systems.
3.2
Using systems or networks to connect to other systems evading the physical limitations of the local
or remote system.
3.3
Decrypting system or user passwords.
3.4
Copying system files.
3.5
Duplicating copyrighted materials, such as third-party software, without the express written
permission of the owner or the proper license.
3.6
Attempting to “crash” network systems or programs.
3.7
Attempting to secure a higher level of privilege on network systems.
3.8
Willfully introducing computer “viruses”, disruptive, or destructive programs into the organization
network or into external
networks.
3.9
Connecting to a peer-to-peer network (such as but not limited to; Kazaa, Limewire, Bit Torrent
etc.) to share and download copyrighted media and/or software.
The Northern Valley network and computing systems are expected to be used exclusively for educationrelated functions and applications. As the systems administrators have access to all files, including e-mail
files, users should have no expectation of privacy with respect to said files or e-mail. However, the system
administrators will not normally inspect the contents of files or e-mail sent by one user to an identified
addressee, or disclose such contents to other than the sender, or an intended recipient, without the consent
of the sender, or an intended recipient, unless required to do so by law or policies of Northern Valley
Regional High School District, or to investigate complaints regarding files or e-mail which is alleged to
contain defamatory, abusive, obscene, profane, sexually oriented, threatening, racially offensive, or illegal
material. Further, the Northern Valley Regional Schools are obligated to cooperate fully with local, state, or
federal officials in any investigation concerning or relating to any e-mail transmitted on or misuses of the
network and computing systems.
I, _____________________________________, am a student in Mr. Maietta’s Technology class
Period________. I have reviewed the school's computer, email, and network policy in class with Mr.
Maietta. I understand that I face certain consequences if I violate the policies addressed in this notice.
I, ____________________________________am the legal guardian/parent of the above named student. I
acknowledge that I have read the NVRHS computer, email, and network policies and have spoken to my
child regarding the consequences that they face if they fail to adhere to these policies.
Signed by ______________________________________________________(Student)
_______________________________________________________(Parent/Guardian)
Date__________________
Download