Messages | | The electronic communication network should be used in a responsible, _______________, and lawful manner. |
Equipment | | The consequence for the third offense of breaking the school's computer technology policy is ________________ from school for the semester. |
Discontinued | | Unacceptable use includes utilizing any network resource in an ______________ manner or that violates any State or Federal laws, rules, or regulations. |
Copyright | | Students will NOT vandalize ________________ or systems. |
Passwords | | Students will NOT distribute any ______________ on, or cause to infect, any unit or system or down the server. |
Vandalize | | Unacceptable use includes sending anonymous messages or misrepresenting one's __________________ through the data network. |
Monetary | | Students will NOT remove any technology equipment, _________________, or software from the campus. |
Unplugging | | Access to the electronic communication network, as well as the hardware and software that support access, are the property of the _______________ ________________. |
Content | | If the amount of damage to school technology is in excess of $75.00, violation of this policy may be a Level 1 _______________. |
Privileges | | Any authorized use of the electronic communication network or any failure to comply with the local and system-wide provisions relating to the use of the electronic communication network by a student will be grounds for loss of electronic communication network access and/or other ___________________ and/or legal action. |
Virus | | Students may NOT send __________________ on the network. |
Menus | | Examples of vandalizing software offenses include deleting files, zipping files, hiding or moving files, renaming files, changing files, and deleting ___________. |
Reputation | | Unacceptable use of the ECN includes attempting to gain unauthorized access to a computer resource by using another user's name and/or _______________. |
Offense | | Unacceptable use includes accessing, posting, or communicating materials or messages that are harassing, abusive, threatening, obscene, vulgar, or inappropriate in _________________. |
Password | | The consequence for the ____________ offense of breaking the school's computer technology policy is suspension in school or out of school up to five days. |
Personal | | The consequence for the second offense of breaking the school's computer technology policy is suspension from school for __________ days. |
SchoolSystem | | Students may not attempt to break ________________ on individual units or networks. |
Year | | Unacceptable use includes attempting to disrupt ________________, or break into any computer system resource maintained by the Paulding County School System. |
Disciplinary | | Unacceptable use includes supplying _______________ information such as home address, phone number, and full name while accessing the Internet. |
Political | | Unacceptable use includes utilizing any network resource for personal or ___________________ gain. |
Icons | | Student access to the electronic communication network shall be under the ________________ of a teacher or other appropriate staff member. |
Peripherals | | Use of the Paulding County electronic communication network is a privilege that may be __________________ at any time. |
Games | | Unacceptable use includes accessing, posting, or communicating materials or messages that are slanderous harmful to the _________________ of another. |
ID | | Unacceptable use includes attempting to use any software that would cause ________________ or disruption to any network resource maintained by the Paulding County School District. |
DOS | | Examples of vandalizing equipment or systems offenses include, but not limited to, rearranging keys on the keyboard, removing keys on the keyboard, removing mouse balls, ________________ computer cables, marking on computer equipment, and cutting computer cables. |
Student | | Students should never share ID's or ________________ with anyone else. |
Expulsion | | Students may NOT copy any programs, utilities, or ______________ to any computer on campus. |
Supervision | | A ____________________ is responsible for damage done using his/her ID. |
Service | | Students will remain in the _____________ provided. |
Five | | Students are only authorized to use their own _______ or one assigned by a faculty member. |
Grade | | Unacceptable use includes using any network resource in such a way that does not comply with the __________________ objectives of the Paulding County School System. |
Security | | Students will NOT make changes to teacher grade disks or ___________ records using electronic means. |
Improper | | The consequence for the fourth offense of breaking the school's computer technology policy is expulsion from school for the ___________. |
Damage | | Students will NOT ________________ software. |
First | | Unacceptable use includes utilizing any network resources for _______________ lobbying. |
Ethical | | Unacceptable use includes using any network resource when ______________ have been terminated. |
Educational | | Students may NOT access _________________ on-line information, including the utilization of any improper medium, for example (but not limited to) adult material. |
Commercial | | At no time should a student be found at a _________ prompt (C;/ or any other drive letter), unless authorized and supervised by a faculty member. |
Identity | | Unacceptable use includes utilizing any network resources to obtain any software and/or material against _________________ law. |
Illegal | | Unacceptable use includes engaging in any activity while using a network resource that could result in a ________________ charge to the Paulding County School District. |