Forms & Policies » Responsible Use of Technology

Responsible Use of Technology

Student Compliance Form
(This form must be renewed each academic year)

 

I have read the district’s Responsible Use Policy and Administrative Procedures and agree to abide by their provisions. I understand that violation of these provisions may result in disciplinary action including but not limited to suspension or revocation of privileges, suspension or expulsion from school, and criminal prosecution.

 

USER NAME__________________________________________________________________________

 

PASSWORD (TEMPORARY)____________________________________________________________

 

STUDENT NAME (Print)________________________________________________________________

 

STUDENT NAME (Signature)___________________________________________________________

(Grades 5-8)

 

SCHOOL_____________________________________GRADE_________________ROOM__________

 

PARENT/GUARDIAN NAME (Print)_____________________________________________________

 

PARENT/GUARDIAN NAME (Signature)_________________________________________________

 

 

Please sign and return to the Principal’s Office

PURPOSE
The Everett Public Schools shall provide access for employees and students to the system/network, including access to external networks, for limited educational purposes. Educational purposes shall be defined as classroom activities, career and professional development and high quality self-discovery activities of an educational nature. The purpose of the system/network is to assist in preparing students for success in life and work by providing access to a wide range of information, and the ability to communicate with others. The system/network will be used to increase communication (staff, parent and student), enhance productivity, and assist staff in upgrading existing skills and acquiring new skills through a broader exchange of information. The system/network will also be utilized to provide information to the community, including parents, governmental agencies and businesses.
 
AVAILABILITY
The Superintendent or designee shall implement, monitor and evaluate the district’s system/network for instructional and administrative purposes.  Access to the system/network, including external networks, shall be made available to employees and students for instructional and administrative purposes and in accordance with administrative regulations and procedures. Access to the system/network is a privilege, not a right. All users shall be required to acknowledge receipt and understanding of all administrative regulations and procedures governing use of the system and shall agree in writing to comply with such regulations and procedures. Noncompliance with applicable regulations and procedures may result in suspension or termination of user privileges and other disciplinary actions consistent with the policies of the Everett Public Schools. Violations of law may result in criminal prosecution as well as disciplinary action by the Everett Public Schools.
 
RESPONSIBLE USE
The Superintendent or designee shall develop and implement administrative regulations, procedures and user agreements, consistent with the purpose and mission of the Everett Public Schools as well as with law and policy governing copyright.
 
MONITORED USE
Electronic mail transmissions and other use of electronic resources by students and employees shall not be considered confidential and may be monitored at any time by designated staff to ensure appropriate use for instructional and administrative purposes.

 

LIABILITY

The Everett Public Schools shall not be liable for users’ inappropriate use of electronic resources or violations of copyright restrictions, users' mistakes or negligence, or costs incurred by users. The Everett Public Schools shall not be responsible for ensuring the accuracy or usability of any information found on external networks.

 

ADMINISTRATIVE PROCEDURES AND IMPLEMENTATION

1. Commercial use of the system/network is prohibited.
2. The district will provide training to users in the proper use of the system/network.
3. The district will provide each user with copies of the Responsible Use Policy and Procedures.
4. Copyrighted software or data shall not be placed on the district system/network without permission from the holder of the copyright and the system administrator.
5. Access will be granted to employees with a signed access agreement and permission of their supervisor.
6. Access will be granted to students with a signed access agreement and permission of the building administrator or designee(s).
7. Account names will be recorded on access agreements and kept on file at the building level.
8. Initial passwords provided by the network administrator should be set to expire on login.
9. Passwords may be changed every 15 days.
10. Passwords are confidential. All passwords shall be protected by the user and not shared or displayed.
11. Students completing required course work will have first priority for after school use of equipment.
12. Principals or their designee will be responsible for disseminating and enforcing policies and procedures in the building(s) under their control.
13. Principals or their designee will ensure that all users complete and sign an agreement to abide by policies and procedures regarding use of the system/network. All such agreements are to be maintained at the building level.
14. Principals or their designee will ensure that training is provided to users on appropriate use of electronic resources.
15. Principals or their designee shall be authorized to monitor or examine all systems activities, including electronic mail transmissions to ensure proper use of electronic resources.
16. Principals or their designee shall be responsible for establishing appropriate retention and backup schedules.
17. Principals or their designee shall be responsible for establishing disk usage limitations, if needed.
18. Individual users shall, at all times, be responsible for the proper use of accounts issued in their name.
19. The system/network may not be used for illegal purposes, in support of illegal activities, or for any activity prohibited by district policy.
20. System users shall not use another user's account.
21. System users should purge electronic information according to district retention guidelines.
22. System users may redistribute copyrighted material only with the written permission of the copyright holder or designee. Such permission must be specified in the document or in accordance with applicable copyright laws, district policy and administrative procedures.
23. System administrators may upload/download public domain programs to the system/network. System administrators are responsible for determining if a program is in the public domain.
24. Any malicious attempt to harm or destroy equipment, materials, data or programs is prohibited.
25. Deliberate attempts to degrade or disrupt system performance may be viewed as violations of district policy and/or as criminal activity under applicable state and federal laws. This includes, but is not limited to, the uploading or creation of computer viruses.
26. Vandalism will result in the cancellation of system privileges and will require restitution for costs associated with hardware, software and system restoration.
27. Forgery or attempted forgery is prohibited.
28. To read, delete, copy, or modify the electronic mail of other users or to interfere with the ability of other users to send/receive electronic mail is prohibited.
29. Use of inappropriate language; swearing, vulgarity, ethnic or racial slurs and other inflammatory language is prohibited.
30. Sending and receiving electronic messages, while pretending to be someone else is prohibited.
31. Transmitting or viewing obscene material is prohibited.
32. Revealing personal information (address, phone numbers, etc.) is prohibited.

33. The district will cooperate fully with local, state, or federal officials in all investigations concerning or relating to misuse of the district's system/network.

 

A user who violates district policy or administrative procedures will be subject to suspension or termination of system/network privileges and will be subject to appropriate disciplinary action and/or prosecution.

The Everett School Committee has adopted the following policy on the use of student-owned laptops, netbooks, tablet computers, mobile internet devices and cellular phones in school:

 

The Everett Public Schools provides students access to a wireless network, and the option of utilizing a laptop, netbook, tablet other Mobile Internet Device (MID) or cellular phone as a means to enhance their education. The purpose of this policy is to assure that students recognize the limitations that the Everett Public Schools imposes on their use of personal laptops, netbooks, tablet computers and other MIDs and cellular phones. In addition to this policy, the use of any school computer, including laptop computers, netbooks, tablet computers, MIDs and cellular phones also requires students to abide by the Everett Public Schools Responsible Use Policy for Technology.

 

During the course of the school year, other rules regarding the use of personal laptops, netbooks, tablet computers, MIDs and cellular phones may become a part of this procedure.

 

General Usage

The Everett Public Schools provides the opportunity for students to bring a personal laptop, netbook, tablet computer, other MID or cellular phone to school to use as an educational tool.

 

The use of these laptops, netbooks, tablet computers, MIDs and cellular phones in class will be at the discretion of the teacher.

• Students must obtain teacher permission before using a personal laptop, netbook, tablet computer, MID or cellular phone during classroom instruction.

• Student use of a personal laptop, netbook, tablet computer, MID or cellular phone must support the instructional activities currently occurring in the instructional environment.

• Students must turn off and put away a personal laptop, netbook, tablet computer, MID or cellular phone when requested by a teacher.

Students should be aware that their use of the laptop, netbook, tablet computer, MID or cellular phone could cause distraction for others in the classroom, especially in regard to audio. Therefore, audio must be muted. Headphones should not be used during instructional time.

 

Consequences of Prohibited Us

If students refuse to comply with the above guidelines, consequences will apply. Student infractions will be documented as a referral for each offense. The consequences for these infractions are outlined below:

  • 1st Offense = Laptop, netbook, tablet computer, MID or cellular phone will be confiscated until the end of the school day, when the student may retrieve it.
  • 2nd Offense = Laptop, netbook, tablet computer, MID or cellular phone will be confiscated until the end of the day, when the student’s parent must retrieve it.
  • 3rd Offense = Loss of laptop, netbook, tablet computer, MID or cellular phone privileges for a period of time as decided by School Administration on a case by case basis.

 

Laptop/Netbook/MID/Cellular Phone Security Risks

Laptops, netbooks, tablet computers, MIDs and cellular phones are especially vulnerable to loss and theft. Opportunistic and organized thieves will target these devices in school, on school grounds, and in the community.

 

Student Responsibility

Everett Public Schools accept no responsibility for personal property brought to the school by students. This includes laptop computers, netbooks, tablet computers, MIDs and cellular phones. Students who bring a laptop, netbook, tablet computer, MID or cellular phone to school assume total responsibility for said equipment. Laptops, netbooks, tablet computers, MIDs or cellular phones that are stolen or damaged are the responsibility of the student and their parents or guardians.

 

Students should take all reasonable steps to protect against the theft or damage of their personal laptop, netbook, tablet computer, MID or cellular phone.

 

Physical Security

Users should take the following physical security preventative measures.

Laptops, netbooks, tablet computers, tablet computers, MIDs and cellular phones should NEVER be left unattended for ANY period of time. When not in use, these items should be locked in the owner’s school locker.

 

Laptop computers, netbooks, tablet computers, MIDs and cellular phones must not be left unattended at any time. (If a laptop, netbook, tablet computer, MID or cellular phone is left unattended it will be picked up by staff and turned into the Main Office.)

 

Access Control and Authentication

• Students can only access the Internet and the school network via a wireless connection provided by the District and using his/her own District account. Any student found connecting his/her laptop or netbook to the network using an Ethernet cable plugged into a wall jack will have his/her laptop or netbook confiscated and will lose personal laptop access privileges.

 

• No student shall knowingly gain access to, or attempt to gain access to, any computer, computer system, computer network, information storage media, or peripheral equipment without the consent of authorized school or district personnel.

 

•  No student shall install District-owned licensed software on their personal laptop or netbook.

 

• No student shall establish a wireless Ad-hoc (peer-to-peer) network using his/her laptop or netbook while on school grounds.

 

• No students shall use any computing device, including their laptop, netbook, tablet computer, MID or cellular phone to illegally collect any electronic data or disrupt networking services (Hacking).