Procedural Guidelines
Computer Virus
Unacceptable Uses
Wireless Communication
Monitoring and Uses
100

This network is not a public service or free wifi hotspot and may place limitations on it's users.

What is OCSD network or UNET

100

Include, but not limited to: uploading or creation of computer viruses, hacking or altering software, and physical damage to the computer


What is considered vandalism?

100

Creating a meme powerpoint that is making fun of Mrs. Hagan and posting it on Instagram, YouTube, and SnapChat.

What is bullying or spreading information that infringes on the rights of others?

100

Vlogging while working in the classroom (Because you KNOW your subscribers want to see what you are up to!)

What is inappropriate use of a cellphone at school?

100

Researching climate change and then building a powerpoint online with Office 365. 

What is an appropriate use of the computers?

200

Technology is a __________ not a ________

Privilege, right
200

Changing the wi-fi connection on your class computer from UNET to BYOD.

What is disrupting technology or what Mrs. Hagan considers vandalism?

200

Searching for vaping stores online while on a school computer.

What is spreading or accessing information the promotes criminal behavior

200

Texting your friend the answers to the math test.

What is inappropriate use of a cellphone and cheating at school?

200

Mrs. Hagan using screen monitoring software to watch you work.

What type of monitoring is allowed in school?

300

Internet access

What can be taken away if this policy is violated?

300

Installing a keystroke software on your school computer.

What is installing inappropriate software? or What is potentially spreading a virus?

300

Sharing a copy of Billie Eilish's new song on the OneDrive for the whole class to download.

What is violating copyright laws?

300

Turning on music on your cellphone and using bluetooth headphones to listen.

What is inappropriate use of a cellphone while at school?

300

Students files saved on a school computer and online using Office, ClassLink, or Google Drive.

What is subject to monitoring and inspection?

400

These files are not private and may be inspected by a school principal.

What are student files subject to?

400

Spread a computer virus.

What might happen if you download a file from an unknown website or without a teacher's permission?

400

Taking a picture on your phone in class and then posting it online.

What is violating personal privacy?

400

Texting your BFF after school to meet up at Cafe Liquid for a coffee.

When is an appropriate time to use cellphones?

400

Inspection and monitored by the school.

What are student files and web searches while on the school network subject to?

500

Office referral and possible removal of computer privileges. 

What are the disciplinary actions of someone who violates the policy?

500

Plugging in a USB drive without permission.

What is potentially spreading computer viruses?

500

Putting tape on the bottom of the mouse so that it does not track properly.

What is vandalism of a school computer?

500
Texting while in class.

What is inappropriate cell phone use while at school?

500

All activities that you perform on the computer, such as web searching, typing, uploading, and downloading.

What are you held accountable for when logged into the computer?