With students and staff bringing in their own devices we found a need to completely rework our acceptable use policy. In its previous form, our AUP read more like an unacceptable use policy. It spent more time highlighting what a student could NOT do, rather than what they could do.
Developing an AUP was a process. We spent considerable time reviewing other AUPs as well as researching effective acceptable use policies. Broadly, our goals were:
- Develop an AUP that outlined appropriate behavior in positive terms
- Outline the procedures involved with following or not following the AUP
At the beginning of the year, students and staff sign off electronically that they have received the AUP. This allows us to track acknowledgements easily as well as save us the hassle of tracking paper sign-offs.
Sign-offs are completed through a combination of Google Forms and a Google Site. A student’s google username is recorded on sign-off.
Oak Hills Acceptable Use Policy
We in the Oak Hills Local School District are pleased to be able to offer our students, staff and guests access to computer technology, including access to the Internet, certain online services, and the Oak Hills information technology network. We are dedicated to access and support of appropriate technology which unlocks our potential and connects us locally and globally. We envision a learning environment where technology is a part of us, not apart from us.
We believe that the tremendous value of technology and the information technology network as an educational resource far outweighs the potential risks. We will leverage existing and emerging technology as a means to learn and thrive in the 21st Century and prepare our students for success toward their goals in the competitive global, electronic age. We feel that access to the tools and resources of a world-wide network and understanding when and how these tools are appropriately and effectively used are imperative in each student’s education. However, if parents feel they do not want their child to have Internet access, then they will be responsible for informing their child’s teachers, in writing, before the end of the second week of school.
The school’s information technology resources, including email and Internet access, are provided for educational purposes. If you have any doubt about whether a contemplated activity is acceptable, consult with your immediate teacher, supervisor, or director to help decide if a use is appropriate. Adherence to the following policy is necessary for continued access to the school’s technological resources:
Users must respect and protect the privacy of others by:
- Using only assigned accounts.
- Only viewing, using, or copying passwords, data, or networks to which they are authorized.
- Refraining from distributing private information about others or themselves.
Users must respect and protect the integrity, availability, and security of all electronic resources by:
- Observing all district Internet filters and posted network security practices.
- Reporting security risks or violations to a teacher or network administrator.
- Not destroying or damaging data, networks, or other resources that do not belong to them, without clear permission of the owner.
- Conserving, protecting, and sharing these resources with other users.
- Notifying a staff member or administrator of computer or network malfunctions through the creation of a service request.
Users must respect and protect the intellectual property of others by.
- Following copyright laws (not making illegal copies of music, games, or movies).
- Citing sources when using others’ work (not plagiarizing).
Users must respect and practice the principles of community by:
- Communicating only in ways that are kind and respectful.
- Reporting threatening or discomforting materials to a teacher or administrator.
- Not intentionally accessing, transmitting, copying, or creating material that violates the school’s code of conduct (such as messages/content that are pornographic, threatening, rude, discriminatory, or meant to harass).
- Not intentionally accessing, transmitting, copying, or creating material that is illegal (such as obscenity, stolen materials, or illegal copies of copyrighted works).
- Not using the resources to further other acts that are criminal or violate the school’s code of conduct.
- Avoiding spam, chain letters, or other mass unsolicited mailings.
- Refraining from buying, selling, advertising, or otherwise conducting business, unless approved as a school project.
Users may, if in accord with the policy above:
- Design and post web pages and other material from school resources.
- Communicate electronically via tools such as email, chat, text, or videoconferencing (students require a teacher’s permission).
- Install or download software, if also in conformity with laws and licenses, (students must be under the supervision of a teacher).
- Use the resources for any educational purpose.
Consequences for Violation.
Violations of these rules may result in disciplinary action, including the loss of a user’s privileges to use the school’s information technology resources. Further discipline maybe imposed in accordance with the Board’s Code of Conduct up to and including suspension or expulsion depending on the degree and severity of the violation.
Supervision and Monitoring.
The use of District owned information technology resources is not private. School and network administrators and their authorized employees monitor the use of information technology resources to help ensure that uses are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any data found on the school’s information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property. They may also use this information in disciplinary actions, and will furnish evidence of crime to law enforcement.
The district reserves the right to determine which uses constitute acceptable use and to limit access to such uses. The district also reserves the right to limit the time of access and