Technology Use Agreement



I. Introduction

Each employee, student or non-student user of the East Carter County R-II School District (ECSD) information system is expected to be familiar with and follow the expectations and requirements of this agreement. The purpose of this agreement is to ensure that individuals are aware of their responsibilities regarding the use of the school districts information systems, technology, equipment and the Internet.

All users of the ECSD information system must have a signed copy of this agreement on file with the Technology Department before a user id and password will be assigned.

A. Legal Requirements

ECSD is committed to complying with applicable information security requirements and relevant information security standards and protocols. These requirements include, but are not limited to the following:

  1. The Family Educational Rights and Privacy Act (FERPA)
  2. Children's Internet Protection Act (CIPA)
  3. Individuals with Disabilities Education Act (IDEA)
  4. Children's Online Privacy Protection Act (COPPA)
  5. Health Insurance Portability and Accountability Act (HIPPA)

Users of the ECSD network are required to adhere to state and federal law as well as board policy. Any attempt to break those laws or policies through the use of ECSD networks may result in discipline or litigation against the offender(s) by the proper authority. ECSD will provide any information necessary in order to fully cooperate with the appropriate authorities in the civil and/or criminal process.

B. Acceptable Use

ECSD provides computer, network, e-mail, and Internet access to individuals as part of the learning environment. The use of these resources is a privilege and not a right. While these systems have the power to deliver a vast number of resources to classrooms and enhance education, their effectiveness depends on the responsible and ethical use by every individual. Violation of this agreement will result in the loss of this privilege and may result in discipline or litigation in accordance with board policy and state and federal law.

II. Employee Acceptable Use

This section is dedicated to provide ECSD employees with guidance of acceptable use of the school district's information technology resources, including but not limited to:

  1. The internet, intranet, e-mail, portal
  2. District assigned computing devices such as personal electronic devices, laptops and desktops and
  3. The District's network and supporting systems and data transmitted by and stored on the ECSD systems.

A. Annual Responsibilities and Information Security Awareness

Staff members will review the Information Security Awareness materials presented on the ECSD Portal website annually.

B. Prohibited Use of ECSD Resources

The following uses of ECSD computer resources by staff members are prohibited at all times:

  1. Unauthorized or excessive personal use. Any personal use should not interfere with or impair an employee's job performance.
  2. Infringing upon the intellectual property rights of others or violating copyright laws.
  3. Advancing personal profit.
  4. Furthering political causes in violation of board policy.
  5. Uploading or transferring out of the District's direct control any software licensed to the District or data owned by the District without explicit written authorization. Failure to observe copyright or license agreements can result in disciplinary action from ECSD or legal action by the copyright owner.
  6. Unauthorized use of resources (including but not limited to servers, networks, computers and printed output) to reveal confidential or sensitive information, student data, or any other information covered by existing state or federal privacy or confidentiality laws, regulations, rules, policies, procedures, or contract terms.
  7. Downloading and installation of any software from the Internet.
  8. Bypassing or attempting to bypass any of the District's security or content filtering safeguards.
  9. Accessing or attempting to access resources for which an employee does not have explicit authorization by means of assigned user accounts, valid passwords, file permissions or other legitimate access and authentication methods.
  10. Granting another individual access to any District user accounts that have been authorized for your use only, or using another individual's District authorized user account, user-id's and/or passwords.
  11. Allowing another person to use a District system under his or her log in.
  12. Adding, modifying, repairing, removing, re-configuring, or tampering with any device on the network infrastructure.
  13. Allowing non-district persons permission to use District assigned information systems on District equipment taken off-site.
  14. Sharing the username and password of a users unique Student Information System user ID with any other individuals or staff.
  15. The use of any "hacking tools" that can be used for "computer hacking", may not be possessed on school property, on any District premise, or run or loaded on any District system.
  16. Attaching any non-District owned device to the District network or wireless network.
  17. Violating any state or federal law or regulation, board policy or administrative rule.

C. Sensitive Information

ECSD employees who have or may have access to personally identifiable student records shall adhere to all standards included in the Family Educational Rights and Privacy Act (FERPA), Health Insurance Portability and Accountability Act (HIPPA), Children's Online Privacy Protection Act (COPPA), and other applicable laws and regulations, as they relate to the release of student information.

  1. Employees may not disclose sensitive or personally identifiable information regarding students to individuals and/or parties not authorized to receive it. Authorization to disclose information of a student to individuals and/or parties must strictly adhere to regulations set forth in the FERPA - See Board Policy and Administrative Rule JR.
  2. Information contained in these records must be securely handled and stored according to ECDS directives, rules and policies and if necessary destroyed in accordance with state information retention standards and archival policy.

D. Granting Access to Secure Locations

Staff members may only grant access to sensitive and secure areas, including but not limited to, server rooms and wire closets, after verification with the Technology Department of the credentials and need for access of the person requesting access.

E. Limited Personal Use

ECSD does not grant any ownership, privacy or an expectation of privacy in the contents of any message, including email, or other Internet activities involving ECSD resources or equipment.

Personal use is prohibited if:

  1. It interferes with the use of IT resources by the District;
  2. Such use burdens the District with additional costs;
  3. Such use interferes with the staff member's employment duties or other obligations to the District; or
  4. Such use includes any activity that is prohibited under any district (including this rule), board policy, or state or federal law.
  5. Email Maintenance

Each District e-mail user is responsible for the content of all text, audio, or image that he or she places or sends over the Internet or District email systems.

  1. All emails, incoming, outgoing, and sent internally, are archived indefinitely.
  2. Employees must delete messages they don't need or store messages that they will need in another way besides the electronic mail system. Examples of storing emails are printing, saving to other document types or archiving messages in off-line email folders. 
  3. An employee must preserve all emails and other relevant records related to an incident that is subject to litigation once that employee is made aware of the legal action.
  4. Email messages are considered public records and may be released pursuant to the requirements of Federal and State laws.

G. Consequences

Employees who violate this agreement may be subject to discipline, including up to termination. All employees are responsible for reporting breaches and possible breaches of security. Incidents should be reported to an employee's supervisor and directly to the ECSD Technology Department. Suspected criminal activity must be immediately reported to law enforcement.

III. Student Acceptable Use

This section is dedicated to provide ECSD students with guidance of acceptable use of the district's information technology resources, including but not limited to:

  1. The internet, intranet, e-mail, portal;
  2. District assigned computing devices such as personal electronic devices, laptops, desktops and portable storage; and
  3. The District's network and supporting systems and data transmitted by and stored on these systems.

A. Compliance with Copyright Laws

Students are to follow copyright laws at all times. Students should refer all questions regarding copyright concerns to administrators at their school.

B. Filtering and Monitoring Computer Resources

The District takes reasonable precautions by using filtering software to keep inappropriate Internet sites and e-mail out of the classroom. The District strongly adheres to the guidelines set forth by COPPA and CIPA when installing filtering/monitoring software devices on District equipment..

  1. The District reserves the right to review any e-mail sent or received using District equipment and e-mail accounts.
  2. Students must adhere to the behavior expectations while using technology and e-mail, including but not limited to those expectations contained in the student handbook, and board policy, section J.
  3. Technology is constantly changing and evolving. Due to the nature of the Internet, online communications, and evolving technology, the District cannot ensure or guarantee the absolute safety of students during the use of technology, including email and the Internet. Parents and students should contact the school immediately with any concerns related to the use of technology.

C. Prohibited Uses of ECSD Resources

The following uses of ECSD technology resources by students are prohibited from:

  1. The use of school computers for commercial purposes.
  2. The use of obscene, bullying, profane, lewd, threatening, disrespectful, or gang related language or symbols.
  3. The bypass or attempt to bypass any of the District's security or content filtering safeguards.
  4. Allowing another person to use the computer under your District assigned login.
  5. Adding, modifying, repairing, re-configuring or otherwise tampering with any device on the network infrastructure including, but not limited to: wireless network devices, computers, printers, servers, cabling, switches/hubs, routers, etc.
  6. Unauthorized access, overloading, more commonly known as Distributed Denial of Service or Denial of Service, or use, or attempted unauthorized access or use of District information systems.
  7. Destroying or tampering with any computer equipment or software.
  8. The use of any "hacking tools" that can be used for "computer hacking", may not be possessed on school property, on any District premise, or run or loaded on any District system.
  9. The use of school computers for illegal activities including but not limited to planting viruses, hacking, or attempted unauthorized access to any system.
  10. Violating any state for federal law or regulation, board policy or administrative rule.
  11. Attaching or attempting to attache non-District owned device(s) to the District network or wireless network.
  12. Storage of files and data that is not educational in content, on District information systems, including district assigned "cloud" storage space.

D. Agreement of Use

Students, parents and guardians agree that ECSD computer equipment must be handled with care and respect.

E. Consequences

Students who violate this agreement may be subject to disciplinary action up to and including expulsion in accordance with board policy and state and federal law. Suspected criminal activity must be immediately reported to law enforcement.

IV. Internet Safety

A. Introduction

It is the policy of the East Carter County R-II School District to:
  • Prevent user access over its computer network to, or transmission of, inappropriate material via Internet, electronic mail, or other forms of direct electronic communications.
  • Prevent unauthorized access and other unlawful online activity.
  • Prevent unauthorized online disclosure, use, or dissemination of personal identification of minors
  • Comply with the Children's Internet Protection Act [Pub. L. No. 106-554 and 47 USC 254(h)].
B. Definitions

Key terms are as defined in the Children's Internet Protection Act.

C. Access to Inappropriate Material

To the extent practical, technology protection measures (or "Internet filters") shall be used to block or filter Internet, or other forms of electronic communications, access to inappropriate information. Specifically, as required by the Children's Internet Protection Act, blocking shall be applied to visual depictions of material deemed obscene or child pornography, or to any material deemed harmful to minors. Subject to staff supervision, technology protection measures may be disabled or, in case of minors, minimized only for bona fide research or other lawful purposes.

D. Inappropriate Network Usage

To the extent practical, steps shall be taken to promote the safety and security of users of the East Carter County R-II School District online computer network when using electronic mail, chat rooms, instant messaging, and other forms of direct electronic communications. Specifically, as required by the Children's Internet Protection Act, prevention of inappropriate network usage include, but is not limited to:
  • Unauthorized access, including so called 'hacking', and other unlawful activities.
  • Unauthorized disclosure, use, and dissemination of personal identification information regarding minors.
E. Supervision and Monitoring

It shall be the responsibility of all members of the East Carter County R-II School District to supervise and monitor usage of the online computer network and access to the Internet in accordance with this policy and the Children's Internet Protection Act. Procedures for disabling or otherwise modifying any technology protection measures shall be the responsibility of the Network Administrator or designated representatives.

F. Technology Protection Measure

The term "technology protection measure" means a specific technology that blocks or filters Internet access to visual depictions that are:
  • Obscene, as that term is defined in section 1460 of title 18, United States Code;
  • Child Pornography, as that term is defined in section 2256 of title 18, United States Code;
  • Harmful to Minors.
G. Harmful to Minors

The term "harmful to minors" means any picture, image, graphic image file, or other visual depiction that:
  • Taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion;
  • Depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; and
  • Taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors.
H. Sexual Act

The terms "sexual act" and "sexual contact" have the meanings given such terms in section 2246 of title 18, United States Code.

V. Wireless Network

A. Guidelines

The East Carter County R-II School District's (ECSD) goal for wireless access in district facilities is to provide network and Internet access to district owned technology resources and equipment used for business and educational purposes by ECSD staff and students. The wireless network is meant to extend the wired network for use in areas or to devices where wired network access is unavailable, or for district owned devices that require a wireless network connection to operate.

B. Support


All district owned devices are tested to work with the ECSD wireless network before they are purchased. All district owned wireless devices are configured to connect to the ECSD wireless network before they are assigned to staff or students. No support shall be given by the district technology department or staff for any device connected to the wireless network that is not owned by the school district.


C. General Use


It is the intention of the ECSD wireless network is to provide network and Internet connectivity for staff and students for business and educational purposes. 

  • Wireless access points are installed to provide an acceptable level of service and availability. 
  • Wireless access points are a shared resource; as the number of users increases, the available bandwidth per user decreases. As such, everyone is asked to be considerate and refrain from using high bandwidth applications (ex. streaming music and video from the Internet). 
  • Network reliability is determined by the level of user traffic and accessibility. In order to provide an acceptable level of reliability, bandwidth will be regulated according to user role and location.
  • ECSD cannot guarantee the confidentiality of any information stored on any device connected to the ECSD Wireless Network; therefore the wireless network should not be used to transmit critical or sensitive information. Individuals assume full responsibility for their actions.

D. Wireless Access


Access to the wireless network will be subject to approval by the ECSD administration and technology department, and will be evaluated on a case by case basis. 

  • Unauthorized devices found connected to the ECSD wireless network will be instantly removed from the wireless network and blocked from any future access.
  • Access to the wireless network is provided for visitors to the district performing official school business. Users will need to authenticate after joining the wireless network by opening a browser to be directed to the log in page and entering the username and password provided by the Technology Department.
  • Wireless connectivity is available in most school district facilities and classrooms.
  • By connecting to any of the ECSD wireless networks you agree to the terms of use addressed in this Technology Use Agreement.

E. Expectations


The following guidelines further supplement the Technology Use Agreement.

  • The district is not responsible for lost, stolen or damaged personal devices.
  • Users may not extend or modify the network in any way. This includes adding access points and installing bridges, switches, hubs, or repeaters. The school district reserves the right to remove or disable any unauthorized access points.
  • Any attempt to break into or gain unauthorized access to any computer(s) or system(s) from a wireless connection is prohibited.
  • Running any unauthorized data packet collection programs on the wireless network is prohibited. Such practices are a violation of privacy and constitute the theft of user data.
  • The district reserves the right to limit bandwidth on a per-connection basis on the wireless network, as necessary, to ensure network reliability and fair sharing of network resources for all wireless connected devices and users.
  • Any effort to circumvent the security systems designed to prevent unauthorized access to any ECSD wireless network may result in the suspension of all access and may result in disciplinary action by the school district.
  • All devices connected to the ECSD network, should be running anti-virus software with the latest virus updates, personal firewall, operating system updates, and patches.
  • Users must comply with all district policies, procedures, local, state, and federal laws pertaining to the security of sensitive and confidential data on district networks.
  • Approved personal devices connected to the wireless network may be monitored and reviewed at anytime by designated technology staff, and removed and blocked from future access without notice.
  • While connected to the wireless network, users network usage may be monitored and reviewed at any time by designated technology staff.
  • Users must report violations of the wireless network guidelines and policies to the technology department.

F. Security and Network Maintenance


For security and network maintenance purposes, the District may monitor individual equipment, or wireless network traffic. 

  • The District reserves the right to audit networks and systems on a periodic basis to ensure compliance with this guideline. 
  • The District has the authority to disconnect any device from the wireless network that violates the practices set forth in this policy or any other related policy. It is the responsibility of the user to be knowledgeable of the information set forth in district policy.
VI. Google Apps for Education

A. Introduction

Google Apps for Education is a suite of online tools made available for free by Google for public and private educational facilities. The East Carter County R-II School District has partnered with Google to use it's services for the staff business and student educational needs. The Google Apps for Education system runs on an Internet domain owned by the District, and is therefore is considered as part of the Districts Information Systems.

B. Core Services

The following core services are available in the District's Google Apps for Education domain:
  • Calendar - an individual calendar providing the ability to organize schedules, daily activities, and assignment
  • Docs - a word processing, spreadsheet, drawing, and presentation tool set that is very similar to Microsoft Office that will allow teachers and students the opportunity to collaboratively create, edit and share documents.
  • Sites - an easy way to create web pages for classroom projects in a secure environment.
  • Email - collaboration using electronic messages.
C. Student Expectations for Acceptable Use

The teachers will make every reasonable effort to monitor student conduct related to class content in order to maintain a positive learning community. All participants will respect the teachers' time and professionalism by supporting the same positive approach.

All participants will be respectful in their postings and comments.  Inappropriate language, personal insults, profanity, spam, racist, sexist or discriminatory remarks, or threatening comments will be not be tolerated.

No student, or other participant, may include any information on the site that could compromise the safety of him/herself or other class members. Participants should avoid specific comments about school location or schedules.

All participants must protect their log-in and password information, as well as class passwords (if any). If participants suspect that a password has been compromised, they must notify the teacher immediately.

No participant may share his/her log-in information or protected information about the site with anyone who is not a participant.

Student use must follow all other expectations as listed in the Harry Stone Student Handbook.

 

Google Apps for Education runs on an Internet domain owned by the District and is intended for educational use. Your student’s teachers will be using Google Apps for lessons, assignments, and communication. 

Google Apps for Education is also available at home, the library, or anywhere with Internet access. School staff will monitor student use of Apps when students are at school. Parents are responsible for monitoring their child’s use of Apps when accessing programs from home. Students are responsible for their own behavior at all times.

Staff and student safety is our highest priority.

D. Guidelines

Google Apps for Education is primarily for educational use. Students may use Apps for personal use subject to the restrictions below and additional school rules and policies that may apply.

  • Privacy - School staff, administrators, and parents all have access to student email for monitoring purposes. Students have no expectation of privacy on the Apps system. 
  • Limited personal use - Students may use Apps tools for personal projects but may not use them for: 
  • Unlawful activities
  • Commercial purposes (running a business or trying to make money)
  • Personal financial gain (running a web site to sell things)
  • Inappropriate sexual or other offensive content
  • Threatening another person
  • Misrepresentation of East Carter County R-II School District, staff or students. Apps, sites, email, and groups are not public forums.

Safety

  • Students may not post personal contact information about themselves or other people. That includes last names, addresses and phone numbers.
  • Students agree not to meet with someone they have met online without their parent’s approval and participation.
  • Students will tell their teacher or other school employee about any message they receive that is inappropriate or makes them feel uncomfortable.
  • Students are responsible for the use of their individual accounts and should take all reasonable precautions to prevent others from being able to use their account. Under no conditions should a user provide his or her password to another person.

Access Restriction - Due Process

  • Access to Google Apps for Education is considered a privilege accorded at the discretion of the District. The District maintains the right to immediately withdraw the access and use of Apps when there is reason to believe that violations of law or District policies have occurred. In such cases, the alleged violation will be referred to the Administration for further investigation and account restoration, suspension, or termination.

Consumer Safety (Advice for Students and Parents)

  • Don't get scammed. Crooks are good at fooling people. They create fake emails and web pages that look real in a practice called phishing. Don't trust links or web pages sent by email. Instead, open a new browser window and type in the address yourself.
  • Don't get spammed. Spam is unwanted advertising sent by email. Never reply to spam and never do business with a company that sends spam. Use the "report spam" button to get rid of spam.

Digital Citizenship (Advice for All)

  • Treat others well. It hurts to get a mean email just like it hurts when someone is mean in the school hallway. When using email or making a post on a forum or web page, be kind. Everyone will see what you write so think before you type. Be careful with what you say about others and yourself.
  • Respect the rights of copyright owners. Copyright infringement occurs when an individual reproduces a work without permission that is protected by a copyright. If a work contains language that specifies acceptable use of that work, the user should follow the expressed requirements. If the user is unsure whether or not they can use a work, they should request permission from the copyright owner.
  • Students have First Amendment rights to free speech. Your rights can be limited in school, though. If you post something via email or on a school web page that disturbs the learning environment in your school, your right of speech may be limited. School web sites, email, and groups are for educational use and are not considered public forums for debating ideas. This means that a school has the right to limit student speech that disturbs the learning process in these areas.

VII. Other Terms of Use

A. General Access

In compliance with the Children's Internet Protection Act ("CIPA"), U.S.C. §254 (h), the District uses technological devices designed to filter and block the use of any of the District's computers with Internet access to retrieve or transmit any visual depictions that are categorized as obscene, child pornography, or "harmful to minors" as defined in the CIPA.

  1. Though the District makes reasonable efforts to filter such Internet content, the District cannot warrant the effectiveness of its Internet filtering due to the dynamic nature of the Internet.
  2. Users of a District computer with Internet access may request that the "technology protection measures" be temporarily disabled to conduct bona fide research for another lawful purpose. These requests should be made to the Technology Department with the knowledge of that employee's supervisor.

B. Education, Supervision, and Monitoring

It shall be the responsibility of all District school staff to make a reasonable effort to educate, supervise, and monitor appropriate usage of online computer network access to the Internet in accordance with this agreement, CIPA, COPPA, and the Protecting Children in the 21st Century Act.

C. Personal Safety

The following list is considered precautions taken by ECSD to ensure the safety of their students, employees, and other individuals.

  1. Students will not post or email personal contact information about themselves or other people unless it is in conjunction with a specific teacher-approved assignment or approved college/career communication.
  2. Students will not agree to meet with someone they have met online without their parent/guardian's approval.
  3. Students will promptly disclose to an administrator, teacher, or other school employee any message they receive that is inappropriate or makes them feel uncomfortable.
  4. Employees will report any concerns related to their use of technology to their immediate supervisor.

D. Expectation of Privacy

Individuals should not have an expectation of privacy in the use of the District's email, systems, or equipment. The District may, for a legitimate reason, perform the following:

  1. Obtain emails sent or received on District email.
  2. Monitor an individual's use on the District's systems.
  3. Confiscate and/or search District-owned software or equipment.