tcss technology policies revisions 2004/2005 student, employee and copyright

15
TCSS Technology TCSS Technology Policies Revisions Policies Revisions 2004/2005 Student, 2004/2005 Student, Employee and Copyright Employee and Copyright

Post on 18-Dec-2015

214 views

Category:

Documents


2 download

TRANSCRIPT

TCSS Technology Policies TCSS Technology Policies RevisionsRevisions

2004/2005 Student, Employee 2004/2005 Student, Employee and Copyrightand Copyright

Policy ReviewPolicy Review

Student and Employee policies were Student and Employee policies were updated in order to reflect updated in order to reflect technological changes over the past technological changes over the past few years and to be more specific on few years and to be more specific on what is and is not permitted on what is and is not permitted on district computers and networks.district computers and networks.

Student Policy Review Student Policy Review

The TCSS Board of Education has three The TCSS Board of Education has three policies that relate to student use of policies that relate to student use of technology.technology.

1.1. Policy: IFBGC & JFBGC (Student Access to Policy: IFBGC & JFBGC (Student Access to Networked Information Resources)Networked Information Resources)

2.2. Policy: IFBCG-R1/R2 & JFBCG-R1/R2 Policy: IFBCG-R1/R2 & JFBCG-R1/R2 (TCSS Guidelines for Use of Networked (TCSS Guidelines for Use of Networked Information and Electronic Mail)Information and Electronic Mail)

3.3. Policy: IFBGB (Computer Software Policy: IFBGB (Computer Software Selection and Duplication)Selection and Duplication)

Student Policy RevisionsStudent Policy Revisions

The primary changes in the student The primary changes in the student policies were made to policy IFBGC-policies were made to policy IFBGC-R1/R2 and JFBGC-R1/R2. R1/R2 and JFBGC-R1/R2.

Within these policies the district Within these policies the district redefined the criteria of what is not redefined the criteria of what is not permitted on district computers and permitted on district computers and networks and created a new Student networks and created a new Student Agreement/Parent Permission form.Agreement/Parent Permission form.

Effective for 2004/2005, students are not allowed to doEffective for 2004/2005, students are not allowed to do the following on district computers or networks.the following on district computers or networks.

1.1. Sending, displaying or downloading offensive or threatening Sending, displaying or downloading offensive or threatening messages or pictures using any electronic format.messages or pictures using any electronic format.

2.2. Accessing or using non-approved Email services, such as AOL, Accessing or using non-approved Email services, such as AOL, MSN, dial-up or other personal email services. Exceptions are MSN, dial-up or other personal email services. Exceptions are allowed only when the purpose is intended for class projects. allowed only when the purpose is intended for class projects. Access is only permitted only with direct teacher supervisionAccess is only permitted only with direct teacher supervision

3.3. Playing, downloading or using the Internet or computer games Playing, downloading or using the Internet or computer games in a non-instructional purpose or without teacher supervision. in a non-instructional purpose or without teacher supervision.

4.4. Using obscene language.Using obscene language.5.5. Harassing, insulting or attacking others.Harassing, insulting or attacking others.6.6. Damaging computers and components, operating systems, Damaging computers and components, operating systems,

software or computer networks.software or computer networks.7.7. Violating copyright laws (see TCSS Policy IFBGB).Violating copyright laws (see TCSS Policy IFBGB).8.8. Plagiarizing materials found on the Internet. Plagiarism is the Plagiarizing materials found on the Internet. Plagiarism is the

act of taking the ideas or writings of others and presenting them act of taking the ideas or writings of others and presenting them as the user’s own.as the user’s own.

9.9. Using another person’s password.Using another person’s password.10.10. Trespassing in another person’s folders, work or files.Trespassing in another person’s folders, work or files.11.11. Intentionally wasting limited resources such as paper, ink, Intentionally wasting limited resources such as paper, ink,

toner, bandwidth, diskettes, etc.toner, bandwidth, diskettes, etc.12.12. Employing the network for commercial purposes.Employing the network for commercial purposes.13.13. Using or downloading of non-educational software or utilities Using or downloading of non-educational software or utilities

such as, but not limited to hacking tools, spyware, mp3/music such as, but not limited to hacking tools, spyware, mp3/music download programs or utilities, the Gnutella network, P2P (Peer download programs or utilities, the Gnutella network, P2P (Peer to Peer), MIRC, ICQ, newsgroups and chat rooms, online chat to Peer), MIRC, ICQ, newsgroups and chat rooms, online chat (AOL, Yahoo or MSN Instant Messenger) except for class-specific (AOL, Yahoo or MSN Instant Messenger) except for class-specific teacher-supervised projects).teacher-supervised projects).

14.14. Utilizing software that consumes large amounts of bandwidth; Utilizing software that consumes large amounts of bandwidth; that is, streaming audio/video such as but not limited to that is, streaming audio/video such as but not limited to Windows Media Player, Real Player, Shockwave, Quicktime, Windows Media Player, Real Player, Shockwave, Quicktime, WeatherBug, Webshots, for non-instructional purposes.WeatherBug, Webshots, for non-instructional purposes.

15.15. Viewing or attempting to view inappropriate web sites as Viewing or attempting to view inappropriate web sites as defined under the Children’s Internet Protection Act (CIPA) of defined under the Children’s Internet Protection Act (CIPA) of 2000.2000.

16.16. Bypassing or attempting to re-route Internet sites past the Bypassing or attempting to re-route Internet sites past the school system’s content filters or security devices.school system’s content filters or security devices.

Notes of InterestNotes of Interest Student use of computer equipment and the Student use of computer equipment and the

Internet is for educational purposes only.Internet is for educational purposes only. Teachers are responsible for conducting good Teachers are responsible for conducting good

classroom management and should be aware of classroom management and should be aware of the students behavior while using school the students behavior while using school computers and the Internet. computers and the Internet.

New policy revisions address specific rules of use. New policy revisions address specific rules of use. Including student access of outside personal Including student access of outside personal Email accounts and Instant Messaging. Email accounts and Instant Messaging.

Schools must receive and keep records of the Schools must receive and keep records of the Student Agreement/Parent Permission forms. Student Agreement/Parent Permission forms. Students should not be granted access to Students should not be granted access to computers unless they have a signed the computers unless they have a signed the agreement have parental approval. agreement have parental approval.

Employee Policy Review Employee Policy Review

The TCSS Board of Education has The TCSS Board of Education has two policies that relate to employee two policies that relate to employee use of technology.use of technology.

1.1. Policy: GAJDBC (Employee Network Policy: GAJDBC (Employee Network and Internet System Usage)and Internet System Usage)

2.2. Policy: IFBGB (Computer Software Policy: IFBGB (Computer Software Selection and Duplication)Selection and Duplication)

Employee Policy RevisionsEmployee Policy Revisions The changes in the employee policy now include The changes in the employee policy now include

more specific details and rules of behavior while more specific details and rules of behavior while using district computers and network resources. using district computers and network resources.

In general, employees are permitted to use In general, employees are permitted to use computers and the Internet to support the computers and the Internet to support the educational mission of the Tuscaloosa County educational mission of the Tuscaloosa County School System.School System.

Incidental personal use of district computers must Incidental personal use of district computers must not interfere with the employee’s job not interfere with the employee’s job performance. performance.

Employees should note that all communications Employees should note that all communications over Board equipment or facilities is the property over Board equipment or facilities is the property of the TCBOE and is subject to monitoring. of the TCBOE and is subject to monitoring.

Employee Rules and RestrictionsEmployee Rules and Restrictions1.1. Access, transmit, or retransmit material which promotes violence or advocates Access, transmit, or retransmit material which promotes violence or advocates

destruction of property including, but not limited to, information concerning the destruction of property including, but not limited to, information concerning the manufacture of destructive devices such as explosives, fireworks, smoke bombs, manufacture of destructive devices such as explosives, fireworks, smoke bombs, incendiary devices, etc.incendiary devices, etc.

2.2. Access, transmit, or retransmit any pornographic or other sexually oriented Access, transmit, or retransmit any pornographic or other sexually oriented material. Pornographic materials are pictures or writings that are intended to material. Pornographic materials are pictures or writings that are intended to stimulate erotic feelings by the description or portrayal of sexual activity or the stimulate erotic feelings by the description or portrayal of sexual activity or the nude form. This includes, but is not limited to:nude form. This includes, but is not limited to:

a.a. viewing pornography on the computer.viewing pornography on the computer.b.b. conducting sexually explicit discussions with Internet partners at any time of conducting sexually explicit discussions with Internet partners at any time of

the day.the day.c.c. sending, displaying, viewing or downloading pornographic messages, pictures sending, displaying, viewing or downloading pornographic messages, pictures

or movies.or movies.d.d. using obscene or profane language.using obscene or profane language.

3.3. Advocate or promote violence or hatred against a particular individual or group of Advocate or promote violence or hatred against a particular individual or group of individuals or advocate or promote the superiority of one racial, ethnic, or individuals or advocate or promote the superiority of one racial, ethnic, or religious group over another. This includes:religious group over another. This includes:

a.a. harassing, threatening, insulting, or attacking others.harassing, threatening, insulting, or attacking others.b.b. using the system network to exchange messages which create dissension or using the system network to exchange messages which create dissension or

conflict.conflict.4.4. Use or possess bootleg software. Bootleg software is any software that is in the Use or possess bootleg software. Bootleg software is any software that is in the

user’s possession without the appropriate registration of the software.user’s possession without the appropriate registration of the software.5.5. Initiate the use of encryption software from any access point within the school Initiate the use of encryption software from any access point within the school

district.district.6.6. Use of alternate Internet service provider connections (such as AOL, MSN, dial-up, Use of alternate Internet service provider connections (such as AOL, MSN, dial-up,

etc.) to the Tuscaloosa County School’s internal network unless expressly etc.) to the Tuscaloosa County School’s internal network unless expressly authorized by the Superintendent and properly protected by a firewall or other authorized by the Superintendent and properly protected by a firewall or other appropriate security device's). Employee personal computers may not be appropriate security device's). Employee personal computers may not be connected to the school network. Authorized non-network Internet use by system connected to the school network. Authorized non-network Internet use by system employees must also conform to school system policies.employees must also conform to school system policies.

7.7. Excessive use or access of personal email services that are not part of the district’s Excessive use or access of personal email services that are not part of the district’s email system. This includes services such as, but not limited to, AOL, MSN, Hotmail email system. This includes services such as, but not limited to, AOL, MSN, Hotmail and Yahoo mail. Employees who access these services are requested to use and Yahoo mail. Employees who access these services are requested to use caution when viewing personal messages that contain file attachments to help caution when viewing personal messages that contain file attachments to help minimize the potential or accidental release of a computer virus/worm/spy-ware on minimize the potential or accidental release of a computer virus/worm/spy-ware on district equipment. All network and Internet polices apply to employees when district equipment. All network and Internet polices apply to employees when accessing home or personal email services using district equipment. Use is accessing home or personal email services using district equipment. Use is considered excessive when it interferes with the performance of one’s professional considered excessive when it interferes with the performance of one’s professional responsibilities and/or when system technology resources are significantly responsibilities and/or when system technology resources are significantly diminished.diminished.

8.8. Commit or attempt to commit any willful act involving the use of the network that Commit or attempt to commit any willful act involving the use of the network that disrupts the operation of the network within the school district or any network disrupts the operation of the network within the school district or any network connected to the Internet including the use or attempted use or possession of connected to the Internet including the use or attempted use or possession of computer viruses.computer viruses.

9.9. Publish or copy copyrighted material. For any violation of this rule, the Board will Publish or copy copyrighted material. For any violation of this rule, the Board will hold the employee personally liable for any of his/her own actions that violate hold the employee personally liable for any of his/her own actions that violate copyright laws. Unless otherwise noted as “freeware” or “shareware”, all software copyright laws. Unless otherwise noted as “freeware” or “shareware”, all software on the Internet should be considered copyrighted work. Therefore, employees are on the Internet should be considered copyrighted work. Therefore, employees are prohibited from downloading software and/or modifying any such files without prohibited from downloading software and/or modifying any such files without permission from the copyright holder. Software updates may be purchased online permission from the copyright holder. Software updates may be purchased online in accordance with TCSS purchase guidelines, and installed in accordance with the in accordance with TCSS purchase guidelines, and installed in accordance with the software licensing agreement. Employees must have the approval of the school software licensing agreement. Employees must have the approval of the school administrator before installing outside software can be installed on a system administrator before installing outside software can be installed on a system workstation or server.workstation or server.

10.10. Plagiarize materials found on the Internet. Plagiarism is the taking of ideas or Plagiarize materials found on the Internet. Plagiarism is the taking of ideas or writings of others and presenting them as the user’s own.writings of others and presenting them as the user’s own.

11.11. Transmit confidential information concerning students or others over the system Transmit confidential information concerning students or others over the system network unless Board Policy regarding confidentiality is followed. Care must be network unless Board Policy regarding confidentiality is followed. Care must be taken to protect against negligent disclosure of such information.taken to protect against negligent disclosure of such information.

12.12. Use passwords improperly or negligently. Employees are forbidden to use another Use passwords improperly or negligently. Employees are forbidden to use another employee’s password. No message should be transmitted without the sender’s employee’s password. No message should be transmitted without the sender’s identity. Transmittal of messages with anonymous or fictitious names is prohibited.identity. Transmittal of messages with anonymous or fictitious names is prohibited.

13.13. Disregard school rules regarding network systems access.Disregard school rules regarding network systems access.

14.14. Leave students unsupervised while they work on the Internet.Leave students unsupervised while they work on the Internet.

15.15. Use another employee’s computer without authorization.Use another employee’s computer without authorization.

16.16. Conduct non-educational discussions with Internet partners during the school day.Conduct non-educational discussions with Internet partners during the school day.

17.17. Utilize software that consumes large amounts of bandwidth; that is, streaming Utilize software that consumes large amounts of bandwidth; that is, streaming audio/video such as, but not limited to, Windows Media Player, Real Player, audio/video such as, but not limited to, Windows Media Player, Real Player, Shockwave, QuickTime, Weather Bug, Webshots, for non-instructional purposes.Shockwave, QuickTime, Weather Bug, Webshots, for non-instructional purposes.

18.18. Move networked computers off campus unless authorized by an administrator.Move networked computers off campus unless authorized by an administrator.

19.19. Advertise and solicit on school computers. Internet accounts may not be used for Advertise and solicit on school computers. Internet accounts may not be used for commercial purposes or personal gain. Employees will not offer or provide products commercial purposes or personal gain. Employees will not offer or provide products or services on System networks.or services on System networks.

20.20. Use or download non-educational related software or utilities such as but not limited Use or download non-educational related software or utilities such as but not limited to hacking tools, spyware, mp3/music download programs or utilities, the Gnutella to hacking tools, spyware, mp3/music download programs or utilities, the Gnutella network, P2P (Peer to Peer), MIRC, ICQ, newsgroups and chat rooms, online chat network, P2P (Peer to Peer), MIRC, ICQ, newsgroups and chat rooms, online chat (AOL, Yahoo or MSN Instant Messenger). (AOL, Yahoo or MSN Instant Messenger).

Notes of InterestNotes of Interest Employees may use the Internet and computers for personal use Employees may use the Internet and computers for personal use

as long as they have supervisor permission and the incidental use as long as they have supervisor permission and the incidental use does not interfere with the employee’s job.does not interfere with the employee’s job.

Instant messaging and private outside Email in a non-educational Instant messaging and private outside Email in a non-educational setting is limited to the same conditions as personal computer and setting is limited to the same conditions as personal computer and Internet use. Internet use.

The district has the right to limit or prohibit access to certain The district has the right to limit or prohibit access to certain websites and services and may monitor all network activity.websites and services and may monitor all network activity.

Employees are required to use the district’s approved software Employees are required to use the district’s approved software applications and Email services. Employees must have supervisor applications and Email services. Employees must have supervisor and Technology Department approval before downloading or and Technology Department approval before downloading or installing any third party software of utilities. installing any third party software of utilities.

All Employees that use or have access to district computer All Employees that use or have access to district computer equipment must sign the Employee Network and Internet System equipment must sign the Employee Network and Internet System Usage form (GAJDBC-R1).Usage form (GAJDBC-R1).

Computer Software and Computer Software and Duplication Policy (IFBGB)Duplication Policy (IFBGB)

This policy received minor This policy received minor modifications and does not require modifications and does not require extensive review.extensive review.

Employees and students should be Employees and students should be made aware of this policy so that made aware of this policy so that they understand the district’s they understand the district’s position on computer software and position on computer software and duplication of electronic media. duplication of electronic media.

QuestionsQuestions

??