Text Options for the Visually Impaired Font Size: a- A+ Color: A A A Revert 
Close vision bar
Open vision bar

Parent Portal Access

Scott County School Acceptable Use Policy

Access to Electronic Media

(Acceptable Use Policy)

The Board supports the right of students, employees, and community members to have reasonable access to various information formats and believes it is incumbent upon students, employees, and community members to utilize this privilege in an appropriate and responsible

manner. This policy outlines both the privileges and the responsibilities associated with the use of the Scott County Schools’ network and its resources. It addresses ethical and educational uses of electronic media, including, but not limited to, the Internet, email, and other technological

resources. It also addresses issues of privacy versus administrative review of electronic files and communications. The policy prohibits use of networks for illegal activities, the intentional spreading of embedded messages, or the use of other programs with the potential of damaging or

destroying programs or data. For additional information see school board policies for students, and certified and classified employees, regarding use of school property, disrupting the educational process, and conduct.

EDUCATIONAL SUITABILITY

School officials shall apply the same criterion of educational suitability used to review other educational resources when questions arise concerning access to specific databases or other electronic media.

NETWORK RELIABILITY

Scott County Schools will not be responsible for any damages not limited to loss of data resulting from delays, non-deliveries, missed deliveries, or service interruptions caused by its own negligence or user errors or omissions.

SAFETY

Accounts are to be used in support of education and research that is consistent with the educational objectives of the Scott County Schools. This may include reasonable personal use.

Examples of acceptable use include but are not limited to protecting yourself and others by not revealing personal information that could lead a stranger to you or another person. (i.e. name, address, telephone, workplace, etc.) Users should notify a Principal or School Technology

Coordinator (STC) of any policy violations or security breeches. This can be done anonymously.

UNACCEPTABLE USE

Guidelines for unacceptable use shall prohibit utilization of networks for prohibited or illegal activities, the intentional spreading of embedded messages, or the use of other programs with the

potential of damaging or destroying programs or data. Unacceptable use of technology includes, but is not limited to, the following;

 

Sharing your password;

 Using or altering anyone else’s password;

 Allowing someone to access any area of your account;

Access to Electronic Media

(Acceptable Use Policy)

UNACCEPTABLE USE (CONTINUED)

Accessing any computer or network for which you are unauthorized;

 Creating or sharing computer viruses;

 Destroying another person’s data;

 Monopolizing the network resources by running large programs and  network during the day and/or sending massive amounts of email to other users, or using system resources for games;

 Vandalizing network resources; Vandalism is defined as any attempt to harm or destroy equipment, data, operating systems or applications, our network, or any other networks.

 Playing games with no educational purpose over the network;

 Taking from or placing on the network, any copyrighted material including copyrighted movies and music without authorization from the District network administrator;

 Distributing or collecting obscene, abusive, discriminatory or threatening material via telephone, video, email, internet or other means;

 Demonstrating or discussing policy violations or security breeches with someone other than a school network administrator;

 Annoying other users with things such as talk requests and chain letters;

 Conducting any illegal activity via the network; Known illegal activity will be reported to the authorities;

Sending harassing or abusive email messages to others;

 Using vulgar or inappropriate language;

 Using network resources for personal profit; and

 Using technology resources for commercial, political, or profit-making enterprise except as specifically agreed to with the District.

ACCESS PRIVILEGES TO ELECTRONIC MATERIALS

Access to electronic information resources may range from read-only access to instructional software to full search capability of the Internet and to email. For these reasons the Scott County

Schools maintain the right to limit access to software and/or documents found either on our network or the Internet via technical or human barriers.

NETWORK PRIVILEGES

Employees Students Community Members

Infinite Campus or similarly necessary information systems, when

Appropriate User folder Internet access

User folder Supervised internet access and supervised class email (K-5)

Internet access Independent internet access independent email (6-12)

Email account Email account

Access to Electronic Media

(Acceptable Use Policy)

CONTRACTS

Student

A contract, signed by the student, shall be required prior to the school granting that student access to the network, Internet, and/or email. The signature of a parent or guardian is also required for students under the age of eighteen (18) and will indicate the degree of access granted to the student. This document shall be kept on file by the Principal or School Technology Coordinator (STC) as a legal, binding document and shall continue to be in effect throughout the student’s attendance in the building in which their grade level is housed (i.e. K-5, 6-8 and 9-12), unless modified by the parent/guardian.. These signatures indicate understanding and agreement with the specified acceptable uses, rules of on-line behavior, access privileges and penalties for policy/procedural violations.

Employee

A contract, signed by the employee, shall be required prior to the school granting that employee access to the network, Internet, and/or email. This document shall be kept on file by the District Technology Coordinator (DTC) as a legal, binding document. The signature indicates understanding and agreement with the specified acceptable uses, rules of on-line behavior, access privileges and penalties for policy/procedural violations.

Community Member

The Superintendent, or his designee, shall determine when it is appropriate for community members to have access to District technology resources.

A contract, signed by the community member, shall be required prior to the school granting that community member access to the network, Internet, and/or email. This document shall be kept on file by the District Technology Coordinator (DTC), principal, or School Technology Coordinator (STC) as a legal, binding document. The signature indicates understanding and agreement with the specified acceptable uses, rules of on-line behavior, access privileges and penalties for policy/procedural violations

LOGINS AND PASSWORDS

Upon signing a contract, a private login and password will be assigned to each user. The user is responsible for any activity performed under that login and password and therefore, passwords must be kept private.

There will be no access to the network, email, or the Internet without the use of a login and password and those will only exist for those persons with a signed contract.

Access to Electronic Media

(Acceptable Use Policy)

RIGHT TO PRIVACY

The Scott County Schools reserve the right to ask a Network Administrator to access any user folder and/or email account of any user at any time. Users are advised not to place confidential documents in their user folder and never to use email for confidential communication. EMAIL is not private. All Internet sites visited will be logged and reviewed for suitability of Internet use to assure compliance with the AUP and with state law. Internet access has been granted for educational and research purposes only.

DISREGARD OF RULES

Individuals who refuse to sign required acceptable use documents or who violate District rules governing the use of District technology shall be subject to loss or restriction of the privilege of using equipment, software, information access systems, or other technological resources.

RESPONSIBILITY FOR DAMAGES

Individuals shall reimburse the Board for repair or replacement of District property lost, stolen, damaged, or vandalized while under their care.

DISCIPLINARY ACTION

Any user who violates the terms and conditions of this Acceptable Use policy will experience immediate degradation of services to “read only access”. Loss of privileges may continue for a period of up to one (1) calendar year, and/or other disciplinary actions may be enforced as per the discipline policy. The DTC, STC, or Network Director, may convert an account to “read only access” at any time as required. The DTC, STC, or Network Director, in cooperation with the building administrator, must notify the user, and user’s parents in case of a minor, in writing within two weeks informing them of the reason for suspension or termination of an account. Users (student, employees, or community members) whose accounts are denied, suspended or revoked do have the following rights:

To request (in writing) from the District Technology Coordinator a written statement justifying the disciplinary actions.

 

To submit a written appeal to the Superintendent and a committee he/she shall designate. Pending the decision of this committee, a user can make a final appeal to the Board of Education. The decision of the Board of Education is final




Click here if you agree to the Acceptable use Policy and wish to access the RSMS Parent Portal




Back to School News      Print News Article