ROSE TREE MEDIA SCHOOL DISTRICT

advertisement
No. 815
ROSE TREE MEDIA
SCHOOL DISTRICT
SECTION:
OPERATIONS
TITLE:
ACCEPTABLE USE OF RTM
NETWORK RESOURCES
ADOPTED:
February 28, 2002
REVISED:
December 21, 2006
815. ACCEPTABLE USE OF RTM NETWORK RESOURCES
1. Purpose
The Board of School Directors supports the use of the Internet and other computer
networks in the district's instructional program in order to facilitate learning and
teaching through interpersonal communications, access to information, research and
collaboration.
This policy applies to students, staff, and others using district technology.
The use of network facilities and the Internet shall be consistent with the curriculum
adopted by the school district as well as the varied instructional needs, learning
styles, abilities, and developmental levels of students.
2. Authority
The electronic information available to students and staff from various sources does
not imply endorsement of the content by the school district, nor does the district
guarantee the accuracy of information received on the Internet. The district shall not
be responsible for any information that may be lost, damaged or unavailable when
using the network or for any information that is retrieved via the Internet.
The school district shall not be responsible for any unauthorized charges or fees
resulting from access to the Internet.
The district reserves the right to monitor and log network use and to monitor
fileserver space utilization by district users, while respecting the privacy rights of
both district users and outside users; however, all data stored or transmitted on the
RTM network can and may be reviewed, if necessary.
The RTM Board establishes that use of the Internet and the network facilities is a
privilege, not a right; inappropriate, unauthorized and illegal use will result in the
cancellation of those privileges. Appropriate disciplinary action may be taken in
accordance with established discipline policies and procedures.
Page 1 of 8
815. ACCEPTABLE USE OF RTM NETWORK RESOURCES - Pg. 2
3. Delegation of
Responsibility
The district shall make every effort to ensure that this educational resource is used
responsibly by students and staff. The district reserves the right to utilize electronic
devices and other media to determine that users are in compliance with this policy.
Administrators, teachers and staff have a professional responsibility to work together
to help students develop the information literacy skills necessary to discriminate
among information sources, to identify information appropriate to their age and
developmental levels, and to evaluate and use the information to meet their
educational goals. Administrators, teachers, librarians and other staff will collaborate
to ensure that students develop the information literacy skills necessary to identify
when they need information, and to locate, evaluate and effectively use the
information to answer questions, solve problems and make decisions.
Students and staff have the responsibility to learn the rules and guidelines for the use
of computers, computer facilities, computer networks, and computer resources and
to abide by them.
The building and/or department administrator or the district Superintendent, with the
Technology Department, shall have the authority to determine what constitutes
inappropriate use.
This policy will be disseminated to all students and staff via the web site, the student
handbook, and the staff handbook.
Students will receive Internet safety instruction; including all rules and guidelines
for the use of computers, computer facilities, computer networks, and computer
resources.
Employees will be responsible for safeguarding passwords and held accountable for
the unauthorized or negligent disclosure of this information.
4. Definitions
47 U.S.C.
Sec. 254
CIPA - Key terms are as defined in the Children’s Internet Protection Act.
Technology - Electronic devices of communication of any kind, including, but not
limited to: desktop computers, laptops, PDA’s, cell phones, MP3 players, e-mail,
instant messaging, and blogs.
RTM Network - Any wired or wireless access to resources provided by and through
RTM.
Personally Identifiable Information - May include, but is not limited to, Social
Security Number, address, phone number and/or password.
Page 2 of 8
815. ACCEPTABLE USE OF RTM NETWORK RESOURCES - Pg. 3
CIPA Filters - The term technology protection measure means a specific
technology that blocks or filters Internet access to visual depictions that are:
1. Obscene, as that term is defined in section 1460 of Title 18, United States Code.
2. Child pornography, as that term is defined in section 2256 of Title 18, United
States Code.
3. Harmful to minors.
Harmful to Minors and Inappropriate Material - Both mean any text, audio file,
picture, image, graphic image file, or other visual depiction that:
1.
Taken as a whole and with respect to minors, appeals to a prurient interest in
nudity, sex, or excretion.
2.
Taken as a whole, lacks serious literary, artistic, political, or scientific value as
to minors.
Hacking - Refers to the act of gaining unauthorized entry or attempting to gain
unauthorized entry into a computer system for the purpose of:
5. Guidelines
1.
Determining the data structure and security restrictions of the computer system.
2.
Making unauthorized changes in the data structure and security restrictions of
the computer system.
3.
Making unauthorized use of services provided by the computer system to share
information regarding all of the above with other unauthorized users.
Network accounts will be used only by the authorized owner of the account for its
authorized purpose. All communications and information accessible via the network
should be assumed to be personal property of the account owner and shall not be
disclosed to network users. Network users shall respect the rights of other users on
the system. Nothing in this paragraph shall affect the district’s right to access the
data.
Page 3 of 8
815. ACCEPTABLE USE OF RTM NETWORK RESOURCES - Pg. 4
Prohibitions
Students and staff are expected to act in a responsible, ethical and legal manner in
accordance with district policy, accepted rules of network etiquette, and federal and
state law. Specifically, the following uses are prohibited and constitute inappropriate
use:
1.
Use of the network to facilitate illegal activity.
2.
Use of the network for commercial or for-profit purposes.
3.
Use of the network for nonwork or nonschool-related work.
4.
Use of the network for product advertisement or political lobbying.
5.
Use of the network for hate mail, discriminatory remarks, and offensive or
inflammatory communication.
6.
Unauthorized or illegal installation, distribution, reproduction, or use of
copyrighted materials.
7.
Use of the network to access obscene or pornographic material.
8.
Use of inappropriate language or profanity on the network.
9.
Use of the network to transmit material likely to be offensive or objectionable to
recipients.
10. Use of the network to intentionally obtain or modify files, passwords, and data
belonging to other users.
11. Impersonation of another user, or anonymity, or use of pseudonyms.
12. Use of network facilities for fraudulent copying, communications, or
modification of materials in violation of copyright laws.
13. Loading or use of unauthorized games, programs, files, or other electronic
media.
14. Use of the network to disrupt the work of other users.
15. Destruction, modification, or abuse of network hardware, software, and data by
physical or electronic means (viruses, worms, etc.).
Page 4 of 8
815. ACCEPTABLE USE OF RTM NETWORK RESOURCES - Pg. 5
16. Quoting personal communications in a public forum without the original
author's prior consent.
17. Circumventing or disabling the filter or any security measure.
18. Disclosing, using or disseminating any personally identifiable information of
themselves or other staff or students.
19. Engaging in the practice of “hacking” in order to bypass computer and network
security for any purpose whatsoever.
Security
System security is protected through the use of passwords. Failure to adequately
protect or update passwords could result in unauthorized access to personal or
district files. To protect the integrity of the system, the following guidelines shall be
followed:
1. Employees and students shall not reveal their passwords to another individual.
2. Users are not to use a computer that has been logged in under another student's
or teacher's name.
3. Any user identified as a security risk or having a history of problems with other
computer systems may be denied access to the network.
Safety
To the greatest extent possible, users of the network will be protected from
harassment or unwanted or unsolicited communication. Any network user who
receives threatening or unwelcome communications shall immediately bring them to
the attention of a teacher or administrator.
Network users shall not reveal personal addresses or telephone numbers to other
users on the network.
47 U.S.C.
Sec. 254
The district will take appropriate measures through the use of hardware and/or
software tools in an effort to prevent any user from being exposed to graphic, text,
and any other form of obscene, child pornography, or other material that is harmful
Page 5 of 8
815. ACCEPTABLE USE OF RTM NETWORK RESOURCES - Pg. 6
to minors. This includes using one or more Internet content filtering agents that will
remove and/or block inappropriate Internet content related to, but not limited to, any
of the following topics:
1. “Adults only” sites.
2. Alcohol.
3. Drugs.
4. Sexual content.
5. Nudity.
6. Violence.
7. Weapons.
8. Tobacco.
9. Gambling.
10. Games (noneducational).
11. Hate or discrimination.
12. Illegal activities.
13. Computer “hacking”.
14. Pornography.
15. Unethical use of information.
16. Sites that require personal identifiable information from students.
These Internet content filtering agents may not be deactivated or circumvented by
any RTM computer user for any purpose. Notwithstanding filter implementation, the
user retains full responsibility for his/her actions.
Page 6 of 8
815. ACCEPTABLE USE OF RTM NETWORK RESOURCES - Pg. 7
Consequences For Inappropriate Use
The network user shall be responsible for damages to the equipment, systems, and
software resulting from deliberate or willful acts.
Illegal use of the network, intentional deletion or damage to files of data belonging
to others, copyright violations or theft of services will be reported to the appropriate
legal authorities for possible prosecution.
General rules for behavior and communications apply when using the Internet, in
addition to the stipulations of this policy. Loss of access and other disciplinary
actions shall be consequences for inappropriate use.
Vandalism will result in cancellation of access privileges. Vandalism is defined as
any malicious attempt to harm or destroy data of another user, Internet or other
networks. This includes, but is not limited to, the uploading or creation of computer
viruses.
Copyright
17 U.S.C.
Sec. 101 et seq
Pol. 814
The illegal use of copyrighted software by students and staff is prohibited. Any data
uploaded to or downloaded from the network shall be subject to fair use guidelines.
Disclaimer
The school district makes no warranties of any kind, whether express or implied, for
the service it is providing. The school district is not responsible, and will not be
responsible, for any damages, including loss of data resulting from delays, nondeliveries, missed deliveries, or service interruption. Use of any information
obtained through the use of the school district's computers is at the user's risk. The
school district disclaims responsibility for the accuracy or quality of information
obtained through the Internet or e-mail.
Page 7 of 8
815. ACCEPTABLE USE OF RTM NETWORK RESOURCES - Pg. 8
References:
Child Internet Protection Act – 24 P.S. Sec. 4601 et seq
U.S. Copyright Law – 17 U.S.C. Sec. 101 et seq
Enhancing Education Through Technology Act of 2001 – 20 U.S.C. Sec. 6777
Internet Safety – 47 U.S.C. Sec. 254
State Board of Education Regulations – 22 PA Code Sec. 403.1
Board Policy – 814
Page 8 of 8
Download