SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Student Internet Contract

You may distribute the following Student Internet Contract to students. The Student Internet
Contract asks for students to act responsibly at any time they are using the computer and calls for
students to monitor their own activities.




Copyright © Glencoe/McGraw-Hill
Student Internet Contract

       Below are policies that will regulate our use of the Internet. These rules have been designed
to keep our computer and classroom functioning at the highest of standards. In order to have
access to E-mail and the Internet, please read the following and sign below.

For safety reasons, when using E-mail or the Internet:
1. I will not give out personal information such as my home address, parental information, or
   school name or location without the permission of my teacher.
2. I will immediately notify my teacher if I come across any information that makes me feel
   awkward.
3. I will never get together with someone I have “met” on-line without first getting my parents’ and
   teacher’s permission. If they agree, I will still bring an adult with me.
4. I will never forward my picture or anything else without first getting my teacher’s approval.
5. I will not return any messages that are inappropriate or make me feel uncomfortable. If I receive
   a message like this, I will notify my teacher.

The following activities are illegal, and I will not willingly participate in them:
1. Gaining unauthorized access to any place I am not supposed to be.
2. Disrupting any computer system.
3. Contributing to help spread electronic viruses.
4. Engaging in any illegal activity on-line.

I am aware that any on-line correspondence I send is a reflection of my school and myself.
1. My messages will be short, courteous, and to the point.
2. I will not use obscene language, engage in personal or discriminatory attacks, or post false or
    misleading information about individuals or organizations.

I will not access, download, or distribute:
1. Any pornographic, obscene, or sexually explicit materials.
2. Inappropriate information or graphics.

   These policies and procedures must be adhered to, and any violation of them will be met with
zero tolerance.

•   Students must abide by their signed contracts.
•   The use of the computer is a privilege, not a right.
•   If this contract is broken, the student’s privilege will be revoked.

I have read the “Student Internet Contract” above. By signing below, I fully agree with and
understand the contents of this contract. If I breach any rules, I understand my Internet and
computer privileges may be revoked.

Signed by:

Student:                                            Date:

Teacher:                                            Date:




Copyright © Glencoe/McGraw-Hill

Contenu connexe

Tendances

Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet safety
Internet safetyInternet safety
Internet safetywalsh008
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipsmillerivy
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipsmillerivy
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetykirshee
 

Tendances (20)

E safety
E safetyE safety
E safety
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Family online-safety-contract
Family online-safety-contractFamily online-safety-contract
Family online-safety-contract
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

En vedette (20)

pltest01
pltest01pltest01
pltest01
 
PréMios 1ª Fase Livros1
PréMios 1ª Fase  Livros1PréMios 1ª Fase  Livros1
PréMios 1ª Fase Livros1
 
Project Primer
Project PrimerProject Primer
Project Primer
 
Estandards en elearning
Estandards en elearningEstandards en elearning
Estandards en elearning
 
Phd Test01
Phd Test01Phd Test01
Phd Test01
 
Tefelicito
TefelicitoTefelicito
Tefelicito
 
18
1818
18
 
27
2727
27
 
23
2323
23
 
ACTORES
ACTORESACTORES
ACTORES
 
Moraleja
MoralejaMoraleja
Moraleja
 
Reference Manager Manual
Reference Manager ManualReference Manager Manual
Reference Manager Manual
 
70723 Huycolombiaaa
70723 Huycolombiaaa70723 Huycolombiaaa
70723 Huycolombiaaa
 
8o D No10
8o D No108o D No10
8o D No10
 
26
2626
26
 
Alfa Junior
Alfa JuniorAlfa Junior
Alfa Junior
 
DAILY ROUTINES
DAILY ROUTINESDAILY ROUTINES
DAILY ROUTINES
 
Certificação Socioambiental
Certificação SocioambientalCertificação Socioambiental
Certificação Socioambiental
 
Carolina
CarolinaCarolina
Carolina
 
Vdltest01
Vdltest01Vdltest01
Vdltest01
 

Similaire à Student Internet Responsibility Contract

Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
St Benedicts School ICT Acceptable Use Agreement
St Benedicts School ICT Acceptable Use AgreementSt Benedicts School ICT Acceptable Use Agreement
St Benedicts School ICT Acceptable Use AgreementDai Barnes
 
Senior student e learning agreements for home
Senior student e learning agreements for homeSenior student e learning agreements for home
Senior student e learning agreements for homeEmma Watts
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policycollimic
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreementPaula Naugle
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6RochelleStansfield
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Matthew Rathbun
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectjuliewltn
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 
Internet safety and acceptable use policies
Internet safety and acceptable use policiesInternet safety and acceptable use policies
Internet safety and acceptable use policiesjac2015
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 
Safety Presentation
Safety PresentationSafety Presentation
Safety PresentationSarah Sutter
 

Similaire à Student Internet Responsibility Contract (20)

Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
St Benedicts School ICT Acceptable Use Agreement
St Benedicts School ICT Acceptable Use AgreementSt Benedicts School ICT Acceptable Use Agreement
St Benedicts School ICT Acceptable Use Agreement
 
Senior student e learning agreements for home
Senior student e learning agreements for homeSenior student e learning agreements for home
Senior student e learning agreements for home
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement11.21.10 inventedstudentuseagreement
11.21.10 inventedstudentuseagreement
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6
 
Social media policy
Social media policySocial media policy
Social media policy
 
Agreement for Use of Technology for Families
Agreement for Use of Technology for Families Agreement for Use of Technology for Families
Agreement for Use of Technology for Families
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Internet safety and acceptable use policies
Internet safety and acceptable use policiesInternet safety and acceptable use policies
Internet safety and acceptable use policies
 
bk
bkbk
bk
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 

Plus de yasha15

Untitled
UntitledUntitled
Untitledyasha15
 
Untitled
UntitledUntitled
Untitledyasha15
 
Untitled
UntitledUntitled
Untitledyasha15
 
Untitled
UntitledUntitled
Untitledyasha15
 
Introduction
IntroductionIntroduction
Introductionyasha15
 
Introduction
IntroductionIntroduction
Introductionyasha15
 
Y Wilson525 Final Presentationv2
Y Wilson525  Final Presentationv2Y Wilson525  Final Presentationv2
Y Wilson525 Final Presentationv2yasha15
 

Plus de yasha15 (7)

Untitled
UntitledUntitled
Untitled
 
Untitled
UntitledUntitled
Untitled
 
Untitled
UntitledUntitled
Untitled
 
Untitled
UntitledUntitled
Untitled
 
Introduction
IntroductionIntroduction
Introduction
 
Introduction
IntroductionIntroduction
Introduction
 
Y Wilson525 Final Presentationv2
Y Wilson525  Final Presentationv2Y Wilson525  Final Presentationv2
Y Wilson525 Final Presentationv2
 

Dernier

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Student Internet Responsibility Contract

  • 1. Student Internet Contract You may distribute the following Student Internet Contract to students. The Student Internet Contract asks for students to act responsibly at any time they are using the computer and calls for students to monitor their own activities. Copyright © Glencoe/McGraw-Hill
  • 2. Student Internet Contract Below are policies that will regulate our use of the Internet. These rules have been designed to keep our computer and classroom functioning at the highest of standards. In order to have access to E-mail and the Internet, please read the following and sign below. For safety reasons, when using E-mail or the Internet: 1. I will not give out personal information such as my home address, parental information, or school name or location without the permission of my teacher. 2. I will immediately notify my teacher if I come across any information that makes me feel awkward. 3. I will never get together with someone I have “met” on-line without first getting my parents’ and teacher’s permission. If they agree, I will still bring an adult with me. 4. I will never forward my picture or anything else without first getting my teacher’s approval. 5. I will not return any messages that are inappropriate or make me feel uncomfortable. If I receive a message like this, I will notify my teacher. The following activities are illegal, and I will not willingly participate in them: 1. Gaining unauthorized access to any place I am not supposed to be. 2. Disrupting any computer system. 3. Contributing to help spread electronic viruses. 4. Engaging in any illegal activity on-line. I am aware that any on-line correspondence I send is a reflection of my school and myself. 1. My messages will be short, courteous, and to the point. 2. I will not use obscene language, engage in personal or discriminatory attacks, or post false or misleading information about individuals or organizations. I will not access, download, or distribute: 1. Any pornographic, obscene, or sexually explicit materials. 2. Inappropriate information or graphics. These policies and procedures must be adhered to, and any violation of them will be met with zero tolerance. • Students must abide by their signed contracts. • The use of the computer is a privilege, not a right. • If this contract is broken, the student’s privilege will be revoked. I have read the “Student Internet Contract” above. By signing below, I fully agree with and understand the contents of this contract. If I breach any rules, I understand my Internet and computer privileges may be revoked. Signed by: Student: Date: Teacher: Date: Copyright © Glencoe/McGraw-Hill