Computer Use Contract
Computer Use Contract
12.
Page 1 of 3
____________________________________________________________________________________
If you wish to use any of the computers at IICSN, the attached form must be signed by both you and your parent and returned annually before the student can use school computers. Sign the form and return it to your homeroom teacher. If no form is on file, you will not be allowed to use the computers on campus for any reason. Consequences: If students violate the computer contract, the following actions will be taken: 1. First Offense - Student will not be allowed to use any computer equipment for 1 week (5 school days) and a letter will be sent home to inform the parent/guardian of the violation and consequence. 2. Second Offense - Student will not be allowed to use any computer equipment for three weeks (15 school days) and a letter will be sent home to inform the parent/guardian of the violation and consequence. In addition, both student and parent/guardian must resign the contract before computer use will be reinstated. 3. Third Offense - Student will not be allowed to use computer equipment for the remainder of the school year and a letter will be sent home to inform the parent/guardian of the violation and consequence. 4. Other Offenses - Serious violations (ex. security issues, etc.) will be handled on an individual basis.
Page 2 of 3
____________________________________________________________________________________
A. Rules The following rules apply to the use of computer labs and equipment at IICSN: Use technology center, library computers and computer labs only to work on school assignments. No games or personal use (personal letters, personal CD's/DVD's, ebay, online surveys, Facebook, MysSpace, YouTube, etc.). No music from personal CD's/DVD's or online sources. Respect the security of any computer systems. Keep your password confidential. Do not copy, modify, or delete files or programs installed on school computers. Obtain training on the specific equipment before attempting to use. Use only programs permanently installed on the network and/or hard drives (no personal software may be used on school computers). Save work on personal disks or student designated drives only, never on the C-drive (my documents). Do no print copies of a document in the lab. Keep food or beverages out of the technology center, library, computer labs, and away from all computers in the classrooms. 2. Contract I, ____________________, have read and agree to abide by the rules above. I understand that any violations of these rules may result in my being denied access to school computer facilities. I further understand that experimenting or tampering with computer security may subject me to prosecution for violation of Nevada statutes as detailed in this document. I also understand that willful destruction of computer property may result in payment of damages equal to the value of destruction to IICSN. _______________________________ ____________________________ Signature of IICSN Student Date _______________________________ ____________________________ Signature of parent or guardian Date
Page 3 of 3
____________________________________________________________________________________
(2) OFFENSES AGAINST COMPUTER DATA AND PROGRAMS (a) Whoever willfully, knowingly, and without authorization does any of the following may be penalized as provided in paragraph (b): 1. 2. 3. 4. 5. 6. Modifies data, computer programs, or supporting documentation. Destroys data, computer programs, or supporting documentation. Accesses data, computer programs, or supporting documentation. Takes possession of data, computer programs, or supporting documentation. Copies data, computer programs, or supporting documentation. Discloses restricted access codes or other restricted information to unauthorized persons.
(b) Whoever violates this subsection is guilty of: 1. A Class A misdemeanor unless sub. 2, 3, or 4 applies. 2. A Class E felony if the offense is committed to defraud or to obtain property. 3. A Class D felony if the damage is greater than $2,500 or if it causes an interruption or impairment of governmental operations or public communication, of transportation or of a supply of water, gas, or other public service. 4. A Class C felony if the offense creates a substantial and unreasonable risk of death or great bodily harm to another. (3) OFFENSES AGAINST COMPUTERS, COMPUTER EQUIPMENT, OR SUPPLIES (a) Whoever willfully, knowingly, and without authorization does any of the following may be penalized as provided in paragraph (b): 1. Modifies computer equipment or supplies that are used or intended to be used in a computer, computer system, or computer network. 2. Destroys, uses, takes or damages a computer, computer system, computer network or equipment or supplies used or intended to be used in a computer, computer system, or computer network.. (b) Whoever violates this subsection is guilty of: 1. A Class A misdemeanor unless sub. 2, 3, or 4 applies. 2. A Class E felony if the offense is committed to defraud or obtain property. 3. A Class D felony if the damage to the computer, computer system, computer network, equipment or supplies is greater than $2,500. 4. A Class C felony if the offense creates a substantial and unreasonable risk of death or great bodily harm to another.