K4-5 Student Handbook 23-24.docx

V. ​ “PA Technology,” as used in this Policy, means any Technology owned, controlled, or provided by PA. . ​

VI. ​ Responsibilities of the User: Users of PA Technology must take full responsibility for what they publish, transmit, or possess. Users of PA Technology must connect equipment and install software in a manner that meets the technical and security standards set by Pillow Academy. Users are also responsible for keeping their account information confidential at all times. ……………………………… ​ ​ A certain measure of caution and awareness is required by Users to ensure the efficient and trouble-free use of PA Technology. While PA has systems in place to combat viruses, spy ware, spam, and other computer “bugs,” PA will not be responsible for damage to a User’s Technology that results from viruses, spy ware, spam, or any other use of PA Technology. Users are responsible for adequately protecting and maintaining their own Technology. . ​ Users are responsible for keeping their personally identifiable information, which may include, but is not limited to, a User’s telephone number, address, age, gender, date of birth, credit card data, Social Security, and Driver’s License numbers etc., strictly confidential. ​ ​ VII. ​ Unacceptable Uses: Technology – No User may use any Technology to do the following: A. ​ Steal, forge, lie, cheat, plagiarize or masquerade B. ​ Bully or threaten C. ​ Violate the confidentiality of another D. ​ Tamper with, misuse, damage, interfere with or destroy the technology of another E. ​ Upload, post, or transmit content that is obscene, threatening, harassing, defamatory, libelous, invasive of another’s privacy, hateful or racially/ethnically motivated, incite violence, and/or the imminent threat of violence. . ​ VIII. ​ PA Technology - PA Technology exists to advance the mission of PA. PA will manage these resources accordingly. Users may not do any of the following with PA Technology: A. ​ Steal, forge, lie, cheat, plagiarize or masquerade B. ​ Bully or threaten C. ​ Access the account of another D. ​ Generate activities which consume more than a User’s fair share of either system E. ​ Time or network bandwidth [ex: sending chain letters] F. ​ Fraudulently log into any computer G. ​ Forge e-mail headers or manipulate other identifiers in order to disguise the origin of any system or network activity 49

Made with FlippingBook - professional solution for displaying marketing and sales documents online