816. ACCEPTABLE USE OF THE COMPUTERS, NETWORK, INTERNET, ELECTRONIC COMMUNICATIONS, AND INFORMATION SYSTEMS
- Delegation of Responsibility
- Access to CIS Systems
- Parental Notification and Responsibility
- School District Limitation of Liability
- Content Regulations
- Due Process
- Search and Seizure
- Copyright Infringement and Plagiarism
- Selection of Material
- School District Web Site
- Safety and Privacy
- Consequences for Inappropriate, Unauthorized, and Illegal Use
- Downloadable CIS Acknowledgment and Consent Forms
The Kennett Consolidated School District (“School District”) provides employees, students, and guests (“users”) with access to the School District’s electronic communication systems and network, which includes Internet access, whether wired or wireless or by any other means. Guests include but are not limited to visitors, workshop attendees, volunteers, independent contractors, adult education staff, students, and Board members.
Computers, network, Internet, electronic communications, and information systems (collectively “CIS systems”) provide vast, diverse, and unique resources. The Board of School Directors will provide access to the School District’s CIS systems for users if there is a specific School District-related purpose to access information and research, to collaborate to facilitate learning and teaching, and to foster the educational purpose and mission of the School District.
For users, the School District’s CIS systems must be used for education-related purposes and performance of School District job duties. Incidental personal use of school computers is permitted for employees so long as such use does not interfere with the employee’s job duties and performance, with system operations, or with other system users. Personal use must comply with this Policy and all other applicable School District Policies, procedures and rules contained in this Policy, as well as Internet service provider (“ISP”) terms, local, state, and federal laws, and must not damage the School District’s CIS systems. Students may only use the CIS systems for educational purposes. At the same time, personal technology devices brought onto the School District’s property or at School District events or connected to the School District’s network that the School District reasonably believes contain School District information or contain information that violates a School District Policy or contain information/data that the School District reasonably believes involves a criminal activity may be legally accessed to insure compliance with this Policy, other School District Policies, and to comply with the law. Users may not use their personal computers to connect to the School District’s intranet, Internet, or any other CIS System unless approved by the Technology Manager and/or designee.
The School District intends to protect its CIS systems strictly against numerous outside and internal risks and vulnerabilities. Users are important and critical players in protecting these School District assets and in lessening the risks that can destroy these important and critical assets. Consequently, users are required to comply fully with this Policy and to report immediately any violations or suspicious activities to the building principals or the Superintendent. Conduct otherwise will result in actions further described in Section 13 - Consequences for Inappropriate, Unauthorized, and Illegal Use, found in the last Section of this Policy and provided in relevant School District Policies.
» Back to top
- (Reference: 18 U.S.C. § 2256(8)) Child Pornography – Under Federal law, any visual depiction, including any photograph, film, video, picture, or computer or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, of sexually explicit conduct, where:
(Reference: 18 Pa.C.S. § 6312) Under Pennsylvania law, any book, magazine, pamphlet, slide, photograph, film, videotape, computer depiction, or other material depicting a child under the age of 18 years engaging in a prohibited sexual act or in the simulation of such act.
- The production of such visual depiction involves the use of a minor engaging in sexually explicit conduct;
- Such visual depiction is a digital image, computer image, or computer-generated image that is or is indistinguishable from that of a minor engaging in sexually explicit conduct; or
- Such visual depiction has been created, adapted, or modified to appear that an identifiable minor is engaging in sexually explicit conduct.
- Computer – Includes any School District owned, leased, licensed, or user-owned personal hardware, software, or other technology used on School District premises or at School District events or connected to the School District network containing School District programs or School District or student data (including images, files, and other information) attached or connected to, installed in, or otherwise used in connection with a computer. Computer includes but is not limited to the School District and users: desktop, notebook, power book, tablet PC or laptop computers, printers, facsimile machine, cables, modems, and other peripherals; specialized electronic equipment used for students’ special educational purposes; Global Positioning System (GPS) equipment; personal digital assistants (PDAs); iPods, MP3 players; cell phones, with or without Internet access and/or recording and/or camera/video and other capabilities and configurations, telephones, mobile phones, or wireless devices, two-way radios/telephones; beepers; paging devices, laser pointers and attachments, and any other such technology developed. Students are not permitted to attach personally owned computers and devices to the School District’s network (whether wired or wireless) without expressed written approval from the Technology Manager, who will assume the responsibility to supervise the student(s) and such use.
- Electronic Communications Systems – Any messaging, collaboration, publishing, broadcast, or distribution system that depends on electronic communications resources to create, send, forward, reply to, transmit, store, hold, copy, download, display, view, read, or print electronic records for purposes of communication across electronic communications network systems between or among individuals or groups that is either explicitly denoted as a system for electronic communications or is implicitly used for such purposes. Further, an electronic communications system means any wire, radio, electromagnetic, photo-optical, or photo-electronic facilities for the transmission of wire or electronic communications and any computer facilities or related electronic equipment for the electronic storage of such communications. Examples include, without limitation, the Internet, intranet, electronic mail services, GPS, PDAs, facsimile machines, cell phones with or without Internet access and/or electronic mail and/or recording devices, cameras/video, and other capabilities and configurations.
- Educational Purpose - Includes use of the CIS systems for classroom activities, professional or career development, and to support the School District’s curriculum, Policy and mission statement.
- (Reference: 20 U.S.C. § 6801, 47 U.S.C. § 254(h)) Harmful to Minors – Under Federal law, any picture, image, graphic image file, or other visual depictions that:
(Reference: 18 Pa.C.S.A. § 5903(e)(6)) Under Pennsylvania law, any depiction or representation, in whatever form, of nudity, sexual conduct, sexual excitement, or sadomasochistic abuse, when it:
- taken as a whole, with respect to minors, appeals to the prurient interest in nudity, sex, or excretion;
- depicts, describes, or represents in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual content, actual or simulated normal or perverted sexual acts, or lewd exhibition of the genitals, and
- taken as a whole lacks serious literary, artistic, political, educational, or scientific value as to minors.
- predominantly appeals to the prurient, shameful, or morbid interest of minors; and
- is patently offensive to prevailing standards in the adult community as a whole with respect to what is suitable for minors; and
- taken as a whole, lacks serious literary, artistic, political, educational, or scientific value for minors.
- Incidental Personal Use – Incidental personal use of school computers is permitted for employees so long as such use does not interfere with the employee’s job duties and performance, with system operations, or with other system users. Personal use must comply with this Policy and all other applicable the School District’s procedures and rules contained in this Policy, as well as ISP terms, local, state, and federal laws, and must not damage the School District’s CIS systems.
- (Reference: 20 U.S.C. § 6777(e), 47 U.S.C. § 254(h)) Minor – For purposes of compliance with the Children’s Internet Protection Act (“CIPA”), an individual who has not yet attained the age of seventeen (17). For other purposes, minor shall mean the age of minority as defined in the relevant law.
- (Reference: 18 U.S.C. § 1460) Obscene – Under Federal law, analysis of the material meets the following elements:
(Reference: 18 Pa.C.S. § 5903) Under Pennsylvania law, analysis of the material meets the following elements:
- whether the average person, applying contemporary community standards, would find that the material, taken as a whole, appeals to the prurient interest;
- whether the work depicts or describes, in a patently offensive way, sexual conduct specifically designed by the applicable state or federal law to be obscene; and
- whether the work, taken as a whole, lacks serious literary, artistic, political, educational, or scientific value.
- the average person, applying contemporary community standards, would find that the material, taken as a whole, appeals to the prurient interest;
- the subject matter depicts or describes in a patently offensive way, sexual conduct described in the law to be obscene; and
- the subject matter, taken as a whole, lacks serious literary, artistic, political, educational, or scientific value.
- (Reference: 18 U.S.C.§ 2246, 18 Pa.C.S.§ 5903) Sexual Act and Sexual Contact – As defined at 18 U.S.C. § 2246(2), and at 18 U.S.C. § 2246(3), 18 Pa.C.S.A. § 5903.
- (Reference: 20 U.S.C.§ 6801, 47 U.S.C.§ 254, 47 U.S.C.§ 254(h)) Technology Protection Measure(s) – A specific technology that blocks or filters Internet access to visual depictions that are obscene, child pornography or harmful to minors.
- (Reference: 18U.S.C.§ 1460(b), 18 U.S.C.§ 2256) Visual Depictions – Undeveloped film and videotape and data stored on computer disk or by electronic means which is capable of conversion into a visual image but does not include mere words.
» Back to top
- Access to the School District’s CIS systems through school resources is a privilege, not a right. These, as well as the user accounts and information, are the property of the School District, which reserves the right to deny access to prevent further unauthorized, inappropriate, or illegal activity and may revoke those privileges and/or administer appropriate disciplinary action. The School District will cooperate to the extent legally required with ISP, local, state, and federal officials in any investigation concerning or related to the misuse of the CIS systems.
- It is often necessary to access user accounts in order to perform routine maintenance and security tasks. System administrators have the right to access by interception and the stored communication of user accounts for any reason in order to uphold this Policy and to maintain the system. Users have no privacy expectation in the contents of their personal files or any of their use of the School District’s CIS systems. The School District reserves the right to monitor, track, log, and access CIS systems use and to monitor and allocate fileserver space.
- The School District reserves the right to restrict access to any Internet sites or functions it may deem inappropriate through general policy, software blocking, or online server blocking. Specifically, the School District operates and enforces technology protection measure(s) that block or filter online activities of minors on its computers used and accessible to adults and students so as to filter or block inappropriate matter on the Internet. Inappropriate matter includes, but is not limited to, visual, graphic, text, and any other form of obscene, sexually explicit, child pornographic, or other material that is harmful to minors, hateful, illegal, defamatory, lewd, vulgar, profane, rude, inflammatory, threatening, harassing, discriminatory (as it pertains to race, color, religion, national origin, gender, marital status, age, sexual orientation, political beliefs, receipt of financial aid, or disability), violent, bullying, terroristic, and advocates the destruction of property. Measures designed to restrict adults’ and minors’ access to material harmful to minors may be disabled to enable an adult or student to access bona fide research, not within the prohibitions of this Policy, or for another lawful purpose. No person may have access to material that is illegal under federal or state law. Expedited review and resolution of a claim that the Policy is denying a student or adult to access material will be enforced by an administrator, supervisor, or their designee upon the receipt of written consent from a parent or guardian of a student and upon the written request from an adult.
- The School District has the right, but not the duty, to monitor, track, log, access, and/or report all aspects of its computer information, technology, and related systems of all users and of any user’s personal computers, network, Internet, electronic communication systems, and media that they bring onto School District property or to School District events that were connected to the School District network and which contained School District programs or School District or student data (including images, files, and other information), all pursuant to the law, in order to insure compliance with this Policy and other School District Policies, to protect the School District’s resources, and to comply with the law.
- The School District reserves the right to restrict or limit usage of lower priority CIS systems and computer uses when network and computing requirements exceed available capacity according to the following priorities:
- Highest – uses that directly support the education of the students.
- Medium – uses that indirectly benefit the education of the students.
- Lowest – uses that include reasonable and limited educationally-related interpersonal communi-cations.
- Forbidden – all activities in violation of this Policy.
- The School District additionally reserves the right to:
- Determine which CIS systems’ services will be provided through School District resources.
- Determine the types of files that may be stored on School District file servers and computers.
- View and monitor network traffic, file server space, processor, and system utilization and all applications provided through the network and communications systems, including e-mail, and other electronic communications.
- Remove excess e-mail or files taking up an inordinate amount of fileserver disk space after a reasonable time.
- Revoke user privileges, remove user accounts, or refer to legal authorities when violation of this and any other applicable School District Policies occur or state or federal law is violated, including but not limited to those governing network use, copyright, security, privacy, employment, data breaches, and destruction of School District resources and equipment.
» Back to top
- Due to the nature of the Internet as a global network connecting thousands of computers around the world, inappropriate materials, including those which may be defamatory, discriminatory (as it pertains to race, color, religion, national origin, gender, marital status, age, sexual orientation, political beliefs, receipt of financial aid, or disability), inaccurate, obscene, sexually explicit, lewd, vulgar, rude, harassing, violent, inflammatory, threatening, terroristic, hateful, bullying, profane, pornographic, offensive, or illegal, can be accessed through the network and electronic communications systems. Because of the nature of the technology that allows the Internet to operate, the School District cannot completely block access to these resources. Accessing these and similar types of resources may be considered an unacceptable use of school resources and will result in actions explained further in Section 13, Consequences for Inappropriate, Unauthorized, and Illegal Use, found in the last Section of this Policy and as provided in relevant School District Policies.
- Users must be capable and able to use the School District’s CIS systems and software relevant to their responsibilities. In addition, users must practice proper etiquette, School District ethics, and agree to the requirements of this Policy.
» Back to top
Delegation of Responsibility
- The Technology Manager and/or designee will serve as the coordinator to oversee the School District’s CIS systems and will work with other regional or state organizations as necessary to educate users, approve activities, provide leadership for proper training for all users in the use of the CIS systems and the requirements of this Policy, establish a system to insure adequate supervision of the CIS systems, maintain executed user agreements, and interpret and enforce this Policy.
- The Technology Manager and/or designee will establish a process for setting-up individual and class accounts, set quotas for disk usage on the system, establish a document retention and destruction Policy and schedule to include electronically stored information in accordance with Board Policy, and establish the School District virus protection process.
- Unless otherwise denied for cause, student access to the CIS systems resources shall be through supervision by the professional staff. Administrators, teachers, and staff have the responsibility to work together to help students develop the skills and judgment required to make effective and appropriate use of the resources. All users have the responsibility to respect the rights of all other users within the School District and School District CIS systems, and to abide by the rules established by the School District, its ISP, local, state, and federal laws.
» Back to top
Access to the CIS Systems
» Back to top
- CIS systems user accounts will be used only by authorized owners of the accounts for authorized purposes.
- An account will be made available according to a procedure developed by appropriate School District authorities.
- CIS System. The School District’s Acceptable Use of the Computers, Network, Internet, Electronic Communications, and Information Systems Policy, as well as other relevant School District Policies, will govern use of the School District’s CIS systems for users.
- Types of Services include, but are not limited to:
- World Wide Web. School District employees, students, and guests will have access to the Web through the School District’s CIS systems as needed.
- E-Mail. School District employees may be assigned individual e-mail accounts for work related use, as needed.
- Guest Accounts. Guests may receive an individual account with the approval of the Technology Manager and/or designee if there is a specific School District-related purpose requiring such access. Use of the CIS systems by a guest must be specifically limited to the School District-related purpose and comply with this Policy and all other School District Policies, procedures, and rules, as well as Internet Service Provider (“ISP”) terms, local, state, and federal laws and may not damage the School District’s CIS systems. An agreement between the School District and a guest and a parental signature will be required if the guest is a minor.
- Blogs. Employees may be permitted to have School District-sponsored blogs after they receive training and the approval of the School District. All Bloggers must follow the rules provided in this Policy, the School District’s Blogging Policy, and other applicable Policies, regulations, and rules of the School District.
- Web 2.0 Second Generation Web-based Services. Certain School District authorized second generation web-based services, such as social networking sites, wikis, podcasts, RSS feeds, social software, folksonomies, and collaboration tools that emphasize online educational collaboration and sharing among users, may be permitted by the School District; however, such use must be approved by the Technology Manager or designee, followed by training authorized by the School District. Users must comply with this Policy as well as any other relevant Policies, regulations, and rules during such use.
- Access to all data on, taken from, or compiled using School District computers is subject to inspection and discipline. Users have no right to expect that School District information placed on users’ personal computers, networks, Internet, and electronic communications systems is beyond the access of the School District. The School District reserves the legal right to access users’ personal technology devices brought onto the School District’s property or to School District events or connected to the School District’s network when the School District reasonably believes they contain School District information or contain information that violates a School District Policy or contains information/data that the School District reasonably believes involves a criminal activity.
Parental Notification and Responsibility The School District will notify the parents about the School District CIS systems and the Policies governing their use. This Policy contains restrictions on accessing inappropriate material. There is a wide range of material available on the Internet, some of which may not be fitting with the particular values of the families of the students. It is not practically possible for the School District to monitor and enforce a wide range of social values in student use of the Internet. Further, the School District recognizes that parents bear primary responsibility for transmitting their particular set of family values to their children. The School District will encourage parents to specify to their child(ren) what material is and is not acceptable for their child(ren) to access through the School’s District’s CIS system. Parents are responsible for monitoring their children’s use of the School District’s CIS systems when they are accessing the systems.
» Back to top
School District Limitation of Liability The School District makes no warranties of any kind, either expressed or implied, that the functions or the services provided by or through the School District’s CIS systems will be error-free or without defect. The School District does not warrant the effectiveness of Internet filtering. The electronic information available to users does not imply endorsement of the content by the School District nor is the School District responsible for the accuracy or quality of the information obtained through or stored on the CIS systems. The School District shall not be responsible for any damage users may suffer, including but not limited to, information that may be lost, damaged, delayed, misdelivered, or unavailable when using the computers, network, and electronic communications systems. The School District shall not be responsible for material that is retrieved through the Internet or the consequences that may result from them. The School District shall not be responsible for any unauthorized financial obligations, charges, or fees resulting from access to the School District’s CIS systems. In no event shall the School District be liable to the user for any damages, whether direct, indirect, special, or consequential, arising out the use of the CIS systems.
» Back to top
Prohibitions The use of the School District’s CIS systems for illegal, inappropriate, unacceptable, or unethical purposes by users is prohibited. Such activities engaged in by users are strictly prohibited and illustrated below. The School District reserves the right to determine if any activity not appearing in the list below constitutes an acceptable or unacceptable use of the CIS systems.
These prohibitions are in effect any time School District resources are accessed, whether on School District property, when using mobile commuting equipment, telecommunication facilities in unprotected areas or environments, directly from home, or indirectly through another ISP, and if relevant, when an employee or student uses their own equipment.
Students may possess their personal computers as defined by this Policy, but they must keep them out of sight and may not use them on School District premises and property (including but not limited to buses and other vehicles) or through connection to the School District CIS systems, unless expressed permission has been granted by a teacher or administrator, who will then assume the responsibility to supervise the student in its use, or unless an IEP team determines otherwise, in which case, an employee will supervise the student in its use. Thus, users are prohibited from using cell phones with or without Internet access and/or recording, and/or camera/video and other capabilities and configurations. Cameras and the like may not be used to take images of others, transfer them, or place them on web sites without the consent of Technology Manager. Students who are performing volunteer fire company, ambulance, or rescue squad functions or who need such a computer because of their medical condition or the medical condition of a member of the family, with notice and the approval of the school administrator, may qualify for an exemption of this prohibition.
» Back to top
- General Prohibitions
Users are prohibited from using School District CIS systems to:
- Communicate about non-work or non-school related communications.
- Send, receive, view, download, access, or transmit material that is harmful to minors, indecent, obscene, pornographic, child pornographic, and terroristic. Neither may users advocate the destruction of property.
- Send, receive, view, download, access, or transmit inappropriate matter and material likely to be offensive or objectionable to recipients including but not limited to that which may be defamatory, inaccurate, obscene, sexually explicit, lewd, hateful, harassing, discriminatory (as it pertains to race, color, religion, national origin, gender, marital status, age, sexual orientation, political beliefs, receipt of financial aid, or disability), violent, vulgar, rude, inflammatory, threatening, profane, pornographic, offensive, terroristic, and/or illegal.
- Cyberbully another individual or entity.
- Access or transmit gambling pools for money, including but not limited to basketball and football, or any other betting or games of chance.
- Participate in discussion or news groups that cover inappropriate and/or objectionable topics or materials, including those that conform to the definition of inappropriate matter in this Policy.
- Send terroristic threats, hateful mail, harassing communications, discriminatory remarks, and offensive or inflammatory communications.
- Participate in unauthorized Internet Relay Chats, instant messaging communications, and Internet voice communications (on-line, real-time conversations) that are not for school-related purposes or required for employees to perform their job duties.
- Facilitate any illegal activity.
- Communicate through e-mail for non-educational purposes or activities. The use of e-mail to mass mail non-educational or non-work related information is expressly prohibited (for example, the use of the “everyone” distribution list, building level distribution lists, or other e-mail distributions lists to offer personal items for sale is prohibited).
- Engage in commercial, for-profit, or any business purposes (except where such activities are otherwise permitted or authorized under applicable School District Policies); conduct unauthorized fund raising or advertising on behalf of the School District and non-school School District organizations; resale of School District computer resources to individuals or organizations; or use the School District’s name in any unauthorized manner that would reflect negatively on the School District, its employees, or students. Commercial purposes is defined as offering or providing goods or services or purchasing goods or services for personal use. School District acquisition policies will be followed for School District purchase of goods or supplies through the School District system.
- Engage in political lobbying.
- Install, distribute, reproduce, or use copyrighted software on School District computers or copy School District software to unauthorized computer systems, intentionally infringing upon the intellectual property rights of others or violating a copyright.
- Install computer hardware, peripheral devices, network hardware, or system hardware. The authority to install hardware or devices on School District computers is restricted to the Technology Manager or designee.
- Encrypt messages using encryption software that is not authorized by the School District from any access point on School District equipment or School District property. Users must use School District approved encryption to protect the confidentiality of sensitive or critical information in the School District’s approved manner.
- Access, interfere, possess, or distribute confidential or private information without permission of the School District’s administration. An example includes accessing other students’ accounts to obtain their grades.
- Violate the privacy or security of electronic information.
- Send any School District information to another party, except in the ordinary course of business as necessary or appropriate for the advancement of the School District’s business or educational interest.
- Send unsolicited commercial electronic mail messages, also known as spam.
- Post personal or professional web pages without administrative approval.
- Post anonymous messages.
- Use the name of the “Kennett Consolidated School District” in any form in web blogs, on School District Internet pages or websites not owned or related to the School District, or in forums/discussion boards to express or imply the position of the Kennett Consolidated School District without the expressed, written permission of the Superintendent. When such permission is granted, the posting must state that the statement does not represent the position of the School District.
- Bypass or attempt to bypass Internet filtering software by any method including but not limited to the use of anonymizers/proxies or any websites that mask the content the user is accessing or attempting to access.
- Advocate illegal drug use, whether expressed or through a latent pro-drug message. This does not include a restriction on political or social commentary on issues, such as the wisdom on the war on drugs or medicinal use.
- Attempt to or obtain personal information under false pretenses with the intent to defraud another person.
- Access and Security Prohibitions
Users must immediately notify the Technology Manager and/or designee if they have identified a possible security problem. Users must read, understand, provide signed acknowledgement form(s), and comply with this Policy that includes network, Internet usage, electronic communications, telecommunications, non-disclosure, and physical and information security policies. The following activities related to access to the School District’s CIS systems, and information are prohibited:
- Misrepresentation (including forgery) of the identity of a sender or source of communication.
- Acquiring or attempting to acquire passwords of another. Users will be held responsible for the result of any misuse of users’ names or passwords while the users’ systems access were left unattended and accessible to others, whether intentional or through negligence.
- Using or attempting to use computer accounts of others. These actions are illegal, even with consent or if only for the purpose of "browsing."
- Altering a communication originally received from another person or computer with the intent to deceive.
- Using School District resources to engage in any illegal act which may threaten the health, safety, or welfare of any person or persons, such as arranging for a drug sale or the purchase of alcohol, engaging in criminal activity, or being involved in a terroristic threat against any person or property.
- Disabling or circumventing any School District security program or device, for example but not limited to anti-spyware, anti-spam software, and virus protection software or procedures.
- Transmitting electronic communica¬tions anonymously or under an alias unless authorized by the School District.
- Users must protect and secure all electronic resources and information, data, and records of the School District from theft and inadvertent disclosure to unauthorized individuals or entities when they are under the supervision and control of the School District and when they are not under the supervision and control of the School District, for example but not limited to working at home, on vacation, or elsewhere. If any user becomes aware of the release of School District information, data, or records, the release must be sent to the Technology Manager immediately. See the Board’s Data Breach Policy No. 817 for further information.
- Operational Prohibitions
The following operational activities and behaviors are prohibited:
- Interference with or disruption of the CIS systems, network accounts, services, or equipment of others, including but not limited to, the propagation of computer "worms" and "viruses", Trojan Horse, and trapdoor program code, the sending of electronic chain mail, distasteful jokes, and the inappropriate sending of "broadcast" messages to large numbers of individuals or hosts. The user may not hack or crack the network or others’ computers, whether by parasiteware or spyware designed to steal information or viruses and worms or other hardware or software designed to damage the CIS systems or any component of the network, or strip or harvest information, or completely take over a person’s computer, or to "look around".
- Altering or attempting to alter files, system security software or the systems without authorization.
- Unauthorized scanning of the CIS systems for security vulnerabilities.
- Attempting to alter any School District computing or networking components (including but not limited to fileservers, bridges, routers, or hubs) without authorization or beyond one’s level of authorization.
- Unauthorized wiring, including attempts to create unauthorized network connections, or any unauthorized extension or re-transmission of any computer, electronic communications systems, or network services, whether wired, wireless, cable, or by other means.
- Connecting unauthorized hardware and devices to the CIS systems.
- Loading, downloading, or using unauthorized games, programs, files, or other electronic media, including but not limited to downloading music files.
- Intentionally damaging or destroying the integrity of the School District’s electronic information.
- Intentionally destroying the School District’s computer hardware or software.
- Intentionally disrupting the use of the CIS systems.
- Damaging the School District’s CIS systems’ networking equipment through the users’ negligence or deliberate act.
- Failing to comply with requests from appropriate teachers or School District administrators to discontinue activities that threaten the operation or integrity of the CIS systems.
Content Regulations Information electronically published on the School District’s CIS system shall be subject to the following regulations:
» Back to top
- Published documents, including but not limited to audio and video clips or conferences, may not include a student’s phone number, street address, or box number, name (other than first name), or the names of other family members without parental consent.
- Documents, web pages, electronic communications, or videoconferences may not include personally identifiable information that indicates the physical location of a student at a given time without parental consent.
- Documents, web pages, electronic communications, or videoconferences may not contain objectionable materials or point directly or indirectly to objectionable materials.
- Documents, web pages, and electronic communications must conform to all School District Policies and guidelines, including copyright laws.
- Documents to be published on the Internet must be edited and approved according to School District procedures before publication.
» Back to top
- The School District will cooperate with the School District’s ISP rules, local, state, and federal officials to the extent legally required in investigations concerning or relating to any illegal activities conducted through the School District’s CIS systems.
- If students or employees possess due process rights for discipline resulting from the violation of this Policy, they will be provided such rights.
- The School District may terminate the account privileges by providing notice to the user.
Search and Seizure
» Back to top
- Users’ violations of this Policy, any other School District Policy, or the law may be discovered by routine maintenance and monitoring of the School District system, or any method stated in this Policy, or pursuant to any legal means.
- The School District reserves the right to monitor, track, log, and access any electronic communications including but not limited to Internet access and e-mails at any time for any reason. Users should not have the expectation of privacy in their use of the School District’s CIS systems and other School District technology, even if they use the CIS system for personal reasons. Further, the School District reserves the legal right, but not the obligation, to access any personal technology device of students and employees brought onto the School District’s property or to School District events, or connected to the School District network, containing School District programs or School District or student data (including images, files, and other information) to insure compliance with this Policy and other School District Policies, to protect the School District’s resources, and to obtain information/data that the School District reasonably believes involves criminal activity.
- Everything that users place in their personal files should be written as if a third party will review it.
Copyright Infringement and Plagiarism
» Back to top
- Federal laws, cases, and regulations pertaining to copyright will govern the use of material accessed through the School District resources. Users will make a standard practice of requesting permission from the holder of the work and complying with license agreements. Employees will instruct users to respect copyrights, request permission when appropriate, and comply with license agreements. Employees will respect and comply as well.
- Violations of copyright law can be a felony, and the law allows a court to hold individuals personally responsible for infringing the law. The School District does not permit illegal acts pertaining to the copyright law. Therefore, any user violating the copyright law does so at his/her own risk and assumes all liability.
- Violations of copyright law include but are not limited to the making of unauthorized copies of any copyrighted material (such as commercial software, text, graphic images, audio and video recording), distributing copyrighted materials over computer networks, and deep-linking and framing into the content of others’ web sites. Further, the illegal installation of copyrighted software or files for use on the School District’s computers is expressly prohibited. This includes all forms of licensed software – shrink-wrap, clickwrap, browsewrap, and electronic software downloaded from the Internet.
- School District guidelines on plagiarism will govern use of material accessed through the School District’s CIS systems. Users will not plagiarize works that they find. Teachers will instruct students in appropriate research and citation practices.
Selection of Material
» Back to top
- School District Policies on the selection of materials will govern use of the School District’s CIS systems.
- When using the Internet for class activities, teachers will select material that is appropriate in light of the age of the students and that is relevant to the course objectives. Teachers will preview the materials and web sites they require or recommend students access to determine the appropriateness of the material contained on or accessed through the web site. Teachers will provide guidelines and lists of resources to assist their students in channeling their research activities effectively and properly. Teachers will assist their students in developing the critical thinking skills necessary to ascertain the truthfulness of information, distinguish fact from opinion, and engage in discussions about controversial issues while demonstrating tolerance and respect for those who hold divergent views.
School District Web Site The School District will establish and maintain a Web Site and will develop and modify its Web pages that will present information about the School District under the direction of the Technology Manager and/or designee. Publishers must comply with this Policy and the Board’s Policies.
» Back to top
» Back to top
- If an employee, student, or guest creates a blog with their own resources, the employee, student, or guest may not violate the privacy rights of employees and students; may not use School District personal and private information/data, images, and copyrighted material in their blog; and may not disrupt the School District.
- Conduct otherwise will result in actions further described in Section 13 of this Policy and provided in relevant School District Policies.
Safety and Privacy
» Back to top
- To the extent legally required, users of the School District’s CIS systems will be protected from harassment or commercially unsolicited electronic communication. Any user who receives threatening or unwelcome communications must immediately send or take them to the Technology Manager and/or designee.
- Users will not post personal contact information about themselves or other people on the CIS systems. The user may not steal another’s identity in any way; may not use spyware, cookies; and may not use School District or personnel technology or resources in any way to invade one’s privacy. Additionally, the user may not disclose, use, or disseminate confidential and personal information about students or employees (examples include but are not limited to using a PDA, iPod, MP3; cell phone with camera/video and Internet access to take pictures of anything including but not limited to persons, places, and documents relevant to the School District, saving, storing, and sending the image with or without text, or disclosing them by any means, including but not limited to print and electronic matter; revealing student grades, social security numbers, home addresses, telephone numbers, school addresses, work addresses, credit card numbers, health and financial information, evaluations, psychological reports, educational records, reports, and resumes or other information relevant to seeking employment at the School District unless legitimately authorized to do so).
- Student users will agree not to meet with someone they have met online unless they have parental consent.
Consequences for Inappropriate, Unauthorized, and Illegal Use
» Back to top
- General rules for behavior, ethics, and communications apply when using the CIS systems and information, in addition to the stipulations of this Policy. Users must be aware that violations of this Policy or other Policies or for unlawful use of the CIS systems may result in loss of CIS access and a variety of other disciplinary actions including but not limited to warnings, usage restrictions, loss of privileges, position reassignment, oral or written reprimands, suspensions (with or without pay for employees), dismissals, expulsions, and/or legal proceedings on a case-by-case basis. This Policy incorporates all other relevant School District Policies such as but not limited to the student and professional employee discipline policies, copyright policy, property policy, curriculum policies, terroristic threat policy, and harassment policies.
- The user is responsible for damages to the network, equipment, electronic communications systems, and software resulting from deliberate and willful acts. The user will also be responsible for incidental or unintended damage resulting from willful or deliberate violations of this Policy.
- Violations as described in this Policy may be reported to the School District and to appropriate legal authorities, whether the ISP, local, state, or federal law enforcement. The School District will cooperate to the extent legally required with authorities in all such investigations.
- Vandalism will result in cancellation of access to the School District’s CIS systems and resources and is subject to discipline.
Downloadable CIS Acknowledgment and Consent Forms
» Back to top
Original Adoption – February 10, 1997
Revised and Adopted – October 8, 2001