Electronic Mail is the most commonly used facility on the Internet. Good email is no different from good writing using any other medium. The following are guidelines for composing effective email messages.
1. .Do a spell check and proofread your message before sending it.
2. Save a copy send a copy to yourself) of important messages.
3. ?'lee Internet is not secure; you should assume that other people
could read your message.
4. No form of chain mail should be sent. They are annoying, can be
threatening, and are illegal
5. Avoid "spamming, "which is forwarding messages to numerous people.
Send forwards selectively.
6. Using all capitals is shouting. ? USE FOR EMPHASIS ONLY!
7. Respect other people's privacy ? never read anyone else's email
Classroom Connect's Connected Teacher - Internet Tips
Connected University Other Products Conferences
http://www.connectedteacher.com/tips/aup. asp
Acceptable Use Policy
The following template may be used as a
starting point in developing an Acceptable Use Policy (AUP) for your
school. You should add, delete, or modify items to reflect the specific
needs and standards of your school and community. Completed Acceptable
Use Policies should be signed by students and their parents or guardians
and be kept on file at your school.
Introduction
[School] has established a computer network and is pleased to offer Internet access for student use. This will allow students to have email accounts and will provide them with access to a variety of Internet resources. In order for students to use the Internet, students and their parents or guardians must first read and understand the following acceptable use policies.
Acceptable Uses
1. The computer network at [school] has been set up in order to allow Internet access for educational purposes. This includes classroom activities, research activities, peer review of assigned work, and the exchange of project?related ideas, opinions, and questions via email, message boards, and other means.
2. Students will have access to the Internet via [classroom, library, lab, etc.] computers. Student access is limited to [hours per week, times of the day, etc.)
3. Network users must respect resource limits and must remain within an allotted disk space of [number of megabytes]. Users are responsible for deleting old emails or other files that may take up excessive amounts of storage space.
4. Student use of the Internet is contingent upon parent/guardian permission in the form of a signed copy of this Acceptable Use Policy. Parents/guardians may revoke approval at any time.
5. Material created and/or stored on the system is not guaranteed to be private. Network administrators may review the system from time to time to ensure that the system is being used properly. For this reason, students should expect that emails, material placed on personal Web pages, and other work that is created on the network may be viewed by a third party.
6. Network users must keep their passwords private. Accounts and/or
passwords may not be shared.
7. Network users are expected to adhere to the safety guidelines listed
below.
Unacceptable Uses
1. The network may not be used to download, copy, or store any software, shareware, or freeware without prior permission from the network
Page 1 of 3
7/15/99