13.07.2015 Views

Student Planner 2013-14 - Pinkerton Academy

Student Planner 2013-14 - Pinkerton Academy

Student Planner 2013-14 - Pinkerton Academy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

-<strong>Student</strong>s are encouraged to use social media and Web 2.0 tools in support of their learning and education provided they follow theResponsible Use Policy for <strong>Student</strong>s. <strong>Student</strong>s will follow both the Acceptable Use Policy as well as follow the guidelines set forth in theComputer Usage and Infractions section of the <strong>Student</strong> <strong>Planner</strong>.-All hardware and software is either owned or licensed by <strong>Pinkerton</strong> <strong>Academy</strong>. All users are required to use the hardware andsoftware in accord with its designed purpose. No hardware or software shall be altered or reconfigured without the permission of theadministration.Unacceptable use for students’ activities includes, but is not limited to, any activity through which the user:-Uses the <strong>Academy</strong>’s technology to violate the acceptable uses set forth above.-Creates, accesses, submits, posts, publishes, forwards, downloads, scans, or otherwise displays defamatory, abusive, obscene,vulgar, threatening, discriminatory, harassing, and/or illegal materials.-Uses the <strong>Academy</strong>’s computers or other technological devices, networks, or internet/intranet for any illegal activity, or in violation ofany <strong>Academy</strong> policy or rule, such as for bullying, cyberbullying, harassing, and vandalizing, or in support of such activities.-Violates copyrights, license agreements, and/or contracts.-Plagiarizes.-Engages in malicious use, disruption, or harm to the <strong>Academy</strong>’s computers or other technological devices, networks, or internet/intranet, including but not limited to hacking and creating/uploading computer viruses and/or worms.-Downloads or installs software or other applications without permission from the administration.-Uses <strong>Academy</strong> technology after such access has been denied or revoked.-Accesses or attempts to access confidential information stored on the <strong>Academy</strong>’s network or server.-Uses the <strong>Academy</strong>’s technology for any other use that is inconsistent with the <strong>Academy</strong>’s educational mission and/or is not foreducational purposes.Any violation of these guidelines will be grounds for disciplinary action, up to and including expulsion, and may result in suspensionor revocation of a student’s technology privileges, referral to law enforcement and/or legal action. If you have any questions or concerns,please see or submit the questions or concerns in writing to the administration. Visit www.pinkertonacademy.net to view the full policy.Computer Usage and InfractionsIt is the belief of the faculty and administration that students are expected to be responsible for their actions. This includes ethical,responsible use of materials, tools, and equipment. Nowhere is this more important than in the responsible use of the many computerson campus. <strong>Student</strong>s must learn to show courtesy and respect to other users of the computers and be aware of the <strong>Academy</strong> as acommunity of learners. Computer users must abide by all aspects of the computer infractions and acceptable use policies listed in thisbook. Any student who discovers vandalism or damage to computer hardware or software must report same to a nearby faculty memberimmediately. An Internet user who accidentally links to an inappropriate site must notify their teacher immediately. Failure to do so willcause the student to face disciplinary action.Policies and consequences for each of these categories of offenses are listed under the appropriate sections in the student planner.Due to the potential drastic ramifications of abuse with computer systems, the following infractions are being listed separately.Examples of infractions in each category are listed; however, infractions are not exclusively limited to these lists.1. CheatingSubmitting a computer generated file or document, either electronically or in hardcopy,which is either totally or in part the work or another person without a proper bibliographic citation.2. Vandalisma. Altering, deleting, or installing files, icons, or programs on the computer without instructions to do so.b. Altering or removing any parts of a computer system including cables attached to the computer, mouse, network, printer, orother peripherals.c. Running programs that install bugs or viruses or cause physical or logical damage to the computer network.d. Entering parts of any network, system, program, or area where access has been denied.e. Modifying programs or the operating system without instructions to do so.3. Stealinga. Taking storage devices.b. Removing parts of any computer system including keyboard keys, mouse components, or cables.c. Any unauthorized entry into computer files, including theft of intellectual property, will result in significant disciplinary action.4. Sharing Accounts - In order to minimize computer misuse, students are prohibited from sharing student accounts or passwords.<strong>Student</strong>s engaging in this practice will be subject to disciplinary action, including loss of privileges and detentions.Any of the above infractions shall subject a student to disciplinary action up to and including expulsion. All computer violations willbe handled through normal administrative disciplinary channels, except for security breaches and/or vandalism. In these two situations,the Headmaster will supervise the investigation. Please consult the Internet Acceptable Use Policy (see table of contents). Violations ofthe Internet Acceptable Use Policy may result in one or more of the following disciplinary actions:-Saturday detention, suspension or expulsion-suspension or revocation of access privileges-removal from a class activity-removal from a course-referral to the appropriate legal authorities for possible criminal prosecution24

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!