Acceptable Use Policy (AUP)

advertisement
File: I.13.
IMPLEMENTATION OF A TECHNOLOGY INFRASTRUCTURE
To meet the goal that every high school graduate will be prepared fully for college, other
post-secondary education or gainful employment the Board believes that a technology
infrastructure should be present in the County schools. In order to meet this goal, 21st century
technologies and software resources shall be provided in grades prekindergarten through 12.
To the extent practicable, technology resources shall be used:
 To maximize student access to learning tools and resources at all times including during
regular school hours, before and after school or class, in the evenings, on weekends and
holidays and for public education, noninstructional days and during vacations; and
 For student use for homework, remedial work, independent learning, career planning and
adult basic education.
 For student use for homework, remedial work, independent learning, career planning and
adult basic education.
It shall be the goal of each school within the county to provide a technology
infrastructure capable of supporting multiple technology-based learning strategies designed to
enable students to achieve at higher academic levels. The technology infrastructure should
facilitate student development by addressing the following areas:
 Mastery of rigorous core academic subjects in grades prekindergarten through eight by
providing software, other technology resources or both aligned with state standards in
reading, arithmetic’s, writing, science, social studies, twenty- first century learning skills and
21st century learning tools;
 Mastery of rigorous core academic subjects in grades nine through 12 by providing
appropriate 21st century technology tools aligned with state standards for learning skills and
technology tools;
 Attainment of 21st century skills outcomes for all students in the use of technology tools and
learning skills;
 Proficiency in new, emerging 21st century content;
 Participation in relevant, contextual instruction that uses dynamic, real-world contexts that are
engaging and meaningful for students, making learning relevant to life outside of school and
bridging the gap between how students live and how they learn in school;
 Ability to use digital and emerging technologies to manage information, communicate
effectively, think critically, solve problems, work productively as an individual and
collaboratively as part of a team and demonstrate personal accountability and other selfdirectional skills;
 Providing students with information on post-secondary educational opportunities, financial
aid and the skills and credentials required in various occupations that will help them better
prepare for a successful transition following high school;
 Providing greater access to advanced and other curricular offerings than could be provided
efficiently through traditional on-site delivery formats, including increasing student access to
quality distance learning curricula and online distance education tools;
 Providing resources for teachers in differentiated instructional strategies, technology
integration, sample lesson plans, curriculum resources and online staff development that
enhance student achievement; and
 Providing resources to support basic skills acquisition and improvement at the above mastery
and distinguished levels.
(WVC §18-2E-7)
(P)
I.13.1.
Meeting SBP 2470 Requirements
To assure the accomplishment of the above student outcomes, the board shall implement
the requirements of SBP 2470 which include the following:
 Pendleton County shall have a county technology team and a comprehensive technology plan
that is part of the Electronic Strategic County Improvement Plan.
 Computer technology skills shall be included in all programs of study, particularly in the areas
of career awareness, career exploration, experiential learning and for use in accessing postsecondary education information.
 The board shall, whenever possible and appropriate, make available facilities and technology
to facilitate distance learning.
 The board, in cooperation with schools, shall, to the extent practicable and as funds and other
resources are available, provide students (including those enrolled in adult basic educational),
teachers, parents and citizens access to technology, especially computers, in the public
schools during non-school hours.
 The board shall provide staff development in the use of technology and its application in the
teaching and learning process.
 Local school improvement councils shall include in the Electronic Strategic School
Improvement Plan mechanisms to foster the use, to the extent practicable and as funds and
other resources are available, of school facilities for the purpose of accessing technology,
especially computers, by students, teachers, parents and citizens during non-school hours.
 Every school shall have a school technology team and a comprehensive technology plan that
is part of the Unified School Improvement Plan. (September 30, 1997) Schools may choose to
have the local school improvement council or the faculty senate or the curriculum team serve
as the technology team.
 Computer/technology skills shall be taught and utilized throughout the programs of study.
(P)
I.13.2.
Internet and Telecommunication Acceptable Use Procedures
The Pendleton County School System embraces the use of technology to promote
educational excellence, resource sharing, assist innovative instruction; provide electronic access
to a wide range of information and the ability to communicate. Use of our technology must be in
support of education and/or research or for school business, support West Virginia Content
Standards and Objectives, and be in accordance with all School Board Policies.
As the use of telecommunication networks by students increase, there is a need to clarify
acceptable use and safety of those networks and to include federal regulations from the Children's
Online Privacy Protection Act (COPPA) and the Children's Internet Protection Act (CIP A).
Privileges
 The use of the Internet as part of an educational program is a privilege, not a right, and
inappropriate or unauthorized use or safety violations could result in revocation or suspension
of that privilege.
 Each student who will access the Internet will be provided acceptable use training and shall
have an acceptable use form, signed by a parent or legal guardian, on file.
Accountability and Responsibility
The use of telecommunications and or access to the internet is an extension of the
educator’s responsibility in his/her classroom. Therefore, it is the educator’s responsibility to
ensure classroom activities that utilize Internet-related technologies that focus on appropriate and
specific learning goals and objectives. All student use of Internet-related applications must be
authorized by the educator. Specific examples of unauthorized use include, but are not limited to
the following:
 Executing non-educational gaming.
 Creating, storing, sending, or viewing pornographic material.
 Downloading executable files, uploading, storing, or saving any games, music, utilities,
screen savers, zip files, and/or executing viruses,
 Using e-mail user ID's other than one's own ID.
 Corrupting, destroying, deleting, or manipulating system data with malicious intent.
 Violating safety and/or security measures when using e-mail, chat rooms, and other forms of
direct electronic communications. Chat rooms and/or use of instant messaging programs are
prohibited unless they are needed for educational use only and under the supervision of the
instructor.
 "Hacking'" or any other unlawful online activity.
 Disclosing, using, or disseminating personal information regarding minors.
 Users will respect the rights of copyright owners.
Due Process:
 In the event that there is an allegation that a student has violated the school’s Acceptable Use
Policy, his/her student service account will be disabled cutting off access to the school’s
internal network and all internet websites until an administrative investigation may be
conducted.
 As a part of the administrative investigation, the student will be provided with a written notice
of the alleged violation and an opportunity to present an explanation of the alleged breech of
computer protocol.
 Disciplinary actions will be tailored to meet the specific concerns related to the violation and
to assist the student in gaining the self-discipline necessary to behave appropriately on an
electronic network.
 Disciplinary actions may include, but are not limited to, actions that are defined in The
Student Code of Conduct, Violation Level I.
E-mail Accounts
 The WVDE and WVNET can only monitor those e-mail accounts issued to the
“access.k12.wv.us” server, which is administered by WVDE and WVNET.
The
responsibility for a “non-access.k12.wv.us” e-mail accounts lies with the administrator(s)
and/or educator(s) identified as responsible for those students using alternative e-mail
accounts or the administrator(s) and/or educator(s) identified as responsible for the e-mail
server being used.
 The privacy of electronic email cannot be guaranteed
 Students are responsible for their individual accounts and should take all reasonable
precautions to prevent others from being able to use their account. Under no conditions
should students provide their password to another person. Students will notify a teacher or
administrator if they have identified a possible security problem.
Web Publishing
 The school's web page will adhere to the WVDE State Policy 2460. Every effort will be made
to provide links relating to the county and school curriculum.
 Student pictures and names may be published on the school/county web site at the discretion
of the school/county. Parental permission will be obtained. Student's last names, home
address, home telephone, credit card information, mother's maiden name, and other personal
information should not be published.
Network Etiquette
Users are expected to aide by the accepted rules of network etiquette. These include, but
are not limited to the following:
 Be polite. Do not write or send abusive messages to others.
 Use appropriate language. Do not swear, use vulgarities or any other inappropriate language.
 Do not reveal the personal home address or phone number of students or colleagues.
Messages related, to or in support of illegal activities may be reported to the authorities.
 Do not use the Internet in a way that would disrupt the use of the Internet by others (e.g.,
downloading huge files during prime time; sending mass e-mail messages; annoying other
users).
Security
Users who identify a security problem on the system must notify a system administrator. Users
must not demonstrate the problem to others.
Plagiarism and Copyright Infringement:
 Users will not plagiarize works that they find on the Internet. Plagiarism is taking the ideas of
writings of others and presenting them as if they were original to the user.
 Users will respect the rights of copyright owners. Copyright infringement occurs when an
individual inappropriately reproduces a work that is protected by a copyright.
Vandalism
Vandalism will result in revocation of user privileges. Vandalism is defined as an attempt
to harm or destroy data of another user or any connections that are part of the Internet.
Safety
 Safety measures must be enforced to carry out policies at the state, county, and school to
implement the intent of CIPA, COPPA and E-rate guidelines.
 The WVDE, county school systems and schools, in partnership with WVNET will organize
technical protection measures to guard against visual depictions that are "inappropriate to
minors." Filtering will be installed at the state level for Internet access.
 The county school system may also add other electronic filters at the local level.
Protecting the School’s Computer Network
 Any attempt to disrupt the school’s computer network through viruses, modification or
deletion of files is strictly prohibited.
 Routine maintenance and monitoring of the system will be conducted to assure proper use of
this electronic network.
(P) I.13.2.1
Internet and Telecommunications Access Consent and Waiver Form
Agreement and Parent Permission Form
After reading the AUP policy, please complete this form to indicate that you agree with the
terms and conditions. The signatures of both student and parent/guardian are mandatory before
Internet access may be granted. Use of the telecommunications network or telecommunication
must be in support of education and/or research or for school business, support of the West
Virginia Content Standards and Objectives and be in accordance with all Pendleton County Board
of Education policies and State Board Policy 2460.
School Name__________________________________________________
STUDENT SECTION
I have read the Acceptable Use Policy concerning all computer usage. I agree to follow the
rules contained in this Policy. I understand that if I violate the rules my privileges may be
terminated or other disciplinary action taken.
User Name (please print)________________________________ Grade: _____________
User’s Signature: ______________________________________ Date: ______________
PARENT SECTION
I have read the AUP policy for use of telecommunications in the school and have discussed this
with my son/daughter. I understand that this access is for educational purposes only, and that it is
the responsibility of my child to restrict his/her use to the classroom projects/activities assigned
by the teacher. I also understand that my child cannot hold the teacher responsible for intentional
infractions of the above rules.
Parent/Guardian (please print)-___________________________________________
Parent/Guardian (signature) ______________________________Date____________
SCHOOL INTERNET WEB STIE STUDENT INFORMATION
I hereby give my permission to use the following information on the school web site. Initial all
that you approve.
_________ Student’s first name
____
__________ Student’s photo
Student in group photo
This form will be kept in the school listed above. It will not be transferred to another
school.
(P)
I.13.3.
Copyrighted Computer Software Use
All Pendleton County Board of Education employees shall adhere to copyright laws that
apply to computer software. To discourage violation of copyright laws, the following compliance
requirements are to be followed by all personnel utilizing County purchased copyrighted
computer software.
 Students enrolled in programs of study using copyrighted software shall be taught the ethical,
practical and legal problems and potential consequences of software piracy.
 Employees are expected to adhere to the provisions of P. L. 96-517, which permits the
making of a single backup copy of copyrighted programs. Additional copies can only be
made with the express written permission of the corporation, which holds the copyright to the
program.
 Illegal copies of copyright programs shall not be made or used on school equipment.
 Under federal law, employees violating the copyright laws may be subject to fines,
confiscation of material, and other criminal prosecution. Violations may also result in the
employee's suspension and/or dismissal for insubordination or immorality.
Each principal shall establish practices to implement this policy at the school level.
Yearly reminders of this policy should be made at the first faculty senate meeting of the year.
(SBP 5711)
Download