top of page
Search
Writer's pictureBrett Saucier

IJNDB-R

Updated: Feb 7, 2020

NEPN/NSBA Code:  IJNDB-R


STUDENT COMPUTER AND INTERNET USE RULES


These rules accompany Board policy INJDB (Student Computer and Internet Use). Each student is responsible for his/her actions and activities involving school unit computers, networks and Internet services, and for his/her computer files, passwords and accounts.   These rules provide general guidance concerning the use of the school unit's computers and examples of prohibited uses. The rules do not attempt to describe every possible prohibited activity by students.  Students, parents/guardians and school staff who have questions about whether a particular activity is prohibited are encouraged to contact a building administrator or the Technology Director


A. Consequences for Violation of Computer Use Policy and Rules


Student use of the school unit computers, networks and Internet services is a privilege, not a right.Compliance with the school unit's policies and rules concerning computer use is mandatory. Students who violate these policies and rules may have their computer privileges limited, suspended or revoked. Such violations may also result in disciplinary action, referral to law enforcement and/or legal action.


The building principal shall have final authority to decide whether a student’s privileges will be limited, suspended or revoked based upon the circumstances of the particular case, the student's prior disciplinary record and any other pertinent factors.


B. Acceptable Use


The school unit's computers, networks and Internet services are provided for educational purposes and research consistent with the school unit’s educational mission, curriculum and instructional goals.


All Board policies, school rules and expectations concerning student conduct and communications apply when students are using computers.


Students are also expected to comply with all specific instructions from teachers and other school staff or volunteers when using the school unit's computers.


C. Prohibited Uses


Examples of unacceptable uses of school unit computers that are expressly prohibited include, but are not limited to the following:

1. Accessing Inappropriate Materials – Accessing, submitting, posting, publishing, forwarding, downloading, scanning or displaying defamatory, abusive, obscene,  vulgar, sexually explicit, sexually suggestive, threatening, discriminatory, harassing and/or illegal materials.

2. Illegal or Prohibited Activities – Using the school unit’s computers, networks and Internet services for any illegal activity or in violation of any Board policy or school rules, including “cyberbullying” and other harassing or discriminatory conduct. The school unit assumes no responsibility for illegal activities of students while using school computers.

3. Violating Copyrights – Copying, downloading or sharing of any type of copyrighted materials (including music or films) without the owner's permission. The school unit assumes no responsibility for copyright violations by students.

4. Copying Software - Copying or downloading software without the express authorization of the Technology Director is prohibited.  Unauthorized copying of software is illegal and may subject the copier to substantial civil and criminal penalties. The school unit assumes no responsibility for illegal software copying by students.

5. Plagiarism – Representing as one’s own work any materials obtained on the Internet (such as term papers, articles, music, etc.).  When Internet sources are used in student work, the author, publisher and Website must be identified.

6. Non-School Related Uses – Using the school unit’s computers, networks and Internet services for non-school-related purposes such as private financial gain, commercial, advertising or solicitation purposes, or for any other personal use not connected with the educational program or assignments.

7. Misuse of Passwords/Unauthorized Access- Sharing passwords, using other user’s passwords, and accessing or using other user's accounts.

8. Malicious Use/Vandalism- Any malicious use, disruption or harm to the school unit's computers, networks and Internet services, including but not limited to hacking activities and creation/uploading of computer viruses.

9. Unauthorized Access to Blogs/Social Networking Sites, Etc. – Accessing blogs, social networking sites, etc. without specific authorization from the supervising teacher.


D. No Expectation of Privacy


M.S.A. D. #60 computers remain under the control, custody and supervision of the school unit at all times.  Students have no expectation of privacy in their use of school computers, including e-mail, stored files and Internet access logs.


E. Compensation for Losses, Costs and/or Damages


The student and his/her parents/guardians are responsible for compensating the school unit for any losses, costs or damages incurred by the school unit for violations of Board policies and school rules while the student is using school unit computers, including the cost of investigating such violations.  The school unit assumes no responsibility for any unauthorized charges or costs incurred by a student while using school unit computers.


F. Student Security


A student is not allowed to reveal his/her full name, address, telephone number, social security number or other personal information on the Internet without prior permission from a teacher. Students should never agree to meet people they have contacted through the Internet without parental/guardian's permission. Students should inform their teacher if they access information or messages that are dangerous, inappropriate or make them uncomfortable in any way.


G. Network Security


The security of the school unit's computers, networks and Internet services is a high priority. Any student who identifies a security problem must notify his/her teacher immediately. The student shall not demonstrate the problem to others or access unauthorized material.  Any user who attempts to breach system security, causes a breach of system security or fails to report a system security problem shall be subject to disciplinary and/or legal action in addition to having his/her computer privileges limited, suspended or revoked.


H. Additional Rules for Laptops Issued to Students


1. Laptops are loaned to students as an educational tool and are only authorized for use consistent with the school's mission.

2. Before a laptop is issued to a student, the student and his/her parents/guardians must sign the AUTHORIZED USE OF SCHOOL OWNED MATERIALS & EQUIPMENT Form.

3. Students are responsible for the proper care of laptops at all times, whether on or off school property, including costs associated with repairing or replacing the laptop.  M.S.A.D. #60 has a shared risk pool to cover replacement costs and/or repair costs for damages not covered by the laptop warranty except for damage that is intentional or due to negligent / improper use.  Parents/guardians who choose not to participate should be aware that they are responsible for any costs associated with loss, theft or damage to a laptop issued to their child.

4. If a laptop is lost or stolen, this must be reported to the building principal immediately.  If a laptop is stolen, a report should be made to the local police and the building principal.

5. The Board's policy and rules concerning computer and Internet use and all other policies and rules apply to use of laptops at any time or place, on or off school property.  Students are responsible for obeying any additional rules concerning care of laptops issued by school staff.

6. Violation of policies or rules governing the use of computers, or any careless use of a laptop may result in a student's laptop being confiscated and/or a student only being allowed to use the laptop under the direct supervision of school staff.  The student will also be subject to disciplinary action for any violations of Board policies or school rules.

7. Parents/guardians will be informed of their child's login password.  Parents/guardians are responsible for supervising their child's use of the laptop and Internet access when in use at home.

8. The laptop may only be used by the student to whom it is assigned.

9. Laptops must be returned in acceptable working order at the end of the school year or whenever requested by school staff.


I. Additional Rules for Use of Privately-Owned Computers by Students


1. A student who wishes to use a privately-owned computer in school must complete a Student Request to Use Privately-Owned Computer form.  The form must be signed by the student, his/her parents/guardians, a sponsoring teacher, the school principal and the Technology Director.  There must be an educational basis for any request. 


2. The Technology Director will determine whether a student's privately-owned computer meets the school unit's network requirements.


3. Requests may be denied if it is determined that there  is not a suitable educational basis for the request and/or if the demands on the school unit's network or staff would be unreasonable.


4. The student is responsible for proper care of his/her privately-owned computer, including any costs of repair, replacement or any modifications needed to use the computer at school.


5. The school unit is not responsible for damage, loss or theft of any privately-owned computer.


6. Students are required to comply with all Board policies, administrative procedures and school rules while using privately-owned computers at school.


7. Students have no expectation of privacy in their use of a privately-owned computer while at school. The school unit reserves the right to search a student's privately- owned computer if there is reasonable suspicion that the student has violated Board policies, administrative procedures or school rules, or engaged in other misconduct while using the computer.


8. Violation of any Board policies, administrative procedures or school rules involving a student's privately-owned computer may result in the revocation of the privilege of using the computer at school and/or disciplinary action.


9. The school unit may confiscate any privately-owned computer used by a student in school without authorization as required by these rules. The contents of the computer may be searched in accordance with applicable law and policies.


Cross Reference:  IJNDB – Student Computer and Internet Use


Adopted: February 14, 2008


Revised: December 6, 2012

103 views

Recent Posts

See All

KF-E2

KF-E2 Hussey Auditorium Event Requirements Please complete this form and review it with the Auditorium Manager at least two weeks before...

KF-E1

Policy KF-E1 Facilities Use Form

Comments


Commenting has been turned off.
bottom of page