Technology Use and Policy

Students are responsible for appropriate behavior on school computer network just as they are in classroom or school hallways. The JVHS network consists of all computers and connected peripherals used on the JVHS campus. This includes all personal computing and communications on the network are often public in nature. General school rules for behavior and communications apply.The network is provided for students to conduct research and communicate with others. Access to network service is given to students with an understanding that they will act in a considerate and responsible manner. Access is a privilege not a right.Access entails responsibility. Individual users of the school’s computer networks are responsible for their behavior and communications over those networks. It is presumed that users will comply with school standards in a honourable and respectable manner. Beyond the clarification of such standard , the school is notresponsible for restricting, monitoring, or controlling the communications of individuals utilizing the network.Network storage areas may be treated like school lockers. Network administrators may review files and communications to maintain system and ensure that users are using responsibly. Users should not expect that files stored on school servers will always be private. Within reason, freedom of speech and access to information will be honoured. During school, teacher will guide students toward appropriate materials. Outside of school, families bear the same responsibility for such guidance as they exercise with information sources such as television, telephones, movies, radio and other potentially offensive media.

Internet Rules

Students who use the internet are expected to adhere to the following guidelines for good network manners. Here are some examples of bad network manners:

a) Sending or displaying offensive messages or pictures.

b) Opening another person’s folder ,file or Email Id without permission from the author

c) Damaging computers, computer systems, software, or computer networks.

d) Using obscene language.

e) Copying someone else’s work

f) Intentionally wasting limited resources and altering computer settings

g) Using another person’s ID or password.