Legal
1. 47 CFR 54.520
2. 47 U.S.C. 254
3. 24 P.S. 1303.1-A
4. Pol. 249
5. Pol. 237
6. Pol. 814
7. 24 P.S. 4604
18 Pa. C.S.A. 2709 18 Pa. C.S.A. 5903 18 Pa. C.S.A. 6312 24 P.S. 4601 et seq
17 U.S.C. 101 et seq
18 U.S.C. 2256
20 U.S.C. 7131
Pol. 103
Pol. 103.1
Pol. 104
Pol. 218
Pol. 218.2
Pol. 220
Pol. 233
Pol. 317
Purpose
The Hopewell Area School District provides its employees, students, and guests (“users”) access to technology resources including, but not limited to, electronic communications systems, computers, computer networks, networked devices, hardware, software, internet access, mobile devices, peripherals, copiers, and cameras.
The Board supports the use of the District’s technology resources to facilitate teaching and learning, to provide access to information, to aid in research and collaboration, to foster the educational mission of the District, and to carry out the legitimate business and operation of the District.
The use of the District’s technology resources is for appropriate school-related educational and operational purposes and for the performance of job duties consistent with the educational mission of the District. Use for educational purposes is defined as use that is consistent with the curriculum adopted by the District as well as the varied instructional needs, learning styles, abilities and developmental levels of students. All use for any purpose must comply with this policy and all other applicable codes of conduct, policies, procedures, and rules and must not cause damage to the District’s technology resources.
All employees and students are responsible for the appropriate and lawful use of the District’s technology resources. This policy is intended to ensure that all users continue to enjoy access to the District’s technology resources and that such resources are utilized in an appropriate manner and for legitimate purposes.
Definitions
District Technology Resources
District technology resources means all technology owned, operated, and/or licensed by the District, including computers, projectors, televisions, video and sound systems, mobile devices, calculators, scanners, printers, cameras, portable hard drives, hardware, software, accounts, routers, and networks, including the Internet.
User
User means anyone who utilizes or attempts to utilize District technology resources while on or off District property. The term includes, but is not limited to, students, staff, parents and/or guardians, and any visitors to the District that may use District technology.
Authority
The Board establishes that access to and use of its technology resources is a privilege, not a right, which may be revoked at any time. The District’s technology resources are the property of the District. The District provides these resources for educational and operational purposes as stated herein and are not provided as a public access service or to provide a public forum.
The Superintendent or their designee is ultimately responsible for overseeing the District’s technology resources. The Superintendent will designate a Technology Director who will serve as the coordinator and supervisor of the District’s technology resources and networks, and who will work with other regional and state organizations as necessary to educate users, approve activities, provide leadership for proper training for all users in the use of the District’s technology resources and the requirements of this policy, and who will establish a system to ensure that users who access District technology resources have agreed to abide by the terms of this policy.
The Superintendent or their designee is directed to implement Internet safety measures to effectively address the following, both through general policy and through the use of filtering technology:[1][2]
- Access by minors to inappropriate or harmful content.
- Safety and security of minors when using electronic mail, chat rooms, and social networking.
- Prevention of unauthorized access of District technology resources.
- Prevention of unauthorized disclosure and dissemination of minors’ personal information.
Delegation of Responsibility
The Superintendent shall develop procedures, in cooperation with the District technology staff, for the acceptable use of all District technology resources including, but not limited to software, hardware, electronic devices, servers and networks.[2]
School District Limitation of Liability
The School District makes no warranties of any kind, either expressed or implied, for the service it is providing through its various technology resources. The District is not responsible, and will not be responsible, for any damages, including loss of data resulting from delays, non-deliveries, missed deliveries, or services interruption. Use of any information obtained through the District’s technology resources is at the user’s own risk.
Guidelines
Use of Personal Electronic Devices
The use of personal electronic devices on the District network is permitted only on designated networks for designated users. When a user connects a personal electronic device to a District network or District technology resources, this policy and its guidelines apply. Users are subject to the same levels of monitoring and access as if a District-owned device were being utilized. Users who connect a personal electronic device to a District network explicitly waive any expectation of privacy in the content exchanged over the District technology resources.
Privacy
The District reserves the right to monitor any user’s utilization of District technology resources. Users have no expectation of privacy while using District technology resources whether on or off District property. The District may monitor, inspect, copy, and review any and all usage of District technology resources including information transmitted and received via the internet to ensure compliance with this and other District policies, and state and federal law. All e-mails and messages, as well as any files stored on District technology resources may be inspected at any time for any reason. The District may decrypt and inspect encrypted internet traffic and communications to ensure compliance with this policy.
Internet Filtering and Children’s Internet Protection Act (“CIPA”) Compliance
The District utilizes content and message filters to prevent users from accessing material through District technology resources that has been determined to be obscene, offensive, pornographic, harmful to minors, or otherwise inconsistent with the District’s educational mission. The Superintendent or their designee shall establish a procedure for users to request that a legitimate website or educational resource not be blocked by the District’s filters for a bona fide educational purpose. Such requests must be either granted or rejected within three school days pursuant to the established procedure.
The Board directs that the Superintendent or their designee ensure that students at the elementary, middle school, and high school levels are educated about appropriate online behavior including interacting via social networks and in chat rooms, cyber-bullying, and disclosure of personal information.[2][3][4]
Monitoring
District technology resources shall be periodically monitored to ensure compliance with this and other District policies including monitoring of users’ online activities. The Technology Director designated by the Superintendent shall ensure that regular monitoring is completed pursuant to this section. However, the Superintendent, or their designee, shall also implement procedures to ensure that District technology resources are not utilized to track the whereabouts or movements of individuals, and that remotely activated cameras and/or audio are not utilized except where necessary to recover lost or stolen District technology.
District Provided Resources
District technology resources may be assigned or allocated to an individual user for his or her use (e.g. individual email accounts, laptop computers, etc.) Despite being allocated to a particular user, the technology resources remain the property of the District and may be revoked, suspended, or inspected at any time to ensure compliance with this and other District policies. Users do not have an expectation of privacy in any District provided technology resource or any of its contents.
Prohibitions
The use of the School District’s systems for illegal, inappropriate, unacceptable, or unethical purposes by Users is prohibited. Such activities engaged in by Users are strictly prohibited and illustrated below. The School District reserves the right to determine if any activity not appearing in the list below constitutes an acceptable or unacceptable use of the systems.
These prohibitions are in effect any time School District resources are accessed whether on School District property, at School District events, while connected to the School District’s network, when using mobile commuting equipment, telecommunication facilities in protected and unprotected areas or environments, directly from home, or indirectly through another ISP, and if relevant, when an employee or student uses their own or another entity’s equipment.
General Prohibitions
- The following uses of District technology resources are prohibited:
- Use of technology resources to violate the law, facilitate illegal activity, or to encourage others to do so.
- Use of technology resources to violate any other District policy.
- Use of technology resources to engage in any intentional act which might threaten the health, safety, or welfare of any person or persons.
- Use of technology resources to cause, or threaten to cause harm to others or damage to their property.
- Use of technology resources to bully, or to communicate terroristic threats, discriminatory remarks, or hate.[3][4] Use of technology resources to communicate words, photos, videos, or other depictions that are obscene, indecent, vulgar, rude, profane, or that advocate illegal drug use.
- Use of technology resources to create, access, or to distribute obscene, profane, lewd, vulgar, pornographic, harassing, or terroristic materials, firearms, or drug paraphernalia.[5] Use of technology resources to attempt to interfere with or disrupt District technology systems, networks, services, or equipment including, but not limited to, the propagation of computer “viruses” and “worms”, Trojan Horse and trapdoor program codes.
- Altering or attempting to alter other users’ or system files, system security software, system or component settings, or the systems themselves, without authorization.
- The attempted physical harm or attempted destruction of District technology resources.
- Use of technology resources in a manner that jeopardizes the security of the District’s technology resources, or in a manner that attempts to circumvent any system security measures.
- Use of technology resources to intentionally obtain or modify files, passwords, and/or data belonging to other users or to the District.
- Use that conceals or attempts to conceal a user’s identity, including the use of anonymizers, or the impersonation of another user.
- Unauthorized access, interference, possession, or distribution of confidential or private information.
- Using technology resources to send any District information to another party, except in the ordinary course of business as necessary or appropriate for the advancement of the District’s business or educational interests.
- Use of technology resources to commit plagiarism.
- Installing, loading, or running software programs, applications, or utilities not explicitly authorized by the District technology staff.
- Installing unauthorized computer hardware, peripheral devices, network hardware, or system hardware onto technology resources.
- Copying District software without express authorization from a member of the District’s technology staff.[6] Use of technology resources for commercial purposes.
- Use of technology resources for political lobbying or campaigning, not including student elections (e.g. student government, club officers, homecoming queen, etc.)
- Use of District technology resources to tether or otherwise connect to a non-District owned device to access an unfiltered and/or unmonitored internet connection.
- The use of proxies or other means to bypass internet content filters and monitoring.
- The use of technology resources to gamble.
- Unauthorized access into a restricted system or changing settings or access rights to a restricted system or account.
- The use of encryption software that has not been previously approved by the District.
- Sending unsolicited mass-email messages, also known as spam.
- Scanning the District’s technology resources for security vulnerabilities.
- Unauthorized or illegal installation, distribution, reproduction, or use of copyrighted materials.
- Fraudulent copying, communications, or modification of materials in violation of copyright laws.
Security
System security is protected through the use of passwords. Failure to adequately protect or update passwords could result in unauthorized access to personal or district files. To protect the integrity of the system, the following guidelines shall be followed:
- Employees and students shall not reveal their passwords to another individual.
- Users are not to use a computer that has been logged in under another student's or employee's name.
- Any user identified as a security risk or having a history of problems with other computer systems may be denied access to the network.
Copyright
The illegal use of copyrighted software by students and staff is prohibited. Any data uploaded to or downloaded from the network shall be subject to fair use guidelines.
Consequences for Inappropriate, Unauthorized and Illegal Use
The user shall be responsible for damages to the equipment, systems, and software resulting from deliberate or willful acts.
Illegal use of the network; intentional deletion or damage to files of data belonging to others; copyright violations; and theft of services will be reported to the appropriate legal authorities for possible prosecution.
General rules for behavior and communications apply when using the Internet, in addition to the stipulations of this policy. Violations of this policy may result in the temporary or permanent revocation of a user’s right to access District technology resources. Additionally, users may be subject to other forms of disciplinary actions for violations of this policy and/or local, state, and/or federal law.[7]
Vandalism will result in cancellation of access privileges. Vandalism is defined as any malicious attempt to harm or destroy data of another user, Internet or other networks; this includes but is not limited to uploading or creating computer viruses.