There is NO expectation of privacy on classroom computers or using RESA 5 Internet.
Every student is required to write his/her name and log in time on the computer log sheet before he/she touches the computer. The student must write the log off time when he/she is finished with the computer. Students must do this every time they use a computer, even if the student only plans to use the computer for a short period of time. If a student is caught not using the computer log sheets, it will be considered a technology use violation.
Students are only allowed to use computers and internet for classroom purposes. Students are NOT allowed to access the following:
- Facebook, Myspace, Twitter, Google+, Foursquare or any form of social networking - Topix or any gossip website - Any form of chat, instant messaging or texting - Gaming - Actual games, game information, games sales, game cheats, etc. - Gambling - poker, betting sites, etc. - Shopping - Ebay, retail sites (unless for applications), etc. - Astrology, horoscopes, tarot cards, etc. - Sports and sports entertainment - team information, scores, etc. - Dating sites of any kind - Any kind of contest - "Enter now to win" - People searches (unless for reference contact information) - Prison sites, jail information, etc. - Music websites, lyrics, etc. - Hulu, Netflix, surfthechannel or any kind of media streaming site - Craigslist for any reason (job search included) - Any form of pornography - Any site with inappropriate content, such as : inappropriate language, less than fully clothed people/characters, illegal activities, etc. - This list can be altered at any time without notice.
Students will be held responsible for ALL content on the computer during the times they listed on the computer log sheet.
Students are not allowed to change any settings on the computers or delete any file, folder or history. This is considered a violation of the technology use policy.
- Settings include, but are not limited to, the following: - Toolbars - Default browsers - Printer settings - Office (Word, Excel, etc.) settings - Home page - Desktop icons - All other Windows settings
Students are not allowed to set the computer to delete browsing history upon exit of the browser. This is considered a violation of the technology use policy.
Students are not allowed to download any programs without permission from a teacher. This includes browsers (Google Chrome), games, rebate programs, e-mail attachment programs, iTunes, etc. This is considered a violation of the technology use policy.
Students are ONLY allowed to check e-mail if it is related to school or employment. Reading and/or sending personal e-mail is considered a violation of the technology use policy.
All activities pertaining to academics and/or job search may be monitored electronically while at SPOKES.
Students are not allowed to download, upload or execute viruses, spyware or malware. Students are not allowed to damage computers, computer systems or computer networks. Students are not allowed to employ the network for commercial purposes. This is considered a violation of the technology use policy.
Students are not allowed to access, alter or delete the files of another student. This is considered a violation of the technology use policy.
Use of the computers and Internet is a privilege, not a right. If students are not responsible enough to use the technology for appropriate purposes, the privilege will be taken away. Other consequences include expulsion from class and possible disciplinary action from the referring agency. If the technology policy is violated, the referring agency will be notified immediately. Depending on the severity of the offense, students may be removed from class for their first technology use violation. Students will only warning for lower level offenses and be terminated from the program for second offense.
If a student has any question about what is appropriate technology use, he/she should immediately ask a teacher. If the content is questionable and the student does not ask the teacher, the student will be held accountable for the content.