View 2020-21 Student Handbook

Total Page:16

File Type:pdf, Size:1020Kb

View 2020-21 Student Handbook LINDEN HALL PARENT/STUDENT HANDBOOK 2020-21 The Linden Hall Parent/Student Handbook is published and distributed to members of the Linden Hall community for the purpose of providing information on aspects of student and campus life so that students may gain as much as possible from their experience at the School. Students, parents, faculty, administration, and staff should all read and be familiar with the contents of the Handbook, so that each member of the community knows and understands the expectations of students within our community. This Handbook is for informational purposes only. It is not intended to create, nor does it create, a contract or part of a contract in any way, including, but not limited to, between Linden Hall and any parent, guardian or student affiliated with or attending the School. Linden Hall reserves the right, in its sole discretion, to add, revise and/or delete School policies before, during, and after the School year. Contents 2019-20 ....................................................................................................................................... 1 PARENT AND STUDENT ACKNOWLEDGEMENT ............................................................ 1 This page is left intentionally blank. ........................................................................................... 2 WELCOME TO LINDEN HALL .............................................................................................. 3 IMPORTANT CONTACT INFORMATION ........................................................................... 4 I. INTRODUCTION .................................................................................................................. 5 Mission Statement ....................................................................................................................... 5 Philosophy ................................................................................................................................... 5 History of School ........................................................................................................................ 6 Linden Hall Seal .......................................................................................................................... 6 Non-Discrimination Policy ......................................................................................................... 6 II. STUDENT CONDUCT EXPECTATIONS ..................................................................... 7 Infractions of Major School Rules ........................................................................................... 9 Documentation and Consequences ........................................................................................... 10 Suspension ................................................................................................................................. 10 Disciplinary Probation .............................................................................................................. 10 Involuntary Leave ..................................................................................................................... 10 Expulsion ................................................................................................................................... 11 Behavioral Expectations While Away from School ................................................................. 11 Parent Involvement ................................................................................................................... 11 Reporting Disciplinary Action to Colleges ............................................................................... 11 Bullying, Harassment, and Intimidation ................................................................................... 12 Sexual Harassment .................................................................................................................... 12 Anti-Hazing Policy .................................................................................................................... 12 Definition ............................................................................................................................... 13 Responsibility for Compliance .............................................................................................. 13 Reporting of a Possible Violation .......................................................................................... 13 Violations and Sanctions ....................................................................................................... 13 i Use of Alcohol, Drugs/Testing (Including E-Cigarettes and Vaping) ...................................... 14 Sanctuary Policy ........................................................................................................................ 14 Sexual Intimacy ......................................................................................................................... 14 Inappropriate Items/Weapons ................................................................................................... 15 Respect for Property .................................................................................................................. 15 Search and Seizure .................................................................................................................... 15 III. HONOR CODE ............................................................................................................ 15 Honor Code ............................................................................................................................... 15 Cheating .................................................................................................................................... 16 Lying ......................................................................................................................................... 16 Stealing ...................................................................................................................................... 16 The Honor Council .................................................................................................................... 17 Upper School Honor Code Violations ...................................................................................... 17 Probable Consequences for Honor Code (HC) Violations in the Upper School ...................... 18 Middle School Honor Code Violations ..................................................................................... 18 Plagiarism and Acceptable Forms of Citation .......................................................................... 19 Citation and Reference Guidelines ............................................................................................ 19 IV. OTHER SCHOOL RULES AND POLICIES .................................................................. 19 Language Policy ........................................................................................................................ 19 Driving Privileges/Automobile Policy ...................................................................................... 20 Gambling ................................................................................................................................... 21 Absences/Tardiness ................................................................................................................... 21 Permissions ............................................................................................................................... 21 Bring Your Own Devices .......................................................................................................... 21 Smart Phones/Electronic Devices ............................................................................................. 21 Electronic Communications, Computers, and Acceptable Use................................................. 22 Sexting ................................................................................................................................... 28 Email ...................................................................................................................................... 28 Social Media .......................................................................................................................... 28 ii Inappropriate Websites and Apps .......................................................................................... 28 V. ACADEMIC PROGRAM .................................................................................................... 29 Graduation Requirements .......................................................................................................... 29 Course Offerings ....................................................................................................................... 30 Academic Concerns .................................................................................................................. 31 Attendance and Absences ......................................................................................................... 31 Make-Up Work ......................................................................................................................... 32 Unexcused Absences ................................................................................................................. 32 Chronic Attendance Issues .......................................................................................................
Recommended publications
  • Prc) International Intellectual Property Alliance (Iipa) 2011 Special 301 Report on Copyright Protection and Enforcement
    PEOPLE’S REPUBLIC OF CHINA (PRC) INTERNATIONAL INTELLECTUAL PROPERTY ALLIANCE (IIPA) 2011 SPECIAL 301 REPORT ON COPYRIGHT PROTECTION AND ENFORCEMENT Special 301 Recommendation: IIPA recommends that USTR maintain China on the Priority Watch List in 2011.1 Executive Summary: High copyright piracy levels persist in China, from pervasive use of unlicensed software by businesses and pre-installation of unlicensed software (hard disk loading piracy) at the distribution level, to widespread online piracy of music, films, television programming and other copyright materials, and piracy of hard goods. The continued overall lack of deterrence against piracy, market closures or barriers for creative content (some of which have been found to violate China’s WTO commitments), and the imposition or spectre of discriminatory policies toward foreign content, suggest a conscious policy seeking to drive Chinese competitiveness while permitting free access to foreign content through unapproved pirate channels. China’s principal reliance on its woefully under- resourced administrative system to deal with IPR infringements rather than through criminal enforcement presents a significant hurdle to effective enforcement.2 At the same time, with the launch of a new Special Campaign on IP enforcement, and through commitments made in recent bilateral forums, the Chinese Government has indicated measures it will take to achieve higher levels of copyright protection. Specifically, the recent meeting of the Joint Commission on Commerce and Trade (JCCT) in December 2010 and the summit between President Obama and President Hu in January 2011 resulted in a number of important commitments by the Chinese to ensure legal use of software in the government and state-owned enterprises (SOEs), seek effective measures to deal with Internet infringements (including intermediary liability), deal with digital library infringements, and ensure that China’s “indigenous innovation” policies do not effectively limit market access for U.S.
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • Genaro Yellow Paper
    Genaro Network Yellow Paper Genaro Network Roadmap Towards a Multi-Source Data Governance Framework Yellow Paper v1.0.1 Page | 1 Genaro Network Yellow Paper Abstract The Genaro Network is a new public blockchain platform based on peer-to-peer encryption and sharing. The platform aims to realize highly efficient node management on the public chain based on PoS (Proof of Stake) and SPoR (Sentinel Proof of Retrievability). The vision of Genaro is to establish a new medium of distributed and encrypted storage, and to enable each user to use and share data, and to establish abundant distributed applications (DApps) on the blockchain and provide stable support for these. Compared with other public chains, Genaro has the following advantages: (1) Genaro modified the use of file sentinels to better suit distributed systems through the combination of PoS and SPoR, thus enhancing the ability to defend against replay attacks; (2) in the design of chain-style PoS, Genaro studied famous PoS methods such as Casper (CFFG, CTFG), Tendermint, and Ouroboros, analyzed the major ways of attacking PoS and proposed relevant schemes; and (3) in terms of management structure, Genaro combines the proof of data integrity and PoS, and provides effective methods of defense against potential problems in PoS. In addition, in terms of the data structure in the public chain, Genaro has developed the GSIOP protocol in line with up-to-date methods of storage encryption, so as to settle different layers of data usage. Finally, in terms of adding data, Genaro has also added relevant VM order sets. Table of Contents 1 Genaro's Vision..................................................3 3.3 File Sharing Based on Proxy Recryption...............................................
    [Show full text]
  • Between Formal and Informal: the Shakeout in China's Online Video
    This may be the author’s version of a work that was submitted/accepted for publication in the following source: Zhao, Elaine& Keane, Michael (2013) Between formal and informal: the shakeout in China’s online video indus- try. Media, Culture and Society, 35(6), pp. 724-741. This file was downloaded from: https://eprints.qut.edu.au/55721/ c c The Author(s) 2013 This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the docu- ment is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recog- nise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to [email protected] Notice: Please note that this document may not be the Version of Record (i.e. published version) of the work. Author manuscript versions (as Sub- mitted for peer review or as Accepted for publication after peer review) can be identified by an absence of publisher branding and/or typeset appear- ance. If there is any doubt, please refer to the published source. https://doi.org/10.1177/0163443713491301 Between formal and informal: the shakeout in China’s online video industry Elaine Jing Zhao Introduction Chinese media is often characterised by a lack of autonomy and dependence on conservative regulatory bodies.
    [Show full text]
  • Free File Sharing and Stora… FREE FILE [email protected] My Account Sign out SHARING
    18-04-2011 4shared.com - free file sharing and stora… FREE FILE [email protected] My Account Sign Out SHARI NG Premium FAQ Quick Tour English Frequently Asked Questions General Questions • Where are my files stored? • Why do I need to sign up? • How long are my files stored for? • How can I change the Publisher name in my account? • How can I change a password for my account? • What should I do if I forgot a password? • How can I subscribe to a Premium account? • Is my data secure? Managing Files & Folders • What files can I upload and store with your service? • Is there any limit to the number of files and their size that may be uploaded per user? • Are there any bandwidth limitations for traffic I can use? • How can I create a folder? • Can I upload several files at once? • How can I arrange and manage my files? • How can I rename a file or a folder? • How can I change the description of a file? • How can I delete a subfolder? • How can I move files from one folder to another one? • What is WebDav? How can I use a WebDAV client to connect to my account? • How can I create a photo album? • How can I stream video and audio files? Sharing Files & Folders • How do I share my files with other users? Can I share my files with non-registered users? • How can I share a folder? • How can I prevent users from changing files in the shared folder? • How to set a password for a shared folder • Can you tell me how to set a subdomain for a folder? • How can I share a folder which stores both public and private files? • Can I invite someone to
    [Show full text]
  • Internet Music Download Manager
    Internet music download manager From Ida Software: Internet Music Downloader is a simple program for safely finding songs online and downloading them for free so you can enjoy them any. Internet Download Manager gives you the tools to download many types of files from the Internet and organize them as you see fit. You can. A download manager full of tools for music and movie lovers to choose between this and Ninja Internet Download Manager for the top spot. Download free music with idm. Psyco4ctiVe Easiest way to download music using Internet Download. It's a smart and fast internet download manager for Windows and Mac OS X. AnyMusic is the best music downloader that empowers you to discover. Download Accelerator Manager (DAM) is an all-in-one downloader, that empowers you to download Internet files and save Web videos, music, from sites like. Free Download Manager latest version: Efficiently manage your downloads. Free Download Manager is exactly what it says it is - an application that looks after your downlo Manager Internet & Network · Download Managers. Internet Download Manager, free and safe download. Internet Download Manager latest version: IDM manages and accelerates downloads, even with Windows. Internet Download Manager is the choice of many, when it comes to increasing tool that enables you to search, access and download over million songs. You don't need a download manager to download software or music or whatever The browser integration works with Internet Explorer, Chrome, and Firefox. Internet Download Manager is a tool for increasing download speeds by up to 5 times, and for resuming, scheduling, and organizing downloads.
    [Show full text]
  • 2012 Special 301 Report
    2012 Special 301 Report Ambassador Ronald Kirk Office of the United States Trade Representative ACKNOWLEDGEMENTS The Office of the United States Trade Representative (USTR) is responsible for the preparation of this report. U.S. Trade Representative Ron Kirk gratefully acknowledges in particular the contributions of Deputy U.S. Trade Representatives Demetrios Marantis, Michael Punke, and Miriam Sapiro; USTR General Counsel Timothy Reif; Chief of Staff Lisa Garcia; and Assistant USTR for Public/Media Affairs Carol Guthrie, Assistant USTR for Intergovernmental Affairs and Public Engagement Christine Turner, Assistant USTR for Congressional Affairs Mac Campbell, Executive Secretary William Mack, Senior Policy Advisor Holly Smith, Senior Advisor David Roth, Assistant USTR for Intellectual Property and Innovation Stan McCoy, Director for Intellectual Property and Innovation Paula Karol Pinha, and numerous other staff of the Office of Intellectual Property and Innovation, the Office of General Counsel, and other USTR offices. Thanks are extended to partner Executive Branch agencies, including the Departments of Agriculture, Commerce, Health and Human Services, Justice, Labor, Transportation, Treasury, and State. In preparing the report, substantial information was solicited from U.S. Embassies around the world and from interested stakeholders. The draft of this report was developed through the Special 301 Subcommittee of the interagency Trade Policy Staff Committee. April 2012 1 Table of Contents EXECUTIVE SUMMARY..........................................................................................................................
    [Show full text]
  • Parimulo: Reengineering
    UNIVERSITÀ DEGLI STUDI DI PADOVA DIPARTIMENTO DI INGEGNERIA DELL’INFORMAZIONE TESI DI LAUREA PARIMULO: REENGINEERING RELATORE: Ch.mo Prof. Enoch Peserico Stecchini Negri De Salvi CORRELATORI: Ing. Michele Bonazza e Ing. Paolo Bertasi LAUREANDA: Martina Muscarella Padova, 24 Ottobre 2011 A.A. 2010/11 To myself, because I deserve it. Acknowledgements In the first place I want to thank my advisor, Prof. Enoch Peserico, for his support and encouragement, but also for giving me many opportunities, such as to be the Mulo Team Leader, allowing me to grow up as an engineer. I’d also like to thank my assistant supervisors, Michele Bonazza and Paolo Bertasi, who lead and supported me during these three years of work on PariPari, teaching me things that I could never have learnt at any university class (such as to ping and to use a screwdriver). Then I am grateful to all the other PariPari Team Leaders and the past and present Mulo developers. In particular way Francesco Peruch for every Connec- tivity integrations - hoping NIO will be the last one - and of course for the record of 150 emails sent in a couple of midsummer nights. My gratitude also goes to Mattia Samory, because Mulo now has what it deserves: a fresh, pretty and green graphic interface. Obviously I must also cite Vincenzo Cappelleri who has been really helpful me dealing with the candyman. Finally I want to thank my best developers Francesco Mattia and Christian Piccolo for the memorable Kad integration (I am so happy we are all still alive and still have both hands) and the former Mulo Team Leader, Roberto Ampezzan, for every public variable in the code and the hints about Acn and Rly.
    [Show full text]
  • International Intellectual Property Alliance
    I NTERNATIONAL I NTELLECTUAL P ROPERTY ALLIANCE ® 2101 L STREET NW, SUITE 1000 ∙ WASHINGTON, DC 20037 ∙ TEL (202) 833-4198 ∙ FAX (202) 331-3101 ∙ WWW.IIPA.COM ∙ EMAIL: [email protected] May 4, 2011 Submitted by First Class Mail and Electronic Mail ([email protected]) Michael Danis Executive Director for the U.S.-China Economic and Security Review Commission 444 North Capitol Street, NW., Suite 602 Washington, DC 20001 Re: Hearing on “China’s Intellectual Property Rights and Indigenous Innovation Policy”, 76 Fed. Reg. 22945 (April 25, 2011) Dear Mr. Danis: The International Intellectual Property Alliance ("IIPA") hereby submits this letter and appendices regarding the Hearing on “China’s Intellectual Property Rights and Indigenous Innovation Policy,” 76 Fed. Reg. 22945 (April 25, 2011). Testifying on behalf of the IIPA will be: Michael Schlesinger International Intellectual Property Alliance (IIPA) 2101 L Street, NW, Suite 1000 Washington, DC 20037 Tel: 202 833 4198 Email: [email protected] While oral testimony will focus on software and recorded music industry issues, IIPA takes this opportunity to briefly recount the overall IP record in China. High copyright piracy levels persist in China, from pervasive use of unlicensed software by businesses and pre-installation of unlicensed software (hard disk loading piracy) at the distribution level, to widespread online piracy of music, films, television programming and other copyright materials, and piracy of hard goods. The continued overall lack of deterrence against piracy, market closures or
    [Show full text]
  • Download Managers – a Better Downloading Experience an In-Depth Analysis of How Download Managers Help You Download Content from the Internet
    White Paper: Download Managers – A Better Downloading Experience An in-depth analysis of how download managers help you download content from the internet Brought to you by the authors of DownloadStudio – the award-winning, multi-featured download manager that gets everything on the web. Conceiva Pty. Ltd. http://www.conceiva.com Table of Contents 1. Introduction .................................................................................... 3 1.1 Key terms............................................................................. 4 1.2 Important: Notice about copyright ownership ........................... 6 2. Various types of content to download ........................................... 7 2.1 Various protocols used on the internet ..................................... 8 3. Key benefits of download managers ........................................... 10 4. Different types of download managers ....................................... 12 4.1 File download managers .......................................................12 4.2 Multi-featured download managers ........................................12 4.3 Criteria for choosing a download manager .............................. 14 5. How download managers work ................................................... 15 5.1 Accelerating downloads .........................................................15 5.2 Resuming downloads ............................................................ 15 5.3 Scheduling a download for a later time of day .........................16 5.4 Download managers
    [Show full text]
  • Goodsuite Sample Security Assessment Report Page 2 of 12 Security
    Sample Security Assessment Report Prepared For Sample Company Prepared By GoodSuite Report Date 7/20/2021 - 7/27/2021 Security 1 phishing websites detected 1 known botnet detected 13 known malware detected 125 malicious websites detected 8,190 files analyzed by sandbox 17 high risk applications detected Top Application Vulnerability Exploits Detected Application vulnerabilities can be exploited to compromise the security of your network. The FortiGuard research team analyzes these vulnerabilities and then develops signatures to detect them. FortiGuard currently leverages a database of more than 5,800 known application threats to detect attacks that evade traditional firewall systems. For more information on application vulnerabilities, please refer to FortiGuard at: http://www.fortiguard.com/intrusion. # Risk Threat Name Type Victims Sources Count 1 Adobe.Flash.Player.Authplay.DLL.SWF.Handling.Code.Executio 1 1 2,035 n 2 IBM.Rational.ClearQuest.Username.Parameter.SQL.Injection SQL Injection 30 1 195 3 Bash.Function.Definitions.Remote.Code.Execution OS Command Injectio 8 3 15 n 4 MS.GDIPlus.JPEG.Buffer.Overflow Buffer Errors 3 2 10 5 MS.IE.MSXML.Object.Handling.Code.Execution Buffer Errors 1 1 2 6 McAfee.Web.Reporter.EJBInvokerServlet.Object.Code.Execution Code Injection 1 1 1 7 LaVague.PrintBar.PHP.File.Inclusion Code Injection 30 1 183 8 IISadmin.ISM.DLL.Access Information Disclosure 29 1 169 9 GameSiteScript.Index.PHP.SQL.Injection SQL Injection 30 1 169 10 OTE.Header.PHP.File.Inclusion Code Injection 30 1 163 Top Malware, Botnets and Spyware/Adware Detected There are numerous channels that cybercriminals use to distribute malware.
    [Show full text]
  • China: Intellectual Property Infringement, Indigenous Innovation Policies, and Frameworks for Measuring the Effects on the U.S
    United States International Trade Commission China: Intellectual Property Infringement, Indigenous Innovation Policies, and Frameworks for Measuring the Effects on the U.S. Economy Investigation No. 332-514 USITC Publication 4199 (amended) November 2010 U.S. International Trade Commission COMMISSIONERS Deanna Tanner Okun, Chairman Irving A. Williamson, Vice Chairman Charlotte R. Lane Daniel R. Pearson Shara L. Aranoff Dean A. Pinkert Karen Laney Acting Director of Operations Robert Carr Robert B. Koopman Acting Director, Office of Industries Director of Economics Address all communications to Secretary to the Commission United States International Trade Commission Washington, DC 20436 U.S. International Trade Commission Washington, DC 20436 www.usitc.gov China: Intellectual Property Infringement, Indigenous Innovation Policies, and Frameworks for Measuring the Effects on the U.S. Economy Investigation No. 332-514 USITC Publication 4199 (amended) November 2010 Project Leaders Katherine Linton Alexander Hammer [email protected] [email protected] Deputy Project Leader Jeremy Wise [email protected] Office of Industries Renee Berry, Laura Bloodgood, Jeffery Clark, Shannon Gaffney, Cathy Jabara, John Kitzmiller, Elizabeth Nesbitt, George Serletis, Donald Sussman, and Isaac Wohl Office of Economics Robert Feinberg, Michael Ferrantino, Kyle Johnson, and Tani Fukui Office of the General Counsel Sidney Rosenzweig Special Assistance from Joseph Cooter, Alison Gosney, Dong Hong, Kyle Hutzler, Lara Loewenstein, Kathryn Lundquist, and Donnette Rimmer Primary Reviewers Lynn Levine and Brian Allen Administrative Support Lynette Gabourel, Phyllis Boone, Nadine Siler, and Sharon Greenfield Under the Direction of Robert Carr, Chief Natural Resources and Metals Division ABSTRACT Intellectual property rights (IPR) infringement in China reduces market opportunities and undermines the profitability of U.S.
    [Show full text]