Acceptable+Use+Policy+draft

Jay School Department provides computers, networks and Internet access to support the educational mission of the schools and to enhance the curriculum and learning opportunities for students and school staff. Employees are to utilize the school district’s computers, networks and Internet services for school-related purposes and performance of job duties. Incidental personal use of school computers is permitted as long as such use does not interfere with the employee’s job duties and performance, with system operations or other system users. "Incidental personal use" is defined as use by an individual employee for occasional personal communications. Employees are reminded that such personal use must comply with this policy and all other applicable policies, procedures and rules. Any employee who violates this policy and/or any rules governing use of the school district’s computers will be subject to disciplinary action, up to and including discharge. Illegal uses of the school district’s computers will also result in referral to law enforcement authorities. All Jay School Department computers remain under the control, custody and supervision of the school district. The school district reserves the right to monitor all computer and Internet activity by employees. Employees should have no expectation of privacy in their use of school computers. Each employee authorized to access the school district’s computers, networks and Internet services is required to sign an acknowledgment form (GCSA-E) stating that they have read this policy and the accompanying rules. The acknowledgment form will be retained in the employee’s personnel file. The superintendent shall be responsible for overseeing the implementation of this policy and the accompanying rules and for advising the board of the need for any future amendments or revisions to the policy/rules. The superintendent may develop additional administrative procedures/rules governing the day-to-day management and operations of the school district’s computer system as long as they are consistent with the board’s policy/rules. The superintendent may delegate specific responsibilities to building principals and others as he/she deems appropriate. Cross Reference: GCSA-R--Employee Computer and Internet Use Rules IJNDB--Student Computer and Internet Use IJNDB-R--Student Computer and Internet Use Rules
 * POLICY: ACCEPTABLE USE OF TECHNOLOGY  **

Acceptable Use Form for Jay School Department Staff:

**2007~ JAY SCHOOL D**** epartment ~ 2008** **STAFF ACKNOWLEDGEMENT FORM** I have read and understood the rules, procedures and policies written in this agenda. __Signature -__ __Date ---__ __     There is a PDF of this policy at: http://www.jay.k12.me.us:16080/jaylr/jaytech/jaystudentaup.pdf __ **Jay School Department** Student Computer and Internet Use Policy

Jay School Department provides computers, networks and internet access to support the educational mission of the school and to enhance the curriculum and learning opportunities for students and school staff. The Jay School Staff and Administration believes that the resources available through the Internet are of significant value in the learning process and preparing students for future success. At the same time, the unregulated availability of information and communication on the Internet require that schools establish reasonable controls for lawful, efficient and appropriate use of this technology.

Students use of school computers, networks and Internet services is a privilege, not a right. Students are required to comply with this policy and the accompanying rules. Students who violate the policy and/or rules may have their computer privileges revoked and may also be subject to further disciplinary and/or legal action.

All Jay School Department computers remain under the control, custody and supervision of the school unit. The school unit reserves the right to monitor all computer and Internet activity by students.

While reasonable precautions will be taken to supervise student use of the Internet, Jay School Staff cannot reasonably prevent all inappropriate uses, including access to objectionable materials and communication with persons outside of the school in violation of Jay School policies/procedures and rules. The school is not responsible for the accuracy or quality of information that students obtain through the Internet.

Students and parents shall be informed of this policy on an annual basis through handbooks and/or other means selected by the Administration.

Parents of students in Jay Middle School, who choose to deny their children access to school computers and/or the Internet, may initiate such a request by contacting school administration.

Student Computer and Internet Use Rules

These rules are intended to provide general guidelines and examples of prohibited computer and Internet uses, but do not attempt to state all required or prohibited activities by users. Failure to comply with this policy and these rules may result in the loss of computer and Internet privileges, and/or legal and disciplinary action.

A. Computer Use is a Privilege, NOT a Right.

Student use of the school’s computers, networks and Internet services is a privilege, not a right. Unacceptable use/activity may result in suspension or cancellation of privileges as well as additional disciplinary action and/or legal action.

The building principal shall have final authority to decide whether a student’s privileges will be denied or revoked.

B. Acceptable Use

Student access to the school’s computers, networks and Internet services are provided for educational purposes and research consistent with the school’s educational mission, curriculum and instructional goals.

The same rules and expectations govern student use of computers as apply to other student conduct and communication.

Students are further expected to comply with these rules and all specific instructions from the teacher or other supervising staff member/ volunteer when accessing the school’s computers, networks and Internet services.

C. Prohibited Use

The user is responsible for his/her actions and activities involving school computers, networks and Internet services, and for his/her computer files, passwords and accounts. Examples of unacceptable uses that are expressly prohibited include, but are not limited to, the following:


 * 1) Accessing Inappropriate Materials-Accessing, submitting, posting, publishing, forwarding, downloading, scanning or displaying materials that are defamatory, abusive, obscene, vulgar, sexually explicit, sexually suggestive, threatening, discriminatory, harassing and/or illegal.
 * 2) Illegal Activities-Using the school’s computers, networks and Internet services for any illegal activity or that violates other policies, procedures and/or school rules.
 * 3) Violating Copyrights-Copying or downloading copyrighted material without the owner’s permission.
 * 4) Plagiarism-Representing as ones own work any material obtained on the Internet (such as term papers, articles, etc.) When Internet sources are used in student work, the author, publisher and Web site must be identified.
 * 5) Copying Software-Copying or downloading software without the express authorization of the system administrator.
 * 6) Non-School Related Uses-Using the school’s computers, networks and Internet services for non-school-related purposes such as private financial gain; commercial, advertising or solicitation purposes.
 * 7) Misuse of Passwords/Unauthorized Access-Sharing passwords, using other students’ passwords and/or accessing other user accounts;
 * 8) Malicious Use/Vandalism-Any malicious use, disruption or harm to the school’s computers, networks and Internet services, including but not limited to hacking activities and creation/uploading of computer viruses.
 * 9) Unauthorized access to Chat Rooms/News Groups- Accessing chat rooms or news groups without specific authorization from the supervising teacher.

D. No Expectation of Privacy

The school retains control, custody, and supervision of all computers, networks and Internet services owned or leased or on loan to Jay Middle School. The school reserves the right to monitor all computer and Internet activity by students. Students have no expectation of privacy in their use of school computers, including email and stored files.

E. Compensation for Losses, Costs and/or Damages

The student and/or the student’s parent/guardian shall be responsible for compensating the school/state for any losses, costs or damages incurred by the school related to the violations of this policy and/or these rules, including investigation of violations.

F. School Assumes No Responsibility for Unauthorized Charges, Costs, or Illegal Use

The School Department assumes no responsibility for any unauthorized charges made by students, including but not limited to credit card charges, long distance telephone charges, equipment and line costs, or for any illegal use of its computers such as copyright violations.

G. Student Security

A student shall not reveal his/her full name, address or telephone number on the Internet without prior permission from a supervising teacher. Students should never meet people they have contacted through the Internet without parental permission and supervision. Students should inform their supervising teacher if they access information or messages that are dangerous, inappropriate or make them feel uncomfortable in any way.

H. System Security

The security of the school’s computers, networks and Internet services is a high priority. Any user who identifies a security problem must notify a school administrator.

- There is a PDF of this form at: http://www.jay.k12.me.us:16080/jaylr/jaytech/aupformjay.08.pdf ** ACCEPTABLE USE FOR STUDENTS: ADMINISTRATIVE PROCEDURES ** The Jay School Department, in order to implement the Committee s Student internet/E-mail and Appropriate Use Policy, will enforce the following administrative procedures. Although some specific examples of prohibited use by students are stated, these administrative procedures do not attempt to state all required or proscribed behavior. Failure to comply with this policy administrative procedure shall be deemed grounds for revocation of privileges, potential disciplinary and/or appropriate legal action. Terms and Conditions Access to the school s Internet/E-mail is provided for educational purposes and research consistent with the school unit s educational mission and goals. Parents shall be required to sign the Internet/E-mail Network Access Agreement form should they request their child **NOT** __have Internet/E-mail access. Forms may be obtained through the middle school office. Student s may be granted an account for up to one academic year at a time. Students will receive account numbers and passwords, which should be changed frequently. The use of the school unit’s Internet/E-mail is a privilege, not a right. Inappropriate use may result in the cancellation of those privileges. The superintendent, principals and their designees shall make all decisions regarding whether or not a user has violated these procedures and may deny, revoke, or suspend access at any time. The user is responsible for all his/her actions and activities involving the network. Examples of prohibited conduct include but are not limited to the following: A. Accessing/Sending or Posting materials or communications that are: Damaging to an other’s reputation, abusive, obscene, sexually oriented, threatening, and contrary to the school s policy on harassment, harassing or illegal; B. Using the network for illegal activity, including violation of copyrights or other contracts or transmitting any material in violation of United States and State regulations; C. Copying or downloading copyrighted material on any system connected to the school unit s system without the owner s permission. Only the owner(s) or individuals the owner specifically authorizes may copy or download copyrighted material to the system; D. Copying or downloading copy righted material for the student s own use without the owner s permission. Students may redistribute copyrighted programs only with the owner s permission. Such permission must be specified in the document or must be obtained directly from the owner in accordance with applicable copyright laws, Committee policy and administrative procedures; E. Failing to comply with resource quotas or disk usage quotas (memory) as set by the superintendent, principals, and their designees. A user who remains in non-compliance of disk space quotas may have their file removed by the superintendent, principal and their designees. Subscriptions may be accessed by permission only; F. Using the network for private financial, commercial gain, or any purchase; G. Wastefully using resources; H. Utilizing any software having the purpose of damaging the school unit s system or other user s system; I. Gaining unauthorized access to resources or entities; J. Invading the privacy of individuals K. Using another user s account or password; L. Posting material authorized or created by another without his/her consent; M. Posting anonymous messages; N. Using the network for commercial or private advertising; O. Forging of electronic mail messages; P. Attempting to read, delete, copy or modify the electronic mail of other system users and deliberately interfering with the ability of other system users to send/receive electronic mail; Q. Using the network while access privileges are suspended or revoked; and R. Using the network in a fashion inconsistent with directions from teachers and other staff and generally accepted network etiquette(seeIJNDB-E2) IV STAFF SUPERVISION Staff members should become familiar with this procedure and should enforce the rules concerning appropriate use when their duties include supervision of students using the Internet/E-mail. When in the course of their duties staff members become aware of student violation of this policy, they should correct the student and address the matter in accordance with this procedure and the Jay School Department general disciplinary policies and procedures. V.COMPENSATION The student and/or the student s parent(s)/legal guardian(s) shall be responsible for compensating the school unit for any losses, costs, or damages incurred by the school unit relating to or arising out of any student violation of these procedures. VI. SECURITY Network security is a high priority. If the student identifies or perceives a security problem or a breech of these responsibilities on the Internet/E-mail, the user must immediately notify the principal or his/her designee. The student must not demonstrate the problem or other student users. User accounts and passwords are to be kept confidential. Any student identified as a security risk may be denied access to the network. VII. VANDALISM Vandalism will result in cancellation of privileges and other disciplinary action. Vandalism is defined as any malicious attempt to harm or destroy the school unit s equipment or materials, data of another student, the Internet/E-mail, network, or agency. This includes but is not limited to the uploading or creation of computer viruses. VIII. TELEPHONE CHARGES The Jay School Department assumes no responsibility for any unauthorized charges or fees including but not limited to long distance charges, per minute surcharges and/or equipment or line costs. __
 * 1. ACCEPTABLE USE **
 * II. PRIVILEGES **
 * III. UNACCEPTABLE USE **

**2007~ JAY SCHOOL D**** epartment ~ 2008** **PARENT/GUARDIAN/ AND STUDENT ACKNOWLEDGEMENT FORM** I have read and understood the rules, procedures and policies written in this agenda. Student Signature_ Date Parent/Guardian ___ Signature Date_ ** *Students are to remove this page and return to the middle school office. **