Craven+County+Schools+-+Computer+Offenses

**__ 2nd Offense __** : || **__ 2nd Offense __**** : **
 * ** Offenses -Type I Consequence **
 * Integrity and Protocol Offenses ** ||
 * Accesses, produces, stores, posts/sends, displays or views inappropriate web sites or material that is pornographic, obscene, discriminatory, profane, lewd, vulgar, rude, blocked, defamatory, or sexually suggestive with language or images. ||
 * Responds inappropriately to directions by a staff member or district technology employee regarding computer activity. ||
 * Plagiarizes information or violates copyright laws from the internet or other electronic media. Violation of Honor Code. ||
 * Uses another user’s password or trespasses in another user’s folder, work, or files. Participates in illegal file sharing. ||
 * Accesses restricted social networking sites during the school day on a school computer. ||
 * Communicates with a student or other students on a social networking site during non-school hours resulting in actions that disrupt the school day. ||
 * Plays games, listens to music, or uses any other type of media during the instructional time that is not directly related to the lesson or to a project as assigned by an instructor. ||
 * Uses inappropriate language, graphics, or references in a school assignment or discussion board. ||
 * ** Type I Consequence Options ** ||
 * **__ 1st Offense __**** : **
 * Conference with student and parents/guardians.
 * Complete a signed warning statement of the offenses and the consequences that could result from subsequent violations.
 * Violation of Honor Code may warrant a zero on the work in question in addition to other consequences.
 * May result in discussion with Magistrate to determine criminal potential.
 * May result in discussion with Magistrate to determine criminal potential.
 * __ 2nd Offense __**** : **
 * Conference with student and parents/guardians.
 * Complete a signed statement of the offenses and the consequences that could result from subsequent violations.
 * Violation of Honor Code shall result in a zero on work in question and may jeopardize status in certain school activities and privileges. Counseling may be considered.
 * May result in loss of laptop or unsupervised computer access for time designated by administrator.
 * May result in student’s losing password or log in privileges on school computers.
 * May result in a student’s returning to paper-pencil activities only.
 * May result in removal of internet capabilities from laptop, restriction to use of flash drive only, or access to restricted user on specific web sites.
 * May result in request to Magistrate to consider criminal charges.
 * May result in suspension up to 3 days contingent upon severity of offense.
 * __ 3rd Offense __**** : **
 * Conference with student and parents/guardians.
 * Complete a signed statement of offenses and consequences that could result from subsequent violations.
 * Continued violation of Honor Code reveals a problem that may lead to complete loss of certain activities or privileges and shall lead to a recommendation for counseling. Student shall receive a zero on the work in question.
 * May result in loss of computer privileges or laptop for extended period of time…up to the entire school year.
 * May result in instructional access only. Laptop student may check out computer from instructor or administrator for class activities in classroom. Student will return laptop at the end of each class period. Student loses all at home laptop privileges.
 * Other students would lose all non-supervised access to classroom computer.
 * May result in filing a complaint with the Magistrate for consideration of criminal charges.
 * May result in suspension up to 5 days. ||
 * ** Offenses -Type II Consequences **
 * Legal Implication or Warrants Monetary Restitution ** ||
 * Damages, disturbs, or vandalizes a computer or school software including any attempt to harm or destroy the operating system, hardware, application software, or data. ||
 * Uses computer to disrupt the activities of other users; for example the distribution of unsolicited advertising (spam), causes a DOS (Denial of Service), propagation of computer viruses, distribution of large quantities of information that may overwhelm the system (i.e., chain letters, network games, or broadcasting). ||
 * ** Type II Consequence Options ** ||
 * **__ 1st Offense __**** : **
 * Conference with student and parents/guardians.
 * Complete a signed statement of offenses and consequences for subsequent violations.
 * Parents and students responsible for restitution of damages of property and staff time to reinstall or change modified/deleted files.
 * May include loss of laptop or non-supervised computer access for time designated by administrator if incident involved school computers.
 * May result in request to Magistrate to consider criminal charges.
 * Possible suspension up to 3 days.
 * May result in request to Magistrate to consider criminal charges.
 * Possible suspension up to 3 days.
 * Conference with student and parents/guardians.
 * Complete a signed statement of offenses and future consequences for subsequent violations.
 * Loss of laptop or non-supervised computer access for extended period of time.
 * Shall discuss filing a complaint with the Magistrate for criminal charges.
 * Possible suspension up to 5 days contingent upon nature of prior offenses and severity of offense.
 * __ 3rd Offense __**** : **
 * Conference with student and parents/guardians
 * Complete a signed statement of offenses and future consequences for subsequent violations.
 * Loss of laptop or computer access for rest of school year.
 * Of may have instructional access only and return laptop at the end of each instructional period or lesson as needed.
 * Shall file complaint with Magistrate to press criminal charges.
 * Suspension up to 10 days.
 * ** Offenses -Type III Consequences **
 * Strong Legal Implications ** ||
 * Hacks into the school data management system or any other school data base. ||
 * Harasses another student through electronic media or means including cell phones. ||
 * Harasses a staff member through electronic media or other means including cyber-stalking, cyber-harassment, or cell phones… ||
 * Poses as another student or staff member by accessing a personal web site or social network page and proceeds to communicate as that person… ||
 * Publishes information or student work on inappropriate or restricted sites. Publishes false or defamatory information ||
 * Uses the school network for legal or illegal (selling drugs or alcohol) commercial gain. ||
 * Agrees to meet with someone through a school network site. ||
 * Posts information about or authored by a school employee without the permission of the employee… ||
 * ** Type III Consequence Options ** ||
 * **__ 1st Offense __**** : **
 * Conference with students and parents/guardians of both parties and/or staff member.
 * Complete a signed statement of offenses (with documented evidence of communication) and future consequences for subsequent violations.
 * Shall discuss possibility of filing criminal charges with the Magistrate.
 * Shall discuss possibility of filing criminal charges with the Magistrate.
 * Conference with students and parents/guardians of both parties and/or staff member.
 * Complete a signed statement of offenses (with documented evidence of communication) and future consequences for subsequent violations.
 * May result in loss of computer access or laptop if applicable.
 * Shall ask the Magistrate to recommend filing charges.
 * Possible suspension up to 3 days.
 * __ 3rd Offense __**** : **
 * Conference with student and parents/guardians of both parties and/or staff member.
 * Produce signed statement of results and future consequences.
 * Shall request that charges be filed with Magistrate.
 * May result in long term loss of computer access or laptop if applicable.
 * Possible suspension up to 10 days. ||
 * __ Definitions __**** : **
 * Illegal Activities ** : Any violations of federal, state, or local laws that include, but are not limited to, copyright infringement and or illegal file sharing; posting or publishing false or defamatory information about a person or organization; committing fraud; cyber-stalking; cyber-harassment; threatening another person; or intentionally engaging in communication for the purpose of abusing, annoying, threatening, terrifying, harassing, misrepresentation or embarrassing another person.
 * Harassment: ** This includes but is not limited to slurs, comments, jokes, innuendoes, unwelcome compliments, cartoons, visual depictions, pranks, text messages, phone messages, or verbal conduct relating to an individual that have the purpose or effect of creating an intimidating hostile or offensive environment and have the purpose or effect of unreasonably interfering with an individual’s work or school performance or interfering with school operations.