Student Computer and Internet Rules

Please take a moment to review the computer and internet use rules for students. 

 

STUDENT COMPUTER AND INTERNET USE RULES

 

These rules accompany Board policy IJNDB (Student Computer and Internet Use).  Each student is responsible for his/her actions and activities involving school unit computers, networks, and Internet services, and for his/her computer files, passwords, and accounts.  These rules provide general guidance concerning the use of the school unit’s computers and examples of prohibited uses.  The rules do not attempt to describe every possible prohibited activity by students.  Students, parents, and school staff who have questions about whether a particular activity is prohibited are encouraged to contact a building administrator or the Technology Coordinator.

 

  1. Consequences for Violation of Computer Use Policy and Rules

 

Student use of the school unit computers, networks, and Internet services is a privilege, not a right.  Compliance with the school unit’s policies and rules concerning computer use is mandatory.  Students who violate these policies and rules may have their computer privileges limited, suspended, or revoked.  Such violations may also result in disciplinary action, referral to law enforcement, and or legal action.

 

            The building principal shall have final authority to decide whether a student’s privileges will be limited, suspended or revoked based upon the circumstances of the particular case, the student’s prior disciplinary record, and any other relevant factors.

 

  1. Acceptable Use

 

            The school unit’s computers, networks, and Internet services are provided for educational purposes and research consistent with the school unit’s educational mission, curriculum, and instructional goals.

 

            All Board policies, school rules, and expectations concerning student conduct and communications apply when students are using computers.

 

            Students are also expected to comply with all specific instructions from teachers and other school staff or volunteers when using the school unit’s computers.

 

  1. Prohibited Uses

 

            Examples of unacceptable uses of school unit computers that are expressly prohibited include, but are not limited to, the following:

 

  1. Accessing Inappropriate Materials – Accessing, submitting, posting, publishing, forwarding, downloading, scanning or displaying defamatory, abusive, obscene, vulgar, sexually explicit, sexually suggestive, threatening, discriminatory, harassing and/or illegal materials;

 

  1. Illegal Activities – Using the school unit’s computers, networks, and Internet services for any illegal activity or in violation of any Board policy or school rules.  The school unit assumes no responsibility for illegal activities of students while using school computers;

 

  1. Violating Copyrights – Copying, downloading or sharing any type of copyrighted materials (including music or films) without the owner’s permission (see Board policy/procedure EGAD – Copyright Compliance).  The school unit assumes no responsibility for copyright violations by students;

 

  1. Copying Software – Copying or downloading software without the express authorization of the Technology Coordinator.  Unauthorized copying of software is illegal and may subject the copier to substantial civil and criminal penalties.  The school unit assumes no responsibility for illegal software copying by students;

 

  1. Plagiarism – Representing as one’s own work any materials obtained on the Internet (such as term papers, articles, music, etc.).  When Internet sources are used in student work, the author, publisher, and website must be identified;

 

  1. Non-School-Related Uses – Using the school unit’s computers, networks, and Internet services for non-school-related purposes such as private financial gain, commercial, advertising or solicitation purposes, or for any other personal use not connected with the educational program or assignments;

 

  1. Misuse of Passwords/Unauthorized Access – Sharing passwords, using other users’ passwords, and accessing or using other users’ accounts;

 

  1. Malicious Use/Vandalism – Any malicious use, disruption or harm to the school unit’s computers, networks, and Internet services, including but not limited to hacking activities and creation/uploading of computer viruses; and

 

  1. Unauthorized Access to Blogs/Chat Rooms – Accessing chat rooms or news groups without specific authorization from the supervising teacher. 

 

  1. No Expectation of Privacy

 

            Regional School Unit #1 computers remain under the control, custody, and supervision of the school unit at all times.  Students have no expectation of privacy in their use of school computers, including email, stored files, and Internet access logs.

 

  1. Compensation for Losses, Costs, and/or Damages

 

            The student and his/her parents are responsible for compensating the school unit for any losses, costs, or damages incurred by the school unit for violations of Board policies and rules while the student is using school unit computers, including the cost of investigating such violations.  The school unit assumes no responsibility for any unauthorized charges or costs incurred by a student while using school unit computers.

 

  1. Student Security

 

            A student is not allowed to reveal his/her full name, address or telephone number, social security number, or other personal information on the Internet without prior permission from a teacher.  Students should never agree to meet people they have contacted through the Internet without parental permission.  Students should inform their teacher if they access information or messages that are dangerous, inappropriate, or make them uncomfortable in any way.

 

 

 

  1. System Security

 

            The security of the school unit’s computers, networks, and Internet services is a high priority.  Any student who identifies a security problem must notify his/her teacher immediately. The student shall not demonstrate the problem to others or access unauthorized material.  Any user who attempts to breach system security, causes a breach of system security, or fails to report a system security problem shall be subject to disciplinary and/or legal action in addition to having his/her computer privileges limited, suspended, or revoked.

 

  1. Additional Rules for Laptops Issued to Students

 

  1. Laptops are loaned to students as an educational tool and are only authorized for use in completing school assignments.

 

  1. Before a laptop is issued to a student, the student and his/her parent or guardian must sign the school’s acknowledgment form. Parents and or guardians must participate in an information session concerning the appropriate use of school provided laptops before being permitted to take the laptop home.

 

  1. Students are responsible for the proper care of laptops at all times, whether on or off school property, including costs associated with repairing or replacing the laptop. 

 

  1. If a laptop is lost or stolen, this must be reported to building principal immediately.

 

  1. The Board’s policy and rules concerning computer and Internet use apply to use of laptops at any time or place, on or off school property.  Students are responsible for obeying any additional rules concerning care of laptops issued by school staff.

 

  1. Violation of policies or rules governing the use of computers, or any careless use of a laptop may result in a student’s laptop being confiscated and/or a student only being allowed to use the laptop under the direct supervision of school staff.  The student will also be subject to disciplinary action for any violations of Board policies or school rules.

 

  1. Parents will be informed of their child’s login password.  Parents are responsible for supervising their child’s use of the laptop and Internet access when in use at home.

 

  1. The laptop may only be used by the student to whom it is assigned.  Appropriate parental use is encouraged.

 

  1. Laptops must be returned in acceptable working order at the end of the school year or whenever requested by school staff.

 

Cross Reference:       EGAD – Copyright Compliance

                                    IJNDB – Student Computer and Internet Use

 

 

Adopted:   March 16, 2009