Acceptable Use Policy
ACCEPTABLE USE POLICY
A. Privacy. All members of the network community have the right to expect privacy in their electronic communications within certain limitations. The school has the right to access any student files and e- mail correspondence if a user is believed to have violated the guidelines set forth in this policy. System administrators may also need to access private files as part of regular system maintenance. In that case, an attempt will be made to notify the user of this in advance whenever possible.
B. Equal Access. All members of the school’s technology network will be given equal access to as many network services as their technology and level of skill will allow. For our purposes, “equal access” will apply within any one division or grade level. Age appropriate restrictions may apply in relation to Internet access, level of required adult supervision, or the holding of e-mail accounts. Internet exploration or other uses of the network are encouraged, but “monopolizing” the network or individual computers is not allowed. A user may be asked to remove personal files if the total system storage space becomes low. In other words, one's access may not obstruct the equal access of the rest of the school community. Authorized student clubs, activities, and organizations may develop web pages, but only with the permission and supervision of the club’s advisor, as well as the system administrator.
C. Safety. To the greatest extent possible, members of the school will be protected
from harassment or unwanted or unsolicited contact. Any one receiving unwelcome
communications should bring them to the attention of a teacher or system
administrator. Users of the Internet, however, should be aware that the school’s
network cannot possibly screen all offensive material. Thus individual users must use
good judgment and must comply with the rules that follow in regard to the visitation
of inappropriate sites on the web. Students will not agree to meet with someone
whom they have met online using the school’s Internet access.
A. Never share your password or account with anyone. Since you have full responsibility for the use of your account, you will also be held accountable for any violations of these policies that can be traced back to your individual account. Do not share your password.
B. Never post information that can damage, disrupt or in any other way, degrade the performance of the network. Chain letters and email bombs are examples of activities prohibited for this reason.
C. Obey the rules of copyright. Copyright infringement occurs when an individual inappropriately reproduces a work that is protected by copyright. Users of the school’s network must follow the instructions of the copyright holder when they encounter works on the Internet that are copyrighted.
D. Do not engage in plagiarism. The normally accepted definition of plagiarism also applies to any information from the Internet. Plagiarism is the taking of ideas or writings of others and presenting them as if they were your own. The correct format for attribution of sources is made clear in English classes, and you are to acknowledge sources acquired via the Internet in the manner prescribed.
E. You may not install any software downloaded from the Internet, or obtained from any other source without the express permission of the system administrator. Nor shall you “run” or “compile” any software from a floppy or CD-ROM on a local PC or network station.
F. You may not post personal communications to a public forum without the stated consent of the original author. To do so is to violate the privacy of the author.
G. Use of the network for any illegal activity is prohibited. These would include tampering with computer hardware or software, unauthorized entry into computers or files or the destruction of files. Such activity is considered a crime under state and federal laws. Use of the network for any other illegal activity, such as sale of illegal substances, is likewise prohibited.
H. Avoid the deliberate or inadvertent spread of computer “viruses.” Deliberate spread of a computer virus, whether to the Academy network or any other network, is considered criminal activity under state and federal law.
I. Use appropriate language. As you would in any other school context, you are expected to be responsible in the use of appropriate language on the school’s network. Obscenities, inflammatory or harassing speech, personal attacks, and racial slurs and the like are thus not allowed on the school’s system or on the internet at large. To post false or defamatory information about a person or organization would also be an example of inappropriate language.
J. Refrain from anonymity, impersonation, or pseudonyms in your use of the school’s network. Such behaviors are not appropriate in an educational setting; individuals must take direct responsibility for their actions and words.
K. No student shall attempt to “copy,” either by downloading from the host PC or
from the original disks, any software located on the station PC or network server.
Software is defined as Windows OS (XP/Vista), Windows NT Server, Microsoft Office (all
versions), Visual Studio, Dreamweaver, InDesign, Photoshop or any other software either
installed on the station PC or on the network. All software is owned and licensed to Staten Island Academy for its explicit use. Copying of such software is a crime under
State and Federal Law.
III. Restrictions. The following are NOT permissible uses of the Staten Island
A. Accessing, downloading, transmitting, copying, displaying, printing or distributing obscene or sexually explicit material, including language, is prohibited. This includes all pornography. There is an equal restriction, in all the manners stated above, on all hate speech, racist tracts, and “how to “ documents encouraging violence or illegal acts. If you accidentally access such material, you must immediately contact the system administrator or a teacher, so that you are protected against a claim that you intentionally violated this policy.
B. Arranging meetings with people, with whom your sole means of contact is the Internet.
C. Plagiarizing written materials or copying copyrighted materials.
D. Damaging computers, computer systems, or networks or peripherals through the intentional misuse or overuse of electronic devices; spreading computer viruses through the inappropriate use of files or disks.
E. Damaging, vandalizing, hacking, or destroying technological systems or equipment.
F. Printing excessive copies, attempting to crash computers or networks, inhibiting network traffic, using chain letters, or excessive messages, or devices that restrict legitimate use.
G. Spamming is prohibited. Spamming is the sending of an annoying or unnecessary message to a large number of people.
H. Using another person’s password or attempting to open another person’s files or folders.
I. Attempting to gain unauthorized access, as defined by the system administrator.
J. Violating local, state, or federal statutes, i.e. using the Academy network for any illegal activity, including harassment or fraudulent purchases through e-mail or internet.
K. Downloading or uploading any programs or files (including games) without the prior permission of the network administrator.
L. Using the Academy network for credit card purchases or credit card services
M. Accessing the Internet, while on campus, through any means other than the
N. Using any computer on campus for non-educational activities such as game
IV. Disclaimers. The school is not responsible for any damages incurred by students, including, but not limited to, loss of data resulting from delays or interruptions of service, for the loss of data stored on the school’s resources, as well as physical or emotional harm or distress that may occur as a result of the Internet access provided by the school.
A. The school is not responsible for the accuracy, nature, or quality of information stored on the school’s network resources or acquired through school-provided access.
B. The school is not responsible for unauthorized financial obligations resulting from the use of school-provided access.
C. Although the school can maintain some supervision of student access to information over the internet, will enforce the rules set forth above, and may use technical or manual means to regulate access to information, these methods do not provide a foolproof method for enforcing the provisions of this policy. Like all school activities, electronic learning will necessitate good judgment on the part of students and attention to the details of the policy stated above.
D. The rules set forth above are subject to change, and any such changes will be either posted and or mailed to homes, as the need arises.
V. Sanctions. Violation of any of the policies stated above may result in disciplinary
action including loss of network privileges, detentions, suspension, or expulsion,
depending on the severity of the infraction.