Acceptable Use Policy

Code: 6142.10A


The Board recognizes that as telecommunications and other new technologies shift the manner in which information is accessed, communicated and transferred that those changes will alter the nature of teaching and learning. Access to telecommunications will allow pupils to explore databases, libraries, Internet sties, bulletin boards and the like while exchanging information with individuals throughout the world. The Board supports access by pupils to information sources but reserves the right to limit in school use to materials appropriate to educational purposes. The Board directs the Superintendent to effect training of teaching staff members in skills appropriate to analyzing and evaluating such resources as to appropriateness for educational purposes.

The Board also recognizes that telecommunications will allow pupils access to information sources that have not been pre-screened by educators using Board approved standards. The Board therefore adopts the following standards of conduct for the use of computer networks and declares unethical, unacceptable or illegal behavior as just cause for taking disciplinary action, limiting or revoking network access privileges and/or instituting legal action.

The Board provides access to computer network/computers for educational purposes only. The Board retains the right to restrict or terminate individual access to the computer network/computers at any time, for any reason. The Board retains the right to have district personnel monitor network activity, in any form necessary, to maintain the integrity of the network and insure its proper use.

Standards for Use of Computer Networks

Any individual engaging the following actions when using computer networks/computers shall be subject to discipline or legal action:

A. Using the computer network(s)/computers for illegal, inappropriate or obscene purposes, or in support of such activities. Illegal activities are defined as activities that violate federal, state, local laws and regulations. Inappropriate activities are defined as those that violate the intended use of the network. Obscene activities shall be defined as a violation of generally accepted social standards for use of publicly owned and operated communication vehicles.

B. Using the computer network(s)/computers to violate copyrights, institutional or third party copyrights, license agreements or other contracts.

C. Using the computer network(s) in a manner that:

1. Intentionally disrupts network traffic or crashes the network;

2. Degrades or disrupts equipment or system performance;

3. Uses the computing resources of the school district for commercial purposes, financial gain or fraud;

4. Steals data or other intellectual property;

5. Gains or seeks unauthorized access to the files of others or vandalizes the data of another user;

6. Gains or seeks unauthorized access to resources or entities;

7. Forges electronic mail messages or uses an account owned by others;

8. Invades privacy of others;

9. Posts anonymous messages;

10. Possesses any data which is a violation of this policy; and/or

11. Engages in other activities that do not advance the educational purposes for which computer
network/computers are provided.

Consent Required

A pupil shall be allowed access to the Internet unless they have filed with the Principal's office a form (see Attachment 1) signed by the parent(s) or guardian(s) indicating that the student many not use the Internet.


Individuals violating this policy shall be subject to the consequences as indicated in Regulation 6142.10A and other appropriate discipline that includes but are not limited to:

1. Use of the network only under direct supervision;

2. Suspension of network privileges;

3. Revocation of network privileges;

4. Suspension of computer privileges;

5. Revocation of computer privileges;

6. Suspension from school;

7. Expulsion from school and/or

8. Legal action and prosecution by the authorities.

Use of the Internet

Because anyone in the world has access to the Internet, the system also contains material that is inappropriate for elementary students or does not possess educational value in the context of our school curriculum. One of the goals of this policy is to outline acceptable use of the Internet by all individuals. This policy seeks to balance issues of intellectual inquiry, freedom of speech and privacy with the responsibility of the district to ensure that individuals do not access or produce inappropriate or illegal materials.

The system administrator will authorize appropriate use of the Internet. Internet access is being provided for educational purposes. However, it is understood that access to the Internet will provide unlimited opportunities beyond the field of education. Therefore, all use of the Internet must be approved by the system administrator. The Superintendent will establish written procedures to monitor this usage.

Inappropriate Uses of the Internet

The following have been deemed inappropriate uses of technology by either the broad community of computer users or by legal judgment. This list is not all-inclusive, but includes the major categories or misuse of technology.

1. Using the network for illegal activities (e.g., copyright infringement),

2. Disrupting or damaging equipment software or the operation of the system.

3. Vandalizing the account or data of another user.

4. Gaining unauthorized access to another account, confidential school records or to the system operation.

5. Using another person's account or name without permission.

6. Using abusive, obscene language, sending hate mail or harassing another individual.

7. Obtaining pornographic text, graphics or photographs.

8. Sending or receiving material that is racist, sexist or offensive to the religious beliefs of people.

9. Creating or installing a computer virus.

10. Using technology for personal financial or business gain.

11. Installing or using personal software on any computer in the district.

12. Changing the configuration of an individual computer or network.

13. Unauthorized downloading of software.

14. Logging on the Internet or sending e-mail using a fictitious name.

15. E-mail broadcasting or spamming.