NORTHERN VALLEY REGIONAL HIGH SCHOOL DISTRICT TECHNOLOGY EDUCATION DEPARTMENT NETWORK COMPUTING POLICY The Northern Valley Regional High School District is responsible for securing its network and computing systems to a reasonable and economically feasible degree against unauthorized access and/or abuse, while making them accessible for authorized and legitimate users. This responsibility includes informing users, both registered and unregistered, of expected standards of conduct and the disciplinary or legal consequences for not adhering to them. Any attempt to violate the provisions of this policy will result in disciplinary action, including but not limited to temporary revocation of user accounts, regardless of the success or failure of the attempt. Permanent revocations can result from disciplinary actions taken by the administrator called upon to investigate network abuses. The users of the network are responsible for respecting and adhering to local, state, federal and international laws. Any attempt to break those laws through the use of the network may result in litigation against the offender by the proper authorities. If such an event should occur, this organization will fully comply with the authorities to provide any information necessary for the litigation process. SECTION 1: GENERAL COMPUTING POLICY Once a user receives a user ID to be used to access the network and computer systems on that network, they are solely responsible for all actions taken while using that user ID. It will be the responsibility of the user to pay any fees accrued by that user or anyone using his user ID. Therefore, the following actions are prohibited: 1.1 Applying for a user ID under false pretenses 1.2 Sharing your user ID with another person. If you do share your used ID with another person, you will be solely responsible for any abuse by that person. 1.3 Deleting, examining, copying, or modifying of files and/or data belonging to other users without their prior consent. 1.4 Attempting to evade or change resource quotas. 1.5 Impeding other users through mass consumption of system resources, after receipt of a request to cease such activity. 1.6 Using facilities and/ or services for unauthorized commercial purposes. 1.7 Any unauthorized, deliberate action which damages or disrupts a computing system or network, alters its normal performance, or causes a malfunction regardless of system location or time duration. SECTION 2: ELECTRONIC MAIL POLICY Electronic mail (“e-mail”) is an electronic message sent by or to a user in correspondence with another person having e-mail access. Messages received by the system are retained on the system until deleted by the recipient. A canceled account will not retain its mail. Users are expected to remove old messages in a timely fashion and the system administrators may remove such messages if not attended to regularly by the user. When a user sends electronic mail (e-mail), his name and user ID are included in each mail message. The user is responsible for all electronic mail from his user ID. Therefore, the following are prohibited: 2.1 Forging or attempting to forge electronic mail messages. 2.2 Attempting to read, delete, copy, modify or view without permission, other users’ e-mail. 2.3 Attempting to send harassing, obscene and/or other threatening e-mail to another user. 2.4 Attempting to send unsolicited junk mail, “for-profit” messages, or chain letters. SECTION 3: NETWORK AND COMPUTING SYSTEM A user of the network may be allowed to access only authorized networks or the computer systems attached to those networks. Therefore, the following are prohibited: 3.1 Using systems and/or networks in an attempt to gain unauthorized access to remote systems. 3.2 Using systems or networks to connect to other systems evading the physical limitations of the local or remote system. 3.3 Decrypting system or user passwords. 3.4 Copying system files. 3.5 Duplicating copyrighted materials, such as third-party software, without the express written permission of the owner or the proper license. 3.6 Attempting to “crash” network systems or programs. 3.7 Attempting to secure a higher level of privilege on network systems. 3.8 Willfully introducing computer “viruses”, disruptive, or destructive programs into the organization network or into external networks. 3.9 Connecting to a peer-to-peer network (such as but not limited to; Kazaa, Limewire, Bit Torrent etc.) to share and download copyrighted media and/or software. The Northern Valley network and computing systems are expected to be used exclusively for educationrelated functions and applications. As the systems administrators have access to all files, including e-mail files, users should have no expectation of privacy with respect to said files or e-mail. However, the system administrators will not normally inspect the contents of files or e-mail sent by one user to an identified addressee, or disclose such contents to other than the sender, or an intended recipient, without the consent of the sender, or an intended recipient, unless required to do so by law or policies of Northern Valley Regional High School District, or to investigate complaints regarding files or e-mail which is alleged to contain defamatory, abusive, obscene, profane, sexually oriented, threatening, racially offensive, or illegal material. Further, the Northern Valley Regional Schools are obligated to cooperate fully with local, state, or federal officials in any investigation concerning or relating to any e-mail transmitted on or misuses of the network and computing systems. I, _____________________________________, am a student in Mr. Maietta’s Technology class Period________. I have reviewed the school's computer, email, and network policy in class with Mr. Maietta. I understand that I face certain consequences if I violate the policies addressed in this notice. I, ____________________________________am the legal guardian/parent of the above named student. I acknowledge that I have read the NVRHS computer, email, and network policies and have spoken to my child regarding the consequences that they face if they fail to adhere to these policies. Signed by ______________________________________________________(Student) _______________________________________________________(Parent/Guardian) Date__________________