Acceptable Use Policy DRAFT


Please return this agreement, signed by student and parent, to your teacher.

We live in a changing world, where we have more and faster access to information than ever before. Students now can be both consumers and producers of information, and the District strives to be a 21st Century district taking advantage of the many new technologies and new methods of communication now available to our students.

We are trying to create an environment that provides guidelines for students and staff to use new technologies in a meaningful way and to embrace them in ways that align to the ISTE National Education Technology Standards for Students. With access to these new technologies, students will have opportunities to learn and create like never before, but with those opportunities do come new responsibilities.

The District provides an array of technology resources for student use. This agreement outlines appropriate use and prohibited activities when using technology resources. Every student is expected to follow all guidelines stated below, as well as those given orally by the staff, and to demonstrate good citizenship and ethical behavior at all times.

In accepting this agreement, students acknowledge the following rules and conditions:
As a District student, I understand that my school network and email accounts are owned by the District and are not private. ISD has the right to access my information at any time.

GOVERNMENT LAWS:
I will use computers in conformity with laws of the United States and the State of Texas. Violations include, but are not limited to, the following:
  1. Criminal Acts – These include, but are not limited to, “hacking” or attempting to access computer systems without authorization, harassing email, cyberbullying, cyberstalking, child pornography, vandalism, and/or unauthorized tampering with computer systems. (A list of Federal statutes from the United States Department of Justice is below as Appendix A).
  2. Libel Laws - Publicly defaming people through the published material on the internet, email, etc…
  3. Copyright Violations - Copying, selling or distributing copyrighted material without the express written permission of the author or publisher (users should assume that all materials available on the Internet are protected by copyright), engaging in plagiarism (using other's words or ideas as your own).

NETIQUETTE and RESPONSIBLE USE:
  1. I understand that passwords are private. I will not allow others to use my account name and password, or try to use that of others.
  2. I will be polite and use appropriate language in my email messages, multi-user role-playing and/or virtual learning environments (e.g. Second Life), online postings, and other digital communications with others. I will refrain from using profanity, vulgarities or any other inappropriate language as determined by school administrators.
  3. I will use email and other means of communications (e.g. blogs, wikis, podcasting, chat, instant-messaging, discussion boards, virtual learning environments, etc.) responsibly. I will not use computers, handheld computers, digital audio players, cell phones, personal digital devices or the Internet to send or post hate or harassing mail, pornography, make discriminatory or derogatory remarks about others, or engage in bullying, harassment, or other antisocial behaviors either at school or at home.
  4. I understand that I represent the school district in all my online activities. I understand that what I do on social networking websites such as MySpace and Facebook should not reflect negatively on my fellow students, teachers, or on the District. I understand that I will be held responsible for how I represent myself and my school, department or District on the Internet.
  5. I understand that masquerading, spoofing, or pretending to be someone else is forbidden. This includes, but is not limited to, sending out e-mail, creating accounts, or posting messages or other online content (e.g. text, images, audio or video) in someone else's name as a joke.
  6. I will use technology resources responsibly. I will not retrieve, save, or display hate-based, offensive or sexually explicit material using any of WA's computer resources. I am responsible for not pursuing material that could be considered offensive. I understand that I am to notify an adult immediately if by accident I encounter materials which violate appropriate use.
  7. I will use technology resources productively and responsibly for school-related purposes. I will avoid using any technology resource in such a way that would disrupt the activities of other users.
  8. I will refrain from attempting to bypass, or circumventing, security settings or Internet filters, or interfere with the operation of the network by installing illegal software, or web-based services and software not appearing on the Approved Electronic Resources list.
  9. I understand that vandalism is prohibited. This includes but is not limited to modifying or destroying equipment, programs, files, or settings on any computer or other technology resource.
  10. I will respect the intellectual property of other users and information providers. I will obey copyright guidelines. I will not plagiarize or use other’s work without proper citation and permission.
  11. I will refrain from the use of or access of files, software, or other resources owned by others without the owner’s permission. I will use only those school network directories that are designated for my use or for the purpose designated by my teacher.
  12. I will follow all guidelines set forth by the District and/or my teachers when publishing schoolwork online (e.g. to a website, blog, wiki, discussion board, podcasting or video server).
  13. I understand the Internet is a source for information that is both true and false; and that the school is not responsible for inaccurate information obtained from the Internet.
  14. I understand that District administrators will deem what conduct is inappropriate use if such conduct is not specified in this agreement.
  15. I agree to abide by all Internet safety guidelines* that are provided by the school and to complete all assignments related to Internet safety.


CONSEQUENCES FOR VIOLATION OF THIS AGREEMENT:
I understand and will abide by the above Acceptable Use Agreement. Should I commit a violation, I understand that consequences of my actions could include suspension of computer privileges, disciplinary action, and/or referral to law enforcement.

Signature: Date
Parent or Guardian:


As the parent or guardian of this student, I have read the Acceptable Conduct and Use Agreement. I understand that computer access is provided for educational purposes in keeping with the academic goals of the District, and that student use for any other purpose is inappropriate. I recognize it is impossible for the District to restrict access to all controversial materials, and I will not hold the school responsible for materials acquired on the school network. I understand that children’s computer activities at home should be supervised as they can affect the academic environment at school.

I hereby give permission for my child to use computer resources at the District.

Parent or Guardian's Name (please print)_
Parent or Guardian's Signature Date

Sharing Policy for Students and Parents:
The spirit of technology education is one of sharing. We create blogs, podcasts, videos, wikis, and other social media, but we don't create them for one person. We create them to share with the class, the school, and the district community and, perhaps, the world, because we understand that a global audience drives achievement. In blogging class, we share our writing work with students in other states, and perhaps other countries. In other media classes and projects, we share our work on websites called www.voicethread.com, www.schooltube.com or www.teachertube.com, These are video hosting sites for educators and students. They're like youtube, except teachers control content so that there aren't any inappropriate comments made. Wikispaces is another teacher moderated site, where students can collaborate on online documents, with teacher supervision. For other work, we use sites like http:drop.io, which allows us to place student's work for sharing, but are password protected, so only students and parents that have the passwords can view the material. Student full names and personal information are always kept confidential and are not shared online, adhering to the COPPA.

Will you allow your students' created content like videos, writing blogs, audio and video podcasts, which may include their images, to be shared on teacher moderated sites similar to voicethread, wikispaces, schooltube, and drop.io?

Initial next to the appropriate box:
Yes, it's okay to share student-created media on teacher moderated sites _
It's only okay to share student work with the district community _
No, please do not share student work outside of class _


Appendix A – Unlawful Online Conduct and Applicable Federal Laws

The chart below details the type of unlawful online conduct, potentially applicable federal laws, and the section of the Department of Justice with subject-matter expertise. If the subject matter expert is not a section of the Department, but rather another agency, the entry will have an asterisk following its initials. In many cases, prosecutors may also consider whether the conduct at issue is a violation of 18 U.S.C. § 2 (aiding and abetting) or 18 U.S.C. § 371 (conspiracy).

Unlawful Conduct
Applicable Federal Law
DOJ Section
Denial of Service Attacks
18 U.S.C. § 1030(a)(5)(A) (transmission of program, information, code, or command, resulting in damage)
CCIPS
18 U.S.C. § 1362 (interfering with government communication systems)
CCIPS
Use of Misleading Domain Name
18 U.S.C. § 2252B (using misleading domain name with intent to deceive a person into viewing obscene material or with intent to deceive a minor into viewing harmful material)
CEOS
Password Fraud
18 U.S.C. § 1030(a)(6) (trafficking in computer passwords)
CCIPS
18 U.S.C. § 1029 (access device fraud)
Fraud/CCIPS
18 U.S.C. § 1343 (wire fraud)
Fraud
Obscenity
47 U.S.C. § 223(a)(1)(A) (using telecommunications device to make, create, or solicit, and transmit any obscene comment, request, suggestion, proposal, image, or other communication)
CEOS
18 U.S.C. § 1465 (using interactive computer service for purpose of sale or distribution of obscene material)
CEOS
Piracy and Intellectual Property Theft
17 U.S.C. §§ 1201-1205 (Digital Millennium Copyright Act)
CCIPS
17 U.S.C. § 506 and 18 U.S.C. § 2319 (criminal copyright infringement)
CCIPS
18 U.S.C. § 2319A (trafficking in recordings of live musical performances)
CCIPS
Electronic Threats
18 U.S.C. § 875 (transmitting communications containing threats of kidnap or bodily injury) (Hobbs Act)
CTS
18 U.S.C. § 1951 (interfering with commerce by robbery, extortion, threats or violence) (Hobbs Act)
DSS
47 U.S.C. § 223 (a)(1)(C) (anonymously using telecommunications device to threaten person who receives communication)
CCIPS
Electronic Harassment
47 U.S.C. § 223 (a)(1)(C) (anonymously using telecommunications device to harass person who receives communication)
CCIPS
47 U.S.C. § 223(a)(1)(E) (repeatedly initiates communication with a telecommunication device solely to harass person who receives communication)
CCIPS
Interception of Electronic Communications
18 U.S.C. § 2511 (intercepting electronic communications)
CCIPS
18 U.S.C. § 2701 (accessing stored communications)
CCIPS
18 U.S.C. § 1030(a)(2) (accessing a computer and obtaining information)
CCIPS
Cyberstalking
18 U.S.C. § 2261A (using any facility of interstate or foreign commerce to engage in a course of conduct that places person in reasonable fear of death or serious bodily injury to person, person's spouse or immediate family) See also Electronic Harassment
DSS
Hate Crimes
Look to civil rights laws and penalty enhancements
Civil Rights
Libel/Slander
Look to civil laws

Posting Personal Information on a Website (e.g., phone numbers, addresses)
This is not a violation of law. May also be protected speech under First Amendment.

Invasion of Privacy
See Interception of Electronic Communications//

Disclosure of Private Information
18 U.S.C. § 2511(1)(c) (disclosing intercepted communications)
CCIPS
Spam
18 U.S.C. § 1037 (CAN-SPAM Act)
CCIPS
Spoofing Email Address
18 U.S.C. § 1037 (CAN-SPAM Act)
CCIPS

References
Acceptable Use Policies. http://www.portical.org/Presentations/Barnett/aup/62706/index.html
Kinnaman, D. Critiquing an AUP. http://www.io.com/~kinnaman/aupessay.html


Other document links:
Cell Phone Use