topleft CSBA.org >  Services >  Governance Technology > 

San Lorenzo Valley USD |  AR  6163.4  Instruction

Student Use Of Technology   

arrow Previous bar Next arrow

Purpose:

To define and delineate acceptable and unacceptable uses of district provided technological resources as well as technology tools and mobile devices that students bring to school from home.

The term "technological resources" in this regulation refers to computers, Internet and Intranet access, server-based storage, email and voice mail and other technology tools and devices.

The term "network" in this regulation refers to a number of computers and other electronic tools that are connected to each other for the purpose of communication and data sharing.

Educational Purpose

1. The district data network has been established for a limited educational purpose. The term "educational purpose" includes classroom activities, continuing education, professional or career development, and high-quality, educationally enriching personal research.

2. The district has the right to place reasonable restrictions on the material that students access or post through the system. Students are also expected to follow the rules set forth in this Regulation, the student disciplinary code, and the law in their use of the district data network.

3. Students may not use the district data network for commercial purposes. They may not offer, provide, or purchase products or services through the district data network.

4. Students may not use the district data network for political lobbying. They may use the system to communicate with elected representatives and to express their opinions on political issues.

Internet Based Information Resources

1. Acceptable Use of Internet Based Information Resources includes but is not limited to:

a. Legitimate purposes related to the district's educational mission by providing access to unique resources and an opportunity for collaborative work.

b. Teacher assignments that may require students to utilize Internet-based information resources. As with any student activity, it is the responsibility of staff members to exercise care in monitoring and supervising, to the best of their ability, such student access to insure that students use such resources in accordance with district policy.

c. Training students in the skills needed to access Internet Based resources, the provisions of this Technology Use Policy, and the rules and procedures of the technological resource to which they are gaining access.

d. Expecting students to use good judgment at all times to insure that their activities while online fall within the provisions of the district's technology use policy.

2. Unacceptable Use of Internet Based Information Resources includes, but is not limited to the following:

a. Any use of the district's technological resources for illegal, inappropriate, obscene or unauthorized purposes, or in support of such activities, is prohibited. Illegal activities shall be defined as a violation of local, state, and/or federal laws. Inappropriate use shall be defined as a violation of the intended use of the network, and/or purpose and goal. Obscene activities shall be defined as a violation of generally accepted social standards for use of a publicly-owned and operated communication vehicle.

Restrictions against inappropriate language apply to all speech communicated through the district data network, including but not limited to public messages, private messages, and material posted on web pages.

b. Attempting to gain unauthorized access to the district data network or to any other computer system through the district data network or go beyond their authorized access. This includes attempting to log in through another person's account or access another person's files.

c. Attempting to circumvent district security measures and systems.

d. Causing a disruption of the district's data network due to activities such as peer-to-peer file sharing.

e. Using the district data network to engage in any other illegal act, such as arranging for a drug sale or the purchase of alcohol, engaging in criminal gang activity, threatening the safety of a person, etc.

f. Use of obscene, profane, lewd, vulgar, rude, inflammatory, threatening, or disrespectful language.

g. Posting information that could cause damage or a danger of disruption.

h. Engaging in personal attacks, including prejudicial or discriminatory attacks such as "cyber bullying."

i. Harassing another person. Harassment is persistently acting in a manner that distresses or annoys another person. When a student is told by a person to stop sending him or her messages, they must stop.

(cf. 5145.3 - Nondiscrimination/Harassment)

j. Accessing, posting, submitting, publishing or displaying harmful or inappropriate matter that is threatening, obscene, disruptive or sexually explicit, or that could be construed as harassment or disparagement of others based on their race/ethnicity, national origin, gender, sexual orientation, age, disability, religion or political beliefs.

Harmful matter includes matter, taken as a whole, which to the average person applying contemporary statewide standards, appeals to the prurient interest and is matter which depicts or describes in a patently offensive way sexual conduct and which lacks serious literacy, artistic, political or scientific value for minors.

(cf. 5145.7 - Sexual Harassment)

(cf. 5145.9 - Hate-Motivated Behavior)

(cf. 5131 - Conduct)

k. Knowingly or recklessly posting false or defamatory information about a person or organization.

l Violating the rules of another organization's networks or computing resources.

m. Using the district's technological resources to engage in commercial activities, product advertisement, soliciting votes, or political lobbying.

n. Unauthorized copying or transfer of copyrighted materials, violations of license.

o. Creating and/or placing a computer virus on any network or device. Deliberate attempts to degrade or disrupt system performance of the network or any other computer system or network on the Internet by spreading computer viruses is considered criminal activity under state and federal law.

(cf. 5131.5 - Vandalism, Theft and Graffiti)

p. Use of an impersonation. Real names must be used; pseudonyms are not allowed.

q. Using the network to send or receive a message that is inconsistent with the school's code of conduct.

r. Using the network to request home phone numbers and, later, making obscene, threatening, or annoying phone calls to the numbers.

s. Disclosing, using or disseminating personal identification information about themselves or others when using electronic mail, social media , or other forms of direct electronic communication. Students are also cautioned not to disclose such information by other means to individuals located through the Internet without permission of their parents/guardians.

Personal information includes the student's name, address, telephone number, social security number, or other individually identifiable information.

t. Violating any state or federal law, or any provision of the Education Code.

u. Students shall not use the system to encourage the use of drugs, alcohol or tobacco, nor shall they promote unethical practices or any activity prohibited by law or Board policy.

(cf. 3513.3 - Tobacco-Free Schools)

v. Tampering with computer hardware or software, unauthorized entry into computers, or knowledgeable vandalism or destruction of computer files is prohibited. Such activity is considered a crime under state and federal law.

w. "Attacking" or arguing with correspondents; persuade them with facts and be polite.

x. Posting messages to groups that the student does not know. The wider you send out your network ID, the more opportunity you provide for unwanted messages.

y. Sending, or encouraging others to send, abusive messages.

z. Installing software tools that could be used for unauthorized access to another system.

(1) Using a teacher's computer for any purpose, without supervision.

District Email

1. Acceptable use of district email includes, but is not limited to the following:

a. Sending messages without interrupting a class or meeting.

b. Sending out information to a wide range of people in a nearly instantaneous manner.

c. Transmitting documents to a work group.

2. Unacceptable use of district email includes, but is not limited to the following:

a. Personal business, commercial activity, product advertisement, or political lobbying.

b. Transmitting messages that are racist, sexist, inflammatory, threatening, or obscene.

c. Using another individual's account without written permission from that person. All use of the system must be under the user's own account.

d. Reading other users' electronic mail or files, without permission.

e. Attempting to interfere with other users' ability to send or receive electronic mail.

f. Attempting to delete, copy, modify or forge other users' mail.

The person in whose name an account is issued is responsible at all times for its proper use.

Email is not private. Messages relating to or in support of illegal activities must be reported to the authorities.

The district reserves the right to monitor any on-line communications for improper use. Electronic communications and downloaded material, including files deleted from a user's account, may be monitored or read by district officials to ensure proper use of the system.

Access to Materials

1. Students may not use the district data network to access material in violation of the following standards:

a. Prohibited Material. Prohibited material may not be accessed at any time, for any purpose. The district designates the following types of materials as prohibited: obscene materials, child pornography, material that appeals to a prurient or unhealthy interest in, or depicts or describes in a patently offensive way, violence, nudity, sex, death, or bodily functions, materials that promote or advocate satanic group membership, material that has been designated as for "adults" only, and material that promotes or advocates illegal activities.

b. Restricted Material. Restricted material may not be accessed by elementary or middle school students at any time for any purpose. Restricted material may be accessed by high school students in the context of specific learning activities that have been approved by a teacher. Materials that may fall within prohibited material that have clear educational relevance, such as material with literary, artistic, political, or scientific value, will be considered to be restricted. In addition, restricted material includes materials that promote or advocate the use of alcohol and tobacco, hate and discrimination, cult group membership, school cheating, and weapons. Sites that contain personal advertisements or facilitate making online connections with other people are restricted unless such sites have been specifically approved by the school.

c. Limited Access Material. Limited access material is material that is generally considered to be non-educational or entertainment. Limited access material may be accessed in the context of specific learning activities that are directed by a teacher or during periods of time that a school may designate as "open access" time. Limited access material includes such material as electronic commerce, games, jokes, recreation, entertainment, sports, and investments.

The district has installed a technology protection measure to help protect against access to inappropriate material. The determination of whether material is appropriate or inappropriate is based on the content of the material and the intended use of the material, not on the protection actions of the technology protection measure.

Privacy and Communication Safety Requirements

1. Personal contact information includes a student's name together with other information that would allow an individual to locate them, including, but not limited to, their parent's name, their home address or location, their work address or location, or their phone number.

a. Elementary or middle school students will not disclose their full name or any other personal contact information for any purpose.

b. High school students will not disclose personal contact information, except to education institutions for educational purposes, companies or other entities for career development purposes, or with specific staff approval.

c. As noted above, students will not disclose names, personal contact information, or any other private or personal information about other students under any circumstances. They will not forward a message that was sent to them privately without permission of the person who sent them the message.

d. Students will not agree to meet with someone they have met online without their parent's/guardian's approval and participation.

e. Students will promptly disclose to their teacher or other school staff any message they receive that is inappropriate or makes them feel uncomfortable. They should not delete such messages until instructed to do so by a staff member.

Plagiarism and Copyright Infringement

1. Students will not plagiarize works they find on the Internet. Plagiarism is taking the ideas or writings of others and presenting them as if they were theirs.

2. Students will respect the rights of copyright owners in their use of materials found on, disseminated through, or posted to the Internet. Copyright infringement occurs when a person inappropriately reproduces a work that is protected by a copyright. Copyright law can be very confusing. If a student is uncertain whether it is appropriate to copy or use material, they should ask a teacher.

(cf. 5131.9 - Academic Honesty)

(cf. 6162.6 - Use of Copyrighted Materials)

System Security and Resource Limits

1. System Security

a. If a student has an individual domain or email account, he or she is responsible for that individual account and should take all reasonable precautions to prevent others from being able to access it. Under no conditions should they provide their password to another person.

b. Students will immediately notify a teacher or the system administrator if they have identified a possible security problem. They are not to go looking for security problems, because this may be construed as an illegal attempt to gain access.

c. Students will avoid the inadvertent spread of computer viruses by following the district virus protection procedures.

d. Students will not attempt to gain access to another student or staff member's computer or files.

2. Resource Limits

As noted above, the district data network has been established for a limited educational purpose.

a. Students will not download large files unless absolutely necessary. If necessary, the file should be downloaded at a time when the system is not being heavily used and immediately removed from the system computer to a personal computer.

b. Students will not misuse district, school, or personal distribution lists or discussion groups for sending irrelevant messages.

c. Students will check their email frequently, delete unwanted messages promptly, and stay within email quotas.

d. Students will subscribe only to approve high quality discussion groups that are relevant to school related tasks or career development.

e. Excessive use of the district data network may raise a reasonable suspicion that a student is using the system in violation of district policy and regulations.

Student Rights and Expectations

1. Free Speech

A student's right to free speech and access to information applies to his or her use of the Internet. The district may restrict access to materials for valid educational reasons. The district will not restrict access to information and ideas based on viewpoint discrimination. The district data network is considered a limited public forum. The district may restrict student speech for valid educational reasons. The district will not restrict speech on the basis of a disagreement with the opinions expressed by a student.

2. Copyright

Students own the copyright to works that they have created in school or for a class assignment. If the work is created jointly, each student will have joint ownership of the copyright. Students and their parent/guardian must agree to post student work on the school or district web site. Student work will be posted with the student's copyright notice.

3. Privacy

As noted above, students should expect no privacy in the contents of personal files or while using the district Internet.

All student use of the Internet may be supervised and monitored. The district's monitoring of Internet usage can reveal all activities engaged in while using the district's network.

Routine maintenance and monitoring of the district data network may lead to discovery that a student has violated this Regulation, the student disciplinary code, or the law. An individual search will be conducted if there is reasonable suspicion that a student has violated this Regulation, the student disciplinary code, or the law. The investigation will be reasonable and related to the suspected violation.

Parents/guardians have the right to request to see the contents of their student's personal computer and email files at any time.

(cf. 5145.12 - Search and Seizure)

4. Due Process

The district will cooperate fully with local, state, or federal officials in any investigation related to any illegal activities conducted through the district data network.

In the event there is a claim that a student has violated this Regulation or student disciplinary code in their use of the district data network, the student will be provided with notice and an opportunity to be heard in the manner set forth in the student disciplinary code.

If the violation also involves a violation of other provisions of the student disciplinary code, it will be handled in a manner described in the code. Additional restrictions may be placed on the student's use of the district data network.

It is in the best interest of all users to have a smoothly running, secure network that can be counted on to function when needed. Network administrators are charged with securing the operation of district networks. It is the responsibility of district users to avoid violating security provisions. While some users may possess the knowledge and skills to overcome network security provisions, it would be an ethical violation to do so. Users who identify a security problem should notify the proper authority immediately.

Any user identified as a security risk will be denied access to the information system.

System operators will have access to all user accounts, including electronic mail. Violations of the use of technology policy or regulation will result in cancellation of the user's access to the system.

(cf. 5144 - Discipline)

(cf. 5144.1 - Suspension and Expulsion/Due Process)

(cf. 5144.2 - Suspension and Expulsion/Due Process: Students with Disabilities)

5. Privileges

The use of the district facilities and/or resources is a privilege, not a right, and inappropriate use of these facilities and/or resources will result in a cancellation of those privileges, disciplinary action and/or legal action in accordance with law and Board policy.

6. Vandalism

Students may not engage in vandalism of the district's technological resources. Vandalism is defined as any malicious attempt to harm or destroy data of another user or any other agencies or networks that are connected to the system. This includes, but is not limited to, the uploading or creation of computer viruses or accessing another system. Any vandalism will result in the loss of computer services, disciplinary action, and legal referral.

Limitation of Liability

1. The district does not guarantee that the functions or services provided through the district data network will be without error.

2. The district is not responsible for any damage a student may suffer, including but not limited to, loss of data, interruption of service, or exposure to inappropriate material or people.

3. The district is not responsible for the accuracy or quality of the information obtained through the system, caused by the district, the district's negligence or by the user's errors or omissions.

4. The district is not responsible for financial obligations arising through the unauthorized use of the system. Parents or guardians will be held financially responsible for any harm that may result from their intentional misuse of the system. A student may only use the system if his or her parent or guardian has signed a disclaimer of claims for damages against the district.

This regulation is applicable to any user of the San Lorenzo Valley Unified School District (SLVUSD) network, and refers to all information resources whether individually controlled, or shared, standalone or networked. Individual sites may define "conditions of use" for networks under their control. Such statements should be consistent with this overall regulation but may provide additional detail, guidelines and/or restrictions. Where such "conditions of use" exist, enforcement mechanisms defined therein shall apply. Where use of external networks is involved, policies governing such use also are applicable and must be adhered to.

The principal or designee shall oversee the maintenance of each school's technological resources and may establish guidelines and limits on their use. He/she shall ensure that all students using these resources receive training in their proper and appropriate use.

(cf. 0440 - District Technology Plan)

(cf. 4040 - Employee Use of Technology)

(cf. 4131- Staff Development)

(cf. 4231 - Staff Development)

(cf. 4331 - Staff Development)

At the beginning of each school year, parents/guardians shall receive a copy of the district's policy and administrative regulation regarding access by students to the Internet and on-line sites. (Education Code 48980)

Regulation SAN LORENZO VALLEY UNIFIED SCHOOL DISTRICT

approved: August 12, 2015 Ben Lomond, California

revised: September 7, 2016