Policy Level: 2
Classification: 7
Descriptor Code: IFBD-R
Descriptor Term: INTERNET ACCEPTABLE USE
Effective Date: 5/14/2013
Description: The Internet Acceptable Use Policy and Administrative Regulations will be placed in each school’s agenda.  A signature of parent indicates understanding of school rules and regulations, which includes the Internet Acceptable Use Policy.

PURPOSE:  Walton County School District provides all students and staff access to the Internet, network resources, and computing devices at designated graded levels as a means to promote achievement and provide diverse opportunities during the educational experience.  This policy provides guidelines and information about the limitations that the school imposes on the use of these resources.  In addition to this policy, the use of any school computing device, also requires students to abide by the WCSD Technology Use Guidelines as stated in the Student Code of Conduct.  Additional rules may be added as necessary and will become a part of this policy. It is the purpose of this list of guidelines to ensure that all persons who use WCSD technology resources, both students and employees, use these valuable resources in an appropriate manner.

TERMS OF THE REQUIRED USE AND INTERNET SAFETY POLICY 
Specifically, the student:
  • Will adhere to these guidelines each time the Internet is used at home and school. 
  • Will make available for inspection by an administrator or teacher upon request any messages or files sent or received at any Internet location.  Files stored and information accessed, downloaded, or transferred on district-owned technology are not private.
  • Will use appropriate language in all communications, avoiding profanity, obscenity, and offensive or inflammatory speech. 
  • Understands that Cyber Bullying such as personal attacks and/or threats on/against anyone made while using district owned technology to access the Internet or local school networks, is to be reported to responsible school personnel.  Rules of netiquette should be followed conducting oneself in a responsible, ethical and polite manner.  
  • Will follow copyright laws and should only download/import music or other files to a district owned technology that he/she is authorized or legally permitted to reproduce, or for which he/she has the copyright. 
  • Will never reveal identifying information, files, or communications to others through email or post to the Internet.  
  • Will not attempt to access networks and other technologies beyond the point of authorized access.  This includes attempts to use another person’s account and/or password.  
  • Will not share passwords or attempt to discover passwords.  Sharing a password could make you liable if problems arise with its use and make you subject to disciplinary action. 
  • Will not tamper with computer hardware or software, attempt unauthorized entry into computers, or vandalize or destroy computing devices or computer files.  Damage to computing devices may result in felony criminal charges. 
  • Will not attempt to override, bypass, or otherwise change the Internet filtering software or other network configurations.   
  • Will not make use of materials or attempt to locate materials that are unacceptable in a school setting.  This includes, but is not limited to, pornographic, obscene, graphically violent or vulgar images, sounds, music, language, video, or other materials.  The criteria for acceptability is demonstrated in the types of material made available to students by administrators, teachers, and the school media center.  Specifically, all district owned technologies should be free at all times of any pornographic, obscene, graphically violent or vulgar images, sounds, music, language, video or other materials (files). 
  • Will keep computing devices secure and damage free.  Each device is issued with a protective case.  The student is allowed to upgrade the case.  If they choose to do this, they must turn in the case provided by the system to the Media Center.
  • Will back up data and other important files regularly.  WCSD will at times maintain the devices by imaging. All files not backed up to server storage space or other storage media will be deleted during these processes. Students and staff are ultimately responsible for backing up all personal files on their own storage media.
Follow these general guidelines: 
  • Do not loan your device, charger, cords or any other device related items. 
  • Do not leave the device in vehicle.
  • Do not leave your device unattended. 
  • Do not eat or drink while using the device or have food or drinks in close proximity to the device. 
  • Do not allow pets near your device. 
  • Do not place the device in floor or in sitting area such as couches or chairs. 
  • Do not leave the device near table or desk edges. 
  • Do not stack objects on top of your device.
  • Do not leave the device outside or use near water such as a pool. 
  • Do not check the device as luggage at the airport. 
  • Devices must remain in system or student provided case at all times.
  • Devices should be securely stored and not in use when walking in the hall.
By signing this you agree to abide by the conditions listed above and assume responsibility for the care and proper use of WCSD technology, including personally backing up personal data.  WCSD is not responsible for any loss resulting from delays, non-deliveries, missed deliveries, lost data, or service interruptions caused by user errors, omissions or reasons beyond the district’s control.  Information obtained via the Internet and other sources using WCSD technologies is not guaranteed as to its accuracy or quality. You understand that should you fail to honor all the terms of this Policy, future Internet and other electronic media accessibility may be denied. Furthermore, you may be subject to disciplinary action outlined in the WCSD Student Code of Conduct and, if applicable, your device may be recalled.  By signing below, parents/guardians give permission for the school to allow their son or daughter to have access to the school device and Internet under the conditions set forth above.

As the parent/guardian, my signature indicates I have read and understand this Required Use Policy, and give my permission for my child to have access to the described electronic resources. 

Parent/Guardian (please print): _______________________________________________ 

Parent/Guardian Signature: _______________________________Date: _____________

As the student, my signature indicates I have read or had explained to me and understand this Required Use Policy and accept responsibility for abiding by the terms and conditions outlined.

Student (please print): _______________________________________________

Student Signature: _______________________________________Date: _____________

_____________________________________________________________________

References
Georgia CodeDescription
O.C.G.A. 16-09-0090Georgia Computer Systems Protection Act
O.C.G.A. 16-09-0091Computer Related Crime
O.C.G.A. 16-09-0092Definitions
O.C.G.A. 16-09-0093Computer crimes defined
O.C.G.A. 16-09-0093.1Misleading transmittal
O.C.G.A. 16-09-0094Violations
O.C.G.A. 20-02-0149Online internet safety education
O.C.G.A. 39-05-0002Subscriber's control of minor's use of internet
O.C.G.A. 16-11-0037.1Dissemination of information relating to terroristic acts
US CodeDescription
20 USC 6777Internet Safety
47 USC 254(h)Universal Service
15 USC 6501Children's Online Privacy Protection Act - Definitions
15 USC 6502Children's Online Privacy Protection Act - Collection and use of personal information from and about children on the Internet
15 USC 6503Children's Online Privacy Protection Act - Safe harbors
15 USC 6504Children's Online Privacy Protection Act - Actions by states
15 USC 6505Children's Online Privacy Protection Act - Administration and Applicability
These references are not intended to be part of the policy itself, nor do they indicate the basis or authority for the board to enact this policy. Instead, they are provided as additional resources for those interested in the subject matter of the policy.