Dream Big Academy
Community Standards and Safety
Access to communication, collaboration and creative technologies, such video conferencing and classroom management tools, are available to students and Instructors on the DBA Platform. We are pleased to offer this access and believe our Platform offers vast, diverse, and unique resources and tools to both students and Instructors. Our goal in providing these services to Instructors and students is to promote educational excellence by facilitating learning, resource sharing, innovation, and communication.
Users of the DBA Platform are responsible for good behavior the same as they would be in a classroom, work environment, school hallway, or business. Rules for proper behavior and communications apply. Network storage areas as well as Google Drive will be treated similar to school lockers; DBA administrators will review files and communications to maintain system integrity and ensure that users are using the system responsibly. Users should not expect that files stored on the DBA servers or Google Apps will always be private. Students are advised to never access, keep, or send material that they would not want their parents, teachers, or peers to see.
The following guidelines are provided to establish the responsibilities of the student when using technology on the DBA Platform
Responsibilities include, but are not limited to, the following:
DBA Platform users will not
Use the DBA Platform to harm other people or their work.
Vandalize the DBA Platform in any way. This includes, but is not limited to, uploading, creating, and/or transmitting computer viruses.
Interfere with the operation of the network by installing illegal software, shareware, or freeware.
Violate copyright laws.
Use the network for commercial or political purposes. This means you may not offer, provide, or purchase products or services through the system, or use it for political lobbying.
View, send, or display obscene, threatening, or discriminatory messages or pictures.
Post personal contact information (address, telephone, school or home addresses, social security numbers, etc.) about yourself or other people.
Share your password with another person.
Waste limited resources such as hard drive space, network bandwidth, or printing capacity.
Trespass another user’s folders, work or files.