3080-STUDENT COMPUTER & INTERNET USE POLICY

   Policy Number: 3080

Dated: 06/22/17

Updated:  05/18/2021

 

3080-STUDENT COMPUTER & INTERNET USE POLICY

(Download PDF by Clicking Title)

 

PURPOSE 

All computer resources at American Leadership Academy shall be used solely for legitimate and authorized academic, instructional, and research purposes.  ALA computer systems and networks are provided for actively enrolled students as a part of the academic program.  Students are encouraged to become proficient in the use of the computers as a means of enhancing their educational experience.  The school maintains a filtering database to block controversial and/or explicit material from being accessed by students.  However, widespread student use also necessitates certain rules of computer conduct.  Use of computer and internet resources is a privilege, not a right.  Therefore, access to computer and Internet resources may be disabled, suspended or revoked if abused.


REQUIREMENT FOR ACESS

Students have a responsibility to use the school’s computer resources in an efficient, ethical, and lawful manner.  ALA will not grant access to computers or Internet resources without prior authorization from the student’s parent or guardian.  The student and parent/guardian must completely read and sign the Student Computer Use Agreement before computer or internet access will be granted.


SYSTEM FILTERS

American Leadership Academy uses an Internet filtering system to assist in restricting access to Internet sites containing material that is obscene, pornographic, or harmful to minors. Even though the school takes reasonable efforts to block material that is obscene, pornographic, or harmful to minors, no filtering system or features will filter out all obscene, pornographic, harmful, or inappropriate material. It is the responsibility of the computer system user to maintain a high level of integrity to protect themselves and others from such inappropriate material. As used herein, references to the terms “obscene,” “obscenity,” “pornographic,” “pornography,” “child pornography”, and “harmful to minors” are defined by applicable state and federal laws, regulations, and cases.


POLICY PROCEDURES

1.  Use only the applications that have been installed by IT personnel.

2.  Use the computers and printers for educational purposes only.  

3.  Do not change the configuration of computer hardware, remove or replace cables of any kind, attach devices of any kind, change monitor settings, or modify computer hardware in any way.

4.  Use only your own account and password for all computer work. Do not share your account and password with others.

5.  Food and/or beverage are not to be consumed around computer equipment.


UNAUTHORIZED USES

American Leadership Academy has a right and duty to protect its valuable computer resources and to restrict student access to uses that are solely related to the students’ academic programs.  ALA reserves the right to define what unauthorized student uses are.  Unauthorized uses for students include but are not limited to the following:

        • Computer games that are not assigned course work;
        • Installation of personal software;
        • Entering chat rooms or instant messaging;
        • Entering or transmitting solicitations
        • Entering or transmitting of obscene material;
        • Sexual harassment or other forms of harassment aimed at others;
        • Sharing one’s own computer account with others, using another person’s accounts, or copying, modifying, replacing, or deleting any other user’s files;
        • Violation of copyright laws or using or copying software in ways that violate the terms of the license;
        • Entering, creating or transmitting computer viruses or any form of intentionally destructive programs;
        • Connecting/Disconnecting any device to the network or computer without permission;
        • Physically harming or defacing ALA computer equipment;
        • Changing or attempting to change computer settings, screen savers, backgrounds, mouse etc.
        • Printing of materials that have no academic or educational purpose;
        • Storage of personal files that serve no educational purpose;
        • Use of computer equipment designated for the use of school personnel;
        • Any attempt to bypass the school’s Internet filtering systems.

1.  Users are responsible for the security of their own account and password. Consequently, account owners are responsible for actions taken from their account by any person, whether or not the action was taken with the owner’s knowledge or permission.  Actions that violate these policies can result in immediate disabling, suspension, and/or revocation of the account owner’s privileges.

2.  Any person who has been authorized to use the computing resources shall be expected to regard all copyrighted personal or proprietary information. Any software, for which the school has obtained a license, will be used in accordance with the terms of the license.


INTERNET USE

The Utah State Core Standards require students to become effective and efficient users of online resources. Students need access to email and the Internet to meet these requirements. Employees and volunteers assigned to supervise student use of computers must ensure compliance with this policy and/or applicable administrative procedures, directives, and rules.  Although student use of the school’s computer system at school will be supervised by school staff, the school cannot guarantee that students will not gain access to inappropriate material.  While there is access to a multitude of beneficial informational resources, some material may not be appropriate.  Because information on the Internet appears, disappears, and changes, creating a “completely safe environment” is impossible.  The school’s focus is to provide the understanding and skills needed to use the Internet in a responsible way that is appropriate to students’ educational needs.  Parents or Guardians are encouraged to discuss these responsibilities with their children and advise them on the possible controversial and negative aspects of this technology.


RULES AND REGULATIONS

1.  Users are responsible for the security of their own account and password. Consequently, account owners are responsible for actions taken from their account by any person, whether or not the action was taken with the owner’s knowledge or permission.  Actions that violate these policies can result in immediate disabling, suspension, and/or revocation of the account owner’s privileges.

2.  Any person who has been authorized to use the computing resources shall be expected to regard all copyrighted personal or proprietary information. Any software, for which the school has obtained a license, will be used in accordance with the terms of the license.

3.  Use of appropriate language is required. Profanity or obscenity in written communication over the Internet is inappropriate as it is in all areas of school life.

4.  Accessing or downloading material that is obscene, pornographic, sexually explicit, sexually suggestive, harmful or otherwise inappropriate is prohibited, as is behavior that is harassing or antisocial.

5.  Downloading is limited to documents for school use only.

6.  Adhere to copyright laws. Users are expected to respect copyright issues regarding downloading and use of software, retrieval and citing of information and attributing authorship.

7.  Use of the Internet for any illegal activities is prohibited.

8.  Impersonation and anonymity are not permitted. Users must take responsibility for their actions and words.

9.  The teacher has the right to suspend or commence Internet privileges during their class period.


INSTRUCTION

Students shall be instructed in appropriate online behavior, including online safety, interacting with other individuals on social networking websites and in chat rooms, and regarding cyber-bullying awareness and response.  This instruction will be included in the curriculum for elementary keyboarding and required junior high and high school CTE courses.


NO EXPECTATION OF PRIVACY

ALA retains control, custody, and supervision over all computers, networks, email services, and Internet access owned, licensed, or leased by the school.  The school reserves the right to monitor all computer, email, and Internet activity by students.  Students have no expectation of privacy in files, disks, documents, etc., which have been created in, entered in, stored in, downloaded from, or used on ALA’s computer system.


STUDENT VIOLATIONS AND DISCIPLINE

Any student who violates this policy and/or applicable administrative procedures, directives, and rules governing the use of school computers may be subject to disciplinary action, such as losing computer use privileges, suspension, and expulsion.  Illegal uses by students of school computers may also result in referral to law enforcement authorities.


NO DISCLOSURE OF PERSONAL INFORMATION

For personal safety purposes in using the school’s email services and Internet access, computer system users are advised not to disclose personal information such as home addresses, home telephone numbers, social security numbers, etc.


REVOCATION OF USE

Access and use of the school’s computers, networks, email services, and Internet access is a privilege and not a right.  This privilege may be revoked at any time for failure to comply with the terms and conditions of this policy and/or applicable administrative procedures, directives, and rules.


ACCEPTABLE USE AGREEMENTS

Each school year, every student authorized to access the school’s computers, networks, email services, and Internet access shall be required to provide the school a “Student Computer Acceptable Use Agreement” signed by the student and a parent/legal guardian stating that they have read the Agreement and this policy and that they agree to comply with the terms and conditions set forth therein.