Temple ISD Technology Use Agreement

The following is an excerpt from the 2016-17 TISD Student Handbook:

Temple Independent School District’s goal in providing technology resources and Internet access to teachers and students is to promote educational excellence in our schools by facilitating collaboration, innovation, and communication. TISD has taken precautions to restrict access to inappropriate materials. However, on a global network it is impossible to control all materials and any user may discover inappropriate information. The guidelines provided here outline the user’s responsibility to operate ethically, efficiently and legally using District network resources. Any Temple Independent School District user violating these policies, posted classroom and district rules, or state and federal laws, is subject to:

  • Suspension of user access to the system
  • Termination/revocation of the system user account
  • Other disciplinary action in accordance with District policy and applicable laws

School and District administrators will make the final determination as to what constitutes unacceptable use. Their decision is final.

1. Responsible Use - The use of your account must be consistent with the educational objectives of the Temple Independent School District.

2. Network Etiquette - You are expected to abide by the generally accepted rules of network etiquette when using any system, including the gcloud.tisd.org secure, controlled email system. The student’s ID number will be part of the username for email.

3. Security - Protecting personal information and network security are high priorities.

4. Vandalism - Vandalism is any malicious attempt to harm or destroy equipment, data of another user or any entity, or other networks that are connected to the Internet.

  1. Internet vandalism will result in cancellation of privileges. This includes, but is not limited to: the uploading or creation of computer viruses.
  2. Hardware and software vandalism will result in cancellation of privileges. This includes but is not limited to: modifying, damaging, or destroying equipment, programs, files, or settings on any computer or other technology resource.