• Violations

     Non severe Violations

    • Non-severe violations are typically those that have minimal effects on others. They include, but are not limited to:
    • Using technology for off-task activities during class (games, videos, music files, CDs, web sites not instructionally related)
    • Sending messages from computer to computer
    • Employing the technology for commercial purposes or for political lobbying
    • Accessing or attempting to access any e-mail services other than school e-mail accounts.
    • Accessing or attempting to access translator services, chat-rooms, bulletin boards, news groups or messaging systems unless authorized by your teacher for a valid educational purpose
    • Removing or replacing hardware or cables without authorization

    Consequences


    Severe Violations

    Severe Violations are typically those that exhibit an indifference to the rights of others or to one's own personal safety. Once a student loses computer privileges due to a severe violation, any subsequent violation is considered severe regardless of the offense. They include, but are not limited to:

    • Installing unauthorized software anywhere on the network
    • Downloading and storing files on the network without authorization (As a student you are authorized to store only course-related documents in your home directory)
    • Connecting any non-SRMHS hardware to the network
    • Not reporting computer vandalism or network security violations that you are aware of
    • Vandalizing or defacing hardware: damage less than $50
    • Using another's account or allowing another individual the use of one's account
    • Using technology to cheat: to misrepresent another's work as one's own or to pass one's work on to another for the purpose of cheating
    • Using technology to plagiarize or infringe copyright
    • Accessing or attempting to access material that is profane, obscene, lewd, sexually suggestive or ghastly; accessing or attempting to access material that advocates or engages in illegal acts, threats, hate or violence; accessing or attempting to access material that potentially disrupts, causes damage, threatens or endangers students or staff.
    • Spamming: Distributing mass e-mail messages and chain letters or sending e-mail to large numbers of people or a large volume of messages to one or more individuals for the purpose of causing annoyance or disruption
    • Posting personal or private information about yourself or other people
    • Posting or sending information that insults, defames or harasses

    Consequences


    Extreme Violations

    Extreme violations are acts with the potential to cause great harm to the LAN/WAN and its resources or to other people. They include but are not limited to:

    • Attempting to get unauthorized access to the SRMHS or WCPSS network from any computer (including computers not at school)
    • Attempting to get unauthorized access to any network from an SRMHS computer
    • Producing, posting, or sending (or attempting to do so) material that is profane, obscene, lewd, sexually suggestive or ghastly; material that advocates or engages in illegal acts, threats, hate or violence; or material that potentially disrupts, causes damage, threatens, or endangers students or staff.
    • Possessing circumvention tools
    • Arranging a meeting with or agreeing to meet with a person you have met online
    • Vandalizing or attempting to vandalize data or hardware: damage greater than $50

    Consequences