Temple ISD Technology Use Agreement

The following is an excerpt from the 2016-17 TISD Student Handbook:
Temple Independent School District’s goal in providing technology resources and Internet access to teachers and students is to promote educational excellence in our schools by facilitating collaboration, innovation, and communication. TISD has taken precautions to restrict access to inappropriate materials. However, on a global network it is impossible to control all materials and any user may discover inappropriate information. The guidelines provided here outline the user’s responsibility to operate ethically, efficiently and legally using District network resources. Any Temple Independent School District user violating these policies, posted classroom and district rules, or state and federal laws, is subject to: 
  • Suspension of user access to the system 
  • Termination/revocation of the system user account 
  • Other disciplinary action in accordance with District policy and applicable laws 
School and District administrators will make the final determination as to what constitutes unacceptable use. Their decision is final.

1.       Responsible Use - The use of your account must be consistent with the educational objectives of the Temple Independent School District.
   a. Transmission and/or access of any material in violation of any District, state, or US regulation is prohibited. This includes, but is not limited to: copyrighted material, threatening or obscene material, or malicious or dangerous material.
   b. Users will respect the intellectual property of other users and information providers and obey copyright guidelines providing proper citation. Users will not plagiarize or use others’ work. 
   c. The taking of unapproved videos/photos of people and events at school and/or the posting of such on any website is strictly forbidden.
   d. Use of your account for commercial activities, product advertisement or political lobbying is prohibited.
   e. Users will not install any personal computer programs or applications on school devices without permission. 
   f. The use of personal electronic devices is allowed with permission during the school day.  

2.     Network Etiquette - You are expected to abide by the generally accepted rules of network etiquette when using any system, including the gcloud.tisd.org secure, controlled email system. The student’s ID number will be part of the username for email.
  a.Be polite. Do not swear, use vulgarities or any other inappropriate language. Abusive or demeaning communications are prohibited.
  b.Do not reveal your personal address or phone numbers to anyone over the Internet including, but not limited to: e-mail, chat, bulletin board postings, social media sites and forums.
  c.Note that email is not guaranteed to be private. People who operate the system have access to all mail. Messages relating to or in support of illegal activities may be reported to the authorities. Use email and other means of communications responsibly (e.g. blogs, wikis, podcasting, chat, instant-messaging, discussion boards, virtual learning environments, etc.).
  d.Do not use electronic devices or the Internet to send or post hate or harassing mail, pornography, make discriminatory or derogatory remarks about others, or engage in bullying, harassment, or other antisocial behaviors.
  e.Do not use the network in such a way that you would disrupt the use of the network by other users.
  f.Do not retrieve, save, or display hate-based, offensive or sexually explicit material Do not retrieve, save, or display hate-based, offensive or sexually explicit material using any TISD resources. Users are responsible for not pursuing material that could be considered offensive and should notify an adult immediately if they encounter such materials accidentally.
  g.The user is responsible for reasonable daily care of the equipment made available by the District.
  h. Users will follow all guidelines set forth by the District and teachers when publishing schoolwork online (e.g. to a website, blog, wiki, discussion board, podcasting or video server). 

3.     Security - Protecting personal information and network security are high priorities.
  a.If you feel you can identify a security problem on the Internet, you must notify a system administrator. Do not demonstrate the problem to other users.
  b.Do not use another individual's account or allow your account to be used by others. This includes, but is not limited to, sending out e-mail, creating accounts, or posting messages or other online content (e.g. text, images, audio or video) in someone else's name.
  c.Attempts to logon to the Internet as a system administrator will result in cancellation of user privileges. Any user identified as a security risk or having a history of problems with other computer systems may be denied access to the Internet.

4.     Vandalism - Vandalism is any malicious attempt to harm or destroy equipment, data of  another user or any entity, or other networks that are connected to the Internet. 
  a.Internet vandalism will result in cancellation of privileges. This includes, but is not limited to: the uploading or creation of computer viruses.
  b.Hardware and software vandalism will result in cancellation of privileges.   This includes but is not limited to: modifying, damaging, or destroying equipment, programs, files, or settings on any computer or other technology resource.