{"id":930,"date":"2020-10-06T03:12:32","date_gmt":"2020-10-06T03:12:32","guid":{"rendered":"http:\/\/www.milwaukeebadger.com\/jslbuild\/?page_id=930"},"modified":"2020-10-19T22:34:44","modified_gmt":"2020-10-20T03:34:44","slug":"2020-2021-jla-technology-acceptable-use-policy","status":"publish","type":"page","link":"https:\/\/www.milwaukeebadger.com\/jslbuild\/2020-2021-jla-technology-acceptable-use-policy\/","title":{"rendered":"Technology Acceptable Use Policy"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-be439bd6b8c70817a4f19f2d415df7f6\">\n.avia-section.av-av_section-be439bd6b8c70817a4f19f2d415df7f6{\nbackground-color:#fcfcfc;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-av_section-be439bd6b8c70817a4f19f2d415df7f6 main_color avia-section-default avia-no-shadow  avia-builder-el-0  avia-builder-el-no-sibling  avia-bg-style-scroll  av-minimum-height av-minimum-height-100  container_wrap fullsize'   data-av_minimum_height_pc='100'><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-930'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_half-15d750bd1b332b34c6e70b077ebbccdf\">\n.flex_column.av-av_one_half-15d750bd1b332b34c6e70b077ebbccdf{\nborder-radius:0px 0px 0px 0px;\n-webkit-border-radius:0px 0px 0px 0px;\n-moz-border-radius:0px 0px 0px 0px;\n}\n<\/style>\n<div class='flex_column av-av_one_half-15d750bd1b332b34c6e70b077ebbccdf av_one_half  avia-builder-el-1  el_before_av_one_half  avia-builder-el-first  first flex_column_div av-zero-column-padding '   ><section class=\"av_textblock_section \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock  '   itemprop=\"text\" ><h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #278abf; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><span style=\"color: #278abf;\"><b>Computer Use\u00a0<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Using computer resources is a privilege offered to students each academic year. This privilege can be taken away at the discretion of the classroom teacher or Principal. Computers and tablets are provided for students to use as educational tools for research, school work, and communication. Students are expected to act in a considerate and responsible manner when using technology. This policy is intended to promote digital citizenship and a safe, productive use of technology offered by JO\u2019S Learning Academy.<\/span><\/p>\n<h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #2a69ac; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><\/h2>\n<h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #278abf; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><b>Mobile Devices and Personal Electronics\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">JLA recognizes the wide range of mobile technology devices and their value as learning tools. For the purpose of this policy, mobile devices are deemed tablets, laptops, netbooks, and readers. Such devices can be brought to school in accordance with the following conditions:\u00a0 Parents\/guardians are fully responsible for making the decision to provide a mobile reader for their child to bring to school.\u00a0 Students who bring a mobile reader to school do so at their own risk. JLA will not be responsible for the loss, theft, or damage of mobile readers brought from home.\u00a0 Students are expected to use their mobile readers only for school-related activities with the permission of teachers or supervising staff.\u00a0 Students are expected to follow the same guidelines outlined in the acceptable use of JLA owned mobile devices.\u00a0<\/span><\/p>\n<h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #278abf; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><\/h2>\n<h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #278abf; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><b>Computer <\/b><b>Care<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">JLA provides technology devices for students to use on an as-needed basis. Proper use and care of tablets and computers are critical to ensure that they are available for everyone\u2019s use. All students are to immediately report damaged, broken, vandalized, or otherwise non-usable computers or mobile devices to their teacher.<\/span><\/p>\n<h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #278abf; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><\/h2>\n<h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #278abf; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><b>Internet Access<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The JLA network is a secure network available only to faculty, staff, and students. Ultimately, parent\/s or guardian\/s of minors are responsible for setting and conveying the standards that their children should follow. Therefore, every student enrolled in classes at JLA must read this Acceptable Use Policy statement with his\/her parents, agree to the terms of this policy, and obtain parental permission as signature, in order to use technology resources at JLA. There will be a follow up with students at the start of each fall semester to review this policy. .<\/span><\/p>\n<h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #278abf; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><\/h2>\n<h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #278abf; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><b>Privacy\/Student Data\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Although each student has his\/her own account, student computer files are not private. Supervising staff have the right to view and\/or modify any information stored by student account holders, with or without prior notice. Information stored, including email communications, which contain unacceptable, inappropriate, or illegal content, may be used in disciplinary proceedings with students.<\/span><\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_half-c8fc129dc35fd1ae2a1e410224d39ea8\">\n.flex_column.av-av_one_half-c8fc129dc35fd1ae2a1e410224d39ea8{\nborder-radius:0px 0px 0px 0px;\n-webkit-border-radius:0px 0px 0px 0px;\n-moz-border-radius:0px 0px 0px 0px;\n}\n<\/style>\n<div class='flex_column av-av_one_half-c8fc129dc35fd1ae2a1e410224d39ea8 av_one_half  avia-builder-el-3  el_after_av_one_half  el_before_av_one_full  flex_column_div av-zero-column-padding '   ><section class=\"av_textblock_section \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock  '   itemprop=\"text\" ><h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #278abf; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><b>Acceptable Use\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Network access and daily use of accounts is a big responsibility. Students who receive password-protected accounts are fully responsible for all activity that occurs on their assigned account, whether or not the account holder committed the action. Students must use only their own account and should not give their passwords to others or allow others to use their accounts. Users are responsible for reporting problems, cases of abuses, or the misuse of technology resources.\u00a0<\/span><\/p>\n<h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #278abf; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><\/h2>\n<p><span style=\"font-weight: 400;\">Responsible use of JLA technology resources requires students to be ethical, courteous, and honest in a way that aligns with the mission of the school. The following activities are deemed unacceptable by administrative staff. Some actions are not only inappropriate but expressly prohibited by law.\u00a0\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Intentionally downloading, displaying, or sending pornographic, racist, or otherwise offensive material\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Using obscene language, harassing, insulting, or attacking others\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Damaging computers, accessories, supporting systems, or networks\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Violating copyright laws through file sharing\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Using others&#8217; passwords or sharing of passwords\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Reviewing or modifying others\u2019 files without permission\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Reviewing, modifying, or displaying files from administrative systems at JLA, JLA website\/intranet, or other organizations<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Intentionally wasting limited resources including but not limited to downloading inappropriate or non-school related files\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Employing the network or other technology resources for commercial purposes or monetary gain\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Non-school related gaming and game site viewing\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Create, manipulate, or post images, audio, or video-related content of a student, teacher, staff member, or JLA event without permission\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Students are prohibited from using JLA\u2019s name in conjunction with other schools, businesses, or brand names for web-based content related to academic projects, community involvement, or social networks\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Sharing music, movies, or commercial content through BitTorrent or any other illegal file sharing platform\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Attempt to launch non-approved software or operating systems on JLA owned devices and servers\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The use of social networks without meeting specified age requirements\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Interrupting school Internet service or any related network resources\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The use of proxy servers or VPN services to bypass network limitations\u00a0<\/span><\/li>\n<\/ul>\n<h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #278abf; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><\/h2>\n<h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #278abf; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><b>C<\/b><b>yber Bullying<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Cyber bullying is the act of using a communication device to bully a person by sending texts and\/or images that are intended to attack, demean, or negatively impact another person or group. JLAl has a zero tolerance policy for this type of behavior. Students who have knowledge of such activity are expected to immediately notify a counselor, teacher, or technology staff member.<\/span><\/p>\n<h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #2a69ac; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><\/h2>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_full-15d750bd1b332b34c6e70b077ebbccdf\">\n.flex_column.av-av_one_full-15d750bd1b332b34c6e70b077ebbccdf{\nborder-radius:0px 0px 0px 0px;\n-webkit-border-radius:0px 0px 0px 0px;\n-moz-border-radius:0px 0px 0px 0px;\n}\n<\/style>\n<div class='flex_column av-av_one_full-15d750bd1b332b34c6e70b077ebbccdf av_one_full  avia-builder-el-5  el_after_av_one_half  avia-builder-el-last  first flex_column_div av-zero-column-padding column-top-margin'   ><section class=\"av_textblock_section \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock  '   itemprop=\"text\" ><h2 style=\"margin: 0px 0px 10px; padding: 0px; color: #2a69ac; font-family: Garamond, 'EB Garamond', Georgia, serif;\"><b>Limitation of Liability\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">JLA reserves the right to filter content that is a distraction to instruction and learning. Students are responsible for bringing any questions about the acceptable use of technology to their teacher or supervising staff. JLA has taken precautions to filter content that is deemed inappropriate. However, safeguards can never be fully without fault as live content on the web changes by the second.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Violations of the JLA Acceptable Use Policy may result in a range of sanctions, including but not limited to loss of access, suspension, and possible expulsion.<\/span><\/p>\n<\/div><\/section><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Technology Acceptable Use Policy - JSLBuild<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Technology Acceptable Use Policy - JSLBuild\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.milwaukeebadger.com\/jslbuild\/2020-2021-jla-technology-acceptable-use-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"JSLBuild\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-20T03:34:44+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Technology Acceptable Use Policy - JSLBuild","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Technology Acceptable Use Policy - JSLBuild","og_url":"https:\/\/www.milwaukeebadger.com\/jslbuild\/2020-2021-jla-technology-acceptable-use-policy\/","og_site_name":"JSLBuild","article_modified_time":"2020-10-20T03:34:44+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.milwaukeebadger.com\/jslbuild\/2020-2021-jla-technology-acceptable-use-policy\/","url":"https:\/\/www.milwaukeebadger.com\/jslbuild\/2020-2021-jla-technology-acceptable-use-policy\/","name":"Technology Acceptable Use Policy - JSLBuild","isPartOf":{"@id":"https:\/\/www.milwaukeebadger.com\/jslbuild\/#website"},"datePublished":"2020-10-06T03:12:32+00:00","dateModified":"2020-10-20T03:34:44+00:00","breadcrumb":{"@id":"https:\/\/www.milwaukeebadger.com\/jslbuild\/2020-2021-jla-technology-acceptable-use-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.milwaukeebadger.com\/jslbuild\/2020-2021-jla-technology-acceptable-use-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.milwaukeebadger.com\/jslbuild\/2020-2021-jla-technology-acceptable-use-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.milwaukeebadger.com\/jslbuild\/"},{"@type":"ListItem","position":2,"name":"Technology Acceptable Use Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.milwaukeebadger.com\/jslbuild\/#website","url":"https:\/\/www.milwaukeebadger.com\/jslbuild\/","name":"JSLBuild","description":"Just another Badger Creative site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.milwaukeebadger.com\/jslbuild\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.milwaukeebadger.com\/jslbuild\/wp-json\/wp\/v2\/pages\/930"}],"collection":[{"href":"https:\/\/www.milwaukeebadger.com\/jslbuild\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.milwaukeebadger.com\/jslbuild\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.milwaukeebadger.com\/jslbuild\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.milwaukeebadger.com\/jslbuild\/wp-json\/wp\/v2\/comments?post=930"}],"version-history":[{"count":11,"href":"https:\/\/www.milwaukeebadger.com\/jslbuild\/wp-json\/wp\/v2\/pages\/930\/revisions"}],"predecessor-version":[{"id":1161,"href":"https:\/\/www.milwaukeebadger.com\/jslbuild\/wp-json\/wp\/v2\/pages\/930\/revisions\/1161"}],"wp:attachment":[{"href":"https:\/\/www.milwaukeebadger.com\/jslbuild\/wp-json\/wp\/v2\/media?parent=930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}