Avengers School District


Introduction (JB)

  • The Acceptable Use Policy had been designed to help employees, students, and people of the community understand their individual responsibilities when using our school districts Communications Network. This includes, but are not limited to, the computer network (local and wide area), the phone system, servers, computers and related hardware, email access, and internet access.
  • The Principal, IT Coordinator, and any assistant Principals are responsible for upholding this AUP and recieving and responding to any complaints or violations.
  • ALL faculty and staff are REQUIRED to report any violations of this policy to the IT Coordinator.
  • The Principal and IT Coordinator have sovereignty in determining punishments for a break of the AUP

Purpose (JB)

  • Our school district had created at network for instructional use. All files and programs are the property of our school district. Our network is open to all students, staff, and members of the community. The right to use our network can be taken away; remember the use of the internet is a privilege, not a right.

CIPA and Internet Security Provisions (KS)


In accordance with the Children’s Internet Protection Act (CIPA), the district will use a firewall system to block inappropriate access and limit use only to those areas that are age appropriate and of educational value. The district will incorporate content filtering software to prevent access to inappropriate material on the Internet. However, the district shall
not be held responsible when a student knowingly or willingly accesses inappropriate material or communicates or shares such materials with others. (Peters Township SD)

The Superintendent or designee shall be responsible for recommending technology and developing procedures used to determine whether the district’s computers are being used for purposes prohibited by law or for accessing sexually explicit materials.
The procedures shall include but not limited to:
1. Utilizing a technology protection measure that blocks or filters Internet access for minors and adults to certain visual depictions that are obscene, child pornography, harmful to minors with respect to use by minors, or determined inappropriate for use by minors by the Board.
2. Maintaining and securing a usage log.
3. Monitoring online activities of minors. (Central Greene SD)

It is the district's goal to protect users of the network from harassment and unwanted or unsolicited electronic communications. Any network user who receives threatening or unwelcome electronic communications or inadvertently visits or accesses an inappropriate site shall report such immediately to a teacher or administrator. Network users shall not reveal personal information to other users on the network, including in chat rooms, e-mail, social networking web sites, etc.
Internet Safety measures shall effectively address the following:
1. Control of access by minors to inappropriate matter on the Internet and World Wide Web.
2. Safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications.
3. Prevention of unauthorized online access of minors, including "hacking" and other unlawful activities.
4. Unauthorized disclosure, use, and dissemination of personal information regarding minors.
5. Restrictions of minors' access to materials harmful to them.
(Central Greene SD)

The Superintendent or designee shall develop and implement administrative regulations that ensure students are educated on network etiquette and other appropriate online behavior, including;
1. Interactions with other individuals on social networking web sites and in chat rooms.
2. Cyberbullying awareness and response.

Security (EW)


System security is protected through the use of passwords. Failure to adequately protect or update passwords could result in unauthorized access to personal or district files. To protect the integrity of the system, the following guidelines shall be followed:
  1. Employees and students shall not reveal their passwords to another individual.
  2. Passwords shall be at least eight characters in length and contain at least one numeric and special character. Passwords shall also be changed every thirty days.
  3. Users are not to use a computer that has been logged in under another student’s or employee’s name.
  4. Any user identified as a security risk or having a history of problems with other computer systems may be denied access to the network

Lists and Definitions of Technologies (EW, KS)

Child Pornography - is defined under Federal Law 18 U.S.C section 2256 and State Law 18 Pa. C.S.A Section 6312 (KS)

CIPA - Children's Internet Protection Act is a Federal law passed by Congress in 2001. The law seeks to address concerns about children accessing offensive content via the Internet on school or public library computers. The law requires schools and public libraries who receive E-Rate funding to have an Internet Safety Policy in place that includes technology protection measures such as content filtering software. Schools and libraries must also implement a policy for monitoring the online activities of minors using the computers. (FCC - CIPA) (KS)

Computers—any and all computers, computer equipment, systems, hardware and/or software owned, leased or operated by the School District. (Pittsburgh Public Schools) (KS)

Direct electronic communications—any and all communications made or disseminated by electronic means, including but not limited to electronic mail, chat rooms or other forms of direct electronic communications. (Pittsburgh Public Schools) (KS)

Electronic devices shall include all devices that can take photographs; record audio or video data; store, transmit or receive verbal, written or recorded messages or images; or which provide a wireless, unfiltered connection to the Internet. Examples of these electronic devices include, but shall not be limited to, radios; walkmans; CD players; iPods; MP3 and other digital music players; DVD players; handheld game consoles; pagers; beepers; digital picture/video cameras; Personal Digital Assistants (PDAs); cellular telephones; smart phones, BlackBerries and other mobile handheld devices that include data service (including wireless internet and e-mail) and voice/phone capabilities; laptop computers; iPads, netbooks; and any other new technology developed with similar capabilities to any of the foregoing. (Pine Richland SD) (EW)

Fair Use Guidelines—guidelines developed by the Working Group on Intellectual Property to clarify the application of fair use principles for educators considering digital copyright issues. (Pittsburgh Public Schools) (KS)

Hacking—the act of accessing or attempting to access targeted network resources, either internal or external, for the purpose of gathering/acquiring non-privileged access and/or information, passwords, functionality, identity theft or distribution of unsolicited scripts and/or viruses. (Pittsburgh Public Schools) (KS)

Harmful to Minors - is defined under Federal Laws 20 U.S.C. section 6777 and 47 U.S.C. Section 254 and State Law 18 Pa. C.S.A. Section 5903 (KS)

Obscene - any material or performance, if:

1. The average person applying contemporary community standards would find that the subject matter taken as a whole appeals to the prurient interest;

2. The subject matter depicts or describes in a patently offensive way, sexual conduct described in the law to be obscene; and

3. The subject matter, taken as a whole, lacks serious literacy, artistic, political, educational or scientific value. (Central Greene SD) (KS)

And is further defined under State Law 18 Pa. C.S.A. Section 5903

Technology Protection Measure - a specific technology that blocks or filters Internet access to visual depictions that are obscene, child pornography, or harmful to minors. (Central Greene SD) (KS)

Vandalism—any malicious attempt to harm or destroy the District’s computers, data, applications, and/or network functionality or the data and/or functionality of another user’s computer. This includes but is not limited to the uploading or creation of computer viruses. (Pittsburgh Public Schools) (KS)

Types of Users (EW)

  • All students, district employees, and third party persons who use district technologies shall be required to comply to the Technology AUP at all times.

District Disclaimer (EW)


The School District issued accounts are not private and the District retains the right to review, audit, intercept, access and disclose all messages created, received, or sent over the District’s Network.The School District reserves the right to deny, revoke or suspend specific user privileges and/or to take other disciplinary action for violations of these Guidelines. The District will advise appropriate law enforcement agencies of illegal activities conducted through the School District’s Network. The District also will cooperate fully with local, state, and/or federal officials in any investigation related to any illegal activities conducted through the service. The District has taken all precautions to maintain safety of all users and these guidelines are written and enforced in the interest of all users’ safety and effective use of the Internet.The school district is not, and cannot be, held responsible for the actions of the users or the information they access or for the loss of material, accidental corruption or any other action that might affect transmission or loss of data.

Prohibited Behavior and Copyright (JB)


Students, employees and community member users are prohibited from using district technologies for purposes prohibited by law or for accessing, storing or transmitting information or material that is not work or school-related, or which is otherwise inappropriate in a public school setting. Examples of prohibited activities include, but are not limited to, the following:
  • Conducting or facilitating illegal activity.
  • Conducting personal business or other activities for personal monetary gain or commercial enterprise.
  • Product advertisement or political lobbying or campaigning.
  • Accessing, downloading, storing or transmitting any data, including images, which others would consider offensive in any way. The foregoing includes but is not limited to information or data that is sexually explicit, obscene, pornographic, hateful, derogatory, defamatory.
  • Engaging in the unauthorized or illegal installation, distribution, reproduction, or use of copyrighted materials or infringing in any way on another party’s trademark or intellectual property rights.
  • Publishing, transmitting or posting communications (including through use of emails, Internet message boards, chat rooms, web postings and similar forums) that contain obscene language or profanity, or language that is otherwise inappropriate in a public school setting.
  • Disclosing confidential information of students or employees without legal authorization or consent.
  • Intentionally obtaining or modifying files, passwords, and data belonging to other users.
  • Impersonating another user, or using anonymity and/or pseudonyms.
  • Downloading, loading or using unauthorized games, music media (MP3) files, programs, data files, or other electronic media.
  • Disrupting the work of other users.
  • Destroying, modifying, or accessing without authorization district hardware, software, networks and files.
  • Quoting personal communications in a public forum without the original author's prior consent.
  • Access by students and minors to material that is harmful to minors or is determined inappropriate to minors in accordance with Board policy.
  • Downloading any application software from the Internet without prior approval of the Technology Department.
  • Subscribing to servers, bulletin boards, online services and other web-based services without prior approval of the Technology Department.
  • Uploading, creating or otherwise utilizing programs, viruses or other technologies that harass or “spam” other users or which infiltrate, hack into, vandalize or damage other user accounts, computer systems or district technologies, or which are designed or intended to accomplish such a purpose.
  • Conducting or engaging in gambling activities.
  • Accessing personal e-mail accounts.

Consequences (KS)


The Avengers School District user shall be responsible for vandalism and/or damages, including lost/extended resource time of Technology staff or outside contractors, affecting the equipment, systems, software and functionality resulting from deliberate or willful acts.

Illegal use of the network; intentional deletion/manipulation or damage to files or data belonging to others; copyright violations or theft of services and/or identity will be reported to the appropriate legal authorities for possible prosecution. (Pittsburgh Public Schools)

The district will cooperate fully with local, state or federal officials in any investigation related to any illegal activities conducted through the district's computer system or technologies. Students, employees and third parties who are granted permission to use personal technology devices (e.g., laptops, wireless networks) while on school property or in connection with school activities will be required to comply with the requirements of this policy while engaged in such activities and/or while on school property. (Pine Richland SD)

General rules for behavior and communications apply when using District computers, network hardware/software resources and/or the Internet, in addition to the stipulations of this policy. Loss of access and other disciplinary and/or legal actions shall be consequences for inappropriate use. (Pittsburgh Public Schools)

Vandalism will result in cancellation of access privileges, disciplinary action and/or legal proceedings. Vandalism is defined as any malicious attempt to harm or destroy data of another user, Internet or other networks; this includes but is not limited to uploading or creating computer viruses.

Failure to comply with this policy or inappropriate use of the Internet, district network or computers shall result in usage restrictions, loss of access privileges, disciplinary action, and/or legal proceedings. (Central Greene SD)

Acknowledgement (JB)


I acknowledge that I have received a copy of the School Board's Acceptable Use Policy. I understand the terms of the guidelines and agree to abide by them. I realize that the school board's security software may record and store for management use the electronic email messages I send and receive, the electronic communication systems address of any site that I visit, and any network activity in which I transmit or receive any kind of file. I understand that any violation of the guidelines could lead to my dismissal from employment and/or
criminal prosecution.

Student Print Name

STUDENT PRINT NAME HERE
Student Signature

STUDENT SIGNATURE HERE

Parent Print Name

PARENT PRINT NAME HERE

Parent Signature

PARENT SIGNATURE HERE

Date

DATE HERE





Sources:

Propel Charter Schools (Pittsburgh, Pa)

http://www.psba.org/districts_policies/p/480/POLPINE237.pdf#search=237- (Pine Richland SD, Gibsonia, Pa)


http://www.psba.org/districts_policies/p/480/POLPINE815.pdf#search=815- (Pine Richland SD, Gibsonia, Pa)


http://www.psba.org/districts_policies/p/480/POLPINE815_1.pdf#search=815- (Pine Richland SD, Gibsonia, Pa)


http://www.psba.org/districts_policies/p/480/POLPINE248.pdf#search=248 - (Pine Richland SD, Gibsonia, Pa)

http://www.manatee.k12.fl.us/sites/library_resources/Handbook/AcceptableUseGuidelines.pdf - (Manatee County SD, Bradenton, Fl)

Central Greene SD Acceptable Use Policy (Waynesburg, Pa)

http://www.pps.k12.pa.us/143110127101929733/lib/143110127101929733/adopted_aup.pdf -(Pittsburgh Public Schools, Pittsburgh, Pa)

FCC - CIPA http://www.fcc.gov/guides/childrens-internet-protection-act

http://www.ptsd.k12.pa.us/Downloads/5114.7%20Accet.%20Use%20of%20Tech.%20Students.pdf - (Peters Township SD, McMurrary, Pa)