Beruflich Dokumente
Kultur Dokumente
by
Michael D. King
For more information on technology planning visit: Tech N Tuit
With the current push for computer technology in the classroom, many schools are facing a greater
liability regarding technology and online learning. Schools can help defuse these problems by adopting
an Acceptable Use Policy, or AUP, for the Internet. The Acceptable Use Policy (AUP) is one of the most
important documents a school will produce, as it will outline rules regarding Internet use on school
property. Creating a workable AUP requires thoughtful research and strategy. The document must
address a number of issues including personal safety, illegal activities, system security, privacy,
plagiarism, copyright infringement and access to inappropriate materials. In addition, it should
unequivocally rule the school’s technology property for educational purposes only. Student’s rights,
such as free speech, access to information and due process, should be outlined in the document, as
should the consequences for violating the Acceptable Use Policy. Below is A Checklist for Planning,
Developing and Evaluating an AUP.
When the committee studies cyber security issues, they should set goals in order to address these
issues. Committee members should formulate program goals in terms of expected results, such as what
the school wishes to achieve when implementing the cyber security plan. Schools usually address these
goals in the preamble of the AUP document.
As the second level of their involvement, committee members should analyze the cause and effect that
the acceptable use policy will have on individuals who will be subject to its regulations. Since any
strategic planning requires knowledge of the community’s make-up, the best way to ascertain
information is to survey the present level of practice regarding cyber security. This type of assessment
(See Cyber Security Assessment Survey) is valuable because it informs school officials what type of
regulatory and protective Internet policy members of the community are likely to accept for their
children. Identifying the present level of cyber security practices will help set the boundaries and
acceptance of the AUP’s implementation, as well as help in the development of future planning.
As the third level of their involvement, committee members should help develop and organize the
content that will be included in the school’s AUP. They would be responsible for describing why the
policy is necessary, defining specific examples of what constitutes unacceptable use, and addressing
what consequences will occur when individuals violate cyber security policies. The authors have outlined
four critical components that committee members should include when formulating the content of the
AUP.
The Preamble
The first step in developing an AUP is to address the purpose it will serve in guiding the school toward its
mission regarding the limited use of the Internet. The preamble or philosophy statement should
describe why the policy is necessary, communicate the intent of the policy as well as outline the goals
the policy will achieve. This section should describe the school’s overall code of conduct as it applies to
student online activity. (See Example of AUP Preamble)
Example of AUP Preamble
Additionally, the policy will prohibit students from using online term paper vendors or will place
restrictions on certain chat rooms. AUPs place strong restrictions on students sending, forwarding, or
posting sexually explicit messages, profanity, and harassing or violent messages. In fact, district officials
must decide whether students will have any type of access to electronic mail or student webpage’s.
Example of Acceptable and Unacceptable Internet Use Policy
Violations
Unfortunately, at times there will be cases where students violate the AUP. The violations/sanctions
section of the policy should address what the consequences will be when this occurs. The AUP should
tell students how to report violations of the policy or whom to question about its application. Violations,
as illustrated Below in Sample Violation Policy, should be handled in accordance with the school’s
general student disciplinary code.
Sample AUP Violation Policy
The permission form agreement should address electronic mail restrictions, as well as ethical conduct
required of individuals using electronic communication resources. The Parent Permission Letter &
Internet Permission Form, provided below is an example of a parent permission form that could be used
to grant students electronic communication access privileges.
Parent Permission Letter & Internet Permission Form
Additional Resources
Becta Schools E-Safety and Acceptable Use Policy