Policies & Codes
- Career and Technical Education Public Notification of Nondiscrimination
- DISD Bullying Policy
- Acceptable Use Policy of Computers and Network Systems
- Denison High School Dress Code Policy
Career and Technical Education Public Notification of Nondiscrimination
-
Agriculture, Food and Natural Resources
-
Architecture and Construction
-
Arts, AV Technology and Communications
-
Business, Management and Administration
-
Education and Training
-
Health Science
-
Hospitality and Tourism
-
Human Services
-
Information Technology
-
Law, Public Safety and Security
-
Manufacturing
-
Science, Technology, Engineering and Math
DISD Bullying Policy
-
Has the effect or will have the effect of physically harming a student, damaging a student’s property, or placing a student in reasonable fear of harm to the student’s person or of damage to the student’s property;
-
Is sufficiently severe, persistent, or pervasive enough that the action or threat creates an intimidating, threatening, or abusive educational environment for a student;
-
Materially and substantially disrupts the educational process or the orderly operation of a classroom or school; or
-
Infringes on the rights of the victim at school; and
-
Includes cyberbullying. Cyberbullying means bullying that is done through the use of any electronic communication device, including through the use of a cellular or other type of telephone, a computer, a camera, electronic mail, instant messaging, text messaging, a social media application, an Internet website, or any other Internet-based communication tool.
-
Bullying that occurs on or is delivered to school property or to the site of a school-sponsored or school-related activity on or off school property;
-
Bullying that occurs on a publicly or privately owned school bus or vehicle being used for transportation of students to or from school or a school-sponsored or school-related activity; and
-
Cyberbullying that occurs off school property or outside of a school-sponsored or school-related activity if the cyberbullying:
-
Interferes with a student’s educational opportunities; or
-
Substantially disrupts the orderly operation of a classroom, school, or school-sponsored or school-related activity.
-
Acceptable Use Policy of Computers and Network Systems
- All files and programs belong to someone. Users shall not erase, rename, or make unusable anyone else’s files or programs.
- Users shall not authorize anyone else to use their name, login, password, or files for any reason.
- Users shall not use DISD computer or network systems for any purposes other than legitimate learning purposes. Users also must not use a computer for unlawful purposes, such as the illegal copying, installation, or storage of software.
- Users shall not attempt to discover another user’s password, either at DISD locally or at a remote location.
- Users shall not copy, change, or transfer any software provided by DISD, an instructor, or any other source. Note that, except as noted in the Copyright Notice at the end of any software document, it is generally illegal to copy any software which has a copyright. The use of illegally copied software is considered a criminal offense and is subject to criminal prosecution.
- Users shall not illegally copy copyrighted software provided by DISD, an instructor, or any other source. Note that, except as noted in the Copyright Notice at the end of any software document, it is generally illegal to copy any software which has a copyright. The use of illegally copied software is considered a criminal offense and is subject to criminal prosecution.
- Users shall not intentionally write, produce, generate, copy, propagate, or attempt to introduce any computer code designed to self-replicate, damage, or otherwise hinder the performance of any computers memory, file system, or software. Such software is often called a bug, virus, worm, or some similar name.
- Users shall not deliberately use the computer to annoy or harass others with unacceptable language, images, or threats. Users also shall not deliberately access any unacceptable, obscene, or objectionable information, language, or images.
- Users shall not intentionally damage the system, intentionally damage information not belonging to them, intentionally misuse system sources, or allow others to misuse system resources.
- Users shall not tamper with the computers, networks, printers or other associated equipment except as directed by the teacher.
You may refer to the Denison High School Student Handbook for additional information regarding technology policies on campus.
Denison High School Dress Code Policy
The dress code of the Denison ISD and High School has been established to promote an orderly environment, conducive to appropriate behavior and representative of community standards, while allowing for sufficient comfort and style. All pupils should observe modesty and neatness in clothing and personal appearance. The following are guidelines to be followed:
- Students should wear clothing that doesn't create a disruption in the classroom or on campus. Clothing shall not have holes or tears allowing visible skin. Leggings are allowed under pants with holes.
- Backless tops or dresses, bare midriffs, see-through blouses and strapless clothing are not allowed (example: halter tops, tube tops, short t-shirts, one-strap or strapless shirts or dresses).
- All tops, shirts, and dresses must have at least one-inch straps.
- T-shirts and sweat shirts must have sleeves.
- No exposed cleavage.
- All clothing worn by students must be free of slogans advertising tobacco, alcoholic beverages or illegal substances and will not display or imply anything derogatory, controversial or vulgar.
- Shorts, skirts and dresses must be no more than 3” from the top of the kneecap. (Must be appropriate when standing, sitting, stooping, and bending with or without tights, leotards, spandex, etc…)
- Any form fitting pants resembling yoga pants, jeggings, leggings, or spandex must be worn with a top that reaches the finger tips around the entire bottom hem when standing and arms relaxed at the side.
- No exposed undergarments (undergarments must be worn).
- Pants must be worn at the natural waist line. No sagging.
- No unnatural hair colors or extreme hair styles (examples: spikes, mohawks or any other inappropriate styles).
- Appropriate footwear must be worn (no roller skate shoes or house shoes).
- Caps, hats, or any head coverings are not allowed in the building. Hoods are not allowed to be worn.
- No body piercings, other than in ears. Extreme piercings, even in the ear (spacers, gauges, or other piercings deemed inappropriate) are prohibited.
- Non-prescription sunglasses are not allowed in the building.
- Pajamas are not allowed.
- Blankets are not allowed in the building.
The administration has the authority to regulate any other attire or fashion trends which are deemed to be inappropriate or disruptive. The administration, in connection with the sponsor, coach, or other person in charge of an extracurricular activity, will regulate the dress and grooming of students who participate in the activity. The administration’s decision is final in all dress code matters.
Students in violation of the dress code will receive one warning. The student will be allowed to correct the violation and return to class. If the violation cannot be corrected they will be sent home to correct the violation. If returning to school on the same day, students must be cleared by an administrator before returning to class. Repeat violations are subject to the discipline management techniques for General Conduct Violations as listed in the Student Code of Conduct.
Be Alert Parents!
Consequences of Sharing Sexual Content Material (8.04)
Training Provided to Students - Consequences of Sharing Sexual Content Material (8.04)
Sexting is the sending, receiving, or forwarding of sexually explicit messages or images, which occurs through text message, video, social media applications, email, webcam, or other avenues via the internet. Concerns regarding sexting began to emerge in the last decade as media and research began highlighting the possible long-term consequences.
Although sexting may appear harmless when it occurs between two consenting adults, it can result in serious criminal charges when it involves minors. Texas law identifies this activity as electronically transmitting sexual depictions of children. As technology has evolved, it has also become apparent that bullying and harassment can be both a cause and effect of sexting.
It is against the law for anyone, including a minor, to send a sexually explicit or suggestive image of someone under 18 years of age. This includes images of the sender, recipient, or another minor child.
What Parents May Think About Sexting:
- My child knows better and would never do that.
- I check my child’s phone, so I would know if they are engaging in it.
- Only promiscuous kids do that.
- I talk to my kids and they would tell me if they were sexting.
- My child does not even think about sex yet.
- My child is too young to sext.
What Young People May Think About Sexting:
- It is just flirting.
- What is the big deal? Everybody does it.
- He/she loves me; I know he/she will not share.
- They will think I am hot when they see this pic.
- If I do not send this, she/he will break up with me.
- If he/she did not want people to see it, he/she would not have sent it.
Sexting is a Safety Issue
- Revenge Porn Once photos and videos are shared with another person or posted online, they usually get spread around. Images and videos can be forwarded or posted as revenge; for example, for breaking up with a boyfriend or girlfriend, for perceived rejection or offense, as blackmail, due to bullying, or to increase the status of the poster. This is labeled as “revenge porn.” These images or videos can end up online, and as discussed earlier, once something is on the internet, it never truly goes away. Texas has a law addressing revenge porn and other unlawful disclosure of intimate images. The penalty for this offense is a state jail felony.
- Sextortion Images can be obtained in various ways: criminals hacking into cloud accounts or webcams; boyfriends or girlfriends sharing images which are then spread around; or by revenge porn. Once videos or images are obtained, they can be used to manipulate or coerce the person in the photo or the person who took the photo to obtain additional or more graphic images. This is called “sextortion” and it is one of the fastest-growing global crimes. Both young people and adults are potential targets, usually for money, but victims of sextortion have also been forced into sex or committing crimes, and it has pushed some people to (falsely) believe suicide is the only way to escape the humiliation, bullying, or extortion caused by an obtained image.
It's Against the Law
It is critical that you, using age and developmentally appropriate language, speak with your child about not taking, posting, or sharing sexual images or videos of themselves or others, and about the laws that are in place.
It is against the law:
- To solicit a minor online for sexual contact or sexual communication.
- To pretend to be someone else, without their consent, with the intent to harm or threaten that person.
- For a minor to engage, promote, possess, or send another minor sexual images which depict minors.
- To send electronic visual material which shows a person engaging in sexual conduct or exposing intimate parts, which is not requested or consented to by the recipient. This applies to all online platforms, text, and email.
