SCHOOL'S RIGHTS AND RESPONSIBILITIES
ACS has the right and responsibility to:
1. Monitor all activity on the School's system.
2. Determine whether specific uses of the network are consistent with this Acceptable Use Policy.
3. Remove a user's access to the network at any time it is determined that the user is engaged in unauthorized activity or violating this Acceptable Use Policy.
4. Respect the privacy of individual user electronic data. The School will secure the consent of users before accessing their data, unless required to do so by law or policies of ACS.
5. Take prudent steps to develop, implement, and maintain security procedures to ensure the integrity of individual and ACS files. However, information any computer system cannot be guaranteed to be inaccessible by other users.
6. Attempt to provide error-free and dependable access to technology resources associated with the School system. However, the district cannot be held liable for any information that may be lost, damaged, or unavailable due to technical or other difficulties.
7. Ensure that all student users complete and sign an agreement to abide by the School's acceptable use policy and administrative regulation. All such agreements will be maintained on file in the school office.
UNACCEPTABLE USE OF THE SCHOOL'S COMPUTER SYSTEMS INCLUDES, BUT IS NOT LIMITED TO, THE FOLLOWING:
1. Altering any computer configuration including screensavers, desktop settings, network settings, passwords, etc.
2. Installing or downloading any executable files from the Internet or portable drives.
3. Using chat rooms or social web sites except for teacher-directed educational purposes.
4. Installing or using instant messenger programs.
5. Downloading MP3s or other music files.
6. Accessing online radio stations and television programs.
7. Writing, downloading, or printing files or messages that contain inappropriate language, images, or content.
8. Accessing or transmitting obscene, pornographic or other inappropriate material.
9. Violating the rights to privacy of students and employees of the School.
10. Reposting personal communications without the author's prior consent.
11. Copying commercial software in violation of copyright law.
12. Attempting to hack, crack, or otherwise degrade or breach the security of the School's network, other networks, or individual computers.
13. Attempting to bypass the district's content filter, including the use of proxy servers.
14. Developing or passing on programs that damage a computer system or network, such as viruses.