Student Internet Acceptable Use Policy
Internet access is available to students and faculty/staff in the Jasper R-5 School District. Our goal in providing this service to students and faculty/staff is to promote educational excellence by increasing resource sharing, improving access to information and developing global communications.
The internet is global network connecting billions of computers all over the world and subsequently billions of individual subscribers. The Internet provides an almost inexhaustible source of information for education, news, and research.
Internet access is coordinated through a complex association of government agencies, regional, and state networks. The Jasper R-5 School District system is sponsored in part through the Missouri Department of Elementary and Secondary Education and a program called MOREnet. The Jasper R-5 School district maintains a CIPA (Child Internet Protection Act) compliant Internet content filter. The smooth operation of the network relies upon the proper conduct of the end users that must adhere to strict guidelines and network etiquette. These rules will also apply to additional technology used within the district. These guidelines are provided so that you are aware of the responsibilities you accept when signing the Jasper R-5 School District’s Internet Acceptable Use Policy.
INTERNET – TERMS and CONDITIONS
1) Acceptable Use
The purpose of the Internet, with respect to education, is to support research and education in and among academic institutions in the U.S. by providing access to unique resources and the opportunity for collaborative work. The use of this account must be in support of education and research and consistent with the educational objectives of our district. Use of any other Internet connected organizations’ network or computing resources must comply with the rules appropriate for that network as well. Transmission of any material in violation of any United States or state regulation is prohibited. This includes, but is not limited to, copyrighted material, threatening or obscene material, or material protected by trade secret. Use for commercial activity by Jasper users is strictly prohibited. Use for product advertisement or political lobbying is also prohibited.
2) Copyright and Fair Use
Users will abide by all copyright, trademark, and other laws governing intellectual property. No software may be installed, copied, or used on School equipment except as permitted by law. All software license provisions must be strictly adhered to.
Copyright law protects literary, musical, graphic, or other artistic forms in which an author expresses intellectual concepts. In the context of copyright law an author is the creator of any copyrightable creation. Any author creation that meets the standards of copyright law is protectable under copyright law and considered to be a work of authorship. The main two requirements to meet the standards of copyright law are originality and fixation.
Copyright protects the particular way an author has expressed him/herself. It does not extend to any ideas, systems, or factual information conveyed in the work. The safest course is always to get permission from the copyright owner before using copyrighted material. When it is impracticable to obtain permission, use of copyrighted material should be avoided unless the doctrine of fair use would clearly apply to the situation.
3) Non-Permitted Uses
The following uses of school-provided Internet access are not permitted:
a. to access, upload, download, or distribute pornographic, obscene, or sexually explicit material;
b. to transmit obscene, abusive, sexually explicit, or threatening language;
c. to violate any local, state, or federal statute;
d. to vandalize, damage, or disable the property of another individual or organization;
e. to access another individual's materials, information, or files without permission;
f. to violate copyright or otherwise use the intellectual property of another individual or organization without permission; and,
g. to use/access peer-to-peer, file sharing and/or instant messaging applications.
4) Expectations of Students Using the Computer Network
Students gaining access to the computer network are expected to abide by the following standards:
a. Students are expected to use only their own user account and password to access any school computer/device. Use of anyone else’s user account (especially a teacher’s login) is strictly prohibited.
b. When a user is finished with a computer or needs to step away beyond visual range of the computer, the user must either logoff or lock the computer to prevent unauthorized access of computer/network resources.
c. Do not use the network in such a way that would disrupt the use of the network by other users.
d. All communications and information accessible via the network should be assumed to be the property of the author and protected under applicable U.S. copyright laws.
e. No outside computers are allowed to access the network without the consent of the school district.
5) Expectations of Students Using the Internet
Students gaining access to the Internet are expected to abide by the following standards:
a. Do not reveal personal or private information (for example your address or phone numbers) or the personal or private information of anyone else.
b. E-mail access (if granted) is not private, and subject to monitoring. Technology personnel have access to all e-mail. Messages relating to or in support of illegal activities will be reported to the authorities.
c. Users may not send e-mail to any person who indicates they do not wish to receive it.
d. Students may not start, forward, or otherwise propagate chain letters, whether or not the recipient wishes to receive such mailings.
e. Do not reveal your user account credentials or give out any of your passwords. Use of another user’s accounts or passwords may result in loss of computer privileges.
f. Use appropriate language
g. Blogs and social networking sites will be blocked and are not allowed to be used unless otherwise specified by a teacher and approved by the Technology Coordinator.
h. Attempts to circumvent or bypass the Internet content filter or firewall will result in loss of computer privileges.
i. Websites deemed inappropriate are generally blocked by category. Some examples of blocked categories include but are not limited to: game sites, hate speech, social networking, adult images, entertainment, etc. With thousands of new websites being added to the Internet daily, some sites are bound to be categorized incorrectly or not yet categorized. Many of these new websites contain viruses, malware, and other unwanted agents. Attempts to find/access websites containing materials found normally within blocked categories is an inappropriate use of school resources and can result in loss of computer privileges.
6) Expectations of Students using Hardware
Students gaining access to the Hardware are expected to abide by the following standards:
a. All hardware is property of the school and should be used only at school.
b. All hardware will be handled with the finest care. Any abuse of the hardware can result in a loss of hardware privileges.
c. Any misuse of the hardware will be reported to an administrator or teacher immediately.
d. No outside hardware may be brought in and used without the consent of the school.
Parent/Guardian Permission for Computer/Internet Access
The undersigned AGREES TO COMPENSATE JASPER R-5 SCHOOL DISTRICT, ADMINISTRATION AND STAFF FOR ANY LOSS suffered to them by reason of improper use of the network by the user; and the user further agrees to compensate anyone harmed by the user’s abusive use of the network.
If a Jasper R-5 School District USER VIOLATES ANY OF THESE PROVISIONS, HIS/HER ACCESS TO THE NETWORK WILL BE TERMINATED AND FUTURE ACCESS COULD BE DENIED. The signatures at the end of this document are legally binding and indicate the parties who have signed have read the terms and conditions carefully and understand their significance.