- Do not leave open /network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight.

Size: px
Start display at page:

Download "- Do not leave open email/network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight."

Transcription

1 STAFF PROCEDURES FOR ACCEPTABLE USE OF /NETWORK AND INTERNET The primary purpose of Sycamore Community Schools /network system is to provide resources to enhance and support educational instruction through collaboration and exchange of information. Two components of the network for professional use at Sycamore Community Schools are the district s system and the internet. It is possible to both send and receive s that are inappropriate for a school setting. It is also widely known that the Internet has resources available that are inappropriate for a school setting. To ensure proper use of the district and/or network resources, the following responsibilities apply to all staff members. A. The use of the /network system is a privilege which may be revoked by the district at any time. Staff training pertaining to and internet use will be provided on a yearly basis. B. Any misuse of the account, by the account holder, could result in suspension of the account privileges and/or other disciplinary action determined by the district, including but not limited to termination of employment as prescribed by law. C. STAFF RESPONSIBILITIES: 1. Password Security and Protection - It is the responsibility of each staff member to change the generic district - issued password to his/her unique password for all /network applications, prior to using the application. - Never share password or account information with fellow staff members, students, substitute teachers, volunteers, or anyone else except the Technology Office staff. - Do not leave open /network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight. - Staff members have full responsibility for the use of their account/password. - All violations of these procedures that can be traced to an individual account name/password will be treated as the sole responsibility of the owner of that account/password. Page 1 of 5 Rev 5-09

2 - Staff members are never authorized to login to the computer and/or district network under a username/account/or password assigned to another employee or student. - Do not use the save password feature of any applications. D. RULES AND REGULATIONS FOR /NETWORK SYSTEM 1. Appropriate language is expected. Profanity, obscenity, and vulgarity will not be tolerated, including, but not limited to pictures, words, jokes, and other images that are offensive to any group of people. All staff members should use language appropriate for school situations. 2. Under no circumstances are s containing inappropriate material, as defined above, to be forwarded to any other individual. If an inappropriate is received by a staff member from another staff member, the receiving individual should report this to his/her building administrator, immediate department manager or the district Technology Office. If an inappropriate is received by a Sycamore staff member from an outside source, it should be immediately deleted. As a specific rule, staff should not forward any that contains inappropriate material. 3. Under no circumstances are s containing inappropriate material, as defined above, to be saved on the district s network. 4. Any generated by staff members which contain personal attacks, discriminatory remarks, or hate mail are an unacceptable use of the network. E. NETWORK 1. Do not knowingly degrade the performance of the network. Hardware/software abuse, chain letters and mail bombs are examples of activities prohibited for this reason. 2. Obey the rules of copyright regarding software. Do not copy commercial software. 3. The Technology Office will install all approved software. Do not install any software onto the network or computer workstations. 4. Use of the network for any illegal activities is prohibited. Illegal activities include tampering with computer hardware or software, unauthorized entry into computers, or knowledgeable vandalism or destruction of computer files. Page 2 of 5 Rev 5-09

3 5. Avoid the spread of computer viruses. "Computer viruses" are programs that have been developed as pranks, and can destroy valuable programs and data. 6. Impersonation, anonymity, or pseudonyms are not permitted. As an educational network, we believe that individuals must take responsibility for their actions and words. 7. Exemplary behavior is expected. When "visiting" websites on the internet, staff members must conduct themselves as representatives of both their respective schools and the community as a whole. Obtaining, viewing, downloading, or otherwise gaining access to any material which may be unlawful, obscene, pornographic, abusive, or otherwise objectionable is in conflict with this policy. 8. Excessive personal use during working and non-working hours will not be tolerated. 9. Downloading movies, using chat and instant messaging is not allowed except for clearly defined educational purposes and in accordance with CIPA (Child Internet Protection Act, In the event a staff member desires a specific download or website available they should enter a helpdesk ticket seven to ten days prior to use. The principal, technology department and central office administration will review the request. 10. Do not allow students to use a computer for purposes of internet/network use in a location that is not adult supervised. 11. Follow the network precautionary measures and abide by Family Educational Records and Privacy Act (FERPA see Instructions on Shared Drive> All District Staff>Forms) forms and student requests for exclusion in media and publicity. F. GENERAL PROVISIONS 1. If an employee is believed to be in violation of the guidelines stated within these procedures, the superintendent or her/his representative has the authority to examine private correspondence or files, including and internet traffic. Upon separation from the school district, an employee's files become the property of the school district. 2. In the event that disciplinary action, as per the procedures specified in the collective bargaining agreement, is taken against a member, beyond suspension of account privileges, the employee shall have the right to representation. A meeting will be conducted to determine appropriate disciplinary actions. Page 3 of 5 Rev 5-09

4 3. All information, services and features contained on district or network resources are intended for the private use of its registered users and use of these resources for commercial, for profit or other unauthorized purposes (i.e. advertisements, political lobbying), in any form is expressly forbidden. 4. The district does not warrant that functions of the system will meet any specific requirements that user may have, or that it will be error-free or uninterrupted; nor shall the district be liable for any direct or indirect, incidental, or consequential damages (including loss of data, information, or time) sustained in connection with the use, operation, or inability to use the system. 5. Network and Internet access is provided as a tool for educational purposes. The district reserves the right to monitor, inspect, copy, review, and store files and documents at any time, without prior notice, any and all usage of the computer network and Internet access and any and all information transmitted or received in connection with such usage. 6. All files shall be and remain the property of the district and no user shall have any exception of privacy regarding such materials. 7. Except for very limited exceptions, s generated by staff members are public records, and available upon request. G. STAFF RESPONSIBILITIES FOR STUDENT USAGE 1. Student use should be limited to curriculum related material. Actively monitor students to attempt to prevent students from downloading movies and music and from using , chat, on-line games and instant messaging except when used for instructional purposes and within copyright regulations. 2. Actively monitor students to try and prevent tampering with hardware (wiring, etc.). 3. Report any use violations to school administration and the Technology Office as soon as possible. Report any network equipment tampering to school administration and the Technology Office immediately. 4. Allow students to use computers only in locations with adult supervision. 5. Password protect all grade books of classes in grades PK Staff should not permit students to view or enter confidential information pertaining to other students. Page 4 of 5 Rev 5-09

5 STAFF PROCEDURES FOR ACCEPTABLE USE OF / NETWORK AND INTERNET Return to building principal. Failure to sign may result in loss of network privileges. I have read, understand and agree to abide by the terms of the foregoing Staff Procedures for Acceptable Use of /Network and Internet. Any misuse of the account, by the account holder, could result in suspension of the account privileges and/or other disciplinary action as determined by the district and per procedures specified in the collective bargaining agreement, including but not limited to termination of employment as prescribed by law. Date Staff Member Name (PLEASE PRINT) Staff Member Signature Building/Department Page 5 of 5 Rev 5-09