1. adhere to the EMSB’s Information and Communication Technologies Access and Acceptable Use Policy and sign the Information and Communication Technologies Access and Acceptable Use Policy Agreement Form (Appendix 2);
  2. observe the principle of efficient usage and appropriate rules of behavior or etiquette, commonly called "netiquette", when using Information and Communication Technologies (ICT);
  3. refrain from accessing network/Internet services anonymously. All network/Internet access must be traceable to the user;
  4. be aware that creating, accessing, storing, sending, distributing or printing messages and other materials which are generally considered to be unlawful, obscene, pornographic, erotic, sexually explicit, racist, abusive, discriminatory, hate-motivated, harassing, threatening, demeaning or otherwise objectionable material, imagery or language will lead to severe penalties;
  5. respect others’ privacy, that is, refrain from intercepting private communications and e-mails. The content of e-mails must not be altered for the purpose of falsification or distortion. Users must not forward information which the originator would reasonably expect to be kept private;
  6. take reasonable precautions to prevent unauthorized access to e-mail, network and Internet services; such precautions include keeping login identifiers and passwords confidential, and shutting-down e-mail when leaving a computer unattended;
  7. refrain from using unprotected chat sites due to their anonymous nature;
  8. report to the proper authority any material received or stored in any manner (text, images, sound) on devices or equipment provided/managed by the School Board which appears to be in violation of this policy; nuisance bulk mail should simply be deleted without reply;
  9. refrain from compromising the privacy or safety of others. Explicit consent is required from an individual when releasing information that identifies the individual. This means: (a) when the information includes the individual’s name, (b) when the information makes the individual’s identity obvious, or (c) when the information does not in itself make the identity of the individual known but is likely in the circumstances to be associated with other information that does;
  10. refrain from harming or attempting to harm or to destroy data or information not belonging to the user;
  11. refrain from obtaining, by any means, access to any system, service, privilege or electronic material to which the user is not entitled;
  12. refrain from violating copyright laws, including unauthorized duplication of copyrighted software (software pirating);
  13. give references and credit when creating, using or altering electronic information with the understanding that rules regarding plagiarism for printed documents also apply to electronic resources ("Netcitation");
  14. refrain from using Internet/network resources to access/store games for recreational purposes; avoid any activity (for example, high-volume transmission) which is likely to place the stability of the infrastructure at risk. These restrictions are required because of limited server storage space and capacity limitations on the volume of data transmitted;
  15. respect federal, provincial and local laws which specify appropriate use of computers and other telecommunication equipment.
  16. refrain from making use of ICT, provided/managed through the school board system, for personal monetary gain. This includes solicitation of funds and selling goods and/or services of any type unless such an activity is sanctioned by the school board and intended for the benefit of the school system;
  17. request permission from the School Principal /Centre Director or consult the School Board Marketing and Communications Officer, as applicable, before releasing information which could appear to be sanctioned by the school, or head office, or is hot-linked to official school system Web sites;
  18. refrain from transmitting unsolicited bulk information (SPAM). This includes junk mail, advertising, jokes, solicitation, chain letters, virus alerts not originating from the system administrator and announcements of non-governmental social or sporting events/information. It does not apply to listservs. Large volume e-mail distribution should be restricted to information of pedagogical or administrative importance;
  19. limit their use of the Board’s ICT services within the constraints stated herein. Users are permitted occasional, limited, appropriate personal use of ICT. This includes occasional personal correspondence, personal record-keeping and appropriate personal research. Activities which are not assignments or course-related or related to assigned duties, will be conducted outside of work hours.