Internet resources must be related to an expressed educationaland/or administrative goal or objective.1. The use of the school’s Internet and computer network mustbe in support of educational goals, research, and classassignments and be consistent with the educationalobjectives of the school.2. Users must have a valid, authorized account to access thenetwork, and use only those computer resources that areauthorized. Accounts may be used only in accordance withauthorized purposes.3. Individual accounts may be used only by the owner of theaccount except where specifically authorized by the schooladministration. In the case of class accounts, all use must beunder the supervision of the sponsoring teacher/supervisor.4. The user is responsible for safeguarding the computeraccount. Users are expected to protect access to accounts byperiodically changing the password and keeping itconfidential. They must respect the privacy of others by nottampering with their files, passwords or accounts.Policy – Terms and ConditionsAcceptable UseUsers are to properly use school network resources foreducational and/or administrative purposes. Respectful andresponsible network etiquette and behavior should be in keepingwith the school’s mission statement. Students and staff areexpressly prohibited from accessing obscene, profane, vulgar, orpornographic sites or materials.Students are prohibited from sending or posting electronicmessages that are abusive, obscene, sexually oriented,threatening, harassing, damaging to another’s reputation orillegal. This prohibition applies to conduct off school property if itresults in a substantial disruption to the educational environment.Any person taking, disseminating, transferring or sharing obscene,sexually oriented, lewd or otherwise illegal images or othercontent will be disciplined according to the Student Code ofConduct and may, in certain circumstances, be reported to lawenforcement.Monitored UseElectronic mail transmissions and other use of the electroniccommunications system by students and employees shall not beconsidered confidential and may be monitored at any time bydesignated school staff to ensure appropriate use for educationalor administrative purposes. Forgery or attempted forgery ofelectronic mail messages is prohibited. Only the school’sauthorized IT Manager may read, delete, copy or modify theelectronic mail of other system users.VandalismVandalism is defined as any malicious attempt to harm, disrupt ordestroy data of another user of the school’s network or any otheragencies or networks that are connected to the Internet. Thisincludes, but is not limited to, the uploading or creating ofcomputer viruses. Any of these actions may be viewed asviolations of school policy, administrative regulations and,possibly, as criminal activity under applicable state and federallaws. Users must respect the privacy of other users, and will notintentionally seek information on, obtain copies of, or modify anyfile, data, or password belonging to another user, or representthemselves as another user unless explicitly authorized.Deliberate attempts to degrade or disrupt system performanceand/or degrade, disrupt or bypass system security are violationsof school policy and administrative regulations, and mayconstitute criminal activity under applicable laws.Any prohibited behavior under this policy will result in thecancellation of technology privileges. The school will, inaccordance with school policy, cooperate with local, state, orfederal officials in any investigation concerning or relating tomisuse of the school’s network.Network EtiquetteEach network user is expected to:1. Be polite (i.e., an all-caps message implies shouting);2. Use appropriate language;3. Refrain from any activity that may be considered “cyberbullying,” including but not limited to threats of violence,extortion, obscene or harassing messages, harassment,stalking, child pornography, and sexual exploitation;4. Maintain confidentiality of the user, colleagues, and students;5. Respect copyright laws; and6. Be respectful in all aspects of network use.ConsequencesViolation of the school’s policies and procedures concerning useof the computer on the network will result in the same disciplinaryactions that would result from similar violations in other areas ofschool policy, including the Student Code of Conduct. Any or all ofthe following consequences may be enforced if a student violatesthe terms of this policy:1. Loss of computer privileges/Internet access, with length oftime to be determined by campus administration.2. Any campus-based disciplinary consequence, includingsuspension, as deemed appropriate by the administration.3. Suspension may be considered for flagrant violations orviolations that corrupt the educational value of the computersor the Internet.4. Expulsion may be considered in instances where studentshave used the school’s Internet access to engage in conductthat constitutes felony criminal mischief, and/or have78 | Revised in July 2019
deliberately attempted to bypass installed security softwareor copy/modify another student’s work files.79 | Revised in July 2019