All school rules of conduct must be followed. Food, drinks, water bottles, radios, makeup and hair spray are not permitted in the labs or library.
Everyone is expected to keep his/her work area clean.
Computer games are not permitted in the labs or library.
Only the teacher/librarian may make adjustments to the equipment. Students should report problems to the teacher/ librarian.
The Computer Coordinator must approve the use of any software not owned by the school.
The Internet can be used for educational purposes only. Violation of this will result in the loss of Internet and computer lab privileges. Students are not permitted to enter chat rooms or use email. Private email is strictly prohibited.
Students may print ONLY class-related items. If in doubt, the student must check with the librarian or teacher. You are to print only what pertains to your assignments.
Librarians or teachers will randomly check printed items for appropriateness.
No inappropriate web sites are allowed. If you have to ask: DON’T GO THERE! If you find something inappropriate on your screen, click “back”.
You are not to download any Plug-Ins or Screen Savers or anything else without permission.
Transmission of any material in violation of any local, state, or federal law is prohibited. This includes, but is not limited to, copyrighted, threatening, and obscene, racist, malicious, fraudulent or libelous material.
Network Etiquette includes, but is not limited to, the following:
a) Be polite and use appropriate language.
b) Do not reveal personal information about yourself or others; e.g. name, age, telephone number.
c) Action relating to or in support of illegal activities will be reported to the authorities.
d) Do not use the network in such a way that you would disrupt the use of the network by others. This includes downloading large files such as MP3 or wave files.
e) Copyright and ownership of material on the Internet should be respected and accredited when used.
Vandalism is defined as any malicious attempt to harm or destroy data, programs, or computer hardware. This includes, but is not limited to, the uploading or creation of computer viruses.