Page 15
i. Using another user’s account, password, or ID card or allowing another
user to access your account, password, or ID.
j. Coaching, helping, joining or acquiescing in any unauthorized acvity on
the network.
k. Posng anonymous, unlawful, or inappropriate messages or informaon
on a district-owned system.
l. Engaging in sexual harassment or using any language of a sexual or
otherwise objeconable nature (e. g., racist, terrorisc, abusive, threatening,
demeaning, stalking, or slanderous) in public or private messages.
m. Falsifying permission and/or authorizaon of idenficaon documents.
n. Obtaining copies of or modifying files, data, or passwords belonging to
other users on the network without authorizaon.
o. Knowingly placing a computer virus on a computer or network.
p. Transmission of any material that is in violaon of any federal or state
law. This includes, but is not limited to confidenal informaon, copyrighted
material, threatening or obscene material, and computer viruses.
3. Acceptable Use Guidelines
a. General Guidelines
(1) Students are responsible for the ethical and educaonal use of technology
in the District and when a district owned device is used out of district.
(2) Students will have access to available forms of electronic media and
communicaon that is in support of educaon and research, and in support of
the educaonal goals and objecves of the District.
(3) All technology policies and restricons must be followed.
(4) Access to the District’s computer online services is a privilege and not a
right. Each student will be required to sign and adhere to the Acceptable Use
Guidelines Agreement.
(5) When placing, removing, or restricng access to data or online services,
school officials shall apply the same criteria of educaonal suitability used for
other educaon resources.
(6) Parents concerned with the District’s computer online services at their
child’s school should refer to the EFA (LOCAL): Instruconal Resources:
Instruconal Material Selecon and Adopon policy and follow the stated
procedure.
(7) Any parent wishing to restrict their children’s access to any District computer
online services will need to provide this restricon request in wring. Parents
will assume responsibility for imposing restricons only on their own children.
Page 16
b. Network Equee
(1) Be polite.
(2) Use appropriate language.
(3) Do not reveal personal data (i.e. home address, phone number, or phone
numbers of other people).
(4) Remember that the other users of technology are human beings whose
culture, language, and humor have different points of reference from your
own.
(5) Users should be discrete when forwarding e-mail, and it should only be
done on a need-to-know basis.
c. E-Mail
(1) E-mail may be used for educaonal or administrave purposes only.
Students are provided a Gaggle e-mail account if e-mail is required in the
course in which they are enrolled.
(2) E-mail transmissions, stored data, transmied data, or any other use of
district-owned technology by students or any other user is subject to being
monitored at any me by designated staffto ensure appropriate use.
(3) All e-mail and all contents are property of the District.
4. Consequences
The student in whose name a system account and/or computer hardware is
issued will be responsible at all mes for its appropriate use.
Noncompliance with the guidelines published here, in the Student Handbook
/ Student Code of Conduct, and in Board policy CQ may result in suspension
or terminaon of technology privileges and disciplinary acon. Use or
possession of hacking soware is strictly prohibited and violators will be
subject to consequences in the Student Handbook / Student Code of Conduct.
Violaons of applicable state and federal law, including the Texas Penal Code,
Computer Crimes, Chapter 33, may result in criminal prosecuon, as well as
disciplinary acon by the District.
The District cooperates fully with local, state, or federal officials in any
invesgaon concerning or relang to violaons of computer crime laws.
In addion, contents of e-mail and network communicaons are governed
by the Texas Public Informaon Act, and therefore, may be subject to public
disclosure as required by law.
Any aempt to alter data, the configuraon of a computer, or the files
of another user without the consent of the individual, campus or district
administrator, will be considered an act of vandalism and subject to
disciplinary acon in accordance with the Student Handbook / Student Code
of Conduct.