Title: OXFORD HILLS COMPREHENSIVE HIGH SCHOOL
1OXFORD HILLS COMPREHENSIVE HIGH SCHOOL
- Introduction to Computer Rules
2Reason for this presentation
- While computers provide excellent educational
opportunities, they can also be used in
inappropriate ways. We want to be sure that
everyone understands the rules and knows the
consequences of breaking them.
3The BIG Rule
- Do not ever, under any circumstances, give your
password to another person or let someone else
use your account.
Letting someone who has been suspended from the
BBS and/or Internet use your account is a
violation of the Acceptable Use Agreement. If
you do this, you will also lose your privileges.
4Rules for the Bulletin Board System
5Educational uses of the Bulletin Board System
- communicating with teachers and classmates about
school work extracurricular activities
- sending files to teachers
- transferring assignments from school to home and
back
- communicating with other schools (possibly
universities) for school projects
- reading daily school bulletins and announcements
to classes
6General BBS Rule
Inappropriate language, images and actions are
not allowed.
7The level of etiquette that is expected on the
BBS is much greater than you might use in notes
or conversations outside of the school for
several reasons
- As a public school, we have to expect a high
standard of dialogue.
- It is impossible to convey facial expression or
tone of voice on email.
- You are not present to see the persons reaction
or to explain further what you meant.
8Definition of inappropriate
- profanity and or obscenity (stars as in st
count as real words)
- sexually suggestive language (can be considered
harassment)
- hate language (put downs of race, sexual
orientation, religion, or ethnic background)
This list applies to messages, subjects,
signatures, and attached files.
9Remember
Every student from third grade on up may have an
account on our BBS and can see anything in the
conference folders. What could be appropriate
for a high school student to read is not
necessarily okay for a third grader.
10Rule of thumb
- If you would not say it to someones face with a
teacher present, or in a public meeting with
children and adults present, you should not write
it on e-mail.
Remember There is no such thing as being
anonymous on the BBS. Your name will always
appear on any message you send.
11Chain letters
- Chain letters ask you to forward something to
several other people, often implying bad luck if
you dont. These are not allowed because they
take up valuable disk space and slow down the
system for all users. They also make some people
feel uncomfortable. If you receive one, delete
it from your account and do not forward it to
anyone else.
12Mass Mailing
- Like chain letters, mass mailings also use up
valuable space and slow down the system.
- We consider a mass mailing to be anything sent to
more than ten people or one conference, the
purpose of which is not related to a class
assignment or school-related activity.
- Check the To field and the Cc field in your
message to make sure you stay within these limits.
13- If you respond to a mass mailing, use the Reply
Special/Reply Sender option. (If you need help,
see Ms. Hayden.)
14Or click on this shortcut on the toolbar.
Otherwise, you will reply to everyone on the
original list and be guilty yourself of mass
mailing.
15One more thing.
BBS users may not conduct any business
transactions or advertise a business on the
system. You may place an appropriate, legitimate
classified ad in the Buy, Sell, or Trade
conference.
16Internet Rules
17- Do not access sites that are defamatory, abusive,
obscene, vulgar, sexually explicit, or sexually
suggestive. If you find a site that is offensive
to you or the people around you, report the site
to a teacher.
- Do not download inappropriate files.
- Name, phone number and address should not be
revealed to anyone on the Internet. NEVER agree
to meet in person someone you met on the
Internet.
- Do not access game sites, non-District email
accounts or chat rooms.
18OHCHS Network
- The school network gives you the ability to use
the school software and printers. It also gives
you access to your home directory, also called
your H-Drive, a space on the server reserved for
you. This is a safe place to store work, and you
can access your home directory from any computer
in the school.
19Network Rules
- Do not install any software or change any
settings.
- Do not place any software on your home directory
--not even WinZip or Real Player. All the
software you need is on the machine.
- Do not use the system to gain unauthorized access
to areas to which you are not explicitly given
access (such as other people's accounts).
- Do not in any way jeopardize the systems
stability or security.
20OHCHS Rules concerning Games
GAMES
21Our policy at OHCHS is...
- No games at any time on any computers in the
school.
You may not keep them your network directory
space or your email account. You may not access
games on the internet, floppy disks, CDs, or from
your home computers. You may not access game
sites on the Internet. No games before, during
or after school--or even during summer vacation.
22General Rules
- Physical damage - vandalism. If a user causes
damage to the equipment, he/she will be held
liable for replacement or repair at the
districts discretion.
Printing - School printers are for printing
schoolwork. Dont print it out unless you need
it, particularly from the Internet.
23Consequences
- Breaking these rules is a violation of a contract
that you and your parents have signed. - The consequence for breaking BBS or Internet
rules is a one-month suspension of Internet and
BBS privileges. - A second violation is suspension for the
remainder of the year, possibly continuing into
the following year.
24- Be aware that consequences for some infractions
may be more severe. For example, if you steal
another persons password (teacher or student)
you may face suspension from school or even
expulsion. - Any type of threat or harassment will be dealt
with as necessary, possibly including the
involvement of law enforcement.
25Big Brother is Watching
How we know if you are breaking a rule
- We have the right to inspect anyones mailbox
and/or network space. - We can see what users are doing and see the
subject of messages being read or written. - We have software that allows us to view any
computer screen from a central console.
26And furthermore
- We have software that allows us to view in real
time current connections to the internet. This
means we know what web site people are looking
at. - We log EVERYTHING that goes on inside this
building. We have the means to examine these
logs for inappropriate actions. That means we can
tell who was using which computer at any given
time.
27In the end
- We invest in technology because we strongly
believe that it will help you learn and help your
teachers teach you. We will do anything we can
to help you use the technology to aid your
education, but we ask you to respect the rules so
we can continue to support technology.