Linden Hall Parent/Student Handbook

Total Page:16

File Type:pdf, Size:1020Kb

Linden Hall Parent/Student Handbook LINDEN HALL PARENT/STUDENT HANDBOOK 2018-19 The Linden Hall Parent/Student Handbook is published and distributed to members of the Linden Hall community for the purpose of providing information on aspects of student and campus life so that students may gain as much as possible from their experience at the School. Students, parents, faculty, administration, and staff should all read and be familiar with the contents of the Handbook, so that each member of the community knows and understands the expectations of students within our community. This Handbook is for informational purposes only. It is not intended to create, nor does it create, a contract or part of a contract in any way, including, but not limited to, between Linden Hall and any parent, guardian or student affiliated with or attending the School. Linden Hall reserves the right, in its sole discretion, to add, revise and/or delete School policies before, during, and after the School year. TABLE OF CONTENTS PARENT AND STUDENT ACKNOWLEDGEMENT ....................................................................... 1 This page is left intentionally blank. ..................................................................................................... 2 WELCOME TO LINDEN HALL ........................................................................................................ 3 IMPORTANT CONTACT INFORMATION ...................................................................................... 4 I. INTRODUCTION ................................................................................................................... 5 Mission Statement ................................................................................................................................. 5 Philosophy ............................................................................................................................................. 5 History of School ................................................................................................................................... 6 Linden Hall Seal .................................................................................................................................... 6 Non-Discrimination Policy .................................................................................................................... 6 II. STUDENT CONDUCT EXPECTATIONS ............................................................................. 7 Documentation and Consequences ....................................................................................................... 9 Suspension ............................................................................................................................................. 9 Disciplinary Probation .......................................................................................................................... 9 Involuntary Leave ................................................................................................................................. 9 Expulsion ............................................................................................................................................. 10 Major School Rules ............................................................................................................................. 10 Behavioral Expectations While Away from School ........................................................................... 11 Parent Involvement ............................................................................................................................. 11 Reporting Disciplinary Action to Colleges ......................................................................................... 11 Bullying, Harassment, and Intimidation ............................................................................................ 11 Sexual Harassment.............................................................................................................................. 12 Anti-Hazing Policy .............................................................................................................................. 12 Definition ............................................................................................................................................. 13 Responsibility for Compliance ............................................................................................................ 13 Reporting of a Possible Violation ....................................................................................................... 13 Violations and Sanctions ..................................................................................................................... 13 Use of Alcohol, Drugs/Testing (Including E-Cigarettes and Vaping) ................................................ 14 Sanctuary Policy ................................................................................................................................. 14 Sexual Intimacy ................................................................................................................................... 14 Inappropriate Items/Weapons ............................................................................................................ 15 Respect for Property ........................................................................................................................... 15 Search and Seizure .............................................................................................................................. 15 III. HONOR CODE ....................................................................................................................... 15 Honor Code ......................................................................................................................................... 15 Cheating .............................................................................................................................................. 16 Lying ................................................................................................................................................... 16 Stealing ................................................................................................................................................ 16 i The Honor Council .............................................................................................................................. 17 Upper School Honor Code Violations .................................................................................................. 17 Probable Consequences for Honor Code (HC) Violations in the Upper School ................................... 18 Middle School Honor Code Violations ................................................................................................. 18 Plagiarism and Acceptable Forms of Citation ................................................................................... 18 Citation and Reference Guidelines ..................................................................................................... 19 IV. OTHER SCHOOL RULES AND POLICIES ........................................................................ 20 Language Policy .................................................................................................................................. 20 Driving Privileges/Automobile Policy ................................................................................................. 20 Gambling ............................................................................................................................................. 21 Jobs ...................................................................................................................................................... 21 Absences/Tardiness ............................................................................................................................. 21 Permissions.......................................................................................................................................... 21 Bring Your Own Devices .................................................................................................................... 21 Smart Phones /Electronic Devices ...................................................................................................... 22 Electronic Communications, Computers, and Acceptable Use ......................................................... 23 Sexting ................................................................................................................................................. 27 Email ................................................................................................................................................... 28 Social Media ........................................................................................................................................ 28 Graduation Requirements .................................................................................................................. 29 Course Offerings ................................................................................................................................. 29 Academic Concerns ............................................................................................................................ 30 Attendance and Absences ..................................................................................................................
Recommended publications
  • Prc) International Intellectual Property Alliance (Iipa) 2011 Special 301 Report on Copyright Protection and Enforcement
    PEOPLE’S REPUBLIC OF CHINA (PRC) INTERNATIONAL INTELLECTUAL PROPERTY ALLIANCE (IIPA) 2011 SPECIAL 301 REPORT ON COPYRIGHT PROTECTION AND ENFORCEMENT Special 301 Recommendation: IIPA recommends that USTR maintain China on the Priority Watch List in 2011.1 Executive Summary: High copyright piracy levels persist in China, from pervasive use of unlicensed software by businesses and pre-installation of unlicensed software (hard disk loading piracy) at the distribution level, to widespread online piracy of music, films, television programming and other copyright materials, and piracy of hard goods. The continued overall lack of deterrence against piracy, market closures or barriers for creative content (some of which have been found to violate China’s WTO commitments), and the imposition or spectre of discriminatory policies toward foreign content, suggest a conscious policy seeking to drive Chinese competitiveness while permitting free access to foreign content through unapproved pirate channels. China’s principal reliance on its woefully under- resourced administrative system to deal with IPR infringements rather than through criminal enforcement presents a significant hurdle to effective enforcement.2 At the same time, with the launch of a new Special Campaign on IP enforcement, and through commitments made in recent bilateral forums, the Chinese Government has indicated measures it will take to achieve higher levels of copyright protection. Specifically, the recent meeting of the Joint Commission on Commerce and Trade (JCCT) in December 2010 and the summit between President Obama and President Hu in January 2011 resulted in a number of important commitments by the Chinese to ensure legal use of software in the government and state-owned enterprises (SOEs), seek effective measures to deal with Internet infringements (including intermediary liability), deal with digital library infringements, and ensure that China’s “indigenous innovation” policies do not effectively limit market access for U.S.
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • Genaro Yellow Paper
    Genaro Network Yellow Paper Genaro Network Roadmap Towards a Multi-Source Data Governance Framework Yellow Paper v1.0.1 Page | 1 Genaro Network Yellow Paper Abstract The Genaro Network is a new public blockchain platform based on peer-to-peer encryption and sharing. The platform aims to realize highly efficient node management on the public chain based on PoS (Proof of Stake) and SPoR (Sentinel Proof of Retrievability). The vision of Genaro is to establish a new medium of distributed and encrypted storage, and to enable each user to use and share data, and to establish abundant distributed applications (DApps) on the blockchain and provide stable support for these. Compared with other public chains, Genaro has the following advantages: (1) Genaro modified the use of file sentinels to better suit distributed systems through the combination of PoS and SPoR, thus enhancing the ability to defend against replay attacks; (2) in the design of chain-style PoS, Genaro studied famous PoS methods such as Casper (CFFG, CTFG), Tendermint, and Ouroboros, analyzed the major ways of attacking PoS and proposed relevant schemes; and (3) in terms of management structure, Genaro combines the proof of data integrity and PoS, and provides effective methods of defense against potential problems in PoS. In addition, in terms of the data structure in the public chain, Genaro has developed the GSIOP protocol in line with up-to-date methods of storage encryption, so as to settle different layers of data usage. Finally, in terms of adding data, Genaro has also added relevant VM order sets. Table of Contents 1 Genaro's Vision..................................................3 3.3 File Sharing Based on Proxy Recryption...............................................
    [Show full text]
  • Between Formal and Informal: the Shakeout in China's Online Video
    This may be the author’s version of a work that was submitted/accepted for publication in the following source: Zhao, Elaine& Keane, Michael (2013) Between formal and informal: the shakeout in China’s online video indus- try. Media, Culture and Society, 35(6), pp. 724-741. This file was downloaded from: https://eprints.qut.edu.au/55721/ c c The Author(s) 2013 This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the docu- ment is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recog- nise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to [email protected] Notice: Please note that this document may not be the Version of Record (i.e. published version) of the work. Author manuscript versions (as Sub- mitted for peer review or as Accepted for publication after peer review) can be identified by an absence of publisher branding and/or typeset appear- ance. If there is any doubt, please refer to the published source. https://doi.org/10.1177/0163443713491301 Between formal and informal: the shakeout in China’s online video industry Elaine Jing Zhao Introduction Chinese media is often characterised by a lack of autonomy and dependence on conservative regulatory bodies.
    [Show full text]
  • 2012 Special 301 Report
    2012 Special 301 Report Ambassador Ronald Kirk Office of the United States Trade Representative ACKNOWLEDGEMENTS The Office of the United States Trade Representative (USTR) is responsible for the preparation of this report. U.S. Trade Representative Ron Kirk gratefully acknowledges in particular the contributions of Deputy U.S. Trade Representatives Demetrios Marantis, Michael Punke, and Miriam Sapiro; USTR General Counsel Timothy Reif; Chief of Staff Lisa Garcia; and Assistant USTR for Public/Media Affairs Carol Guthrie, Assistant USTR for Intergovernmental Affairs and Public Engagement Christine Turner, Assistant USTR for Congressional Affairs Mac Campbell, Executive Secretary William Mack, Senior Policy Advisor Holly Smith, Senior Advisor David Roth, Assistant USTR for Intellectual Property and Innovation Stan McCoy, Director for Intellectual Property and Innovation Paula Karol Pinha, and numerous other staff of the Office of Intellectual Property and Innovation, the Office of General Counsel, and other USTR offices. Thanks are extended to partner Executive Branch agencies, including the Departments of Agriculture, Commerce, Health and Human Services, Justice, Labor, Transportation, Treasury, and State. In preparing the report, substantial information was solicited from U.S. Embassies around the world and from interested stakeholders. The draft of this report was developed through the Special 301 Subcommittee of the interagency Trade Policy Staff Committee. April 2012 1 Table of Contents EXECUTIVE SUMMARY..........................................................................................................................
    [Show full text]
  • Parimulo: Reengineering
    UNIVERSITÀ DEGLI STUDI DI PADOVA DIPARTIMENTO DI INGEGNERIA DELL’INFORMAZIONE TESI DI LAUREA PARIMULO: REENGINEERING RELATORE: Ch.mo Prof. Enoch Peserico Stecchini Negri De Salvi CORRELATORI: Ing. Michele Bonazza e Ing. Paolo Bertasi LAUREANDA: Martina Muscarella Padova, 24 Ottobre 2011 A.A. 2010/11 To myself, because I deserve it. Acknowledgements In the first place I want to thank my advisor, Prof. Enoch Peserico, for his support and encouragement, but also for giving me many opportunities, such as to be the Mulo Team Leader, allowing me to grow up as an engineer. I’d also like to thank my assistant supervisors, Michele Bonazza and Paolo Bertasi, who lead and supported me during these three years of work on PariPari, teaching me things that I could never have learnt at any university class (such as to ping and to use a screwdriver). Then I am grateful to all the other PariPari Team Leaders and the past and present Mulo developers. In particular way Francesco Peruch for every Connec- tivity integrations - hoping NIO will be the last one - and of course for the record of 150 emails sent in a couple of midsummer nights. My gratitude also goes to Mattia Samory, because Mulo now has what it deserves: a fresh, pretty and green graphic interface. Obviously I must also cite Vincenzo Cappelleri who has been really helpful me dealing with the candyman. Finally I want to thank my best developers Francesco Mattia and Christian Piccolo for the memorable Kad integration (I am so happy we are all still alive and still have both hands) and the former Mulo Team Leader, Roberto Ampezzan, for every public variable in the code and the hints about Acn and Rly.
    [Show full text]
  • International Intellectual Property Alliance
    I NTERNATIONAL I NTELLECTUAL P ROPERTY ALLIANCE ® 2101 L STREET NW, SUITE 1000 ∙ WASHINGTON, DC 20037 ∙ TEL (202) 833-4198 ∙ FAX (202) 331-3101 ∙ WWW.IIPA.COM ∙ EMAIL: [email protected] May 4, 2011 Submitted by First Class Mail and Electronic Mail ([email protected]) Michael Danis Executive Director for the U.S.-China Economic and Security Review Commission 444 North Capitol Street, NW., Suite 602 Washington, DC 20001 Re: Hearing on “China’s Intellectual Property Rights and Indigenous Innovation Policy”, 76 Fed. Reg. 22945 (April 25, 2011) Dear Mr. Danis: The International Intellectual Property Alliance ("IIPA") hereby submits this letter and appendices regarding the Hearing on “China’s Intellectual Property Rights and Indigenous Innovation Policy,” 76 Fed. Reg. 22945 (April 25, 2011). Testifying on behalf of the IIPA will be: Michael Schlesinger International Intellectual Property Alliance (IIPA) 2101 L Street, NW, Suite 1000 Washington, DC 20037 Tel: 202 833 4198 Email: [email protected] While oral testimony will focus on software and recorded music industry issues, IIPA takes this opportunity to briefly recount the overall IP record in China. High copyright piracy levels persist in China, from pervasive use of unlicensed software by businesses and pre-installation of unlicensed software (hard disk loading piracy) at the distribution level, to widespread online piracy of music, films, television programming and other copyright materials, and piracy of hard goods. The continued overall lack of deterrence against piracy, market closures or
    [Show full text]
  • China: Intellectual Property Infringement, Indigenous Innovation Policies, and Frameworks for Measuring the Effects on the U.S
    United States International Trade Commission China: Intellectual Property Infringement, Indigenous Innovation Policies, and Frameworks for Measuring the Effects on the U.S. Economy Investigation No. 332-514 USITC Publication 4199 (amended) November 2010 U.S. International Trade Commission COMMISSIONERS Deanna Tanner Okun, Chairman Irving A. Williamson, Vice Chairman Charlotte R. Lane Daniel R. Pearson Shara L. Aranoff Dean A. Pinkert Karen Laney Acting Director of Operations Robert Carr Robert B. Koopman Acting Director, Office of Industries Director of Economics Address all communications to Secretary to the Commission United States International Trade Commission Washington, DC 20436 U.S. International Trade Commission Washington, DC 20436 www.usitc.gov China: Intellectual Property Infringement, Indigenous Innovation Policies, and Frameworks for Measuring the Effects on the U.S. Economy Investigation No. 332-514 USITC Publication 4199 (amended) November 2010 Project Leaders Katherine Linton Alexander Hammer [email protected] [email protected] Deputy Project Leader Jeremy Wise [email protected] Office of Industries Renee Berry, Laura Bloodgood, Jeffery Clark, Shannon Gaffney, Cathy Jabara, John Kitzmiller, Elizabeth Nesbitt, George Serletis, Donald Sussman, and Isaac Wohl Office of Economics Robert Feinberg, Michael Ferrantino, Kyle Johnson, and Tani Fukui Office of the General Counsel Sidney Rosenzweig Special Assistance from Joseph Cooter, Alison Gosney, Dong Hong, Kyle Hutzler, Lara Loewenstein, Kathryn Lundquist, and Donnette Rimmer Primary Reviewers Lynn Levine and Brian Allen Administrative Support Lynette Gabourel, Phyllis Boone, Nadine Siler, and Sharon Greenfield Under the Direction of Robert Carr, Chief Natural Resources and Metals Division ABSTRACT Intellectual property rights (IPR) infringement in China reduces market opportunities and undermines the profitability of U.S.
    [Show full text]
  • Open Tian Thesis.Pdf
    The Pennsylvania State University The Graduate School College of Communications EXAMINING COPYRIGHT REGIMES IN CHINA’S DIGITAL MUSIC INDUSTRY: HISTORY, CHALLENGES AND NEW MODELS A Thesis in Media Studies by Tian Tiffany Zhang © 2012 Tian Tiffany Zhang Submitted in Fulfillment of the Requirements for the Degree of Master of Arts May 2012 The thesis of Tian Tiffany Zhang was reviewed and approved* by the following: Richard Taylor Palmer Chair Professor in Telecommunications Studies Thesis Advisor Matt Jackson Head of Department of Telecommunications Associate Professor of Communications Krishna Jayakar Associate Professor of Communications *Signatures are on file in the Graduate School ii ABSTRACT The traditional Chinese culture of Confucianism, Taoism, and Buddhism and the theories from Marxism and Communism played an essential role during both the forming and modifying era of the intellectual property law regimes in the People’s Republic of China. This thesis analyzed the reasons why no counterparts to copyright law ever developed in ancient China and why it was always problematic to enforce copyright law in modern China. As one of the largest markets for cultural products, China’s digital music industry emerged at the end of twentieth century as promising but fledgling. Troubles and problems took root during the short booming era when pirated copies of music products were available free through both streaming and downloading and were all over the internet. Thousands of illegal sites, a variety of peer-to-peer file sharing software, and even search engines with high reputations were offering infringing and illegitimate mp3 download services. This thesis also discusses the practices of how the P.
    [Show full text]
  • View 2020-21 Student Handbook
    LINDEN HALL PARENT/STUDENT HANDBOOK 2020-21 The Linden Hall Parent/Student Handbook is published and distributed to members of the Linden Hall community for the purpose of providing information on aspects of student and campus life so that students may gain as much as possible from their experience at the School. Students, parents, faculty, administration, and staff should all read and be familiar with the contents of the Handbook, so that each member of the community knows and understands the expectations of students within our community. This Handbook is for informational purposes only. It is not intended to create, nor does it create, a contract or part of a contract in any way, including, but not limited to, between Linden Hall and any parent, guardian or student affiliated with or attending the School. Linden Hall reserves the right, in its sole discretion, to add, revise and/or delete School policies before, during, and after the School year. Contents 2019-20 ....................................................................................................................................... 1 PARENT AND STUDENT ACKNOWLEDGEMENT ............................................................ 1 This page is left intentionally blank. ........................................................................................... 2 WELCOME TO LINDEN HALL .............................................................................................. 3 IMPORTANT CONTACT INFORMATION ..........................................................................
    [Show full text]
  • An Analysis of Piracy in China: the Cause, Reason and Solution
    An analysis of piracy in China: the cause, reason and solution Jiong Chen 8/22/2009 1 Abstract: China has long been criticized as a notorious haven for digital media pirates. Although the government claims enormous actions have been taken, western media still blame China for putting insufficient effort into deterring piracy. In any case, piracy is still the No.1 issue for any digital media companies in China that wish to make profit. According to the report from Business Software Alliance’s (BSA), the overall piracy rate is as high as nearly 90%, resulting in a $2.9 billion loss in 2007.1 However, it may be unfair for China to take all the blame because the statistics do not tell everything. Piracy is not always an evil that lowers the social welfare. Under some circumstances, piracy can have positive consequences for people and 1 IIPA, 2008 Special 301: People’s Republic of China. Page 68, 2009 2 digital companies in developing countries. To fully and objectively analyze and understand the merits and demerits of piracy, we cannot simply focus on the present situation. We need to study the origin and the development of not only piracy but also digital media industry itself. Relevant issues include how piracy has changed the digital media industry and how the digital media industry in China differs from the industry in other countries such as the United States or India. Then we can understand what causes the government’s current ineffective intervention. After that, we can conclude that in terms of combating piracy, it is more efficient for companies to change their business model than to rely on the legal system.
    [Show full text]
  • Westminsterresearch
    WestminsterResearch http://www.westminster.ac.uk/research/westminsterresearch The politics of enjoyment: the media viewing preferences and practices of young higher-educated Chinese Magnus Wilson School of Social Sciences, Humanities and Languages This is an electronic version of a PhD thesis awarded by the University of Westminster. © The Author, 2011. This is an exact reproduction of the paper copy held by the University of Westminster library. The WestminsterResearch online digital archive at the University of Westminster aims to make the research output of the University available to a wider audience. Copyright and Moral Rights remain with the authors and/or copyright owners. Users are permitted to download and/or print one copy for non-commercial private study or research. Further distribution and any use of material from within this archive for profit-making enterprises or for commercial gain is strictly forbidden. Whilst further distribution of specific materials from within this archive is forbidden, you may freely distribute the URL of WestminsterResearch: (http://westminsterresearch.wmin.ac.uk/). In case of abuse or copyright appearing without permission e-mail [email protected] THE POLITICS OF ENJOYMENT: THE MEDIA VIEWING PREFERENCES AND PRACTICES OF YOUNG HIGHER- EDUCATED CHINESE MAGNUS WILSON A thesis submitted in partial fulfilment of the requirements of the University of Westminster for the degree of Doctor of Philosophy September 2011 ii Contents Abstract iii Acknowledgements iv 1. Introduction 1 2. Gaps: Audience and Media Research in China 33 3. Frustrated Aspirations: Negotiating Asian Hybridity 78 4. Viewing Hollywood: Seeking a New „Main Melody‟ 117 5. Viewing US Dramas: a „Chinese American Dream‟? 148 6.
    [Show full text]