Violations
-
Non-severe Violations
- Non-severe violations are typically those that have minimal effects on others. They include, but are not limited to:
- Using technology for off-task activities during class (games, videos, music files, CDs, web sites not instructionally related)
- Sending messages from computer to computer
- Employing the technology for commercial purposes or for political lobbying
- Accessing or attempting to access any e-mail services other than school e-mail accounts.
- Accessing or attempting to access translator services, chat-rooms, bulletin boards, news groups or messaging systems unless authorized by your teacher for a valid educational purpose
- Removing or replacing hardware or cables without authorization
Severe ViolationsSevere Violations are typically those that exhibit an indifference to the rights of others or to one's own personal safety. Once a student loses computer privileges due to a severe violation, any subsequent violation is considered severe regardless of the offense. They include, but are not limited to:
- Installing unauthorized software anywhere on the network
- Downloading and storing files on the network without authorization (As a student you are authorized to store only course-related documents in your home directory)
- Connecting any non-SRMHS hardware to the network
- Not reporting computer vandalism or network security violations that you are aware of
- Vandalizing or defacing hardware: damage less than $50
- Using another's account or allowing another individual the use of one's account
- Using technology to cheat: to misrepresent another's work as one's own or to pass one's work on to another for the purpose of cheating
- Using technology to plagiarize or infringe copyright
- Accessing or attempting to access material that is profane, obscene, lewd, sexually suggestive or ghastly; accessing or attempting to access material that advocates or engages in illegal acts, threats, hate or violence; accessing or attempting to access material that potentially disrupts, causes damage, threatens or endangers students or staff.
- Spamming: Distributing mass e-mail messages and chain letters or sending e-mail to large numbers of people or a large volume of messages to one or more individuals for the purpose of causing annoyance or disruption
- Posting personal or private information about yourself or other people
- Posting or sending information that insults, defames or harasses
Extreme ViolationsExtreme violations are acts with the potential to cause great harm to the LAN/WAN and its resources or to other people. They include but are not limited to:
- Attempting to get unauthorized access to the SRMHS or WCPSS network from any computer (including computers not at school)
- Attempting to get unauthorized access to any network from an SRMHS computer
- Producing, posting, or sending (or attempting to do so) material that is profane, obscene, lewd, sexually suggestive or ghastly; material that advocates or engages in illegal acts, threats, hate or violence; or material that potentially disrupts, causes damage, threatens, or endangers students or staff.
- Possessing circumvention tools
- Arranging a meeting with or agreeing to meet with a person you have met online
- Vandalizing or attempting to vandalize data or hardware: damage greater than $50