EDCA-R LRSD Board Policy

Published by jackbgarvey on Wed, 04/02/2014 - 09:10

LITTLE ROCK SCHOOL DISTRICT NEPN CODE:  EDCA – R

AUTHORIZED USE OF COMPUTER NETWORKS REGULATIONS

  1. Purpose

The Internet and its vast access to information provide an enormous resource for education and assistance in our goal to increase student achievement and professional development.   The computer, computer related devices and software are valuable tools in the efforts of successful educational process. This, combined with the need of creating and maintaining a safe educational environment require the need for an adequate acceptable use policy for the Little Rock School District.

Little Rock School District Responsibilities

The Little Rock School District will take the following steps to assure proper use of the computer network:

  • Teachers and/or support staff will supervise Internet sessions while in the classroom or computer lab.
  • Filtering and network management software will be used to limit the risk of inappropriate material being accessed by students and other users.  These programs monitor ‘http’ traffic and block inappropriate content based on an expanding database of sites and information related to trends in best practices, known information and constant system monitoring.
  • Teachers will be provided with training and resources to understand the current trends and policies of Internet usage and safety practices.
  • Staff will be required to instruct students on the proper use of Internet resources enabling them to make appropriate choices for appropriate content and its use.
  • Current virus protection and anti-Spyware software will be used as an added layer of protection for users against malicious software that may otherwise expose students and other users to inappropriate or harmful material.

Definitions

Asynchronous Communication:  A type of communication protocol that allows an amount of time to pass between communications.  This communication includes but is not limited to emails, discussion forums, weblogs (blogs) and social networking sites (MySpace, Facebook, etc).

Synchronous Communication:  A type of communication protocol that allows users to communicate instantly in real time.  This communication includes but is not limited to cell phones chat rooms, instant messages, voice over IP and certain 3D environments.        

Users

a. Users are defined as authorized personnel as defined by the Little Rock School District to operate computers, computer-related devices and other technology related equipment within the boundary of use of the District.

b. Users are described but not limited to: administrators, teachers, students, substitutes, long-term substitutes, parents, support staff and District authorized guests who are defined as vendors and presenters.

c. The amount of access to the District equipment and network for each of these uses will be determined by function and need by the appropriate technology personnel.

Social Networks:  Websites that are “virtual communities” of people with common interest who are invited to share likes and dislikes on any particular subject, cause and/or theme or to just have an online meeting place for extemporaneous discussion.  Members create accounts that consist of biographical information including but not limited to birthdays, gender, photos, occupation and email addresses.  Communication consists of both synchronous and asynchronous communication such as chat, voice over IP, blogs, discussion forums, and video.

CIPA- Children’s Internet Protection Act

  • Under CIPA, schools and libraries subject to CIPA do not receive the discounts offered by the "E-Rate" program (discounts that make access to the Internet affordable to schools and libraries) unless they certify that they have certain Internet safety measures in place. These include measures to block or filter pictures that: (a) are obscene, (b) contain child pornography, or (c) when computers with Internet access are used by minors, are harmful to minors;
  • Schools subject to CIPA are required to adopt a policy to monitor online activities of minors; and
  • Schools and libraries subject to CIPA are required to adopt a policy addressing: (a) access by minors to inappropriate matter on the Internet and World Wide Web; (b) the safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications; (c) unauthorized access, including so-called "hacking," and other unlawful activities by minors online; (d) unauthorized disclosure, use, and dissemination of personal information regarding minors; and (e) restricting minors' access to materials harmful to them. CIPA does not require the tracking of Internet use by minors or adults.

FERPA- Family Educational Rights Privacy Act

  • The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g; 34 CFR Part 99) is a Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education.
  • FERPA gives parents certain rights with respect to their children's educational records. These rights transfer to the student when he or she reaches the age of 18 or attends a school beyond the high school level. Students to whom the rights have transferred are "eligible students."

Flaming:  To send an e-mail message that is abusive or that offends.  Typing in all capital letters is considered shouting and may be offensive.

Internet:  A network of computer networks.  Networks in the Internet are connected so they can communicate with each other regardless of their manufacture.

Spamming:  To send an annoying or unnecessary message to a large number of people.  An example might be a chain letter asking a user to forward the message to x number of people.

Virus:  A computer program that uses various techniques to duplicate itself and travel between computers.  Viruses can cause serious damage to computers such as erasing important data or crashing a system.  

Spyware: This is a program designed to collect personal information about the user for exploitation which may or may not be for financial gain.

Cyber bullying:  The intentional act of posting, transmitting or the displaying of embarrassing, defaming and/or untrue information about a particular person or persons for the purpose of causing intimidation, ridicule, threat ,harassment, embarrassment and/or an act of violence toward a student or public school employee. This behavior substantially disrupts the educational process within the classroom, overall school climate and the orderly operation of the school and the educational environment.  The information is communicated through all forms of electronic communication including but not limited to text messaging, weblogs, podcast and social networking sites such as but not limited to MySpace, Face Book, and Youtube. 

II.Regulations

General

1.  Computers, computer related devices, telephonic and other communication devices and networks are provided for conducting school business and for the educational development of students and staff.  They are not intended for private or personal use.

2. Users of the network are responsible for following local, state, federal and     international laws.  This includes copyright laws.

3. Users are responsible for the use of their own account, including security and proper use.    Users are not to allow others to use their username and password.  Access to other user profiles is reserved for authorized network administrators.  Users assigned usernames and passwords are responsible for safeguarding this information, and will be held accountable for the consequences of intentional or negligent disclosure of this information.

4. Users are responsible for respecting the policies of other networks, which they access, and for adhering to those policies.

5. Users may not deliberately damage or disrupt a network, computer or computer related device, telephonic or other communication device, and/or removable media that they have been given authorized use.  System components such as hardware, software, or other property will not be removed, destroyed, modified, or abused.  Examples of activities that are prohibited:   altering security codes or passwords and introducing computer viruses and/or malware, removing memory chips, hard drives and other hardware components.

6. No LRSD network, phone, or computer system will be used to terrorize, intimidate, threaten, or harass.

7. Users will not use the LRSD network for financial or commercial gain or to advertise, promote or endorse products or personal services.

8. The District will not be responsible for financial obligations or legal infractions arising from unauthorized use of the system.

9. Network resources, information, Internet and intranet traffic, folders, drives, District provided removable media and electronic mail have no expectation of privacy.  Routine maintenance and monitoring of the system may lead to the discovery that a violation of a law or regulation has occurred.  If there is reasonable suspicion that a law or regulation has been violated, an investigation will be conducted, and items seized and searched. Any suspected illegal activity in the District which may or may not be computer or network related in nature may result in the search of said resources.

10. Long-term substitutes may be granted network privileges at the request of the principal.  If granted, the long-term substitute must sign the Employee Use Agreement.

Hardware

11. Only authorized individuals will install, service, or maintain District owned hardware.

12. All personal hardware such as media players of any kind and their content are subject to LRSD policies that refer to electronic communication devices.

 

Software

13. Only software that is authorized by the District may be installed on computer hardware.

14. Only authorized individuals will install software on District equipment.

 

Internet

15. The primary purpose of providing Internet access to employees is for conducting official business.  The purpose of providing Internet access to students is for educational benefit only.

16. Before a student is allowed to access the Internet, a Student Use Agreement must be signed by both the student and parent.  Students and parents will sign the AUP each time a student enrolls at a new campus.

17.E-mail accounts will be issued to District employees and secondary students in grades 6-12.  Elementary students will not be issued individual e-mail accounts but may be provided access to e-mail through a classroom account.

18. Users will not post personal contact information about themselves or other people.

19. Users are not allowed to intentionally transmit or receive obscene, pornographic, or inappropriately suggestive content or language in the form of images, files or multimedia files types through any synchronous or asynchronous communication device or software used in the Little Rock School District.

20.All users should observe network etiquette.  Users are expected to be polite and use appropriate language.  Using vulgar or profane language is not appropriate.  Engaging in flaming or spamming is not appropriate. Students are prohibited from using chat rooms and instant messenger services.  Participation in cyber bullying (original, secondary, or distributed), is prohibited.

21. Use of the system to access, store, or distribute obscene, pornographic, or inappropriately suggestive material is prohibited.

22. Use of the LRSD networks and computers to access, store, or distribute materials or sites that are considered racially derogatory or “hate sites” is strictly prohibited.

23. Students are to report immediately any inappropriate material they access to a teacher or other staff person.  Students are not to share inappropriate materials or their sources with other students.

 

Supervision of the Computer Network

24. Coordination of the District computer network is under the supervision of the Superintendent or designee.  At the building level, the principal or designee will be responsible for coordination of activities related to the network.

25. The principal or designee will establish a system that ensures that all employees and students receive instruction in District policies that address computer systems and networks.  The principal or designee will also establish a process for supervision of students using the system and will maintain user and account agreements.

26. The principal or designee will establish a process for reviewing these regulations with employees annually.  The Employee Use Agreement must be signed by all employees.  The students will sign the Acceptable Use Policy, once in Elementary, Middle and Senior High.  Parent’s signature will be required even when a student transfers to another school.

 

District Communication Devices (telephones/cellular phones)

The Little Rock School District will utilize cellular telephones and classroom telephones to enhance learning and to improve communication between schools, parents and the community. In order to maximize the use of these devices and to prevent potential abuse of these instruments, employees must be aware of, and agree to abide by, certain regulations.

27. The assignment of cellular telephones to an individual, school or department must  be approved in writing by the respective Associate Superintendent. The need for the cellular telephone must be stated in writing so that the Associate Superintendent can adequately consider the request.

28. Cellular telephones assigned to district personnel may be used to conduct district business and for limited personal use.  Cellular telephones should not be used in lieu of office telephones. Personal calls will be reimbursed to the district by the employee at contract rate. If roaming or long distance charges are incurred for personal calls, those charges will be reimbursed by the employee at the actual billed amount. Employees are to reimburse the district for personal cell phone calls made during "peak" business hours" (PBH). PBH phone calls are identified with a "P" under the type column of the Cellular bill and are generally between 6:00 am and 9:00 pm Monday thru Friday.   (Refer to the Procurement Web Page for the current rate).  Abuse of the personals use guideline may result in denial of cellular privileges. A random sampling of telephone bills will be completed quarterly by the Internal Auditor to determine if exorbitant personal use occurs. Employees failing to reimburse the district may have their payroll check deducted for the calls.

29. The LRSD will employ classroom telephones to enhance learning and to improve communications with parents. Teachers will program classroom telephones and personal cellular telephones not to ring during class to prevent disruption of instruction time. Teachers may retrieve voice mail messages and return calls during planning periods, class changes, lunch and before/after school. Classroom telephones will not be used for any commercial activity.  Teachers must closely supervise student use of classroom telephones which will require a confidential access code. These codes will not be shared for any reason with students or with other staff members. Teachers will not use the telephone during class periods except for incorporation as a learning tool.  Personal calls during class are prohibited.  Telephone privileges may be cancelled if privileges are abused. Staff members must attend telephone training and sign a telephone use agreement form in order to receive an access code for telephone privileges.

 

Penalties for Non-Permitted Activities

27. Any user who violates this policy and accompanying regulations is subject to loss of computer, phone, and network privileges as well as other District disciplinary actions.

 

 

Revised:  July 24, 2008
Revised:  April 24, 2008
Date:        March 23, 2006

 

 

Little Rock School District

Authorized Use of Computer Networks

Student Use Agreement

 

Student Section

School________________________________________________________________

Student Name________________________________   Grade______________________

I have read the District Authorized Use of Computer Networks Policy. I agree to follow the rules contained in this policy. I understand that if I violate the rules my computer privileges can be terminated and I may face other disciplinary measures.

Student Signature_______________________________Date______________________

Parent or Guardian Section

I have read the District Authorized Use of Computer Networks Policy.

I hereby release the District, its Board of Directors, staff, employees, and any institutions with which it is affiliated, from any and all claims and damages of any nature arising from my child’s use of, or inability to use, the District computer network. This includes but is not limited to claims that may arise from the unauthorized use of the system to purchase products or services.

I will instruct my child regarding any additional restrictions I wish to be followed in addition to those outlined in these regulations. I will emphasize to my child the importance of following the rules for personal safety.

 

                  I give permission for my child to participate in the District’s electronic communications system and certify that the information contained on this form is correct.

                   I do not give permission for my child to participate in the District’s electronic communications system.

 

Parent Signature___________________________________Date___________________

 

Print Parent Name_______________________________________

 

Home Address______________________________________Phone_________________

 

Parent’s e-mail address____________________________

 

 

Little Rock School District

Authorized Use of Computer Networks

Employee Use Agreement

 

 

 

 

School or Department______________________________________________________

 

Employee Name__________________________________________________________

 

Employee access to the District’s computer network is primarily to be used as a tool in the performance of the employee’s job.

 

****

 

I have read the District Authorized Use of Computer Networks Policy. I agree to follow the rules contained in this policy. I understand that if I violate the rules my account can be terminated and I may face other disciplinary action.

 

Employee signature____________________________________Date________________