This website uses cookies to ensure you have the best experience. Learn more

Acceptable Use Policy Essay

624 words - 3 pages

21st Century Safety in Schools
Connie Holden
Eastern New Mexico University

21st Century Safety in Schools
The Internet is a tool for both educators and students. Just as with any tool, especially power tools, we need to read safety precautions before using it. A person who uses a power tool without reading safety guidelines first takes a chance of getting hurt. Although using the Internet may not be physically harmful there still needs to be a set of safety guidelines to adhere to. In 2000 Congress enacted The Children’s Internet Protection Act (CIPA) to address this safety.
CIPA imposes that all schools and libraries that receive Internet services at a discounted rate follow certain guidelines to help keep students safe while online. In order to continue receiving the discounted rate schools and libraries must certify that they have an Internet safety policy that includes technology protection measures. Websites that are obscene, contain ...view middle of the document...

Teachers need to discuss the Acceptable Use Policy thoroughly with the students to ensure that they understand these rules, just as the parents should before signing the document.
Another important tool for keeping students secure is The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g; 34 CFR Part 99). The Family Educational Rights and Privacy Act provides parents and all students with certain rights with respect to education records. These rights extend to students in all grade levels, beginning in preschool and extending through their years in postsecondary institutions. As more and more information becomes electronic and accessible online, it is important to remain aware of protecting student privacy as well as with whom and how student information should be shared. The network management team has to remain vigilant about keeping software programs updated in order to keep the information secure.
Each school district has a Network Management team that is responsible for making sure that the software needed to filter or block inappropriate websites or content is installed and updated often. However, as we all know sometimes these things have glitches from time to time and may not work properly. It is up to the teacher to make sure each student has an AUP in order to use the internet and that they understand that if they come across anything questionable they are to let the teacher know immediately. If each of these guidelines is known and enforced correctly the Internet will be a much safer tool for our students.


Children's Internet Protection Act. Retrieved on October 6, 2012 from
I Safe Dig Deeper. Acceptable Use Policies. Why do Schools Need AUP’s?. Retrieved on October 3, 2012 from
US Department of Education. Family Educational Rights and Privacy Act (FERPA).
Retrieved on October 3, 2012 from

Other Papers Like Acceptable Use Policy

Internet Acceptable Use Policy Essay

1702 words - 7 pages INTUSE-2014-POL INTUSE-2014-POL OMNICORP Industries 14 Internet Use Policy OMNICORP Devices Rodriguez, Jacob Isiah CTR NSWC Corona, MS41 CONT OMNICORP Industries 14 Internet Use Policy OMNICORP Devices Rodriguez, Jacob Isiah CTR NSWC Corona, MS41 CONT Change Management | Version History VERSION | NAME | CHANGES | DATE | APPROVED BY | 1.2 | Jacob Rodriguez | Modify Policy | 8/19/2014 | Jacob Rodriguez | 1.1 | Jacob

Acceptable Use Policy Essay

852 words - 4 pages Acceptable Use Policy Richman investments recognizes that the ability to use the Internet and email at work can and will increase productivity and efficiency in the workplace environment. Employees are encouraged to utilize these avenues appropriately. Unacceptable use of the internet and email can place Richman Investments and its staff at risk. The policies that are put in place regarding Internet and email usage, if followed, will ensure the

Richman Investments Acceptable Internet Use Policy

529 words - 3 pages Richman Investments Acceptable Internet Use Policy Use of the Internet by employees of Richman Investments is permitted and encouraged where such use supports the goals and objectives of the business. However, Richman Investments has a policy for the use of the Internet whereby employees must ensure that they: • comply with current legislation • use the Internet in an acceptable way • do not create unnecessary business risk to the company

Itt It255 Unit 4 Aup

1345 words - 6 pages Richman Investments assets. This Acceptable Use Policy in conjunction with the corresponding standards is established to achieve the following: 1. To establish appropriate and acceptable practices regarding the use of information resources. 2. To ensure compliance with applicable State law and other rules and regulations regarding the management of information resources. 3. To educate individuals who may use information resources

Is4550 Week 5 Lab

1642 words - 7 pages Policy Framework Definition Overview Given the following IT security policy framework definition, specify which policy probably can cover the identified risk, threat, or vulnerability. If there is none, then identify that as a gap. Insert your recommendation for an IT security policy that can eliminate the gap. Risk – Threat – Vulnerability | IT Security Policy Definition | Unauthorized access from pubic Internet | Acceptable use

Nt2580 Unit 4 Assignment 2

706 words - 3 pages Dallas Page July 17, 2015 Unit 4 Assignment 2 NT2580 Acceptable Use Policy Definition 1. Overview To protect the integrity, confidentiality and accessibility along with the safety of our clientele and employees it is necessary that a precise set of standards must be defined for anyone who utilizes the electronic devices to access information via the internet. Richman Investments is committed to protecting employees, partners and

Unit 4 Assignment 1: Enhance an Existing It Security Policy Framework

698 words - 3 pages employee bears responsibility for the consequences should the access is misused. Please review the following policies for details of protecting information when accessing the corporate network via remote access methods, and acceptable use of Richman Investment's network:  Acceptable Encryption Policy  Wireless Communications Policy  Acceptable Use Policy For additional information regarding Richman Investment's remote access

Intro To Comuter Security 3

353 words - 2 pages care are just the standards. 15. Policy is guidelines that describe acceptable and unacceptable employee behaviors in the workplace. The difference between policy and law is that ignorance of a policy is an acceptable defense. 16. Software license infringement, illicit use, and misuse of corporation resources 17. Education and training, and technology to protect information and systems. 18. The Association of Computing Machinery was established in 1947 19. Information Systems Audit and Control Association 20. Fear of penalty, probability of being caught, and probability of penalty of being administered

Authorize User Policy

1495 words - 6 pages Example Acceptable Use Policy for IT Systems Using this policy One of the challenges facing organizations today is enabling employees to work productively while also ensuring the security of the IT network and, crucially, the data on it. Given that technology is continually changing, employees play a significant role in IT security. This policy provides a framework for users to follow when accessing IT systems and the data on them. It is

Title Is Awesome

1179 words - 5 pages primer, in your Lab Report document,describe the basic requirements of policies, their benefits, the control factors, and policies every organization needs. 12. Review the identified risks, threats, and vulnerabilities in the table in step 8, and then select an appropriate policy definition that might help mitigate each of them. You can select one of the SANS policies or choose one from the following list:      Acceptable Use Policy

Procedural Message – Draft Version

592 words - 3 pages Attention: This notice is a reminder of company policy on acceptable use of email and text messaging. As the company continues to grow there is a need to refresh you on the Company acceptable use policy. The reason for this policy is to ensure the appropriate use of email and text messaging so that all employees is mindful of what’s considered as satisfactory and unsatisfactory to the company. However, this guideline is a road map and guide of

Related Essays

Acceptable Use Policy Essay

596 words - 3 pages Acceptable Use Policy or AUP is a written policy and an agreement that defines what is allowed and not allowed to be used by employees regarding the use of internet. Here at Richman Investment are giving you, the employees the details and what the policy entails. The use of the Internet is a privilege, not a right, and inappropriate use will result in a cancellation of those privileges. The purpose of the internet resources is to help

Acceptable Use Policy Essay

763 words - 4 pages Richman Investments ACCEPTABLE USE POLICY Information Security Policy Number 12345 Effective 10/15/2013` I. Introduction An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is allowed and what is not allowed regarding use of Information Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors

Ict Acceptable Use Policy Essay

1398 words - 6 pages ICT ACCEPTABLE USE POLICY JUNIOR SCHOOL 2011 P- 2 Student Acceptable Use Policy Being an Academic, Caring and Christian Digital Citizen: In our school we use information and technology in safe, legal, and responsible ways. We embrace the following aspects of being a digital citizen. Safety: 1. Only go online when my parents or an adult know where I am going and can supervise me. 2. Not talk to strangers on-line because of “stranger

Acceptable Use Policy Essay 538 Words

538 words - 3 pages Acceptable Use Policy This written agreement outlining the terms and conditions of Internet usage, including rules of online behavior and access privileges. Because of the possible misuse of companies -wide computer networks and the Internet by employees having access privileges, Richman Investments are particularly concerned about having a well-developed AUP in place, which is then signed by the all employees and members of Management