United Public Schools

Descriptor Code: ACDA

Computer and Network Resource Policy

This Document constitutes a District-wide policy for the appropriate use of all United Public School #7 computing and network resources. It is intended to provide effective protection of individual users, equitable access, and proper management of those resources. These guidelines are intended to supplement, not replace, all existing laws, regulations, agreements, and contracts which currently apply to those resources.

Access to United Public School #7 networks and computer systems is granted subject to District policies and local, state, and federal laws. Appropriate use should always be legal and ethical, reflect community standards, and show restraint in the consumption of shared resources. It should demonstrate respect for intellectual property; ownership of data; system security mechanisms; and individuals’ rights to privacy and freedom from intimidation, harassment, and unwarranted annoyance.

United Public School #7 is not responsible for unacceptable or unethical use of the information technology environment including computer and computer networks or electronic communication system.

Appropriate Use

Appropriate use of information technology resources includes instruction; independent study; authorized research; and official work of the offices, recognized student and campus organizations, and extensions of United Public School #7.

Authorized use of United Public School #7 owned or operated computing and network resources is consistent with the education, research, and service mission of the District, and consistent with this policy.

Authorized users are: (1) faculty, staff, and students of the United Public School #7; (2) anyone connecting from a public information service; (3) others whose access furthers the mission of the District and whose usage does not interfere with other users’ access to resources.

It is your responsibility to be aware of the potential for and possible effects of your computer and network use. You are responsible for the security and integrity of United public School #7 information stored on your individual computing desktop system.

Confidentiality and Privacy

Authorized access to data or information entails both privilege and responsibility, not only for the user, but also for the system administrator. In general, the district will treat information stored on computers as confidential. However, there is no expectation of privacy or confidentiality for documents and messages stored on United Public School #7 – owned equipment. Additionally, e-mail and data stored on United Public School #7 network of computers may be accessed by the District for the following purposes:
a. Troubleshooting hardware and software problems
b. Preventing unauthorized access and system misuse
c. Retrieving District related information*
d. Investigating reports of violation of this policy or local, state or federal law*
e. Complying with legal requests for information*
f. Rerouting or disposing of undeliverable mail

*The System administrator will need specific approval from the superintendent or principal to access these items. The extent of the access will be limited to what is essentially necessary to acquire the information.

To the greatest extent possible in a public setting individuals’ privacy should be preserved. However, privacy or confidentiality of documents and messages stored on United Public School #7-owened equipment cannot be guaranteed. Users of electronic mail systems should be aware that, in addition to being subject to authorized access, electronic mail in its present form cannot be secured and is , therefore, vulnerable to unauthorized access and modification by third parties.

Examples of Prohibited Use

Use of United Public School #7 network and computer systems is conditioned upon compliance with this and other District policies and all applicable laws. Though not exhaustive, the following list is provided to emphasize that these activities are NOT allowed on United Public School #7 networks or computer systems:
a. Using facilities, accounts, access codes, privileges or information for which you are not authorized:
b. Sharing your user login and password information with others;
c. Viewing, copying, altering, or destroying anyone’s files without explicit permission from that individual;
d. Representing yourself electronically as another user;
e. Unlawfully harassing others;
f. Creating and/or forwarding chain letters;
g. Posting or mailing obscene materials;
h. Game playing that interferes with academic or administrative use by others;
i. Making, distributing, or using unauthorized copies of licensed software;
j. Unauthorized copying, reproducing, or redistributing others’ text, photos, sound, video graphics, designs or other information formats;
k. Obstructing others’ work by consuming large amounts of system resources, such as disk space, CPU time and etc.;
l. Unauthorized testing of systems and/or resources, such as using program loops, introducing destructive software e.g., “virus” software or attempting system crashes;
m. Running or otherwise configuring software or hardware to intentionally allow access by unauthorized users;
n. Attempting to circumvent or subvert any system’s security measures;
o. Advertising for commercial gain;
p. Distributing unsolicited advertising;
q. Disrupting services, damaging files or intentionally damaging or destroying equipment, software or data belonging to United Public School #7 or other users;
r. Using computing resources for unauthorized monitoring of electronic communications;
s. Violating any United Public School #7 policy or any local, state or federal law.

In cases of doubt, users bear the burden of responsibility to inquire concerning the permissibility of external network uses, prior to execution. Such questions should be directed to administration.

Reporting Violations

All users and units should report any discovered unauthorized access attempts or other improper usage of United Public School #7 computers, networks, or other information processing equipment. If you observe, or have reported to you, a security or abuse problem, with any District computer or network facilities, including violations of this policy, you should notify the system administrator and appropriate administration officials.

Sanctions

Persons in violation of this policy are subject to the full range of sanctions, including the loss of computer or network access privileges without notification, disciplinary action, dismissal, and legal action. Some violations may constitute criminal offenses, as outlined in North Dakota statutes and other local, state, and federal laws; the District will carry out its responsibility to report such violations to the appropriate authorities.


Information Technology Accessibility Standards:


United Public School #7’s vision includes an emphasis on equal access for the learning community.
To accomplish equal access, we must consider the diverse needs of all students, teachers and staff, including those with disabilities. Accessibility must be considered when procuring, developing or implementing information technologies, including web content, software, hardware, multimedia, and other devices. We endorse the following principles:
• Information technology must be perceivable. Accessible technology is capable of presenting information to all users, including those who perceive content visually, those who perceive content audibly, and those who perceive content through touch. If technology does not itself have this intrinsic ability, it must be compatible with assistive technologies (AT), so the AT can be used for access.
• Information technology must be operable. Accessible technology must be able to operated by all users.
• Information technology must be understandable. We use information technology as a tool for supporting our delivery of quality education to students. Overly complex, unintuitive devices or interfaces can obstruct, rather than enhance, the learning process.