Student Internet and Computer Access
Students are expected to use computers and the Internet as an educational resource. The following procedures and guidelines govern the use of computers and the Internet at school.
I. Student Expectations in the Use of the Internet
A. Acceptable Use
1. Students may use the Internet to conduct research assigned by teachers.
2. Students may use the Internet to conduct research for classroom projects.
3. Students may use the Internet to gain access to information about current events.
4. Students may use the Internet to conduct research for school-related activities.
5. Students may use the Internet for appropriate educational purposes.
B. Unacceptable Use
1. Students shall not use school computers to gain access †to material that is obscene, pornographic, harmful to minors, or otherwise inappropriate for educational uses.
2. Students shall not engage in any illegal or inappropriate activities on school computers, including the downloading and copying of copyrighted material.
3. Students shall not use electronic mail, chat rooms, instant messaging, or other forms of direct electronic communications on school computers unless instructed by teacher.
4. Students shall not use school computers to participate in on-line auctions, on-line gaming or mp3 sharing systems including, but not limited to Aimster or Freenet and the like.
5. Students shall not disclose personal information, such as their names, school, addresses, or telephone numbers outside the school network.
6. Students shall not use school computers for commercial advertising or political advocacy of any kind without the express written permission of the system administrator.
7. Students shall not publish web pages that purport to represent the school district or the work of students at the school district without the express written permission of the system administrator.
8. Students shall not erase, rename or make unusable anyone elseís computer files, programs or disks.
9. Students shall not share their passwords with fellow students, school volunteers or any other individuals, and shall not use, or try to discover, another userís password.
10. Students shall not copy, change or transfer any software or documentation provided by the school district, teachers or another student without permission from the system administrator.
11. Students shall not write, produce, generate, copy, propagate or attempt to introduce any computer code designed to self-replicate, damage, or otherwise hinder the performance of any computerís memory, file system, or software.† Such software is often called, but is not limited to, a bug, virus, worm, or Trojan Horse.
12. Students shall not configure or troubleshoot computers, networks, printers or other associated equipment, except as directed by a teacher or the system administrator.
13. Students shall not take home technology equipment (hardware or software) without permission of the system administrator.
†††††††††††††††††† 14. ††† Students shall not forge electronic mail messages or web pages.
A. Methods of Enforcement
1. The district monitors all Internet communications, Internet usage and patterns of Internet usage.† Students have no right of privacy to any Internet communications or other electronic files.† The computer system is owned by the school district.† As with any school property, any electronic files on the system are subject to search and inspection at any time.
2. The school district uses a technology protection measure that blocks access to some Internet sites that are not in accordance with the policy of the school district.† Standard use of the Internet utilizes a proxy server-based filter that screens for non-curriculum related pages.
3. Due to the nature of filtering technology, the filter may at times filter pages that are appropriate for student research.† The system administrator may override the technology protection measure for the student to access a site with legitimate educational value that is wrongly blocked.
4. The school district staff will monitor students' use of the Internet through direct supervision and by monitoring Internet use history to ensure enforcement of the policy.
B. Consequences for Violation of this Policy
1. Access to the schoolís computer system and to the Internet is a privilege, not a right.† Any violation of school policy and rules may result in:
a. Loss of computer privileges;
b. Short-term suspension;
c. Long-term suspension or expulsion in accordance with the Nebraska Student Discipline Act; and
d. Other discipline as school administration and the school board deem appropriate.†
2. Students who use school computer systems without permission and for non-school purposes may be guilty of a criminal violation and will be prosecuted.†
Adopted on: July 13, 2009
Revised on: _________________________
Reviewed on: June 9, 2014
Reviewed on March 14, 2016