Acceptable Use Policy

INFORMATION TECHNOLOGY RESOURCES

The school's information technology resources, including email and Internet access, are provided for educational purposes. ISPS reserves the right to monitor the use of all technology on campus, including but not limited to computers, mobile devices, networking equipment, and school wi-fi connections. All users should be mindful that internet usage on the school’s premises may be monitored. No expectation of privacy is implied.

Access to the school network and the internet is a privilege that is tied to responsibilities. The school may restrict, suspend, or terminate any user's access to the school's technology systems and network for not respecting these guidelines. Adherence to the following policy is necessary for continued access to these resources.

Students must:

1. Respect and protect the privacy of others.

  • Use only assigned accounts. Accessing other people's accounts in any form, is not allowed.
  • Do not view, use, or copy passwords, data, or networks to which they are not authorized.
  • Do not distribute private information about others or themselves.

2. Respect and protect the integrity, availability, and security of all electronic resources.

  • Observe all network security practices, as posted.
  • Report security risks or violations to a teacher or network administrator.
  • Do not destroy or damage data, networks, or other resources that do not belong to them.
  • Do not download, copy, or install media onto school computers or devices.
  • Do not download any software to the ISPS network or school devices except where it has been approved and authorized by the network administrator or designate.
  • Conserve, protect, and share these resources with other students and Internet users. (i.e. return laptops to the cart and plug in to recharge for the next user.)

3. Respect and protect the intellectual property of others.

  • Do not infringe copyrights (no making, distributing, or downloading illegal copies of music, games, or movies). Copyright information is available in the library.
  • Do not plagiarize.
  • Forgery or attempted forgery of email messages or other electronic documents is prohibited.
  • Reading, deleting, copying, or modifying any electronic documents of other users is prohibited.

4. Respect and practice the principles of community.

  • Communicate only in ways that are kind and respectful. Any online communication should be something you could say in person: this includes emails, instant messages, digital images/videos, or web postings.
  • Report threatening or discomforting materials to a teacher.
  • Do not intentionally access, transmit, copy, or create material that violates the school's code of conduct (such as messages that are pornographic, threatening, rude, discriminatory, or meant to harass).
  • Do not intentionally access, transmit, copy, or create material that is illegal (such as obscenity, stolen materials, or illegal copies of copyrighted works).
  • Do not use the resources to further other acts that are criminal or violate the school's code of conduct.
  • Do not buy, sell, advertise, or otherwise conduct business, unless approved as a school project
  • The primary purpose of ISPS Gmail accounts is for school related communication that serves the teaching and learning at ISPS. Students should not use their Gmail for personal messages during class time unless related to assignments.
  • Do not send spam, chain letters, or other mass unsolicited mailings. Students may not send an email to a whole class, an entire grade level, or any group within the school. Such communications should be processed through a faculty member and/or posted in school announcements
  • Derogatory, obscene, or otherwise inappropriate e-mail exchanges, instant messages, digital images, or web postings are considered cyber-bullying and are prohibited.
  • Any form of cyber-bullying will be dealt with swiftly and may carry severe consequences.
  • Posting images or videos of others, without their permission, may lead to unforeseen consequences. In no instance should photos, audio, or videos of ISPS staff members be posted online without their permission.

5. Use social media responsibly.

  • ISPS students are expected to use the Internet responsibly and productively for educational use. Personal Internet browsing, including social media use, on any device during instructional time, is not permitted when unrelated to school business or professional development.
  • Students are forbidden from using social networks to post or display comments about co-workers, classmates, supervisors or ISPS that are vulgar, obscene, defamatory, threatening, harassing, or that are a violation of ISPS policies on discrimination or harassment.
  • Pictures, audio, or video of students or staff are not to be posted by students without the express permission of persons depicted (including parents of students), along with teacher or administrative approval, as applicable.
  • ISPS students should keep in mind that they are personally responsible for what they post online and should be mindful that what they say will be available publicly for a long time.

6. Bring Your Own Device BYOD:

Each user is responsible for his/her own use, and should treat and use technology responsibly and appropriately, computers and computer accessories are sophisticated devices that require care and gentle treatment to function properly; if you mistreat your device it will likely run poorly or malfunction.

A. Technology Maintenance

    a. Externally
        • Users are responsible for taking care of their devices and related accessories and are cautioned never to leave them unsupervised but to secure them in lockers when not in use.
        • Users are responsible for taking care of audio/visual equipment when in their possession.
        • Users are cautioned about how they utilize their equipment during daily activities like eating, drinking, walking and traveling.

    b. Damage
        • In the case of damage caused by negligence, the user of the device is responsible for repairs or a replacement.
        • Each technology user must be responsible for keeping their device in working order.

    B. Ethical use of Technology: Students may use digital devices in supervised areas including classrooms, the cafeteria, and the library.

    a. Software
        • Users must not download any software while on the ISPS network except where it has been approved and authorized by the network administrator or designate.

    b. Internet
        • As a mission driven school, the internet should be used to promote the instructional mission of ISPS .

    The following activities show responsible use of the internet:
        • Researching
        • Communicating
        • Web-based learning applications
        • Responsible social networking
        • Educational learning networks

    Unacceptable Use:
        • Online gaming (players outside ISPS) and downloading music/videos/software from the internet without permission and unrelated to academic work.
        • The internet provides access to information (e.g. pornographic materials, vulgarity, gambling, militant/extremist material, hate speech, etc.) that is inconsistent with ISPS ' mission. Users may not access, store, share, or display such information.
        • Any malicious attempt to harm or destroy school technology equipment or materials, the data of another user, or any of the institutions, or other networks that are connected to the internet is prohibited.

    C. Communication Tools

        • Individual teachers may have specific policies regarding the use of technology devices in their classrooms. These policies should be respected at all times.
        • Students may use age-appropriate social networks to communicate responsibly with peers.

    7. Supervision and Monitoring:

    School and network administrators and their authorized employees monitor the use of information technology resources, including wi-fi connections to help ensure that uses are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any data found on the school's information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property. They may also use this information in disciplinary actions, and will furnish evidence of crime to law enforcement.

    8. Consequences

    • Deliberate attempts to violate ISPS’ AUP or to compromise, degrade, or disrupt system performance may result in restricted use of technology at school or other appropriate consequences, such as limiting, suspending or revoking a student's access to the school's technology systems or the network.
    • The student is further subject to the Disciplinary Code of Conduct and Consequences as published annually in the Parent-Student Handbook.

    Click to view a printable version

    Powered by Finalsite