Administrative Procedures–Internet and Information Systems (AR 6162.7)
Student Access to Networked Information Resources Procedures
- In order to match electronic resources as closely as possible to the approved district curriculum, district and site personnel will review and evaluate resources, which comply with Board guidelines listed in the Board Policy governing the selection of instructional materials. In using the Internet Resources, the school sites may not be able to restrict access to some materials.
- As much as possible, access to district information resources will be designed in ways that direct students to those which have been reviewed and evaluated prior to use. Students shall be provided with guidelines by their teacher and lists of resources particularly suited to the learning objectives. Students may not pursue electronic research independent of staff supervision. Permission is not transferable and may not be shared.
B. Permission for Use
- All students will be informed by staff of their rights and responsibilities as users of the district network prior to gaining access to that network.
- Teachers must have on file a signed copy of the Student Acceptable Use Policy Terms and Conditions prior to a student accessing on-line services.
- The site principal will be responsible for sending home the Student Acceptable Use Policy Terms and Conditions yearly in September.
C. Internet Rules
- Students are responsible for good behavior on school computer networks just as they are in a classroom or anywhere on school grounds. Communications on the network are often public in nature. General school rules for behavior and communications apply.
- The network is provided for students to conduct research and communicate with others. Access to network services with teacher supervision is provided to students who agree to act in a considerate and responsible manner. Parent permission is required. Access is a privilege, not a right. Access entails responsibility.
- Individual users of the district computer networks are responsible for their behavior and communications over those networks. Users will honor and comply with district standards.
- Network storage areas may be treated like school lockers. Network administrators may review files and communications to maintain system integrity and ensure that users are using the system responsibly. Users should not expect that files stored on district servers will always be private.
- During school, district faculty will guide students toward appropriate materials. Outside of school, families bear responsibility for such guidance as they must also exercise with information sources such as television, telephones, movies, radio and other potentially offensive media.
The following is a list of some of the uses which are unacceptable:
- using impolite, abusive, offensive, or otherwise objectionable language in either public or private messages;
- using the Internet or other resources for sending or retrieving confidential, illegal, obscene, or other material unrelated to the educational objective for which access is granted;
- placing, on the Internet or other information system, material which is confidential, illegal, obscene, or unrelated to the educational objective for which access is granted;
- sending, receiving, copying, or changing copyrighted materials without first obtaining all required permission;
- knowingly or negligently allowing any other person to obtain the student's password;
- using another person's password;
- allowing your account/password to be used by another person;
- using the network for financial gain, commercial activity, political activity, or for any illegal activity;
- damaging, destroying, removing, copying, or abusing any District equipment, including but not limited to computers, printers, and software.
- Violations will result in loss of access as well as parent notification.
- Additional disciplinary action may be determined at each school site while maintaining existing practices regarding inappropriate language or behavior.
- When applicable, law enforcement agencies may be involved.