Bomb threat |
Willful and malicious threat to destroy school property. Includes such action as the use or threat of bombs and/or explosives. |
Bullying |
Bullying is a widespread and serious problem across our nation. It's what happens when someone repeatedly hurts or threatens another person on purpose. Bullying comes in many forms-name-calling, leaving people out, spreading rumors or physically hurting someone. And it can happen in person, in writing, online, on cell phones, in school, on the bus, at home, or anywhere. It is not a normal rite of passage; it has serious consequences and it's NOT acceptable. A repeated occurrence over time. |
Cheating/Providing false information
Â
|
Cheating and providing false information are done willfully and knowingly by the student to act dishonestly or unfairly in order to gain an advantage.
Examples include:
- Sharing of information among test takers or the use of covert notes or crib sheets
- Obtaining the questions or answers to a test ahead of time
- On essay assignments or term papers cheating often takes the form of plagiarism.
- Contract cheating has been observed, where students have work completed on their behalf.
- Using websites and other electronic devices to retrieve answers to questions when not authorized to do so.
|
Contacting inappropriate persons |
All student user accounts should be used for school related activities. When students use their school assigned accounts to contact persons outside of school sponsored assignments, they could be in violation of contacting inappropriate persons.
Examples could include:
- Participating in illegal or prohibited activities, such as those related to gambling, illegal weapons, or terrorist activities.
- Pursuing private commercial business activities, including those conducted on Internet sites (online buying and selling sites).
- Using/linking their personal social media accounts to their student.dodea.edu email account unless the site is DoDEA approved
|
Cyber Bullying |
Cyber bullying Involves harassing, embarrassing, or threatening a young person via the Internet, email and mobile device. Technically, cyber-bullying takes place between two or more young people. When adults are involved, it is typically referred to as cyber-harassment or cyber-stalking. |
Did not obey instructions/Failure to Comply |
Refusal to carry out instructions, open defiance of faculty or staff members or repeated violations of school/class rules or behavior which threatens the immediate safety or welfare of students/staff |
Disrespectful to another student |
Use of profane, vulgar or obscene words or gestures; or actions that are ethnically or racially inflammatory; or disrespectful conduct. |
Disrespect to teacher or another adult |
Refusal to carry out instructions, open defiance, or disrespect of faculty or staff members or repeated violations of school/class rules or behavior which threatens the immediate safety or welfare of students/staff. |
Disruptive behavior |
Acts which may cause substantial disruption of learning opportunities.Â
Examples can vary by grade level but can include but are not limited to:
- Repeatedly leaving and entering the learning space.
- Making loud and disruptive noises
- Continually interrupting a speaker
- Opening multiple windows
- Refusing to mute their microphone
|
Dress code violation |
 Students shall dress in an appropriate manner so as not to distract or interfere with the operation of the school.
- Students must be fully clothed online.
- Students will not wear any clothing that displays drugs/alcohol, paraphernalia, or is sexual in nature.)
|
Insubordination with disrespect and profanity |
Refusal to carry out instructions, open defiance, or disrespect of faculty or staff members or repeated violations of school/class rules or behavior which threatens the immediate safety or welfare of students/staff.
Use of profane, vulgar or obscene words or gestures; or actions that are ethnically or racially inflammatory; or disrespectful conduct.
|
Intentionally accessing restricted private data |
Attempt to harm or destroy data of another user, the internet, or any other network. This includes creating or knowingly transmitting a computer virus or worm, or attempting unauthorized access to files, computers, or networks (i.e., "hacking").
Deliberately with malice intent and determined intention to do as one wants, regardless of the consequences gaining or attempting to gain unauthorized access to other computer systems.
Gain, or attempt to gain, unauthorized access to other computer systems. Examples include:
- Accessing Teacher’s Courseware
- Accessing Teachers Gradebook
- Accessing Other students/teachers personal accounts.
- Accessing ASPEN.
|
Intentionally/willfully attempting to get around safety and security measures (i.e., web filters, virus scan) |
Deliberately with malice intent and determined intention to do as one wants, regardless of the consequences disabling any IT security or auditing system software. |
Intentionally/Willfully modifying, deleting or misusing public files |
Deliberately with malice intent and determined intention to do as one wants, regardless of the consequences modifying, deleting or misusing public/shared files.
Examples include:
- Deleting or modifying courseware
- Deleting or modifying shared documents without the consent of all collaborators
|
Misuse of email/Instant Message Web Conference Tools (Chat box, Google Hangouts, Google Meet, etc.)
A Chat box is a computer program that is designed to simulate human conversation. Users communicate with these tools using a chat interface or via voice, just like they would converse with another person.
Google Hangouts allows conversations between two or more users. The service can be accessed online through Gmail.
Like Hangouts, Google Meet also offers group video calls, not just video chat, but in an expanded capacity.
Harassment is characterized by or using ongoing pressure or intimidation.
|
The student Acceptable Use Policy covers email as well as other technologies.
Below are examples of misuse:
- Using Email, Chat box, and Google Hangout is for other than school related communication.
- Sending harassing messages or content.
- Sending spam email messages or content.
- Sending messages that contain a virus or other malicious content.
- Sending or reading email at inappropriate times, such as during class instruction.
- Sending emails and messages to share test answers or promote cheating in any way.
- Using the account of another person.
- Sending "chain letters" or "broadcast" messages to individuals or to lists of individuals.
- Attempting unauthorized access to files, computers, or networks (i.e., "hacking")
- Pursuing private commercial business activities, including those conducted on Internet sites (online buying and selling sites).
- Sending, or knowingly receiving material that is illegal or offensive to others, such as hate speech or any material that ridicules others based on race, creed, religion, color, sex disability, national origin, or sexual orientation.
- Sending, or knowingly receiving material that is obscene, pornographic, or sexually suggestive.
- Participating in illegal or prohibited activities, such as those related to gambling, illegal weapons, or terrorist activities.
|
Plagiarism |
Plagiarism is copying another person's ideas, words or writing and pretending that they are one's own work. It can involve violating copyright laws. |
Sending or receiving offensive materials |
Creating, accessing, downloading, viewing, storing, copying, sending, or knowingly receiving material that is illegal or offensive to others, such as hate speech or any material that ridicules others based on race, creed, religion, color, sex disability, national origin, or sexual orientation.
Creating, accessing, downloading, viewing, storing, copying, sending, or knowingly receiving material that is obscene, pornographic, or sexually suggestive.
|
Sexually offensive behavior (Problematic Sexual Behavior in Children and Youth Matrix and Referral) |
Sexual harassment is unwelcome words or behaviors that are sexual or sex-based in nature from students or adults (of the same sex or not) that interfere with your ability to learn, study, work, or participate in school or work activities.
The harassment can be in the form of words said or written, something visual, or some form of unwanted physical touching that is sexual or targets you due to your sex. The conduct can make you feel embarrassed, sad, scared, pressured, upset, uncomfortable, humiliated, or angry, and interferes with your ability to focus on what you’re doing or to feel safe at school or work. It can happen on or off school grounds, in person or through other ways, such as by email or social media. It can range from mildly annoying comments or actions to unwanted touching and, in extreme cases, sexual activity forced upon a person without their voluntary or lawful consent, known as sexual assault, sexual violence, or rape.
|
Spamming |
Spamming is the act of sending unsolicited, bulk (and usually commercial) electronic messages. Though this can be done through any number of media, the most common is email.
Spamming deliberately disrupts network use by others. Therefore, students will not send "chain letters" or "broadcast" messages to individuals or to lists of individuals.
|
Threatening behavior |
Communication of a threat intended to terrorize school employee(s) or student(s)
Verbal assault, threatening, or intimidating another individual with violence
|
Threatening to harm, bully, harass, or abuse others, sexual harassment |
Communication of a threat intended to terrorize school employee(s) or student(s)
Verbal assault, threatening, or intimidating another individual with violence
Commission of an act of indecent exposure, sexual contact, or transmission of sexual material
|
Uncooperative with teacher/Insubordination |
Refusal to carry out instructions, open defiance, or disrespect of faculty or staff members or repeated violations of school/class rules or behavior which threatens the immediate safety or welfare of students/staff |
Using another user’s account or allowing another user to use yours
Â
|
Computer accounts should only be used by the student to whom the account was issued to. Only DoDEA approved software and applications should be used by students on DoDEA issued equipment.
Examples of misuse:
- Not logging out of your account when work is completed.
- Willfully and knowingly logging into someone else's account.
- Sharing passwords with other individuals.
|
Using computer resources without permission |
Computer accounts should only be used by the student to whom the account was issued. Only DoDEA approved software and applications should be used by students on DoDEA issued equipment.
Examples of misuse:
- Not logging out of your account when work is completed.
- Willfully and knowingly logging into someone else's account.
- Sharing passwords with other individuals.
- Plugging in external devices that are not approved.
- Downloading and installing software
- Participating in illegal or prohibited activities, such as those related to gambling, illegal weapons, or terrorist activities.
- Pursuing private commercial business activities, including those conducted on Internet sites (online buying and selling sites).
|
Using electronic means (email/Instant Message Web Conference Tools, Chat box, Google Hangouts, Google Meet, etc.) to threaten, bully, harass and/or abuse others
A Chat box is a computer program that is designed to simulate human conversation. Users communicate with these tools using a chat interface or via voice, just like they would converse with another person.
Google Hangouts allows conversations between two or more users. The service can be accessed online through Gmail.
Like Hangouts, Google Meet also offers group video calls, not just video chat, but in an expanded capacity.
|
The student acceptable use policy covers email as well as other technologies.
Below are examples of misuse:
- Sending harassing messages or content.
- Sending, or knowingly receiving material that is illegal or offensive to others, such as hate speech or any material that ridicules others based on race, creed, religion, color, sex disability, national origin, or sexual orientation.
- Sending, or knowingly receiving material that is obscene, pornographic, or sexually suggestive.
- Using swear words, use vulgarities, or using harsh, abusive, sexual, or disrespectful language and/or images.
|
Using e-mail at inappropriate times |
Using e-mail at inappropriate times could include but is not limited to sending or reading email at inappropriate times, such as during class instruction and sharing test answers that promote cheating in any way. |
Using inappropriate language |
Use of profane, vulgar or obscene words or gestures; or actions that are ethnically or racially inflammatory; or disrespectful conduct. |
Violating copyright |
A copyright is a law that gives the owner of a written document, musical composition, book, picture, or other creative work, the right to decide what other people can do with it. Copyright laws make it easier for authors to make money by selling their works. Because of copyright, a work can only be copied if the owner of the copyright gives permission.
When someone copies or edits a work that is protected under copyright without permission, the owner may sue for the value of the violation. Most such cases are handled by civil law.
|
Willfully Damaging Hardware, Software, or network; changing configurations |
Deliberately with the intention of causing harm causing physical damage to school owned hardware, software, or networks or changing the configurations of the same.
Examples are:
- Creating or knowingly transmitting a computer virus or worm, or attempting unauthorized access to files, computers, or networks (i.e., "hacking")
- Attempting to disable any IT security or auditing system.
- Willful and malicious destruction of, or threat to destroy, school property including online software and hardware.
|