Technology Acceptable Use Policy

This policy defines what constitutes acceptable use of Information and Communications (ICT) resources of the International School of Port of Spain (ISPS). The guidelines below apply to any and all digital devices students may be using in school, including but not limited to laptops, smartphones, tablets, mp3 players, etc. and extend to the school’s classroom computers.

Information and Communications Technology (ICT) Use Guidelines

The International School of Port of Spain (ISPS) uses information technology as one way of enhancing its mission to teach the skills, knowledge and behaviors students will need as responsible citizens in the global community. The school's technology infrastructure and network provides extraordinary opportunities to enhance student learning with a variety of technology tools and services. To ensure these resources are always available, it is imperative that all members of the learning community use technology in a manner consistent with our educational mission. 

Access to the school network and the internet is a privilege that is tied to responsibilities. The following guidelines are intended to help individual technology users understand responsible use. The school may restrict, suspend, or terminate any user's access to the school's technology systems and network for not respecting these guidelines. 

The school's information technology resources, including email and Internet access, are provided for educational purposes. ISPS reserves the right to monitor the use of all technology on campus, including but not limited to computers, mobile devices, networking equipment, and school Wi-Fi connections. All users should be mindful that internet usage on the school’s premises may be monitored. No expectation of privacy is implied. Adherence to the following policy is necessary for continued access to these resources.

STUDENTS MUST:

I. Respect and protect the privacy of others.

  • Use only assigned accounts.
  • Do not view, use, or copy passwords, data, or networks to which they are not authorized.
  • Do not distribute private information about others or themselves.

II. Respect and protect the integrity, availability, and security of all electronic resources

  • Observe all network security practices, as posted.
  • Report security risks or violations to a teacher or Systems Administrator or designate.
  • Do not destroy or damage data, networks, or other resources that do not belong to them.
  • Do not download any software to the ISPS network or school devices except where it has been approved and authorized by the Systems Administrator or designate.
  • Do not download, copy, or install media onto school computers or devices.
  • Conserve, protect, and share these resources with other students and Internet users. (i.e. return laptops to the cart and plug in to recharge for the next user.)

III. Respect and protect the intellectual property of others.

  • Do not infringe copyrights (no making, distributing, or downloading illegal copies of music, games, or movies).
  • Do not plagiarize.

IV. Respect and practice the principles of community.

  • Communicate only in ways that are kind and respectful.
  • Report threatening or discomforting materials to a teacher.
  • Do not intentionally access, transmit, copy, or create material that violates the school's code of conduct (such as messages that are pornographic, threatening, rude, discriminatory, or meant to harass).
  • Do not intentionally access, transmit, copy, or create material that is illegal (such as obscenity, stolen materials, or illegal copies of copyrighted works).
  • Do not use the resources to further other acts that are criminal or violate the school's code of conduct.
  • Do not send spam, chain letters, or other mass unsolicited mailings.
  • Do not buy, sell, advertise, or otherwise conduct business, unless approved as a school project.

V. Use social media and technology responsibly.

  • ISPS students are expected to use the Internet responsibly and productively for educational use.  Personal Internet browsing, including social media use, on any device during instructional time, is not permitted when unrelated to school business or professional development.
  • Students are forbidden from using social networks to post or display comments about co-workers, classmates, supervisors or ISPS that are vulgar, obscene, defamatory, threatening, harassing, or that are a violation of ISPS policies on discrimination or harassment.
  • Pictures, audio, or video of students or staff are not to be posted by students without the express permission of persons depicted (including parents of students), along with teacher or administrative approval, as applicable.
  •  ISPS students should keep in mind that they are personally responsible for what they post online and should be mindful that what they say will be available publicly for a long time.

STUDENTS MAY, if in accord with the policy above:

  • Design and post web pages and other material from school resources.
  • Use direct communications such as social networks or text messaging with a teacher's permission in that specific class.
  • Install or download software to personal devices only, if also in conformity with laws and licenses, with the permission of the Systems Administrator or designate and under the supervision of a teacher.
  • Use the resources for any educational purpose.

VI. Consequences for Violation

Violations of these rules may result in disciplinary action, including the restriction of the student's school email account and/or loss of a student's privileges to use the school's information technology resources, inclusive of internet access.

VII. Supervision and Monitoring

The School and Systems Administrator or designate and their authorized employees monitor the use of information technology resources, including but not limited to Wi-Fi connections, internet traffic, search engine results, to help ensure that users are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any data found on the school's information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property. They may also use this information in disciplinary actions, and will furnish evidence of crime to law enforcement.