Acceptable Use Policy

The governing board intends that technological resources provided by Visions In Education shall be used in a safe and responsible manner in support of the instructional program and for the advancement of student learning. All students using these resources shall receive instruction in the proper and appropriate use.

Visions In Education will comply with Children’s Internet Protection Act (CIPA) and E-Rate requirements. This document outlines the rules governing parents/guardians and students use of school data communications networks, the intranet and internet safety, and to provide for the education of minors about appropriate online behavior, including interacting with other individuals on social networking sites and in chat rooms, and cyberbullying awareness and response.

Individuals affiliated with the school have numerous opportunities to use computing resources provided for school-related activities. However, access to these computing resources is a privilege and individual responsibilities accompany that privilege. It is the intention of the school to provide a non-hostile learning environment that minimizes the risk of offending, intimidating, harassing, or otherwise disrespecting other students or employees.

Restricting Access to Inappropriate Content
Charter schools that provide pupils with access to the internet or to an online service are advised to maintain a policy regarding access to sites that contain content that is inappropriate for the school setting.

Use of School Data Communications Networks and the Internet Safety Policy

Children’s Internet Protection Act Compliance: It is the policy of the charter school to:

(a) prevent user access over its computer network to, or transmission of, inappropriate
material via internet, electronic mail, or other forms of direct electronic communications;
(b) prevent unauthorized access and other unlawful online activity; (c) prevent unauthorized online disclosure, use, or dissemination of personal identification information of minors; and (d) comply with the Children’s Internet Protection Act (“CIPA”) [Pub. L. No. 106-554 and 47 USC 254(h)].

Definitions:
1. Network: Two or more computer systems linked to allow communication. The school’s network connects schools and support offices to provide data communications, such as e-mail, file sharing, and internet access.
2. Internet: A global network of interconnected networks.
3. World Wide Web: A global, hypertext-based information system accessible through the internet via HTTP protocol.
4. Universal Resource Locator (URL): The address of a source of information on the internet.
5. E-mail: Electronic mail messaging over communications network.
6. File server: A shared computer providing data storage and services to users.
7. School data: Information maintained and processed in the conduct of school business as required by state or federal mandate and/or school procedure. Confidentiality restrictions may apply to information maintained as school data records and to all copies of those records.
8. System administrator: Person(s) responsible for providing and/or managing network services (e.g., file servers, electronic mail, and internet services).
9. Security administrator: Person(s) responsible for providing network security.
10. Student Acceptable Use Policy: School guidelines for students and parents/guardians regarding acceptable use of the internet and school networks.
11. Master Agreement: A contract between a student and parent/guardian and a school containing a reference to acceptable use of the internet and school networks. This contract must be signed by the student and his/her parent/guardian upon enrolling at a school. A contract must be signed at each new school the student enrolls in.
12. Technology Protection Measure: A specific technology that blocks or filters internet access to visual depictions that are (a) obscene matter, as the term is defined in section 311 of the California Penal Code or section 1460 of Title 18, United States Code; (b) child pornography, as that term is defined in section
2256 of Title 18, United States Code; or (c) inappropriate for minors.
13.Harmful Matter: As defined in Section 313 of the Penal Code. For the purposes of this Policy, Harmful Matter is included in what is deemed “inappropriate” content and/or materials.
14. Sexual Act; Sexual Contact: As defined in section 2246 of Title 18, United States Code.
15. Minor: For the purposes of this administrative procedure, an individual who has not attained the age of 18.
16. Child Pornography: As defined in section 2256 of Title 18, United States Code.
17. Computer: Any hardware, software, or other technology attached or connected to, installed in, or otherwise used in connection with a computer.

ACCEPTABLE USE
The use of school network services is a privilege and is to be limited to school business as authorized by board policy. School-level practice should support and complement school policy and procedure and should be tied to specific curriculum goals and objectives. Use of the school’s network services by students, parents, and school employees should support school policy and procedure in the performance of their assigned duties.

PROHIBITED USE
1. Transmission of any material in violation of any federal or state law is prohibited. This includes, but is not limited to distribution of:

a. Any information that violates or infringes upon the rights of any other person.
b. Any defamatory, inappropriate, abusive, obscene, profane, sexually oriented, threatening, racially offensive, or illegal material.
c. Advertisements, solicitations, commercial ventures, or political lobbying.
d. Any information that encourages the use of controlled substances or the use of the system for the purpose of inciting crime.
e. Any material that violates copyright laws.

2. Any vandalism, unauthorized access, “hacking,” or tampering with hardware or software, including introducing “viruses” or pirated software, is strictly prohibited (California Penal Code section 502).
3. Cyberbullying – The use of modern communication technologies (such as listed below) to intentionally embarrass, humiliate, threaten or intimidate an individual or group via any of the following:

a. Email
b. Instant Messaging
c. Chat Rooms
d. Web Sites
e. Social Networking Sites
f. Cell Phones and other forms of technology

4. Harassment or illegal discrimination with regard to race, sex, color, creed, religion, age, national origin, disability, marital status, status with regard to public assistance, immigration status, sexual orientation, or membership or activity in a local commission.
5. Misuse of the school property, including, but not limited to, theft or damage to equipment or software, knowingly running or installing viruses, attempting to circumvent the installed technology protection measure, using the system for mayhem or to disrupt work and school activities, or attempting to degrade the performance of integrity of any campus network or computer system.

Warning
The school reserves the right to monitor internet/intranet, e-mail, and networked application usage. No student or employee should have any expectation of privacy as to his/her usage. The school reserves the right to inspect any and all files on school computers or school servers connected to school networks and to take custody and possession of those files and computers.

Inappropriate use may result in the cancellation of network privileges. The site system administrator(s) or school security administrator may close an account at any time deemed necessary. Depending upon the seriousness of the offense, any combination of the following will be enforced: Penal Code, Education Code, school procedures, or school site discipline.

Expectations
1. Etiquette: The use of the school’s data communications networks requires that users abide by accepted rules of network etiquette. These include, but are not limited to, the following:

a. Be polite. Do not send abusive, inflammatory, or obscene messages to others. Use language that is appropriate for an educational setting.
b. Respect privacy. Do not reveal personal information about students or staff.
c. Be considerate. Do not use the network in a way that would disrupt the use of the network by other users.

2. Electronic Mail: Users of electronic mail systems should not consider electronic communications to be either private or secure; such communications are subject to review by authorized school personnel and may be subject to review by the public under the Public Records Act. Other conditions for use include, but are not limited to, the following:

a. Individuals are to identify themselves accurately and honestly in e-mail communications. E-mail account names and/or addresses may not be altered to impersonate another individual or to create a false identity.
b. The school retains the copyright to any material deemed to be school data. Use of school data sent as e-mail messages or as enclosures will be in accordance with copyright law and school standards.
c. Messages relating to or in support of violent or illegal activities must be reported to appropriate authorities such as a school administrator.

RESPONSIBILITIES
Reasonable precautions by school staff: The school maintains reasonable precautions to restrict access to inappropriate content and materials that do not support approved educational objectives. Staff will choose resources on the internet that are appropriate for classroom instruction and/or research for the needs, maturity, and ability of their students.

1. Parents/guardians and students should understand that it is not possible to control all material on a public network and they accept responsibility for complying with school procedures and with standards of acceptable use.
2. Guidelines for parents/students. A copy of “Student Acceptable Use Policy” must be provided to the parents/guardians of students to whom the guidelines apply. Students and parents/guardians accept responsibility for abiding by the “Student Acceptable Use Policy” and understand that violation can result in loss of access privileges and disciplinary action.
3. Education, Supervision and Monitoring. It shall be the responsibility of all staff members of the school to educate, supervise and monitor appropriate usage of the online computer network and access to the internet in accordance with this procedure and CIPA, the Neighborhood Children’s internet Protection Act, and the Protecting Children in the 21st Century Act.
4. Procedures for disabling or otherwise modifying any technology protection measures shall be the responsibility of the Technology Department or designated representatives. The Technology Department will assist the school by providing training materials and online resources for age-appropriate training of students who use the school’s internet facilities.
5. The teacher shall be responsible for ensuring that each student receives this training before accessing the school’s internet facilities. The training provided will be designed to promote the school’s commitment to internet safety. Following receipt of internet safety training, the student will acknowledge that he/she received the training, understood it, and will adhere to the provisions of the school’s acceptable use policies.

TECHNOLOGY PROTECTION MEASURES
Technology Protection Measures: To the extent practical, technology protection measures (or “internet filters”) shall be used to block access to inappropriate information. Specifically, as required by CIPA, blocking shall be applied to visual depictions of material deemed obscene or child pornography, or to any material deemed inappropriate. Subject to staff supervision, technology protection measures may be disabled for adults or, in the case of minors, minimized only for bona fide research or other lawful purposes.

To the extent practical, steps shall be taken to promote the safety and security of users of the school online computer network when using electronic mail, chat rooms, instant messaging, and other forms of direct electronic communications. Specifically, as required by CIPA, prevention of inappropriate network usage includes (a) unauthorized access, including so-called ‘hacking,’ and other unlawful activities; and (b) unauthorized disclosure, use, and dissemination of personal identification information regarding
minors.

Security: Security on any computer system is a high priority, especially when the system involves many users. If any user identifies a security problem with school systems, he/she must notify the security administrator at the Technology Department, either in person, in writing, or via the network. Users should not demonstrate the problem to other users. Any user identified as a security risk or having a history of problems with other computer systems may be denied network access. Violations include, but are not limited to, the following:

1. Illicitly gaining entry, or “hacking,” into a computer system or obtaining account passwords.
2. Intentionally creating or distributing a computer virus.
3. Using school systems or equipment to knowingly disable or overload any computer system or network or to circumvent the security of a computer system.
4. Knowingly bypassing a school “firewall” used for blocking inappropriate internet sites and for security screening.

IMPLEMENTATION

1. The school shall provide a copy of “Student Acceptable Use Policy” to parent/guardian of each student before student is provided access to internet or any school network.
2. Students shall receive the internet safety training, in accordance with this procedure and will acknowledge that he/she received the training, understood it, and will adhere to this procedure and the school’s “Student Acceptable Use Policy.”
3. A student shall be provided access to internet or to the school network only after receipt of the training in this procedure and submitting to the school his/her signed “Master Agreement” which shall be retained at the school.

Get Your Free Info Kit

Ready? Click Here to Apply