Acceptable Use Policy
The purpose of this policy is to provide the students, faculty, and staff of Delta Academy (DA) with notice of what conduct shall be deemed acceptable with regard to the use of Technology, as the term is defined herein below.
- Who is covered by this policy.
This policy covers all students, faculty, and staff (collectively "User")
- How this policy applies.
This policy applies to all Users at all times, regardless of their location. This policy applies whether or not the User is engaged in school related activity or making use of Delta Academy Technology.
- "Technology" as used in this policy, means any electronic communication tool, system or process, including, but not limited to telephones, cellular telephones, computers, software, the internet, web sites, or internet related software and communication tools. For example, technology encompasses all cellular and SMS text messages, emails, instant messenger sessions, newsgroups, on-line forums, and file sharing and/or torrent clients. "DA" Technology", as used in the policy, means any technology owned, controlled or provided by DA.
- Responsibilities of the User.
Users of DA Technology must take full responsibility for what they publish, transmit or possess. Users of DA Technology must connect equipment and install software in a manner that meets the technical and security standard set by Delta Academy. Users are also responsible for keeping their account information confidential at all times. A certain measure of caution and awareness is required by Users to ensure the efficient and trouble-free use of DA Technology. While DA has systems in place to combat viruses, spy ware, spam or other computer "bugs," DA will not be responsible for damage to a User’s technology which results from viruses, spy-ware, spam, or any other use of DA Technology . Users are responsible for adequately protecting and maintaining their own technology. Users are responsible for keeping their personally identifiable information, which may include, but is not limited to, a User’s telephone number, address, age, gender, date of birth, credit card data, Social Security and Driver’s License numbers etc.,
- Acceptable Use.
Use of DA Technology is a privilege, not a right. Users may make use of DA Technology
for purposes of scholarship and academic research only.
- Unacceptable Use.
Technology – No User may use any technology to do the following: Steal, forge, lie, cheat, plagiarize, masquerade, bully or threaten, violate the confidentiality of another, tamper with, misuse, damage, interfere with or destroy the technology of another, upload, post, or transmit content that is obscene threatening, harassing, defamatory, libelous, invasive of another’s privacy, hateful or racially/ethnically motivated to incite violence or the imminent threat of violence. DA Technology exists to advance the mission of DA. DA will manage these resources accordingly. Users may not do any of the following with DA Technology:
-Steal, forge, lie, cheat, plagiarize or masquerade.
- Bully or threaten.
-Access the account of another.
-Generate activities which consume more than a User’s fair share of either system time or network bandwidth (ex: sending chair letters).
-Fraudulently log in any computer.
-Forge e-mail header or manipulate other identifiers in order to disguise the origin of any system or network activity.
-Attempt to determine the passwords of others or obtain privileges on any computer to which a User is not entitled.
-Possess, willingly receive or distribute obscene material.
-Copy, install or use any data in violation of applicable copyrights or license agreements (Downloading and distributing movies, songs, and software without authorization from the owner the copyright is a violation of copyright law. The Recording Industry of American and Motion Picture Association of America can and do so aggressively sue to enforce their copyrights).
-Utilize IP forwarding, bridging, ARP proxying, IP masquerading, DHCP, Network Address Translation (NT), IP/IPX tunneling, SOCKS, application layer proxies, SSH, bittorrent and/or peer-to-peer (P2P) software or any similarly enabling technology.
-Add new devices such as hubs, switches, gateways, routers, access points and/or servers of any kind to existing DA Technology.
-Use any DA Technology for commercial purposes or advertising, including unsolicited commercial e-mail (Commercial sponsorship of an academic project, e.g., the inclusion of banner ads on a project website, is strictly prohibited absent the express authorization
of the Headmaster.)
-Use any DA Technology for partisan political activities.
-Install software on DA Technology that interferes with day-to-day work or hinders the operation of DA Technology.
-Violate this Policy off-campus anywhere in the world using DA Technology.
-Possess any software, resource or equipment whose purpose is to effect one of the violations listed in this policy; or attempt to violate any provision of this policy.
Users should have no expectation of privacy with regard to their use of Technology. DA may access, view, investigate and delete any and all information stored on or created with DA Technology. DA may do so without cause and without prior notice to the User.
- Duty of Parent or Guardian to Monitor Out-of-School Use of DA Technology.
It is the responsibility of each parent or guardian to verify that their student’s use of Technology is in compliance with the law and all of DA’s policies. Failure to monitor a student’s use of Technology may result in serious consequences. Personal websites, blogs, or profile directories such as Facebook, Twitter, MySpace, and Xanga are not monitored by DA. However, Users who engage in behavior unbecoming of a member of the DA community through the use of a website will be subject to penalties. In addition, if DA, in its sole discretion, believes that any information on a website, or in an email or text message, is obscene or constitutes a threat, defamation, copyright infringement or other illegal activity, whether directed by DA faculty, staff, students, or others, DA will be compelled to contact the appropriate authorities.
Penalties for violation of this policy may include loss of DA Technology privileges, discipline, suspension, expulsion, or termination. Civil and criminal penalties may also be imposed.