What is an Acceptable Use Policy?
The National Education Association suggests that an effective AUP contain the following six key elements:
- a preamble,
- a definition section,
- a policy statement,
- an acceptable uses section,
- an unacceptable uses section, and
- a violations/sanctions section.
The definition section defines key words used in the policy. Words and terms such as Internet, computer network, education purpose, and other possibly ambiguous terms need to be defined and explained to ensure student and parent comprehension.
A policy statement must tell what computer services are covered by the AUP and the circumstances under which students can use computer services. Schools may, for example, base student access to computer services on the completion of a "computer responsibility" class that will enhance student understanding of the AUP guidelines.
The acceptable uses section must define appropriate student use of the computer network. It may, for example, limit student use of the network to "educational purposes," which then must be defined.
In the unacceptable uses section, the AUP should give clear, specific examples of what constitutes unacceptable student use. In determining what is unacceptable, the committee charged with drafting the AUP must consider
- "what kind of computer network sites, if any, should be off limits to students;
- what kind of student sending, forwarding, or posting of information, if any, should be prohibited, and
- what kind of student behavior will be destructive to the computer network services and should, therefore, be restricted."
The violations/sanctions section should tell students how to report violations of the policy or whom to question about its application. "As a practical matter," says the NEA, "the AUP may simply provide that violations will be handled in accordance with the school's general student disciplinary code."
Purpose of an Acceptable Use Policy
The purpose of an Acceptable Use Policy (AUP) is to communicate in clear language how a district’s computer and network resources are to be used so that the environment is safe, secure and reliable.
Safety
Educational institutions have a responsibility to keep their students safe. Many schools have security guards, policies for students who want to leave a school during lunch periods and controlled access to their buildings. The digital world should be no less secure. Just as a district has policies concerning leaving a locked door open, the district must have policies for circumventing the security of ‘locked digital doors’. The purpose of an acceptable use policies is to inform users about some of the provisions that have been made to ensure their safety on the electronic network and list prohibited behaviors that would compromise their safety.
Security
The security of a building is controlled by keys or access control cards. On an electronic network, access is controlled by user credential and passwords. Similar to policies concerning the control of keys, a district must have policies about user credentials.
Reliability
All networks have limited storage space and bandwidth. As an administrator, you should work with the IT department and have a clear understanding of these limits and how they were determined.
An AUP should contain language that specifies what behaviors will and will not compromise the reliability of the electronic network.
Safety
Educational institutions have a responsibility to keep their students safe. Many schools have security guards, policies for students who want to leave a school during lunch periods and controlled access to their buildings. The digital world should be no less secure. Just as a district has policies concerning leaving a locked door open, the district must have policies for circumventing the security of ‘locked digital doors’. The purpose of an acceptable use policies is to inform users about some of the provisions that have been made to ensure their safety on the electronic network and list prohibited behaviors that would compromise their safety.
Security
The security of a building is controlled by keys or access control cards. On an electronic network, access is controlled by user credential and passwords. Similar to policies concerning the control of keys, a district must have policies about user credentials.
Reliability
All networks have limited storage space and bandwidth. As an administrator, you should work with the IT department and have a clear understanding of these limits and how they were determined.
An AUP should contain language that specifies what behaviors will and will not compromise the reliability of the electronic network.
Creating a Student Acceptable Use Policy |
It is recommended to have both a staff and student Acceptable Use Policy as there should be differences in the rules and sanctions for violation of rules.
Some of the specific considerations that could be addressed in a student Acceptable Use Policy are as follows.
|
Sample Acceptable Use Policy for Students and Parents to Sign:http://www.swordseducatetogether.ie/wp-content/uploads/2015/02/SETNS-AUP.pdf
|
RESOURCES FOR ACCEPTABLE USE POLICY *www.educationworld.com *www.netsmartz.org *youtube - https://www.youtube.com/watch?v=vr01S8Zgrc4 *youtube - https://www.youtube.com/watch?v=0QQ1qqa4OQw *youtube - https://www.youtube.com/watch?v=IbHxDIdS4q8C Sample acceptable use policy - http://www.swordseducatetogether.ie/wp-content/uploads/2015/02/SETNS-AUP.pdf *images - Google images |