GENERAL INFORMATION
Houma Christian School recognizes the importance of computer technology as an integral part of the teaching/learning process. The school's information technology resources are provided for educational purposes only. The purpose of this document is to provide guidelines for use that is acceptable and appropriate.
It is the policy of Houma Christian School to comply with the Children's Internet Protection Act. Houma Christian School shall prevent user access to inappropriate materials. Houma Christian School shall provide for the safety and security of minors when using email, chat rooms, and other forms of direct communication. The school shall prevent unauthorized access to materials that are harmful to minors.
Students are responsible for good behavior on school computers. Communication on the network utilizing any school device is public and will be subject to monitoring.
The network that is provided by Houma Christian School is intended for research, to create documents, and to enable communication. The only activities permitted are educational in nature.
Houma Christian School understands that their computer system is not error free or without defects. Although the school has made every reasonable effort to monitor and maintain safety of students in reference to safety, it is understood that no approach will ever be completely foolproof. Parents assume risk by consenting to allow their child to participate in the use of the Internet.
ACCESS IS A PRIVILEGE NOT A RIGHT and RESPONSIBILITY IS NECESSARY
Privacy Expectations
Student users on the computer network have a limited privacy expectation in the contents of their personal files. Houma Christian School reserves the right to and will actively monitor the use of information including but not limited to communication, emails, documents, and internet searches. Any examination and use of data found on the networks that jeopardize the health, safety, discipline, or security of any student or other person will be disclosed and disciplinary action will be taken.
Use of the school's network is considered a privilege and not a right. Unacceptable uses of the network will result in restriction/suspension of privileges, or other action depending on the severity of the violation. All users are expected to abide by the following guidelines:
1. Respect and protect the privacy of others.
- Use only assigned accounts.
- Do not view, use or copy passwords, data or networks to which they are not authorized.
- Not distribute private information about others or themselves.
- Observe all network safety policies.
- Report security risks or violations to a teacher or administrator.
2. Respect and protect the intellectual property of others.
- Not to infringe copyrights (illegal copies of games, music, movies, etc)
- Not plagiarize.
3. Respect and practice the principles of community.
- Communicate only in kind and respectful ways.
- Report threatening or discomforting material to a teacher.
- Not intentionally access, transmit, copy, or create materials that violate the school's code of conduct.
- Not access, transmit, copy or create materials that are illegal.
- Not use resources to further other acts that are criminal.
- Not send spam, chain letters, or any mass unsolicited mailings through the school email server.
- Not buy, sell, advertise, or otherwise conduct any entrepreneurial business unless previously approved.
4. Respect the property of Houma Christian School.
4. Respect the property of Houma Christian School.
- Agree to only use property for educational purposes.
- Not deface or damage property in any capacity.
- Be responsible to cover the costs associated with intentional damage to equipment.
- In the event of an accident where property is damaged, agree to notify the teacher immediately following the incident.
Unacceptable Student Uses of the Network Include:
1. Violating student or staff rights to privacy.
2. Using profane, obscene, or offensive language, graphics or other forms of communication.
3. Use of school technology resources to support private or personal gain.
4. Misuse or sharing of passwords.
5. Sharing or using personally identifiable information or individually owned or copyrighted materials with the author's prior consent.