Академический Документы
Профессиональный Документы
Культура Документы
The Acceptable Use Policy for Chatham County link is here for your reference. It is also located
at the end of this graphic organizer: It applies specifically to Chatham County. We will highlight
an important portion of the AUP as it pertains to Digital Security in this training:
Link: https://eboard.eboardsolutions.com/ePolicy/policy.aspx?PC=IFBGR&Sch=4140&S=4140&RevNo=2.12&C=I&Z=R
1. All technology resources are for ________________ or ______________ purposes
only. Users shall not access inappropriate sites on the Internet or use
_________ resources for _________ purposes. This rule alone protects against
many dangers that can affect our safety.
2. As teachers, we need _____________ prior approval to release student
_______________ or __________ with last names on the Internet.
3. What is the first level of security for our network?
4. What is THE most important thing we can do as teachers to prevent problems
with the use of technology?
5. What is your plan when students do not follow your directions pertaining to
the use of technology?
6. Beware of __________ attacks and downloading ______________.
7. Each browser has a slightly different way to select privacy settings. Googling,
How to delete cookies in Internet Explorer, Safari, Firefox etc.. or whatever
browser your using will give you step by step instructions on how to delete
cookies and select not to be tracked.
8. ____ _______install Toolbars. Toolbars slow down browsers and can potentially
download unwanted virus. Save this for home use.
9. A virus is a small _________ program that is designed to spread from one
computer to another interfereing with computer ___________ and ____________.
10.____________ security warnings before you ____________ software! NEVER click
Agree or ok to ____________ an irritating window. Instead click the
_________ in the ________ of the window.
11.To perform a virus scan, navigate to the Norton Antivirus program (for HP
computers distributed by the district) by clicking on the ______> All program>
Symantic Client Security > Symantic Antivirus Once the program has opened
click on Scan > Full Scan > Scan.
12.Live Updates- important applications that _________ and install security
_________ and software ______ which protect your computer and the network.
As long as Hackers are constantly finding ways to infect computers so
software developers will constantly be issuing updates.
13.Do not put off installing Live updates
14.We are all ________________ for Live updates and keeping our technology safe
as Digital Citizens.
Administrative Regulation
States Code,
2. Child Pornography, as defined in section 2256 of title 18,
United States Code, or
3. Harmful to minors.
User Responsibilities
Users have an obligation to be responsible participants while exploring
the vast resources that are available on the Network, Internet, and
Intranet, and must adhere to the generally accepted rules of online
behavior. Illegal activities of any kind are strictly forbidden. The
standards include, but are not limited to, the following:
Consequences
The use of the SCCPSS technology resources is a privilege, not a right.
Inappropriate use may result in disciplinary action or cancellation of that
privilege. Use of SCCPSS technology resources is contingent upon
compliance with state and federal laws, District regulations, and the user
responsibilities outlined in this document, and the Code of Ethics for
Government Service.
Disclaimer
SCCPSS makes no warranties of any kind, whether expressed or implied,
for the service provided. SCCPSS will not be responsible for any damage
suffered including, but not limited to, loss of data resulting from delays,
service interruption, and/or exposure to offensive or threatening
material. Use of any information obtained via the Network, Internet, or
Intranet is at the users own risk. SCCPSS specifically denies any
responsibility for the accuracy or quality of any information obtained
through its services, Network, Internet, or Intranet.
Nothing in this policy shall be construed to permit any access to
materials that can be harmful to minors or that violate any local, state,
or federal laws.
Date: 9/29/2013
Version: 4.3.1.13
Last Revised:
1/9/2013