威廉希尔平台

Skip To Main Content

Internet Safety & Acceptable Use of Computer Technology

GENERAL
Athens City Schools (ACS) is pleased to offer students access to a networked computer environment that provides access to a variety of instructional software and to the Internet. In order for the school system to be able to continue to make its computer network and Internet access available, all students must take responsibility for appropriate and lawful use of this access. Access to technology resources is a privilege, not a right, and may be revoked if abused. Access entails responsibility.
The following pages describe the provisions of your agreement regarding computer network and Internet use. Students violating these rules will lose computer privileges and/or receive punishment as defined in the Student Code of Conduct. Misuse of the school system’s technology will result in the student’s computer usage being revoked, monetary charges for repairing damaged equipment, detention, suspension, and/or expulsion. Violation of civil and/or criminal law relating to technology and its use can result in criminal prosecution and civil liability.
ACCESS
The school system’s technology network is a limited forum, similar to the school newspaper, and therefore the school system may restrict your speech while using the network. Students should expect no privacy in the contents of personal files or records of web research activities on the network. The school system reserves the right to monitor, inspect, copy, review, and store at any time and without prior notice any and all usage of the computer network and Internet access and any information transmitted or received in connection with such usage. If a user is believed to be in violation of any of the technology guidelines, a system administrator may review communications and provide documentation related to any violation. The school system does not guarantee the privacy, security, accuracy, truthfulness, or confidentiality of any information sent or received via the Internet.
  • The use of all ACS technology resources is a privilege, not a right, and inappropriate or suspected inappropriate use will result in a cancellation of those privileges, pending investigation.
  • Individuals may use only accounts, files, software, and/or other technology resources that are assigned to, provided, or approved for use.
  • Individuals identified as a real or suspected security risk will be denied access.
  • Individuals must not attempt to disrupt any technology services or data integrity by engaging in inappropriate activities. Examples include, but are not limited to, spreading viruses, spamming, excessive network and/or Internet activity, or modification of equipment or infrastructure.
  • Individuals must not attempt to modify technology resources, utilities, and configurations, and/or change the restrictions associated with his/her accounts, or attempt to breach any technology resources security system or filtering systems, either with or without malicious intent.
  • Personal technology-related devices such as, but not limited to laptops, cell phones, smart- phones, smart watches, iPads, pagers, AirPods, gaming devices, cameras or other eDevices, etc. used on school grounds are subject to all rules covered in this policy and other applicable published guidelines, as well as local, state, and federal laws.
  • The district technology team, and/or school system administrators will determine when inappropriate use has occurred, and they have the right to deny, revoke, or suspend specific user accounts.
LIMITING INTERNET ACCESS TO AGE-APPROPRIATE SUBJECT MATTER/MATERIALS
With respect to student access to the Internet on electronic devices owned by the Board, the Superintendent (and his/her designee) will engage in reasonable efforts to modify/restrict such devices so that they limit Internet access by students to only age-appropriate subject matters and materials deemed age-appropriate by the Superintendent (and his/her designee). For example, these restrictions will be designed to thwart access to pictures that are obscene, that constitute child pornography, or that are otherwise harmful to minors. From time to time, the Superintendent (and his/her designee) will periodically engage in efforts to update and adjust such modifications/restrictions to continue their effectiveness.
INTERNET USE
The Internet is a global network made up of many smaller contributing networks connecting millions of users throughout the world. Through the Internet, students can explore thousands of libraries, databases, museums, and other resources to enhance educational experiences. In compliance with the Children’s Internet Protection Act, signed into law December 21, 2000, Athens City Schools has established several measures to help protect Internet users.
Although ACS provides a reputable Internet blocking system in addition to teacher/staff supervision, it is not possible to screen all materials. It is important for families to discuss the appropriate use of the Internet and to set expectations for the kinds and types of materials that are acceptable for viewing. Ultimately, parents and guardians of minors are responsible for setting and conveying the standards that their children should follow when using the Internet and the school’s technology resources.
  • The intent of ACS is to provide access to resources available via the Internet with the understanding that staff and students will access and use information that is appropriate for their various curricula.
  • All school rules and guidelines for appropriate technology usage, as well as local, state, and federal laws apply to usage of the Internet.
  • Students gain access to the Internet by agreeing to conduct themselves in a considerate and responsible manner and by providing written permission from their parents.
  • Internet activity can and will be monitored, along with other aspects of technology usage.
  • Successful or unsuccessful attempts to bypass the Internet filters by using proxies or other resources are a violation of this policy.
ELECTRONIC MAIL
Electronic mail access is intended to support only educational, instructional, and administrative functions. Students are not allowed to use instructional time and school resources to check personal email accounts via the Internet. The school system cannot guarantee the privacy, security, accuracy, truthfulness, or confidentiality of any information sent or received via electronic mail.
STUDENT USE OF INTERNET AND ELECTRONIC COMMUNICATIONS
With respect to student access to the Internet on electronic devices owned by the Board, the Superintendent (and his/her designee) will engage in reasonable efforts to: (a) prioritize the safety and security of students when using email, chat rooms, and other forms of direct electronic communication; (b) prohibit access by students to unlawfully obtained data or information, including hacking, or other unlawful online activity; and (c) prohibit access to websites, web applications, or software that exposes students to the disclosure, use, or dissemination of their personal information. To these ends, the Superintendent (or his/her designee) will ensure that each student handbook includes Board-approved rules and regulations concerning Internet Safety & Acceptable Use of Computer Technology, which set out rules related to the foregoing items and note the disciplinary consequences to students for failing to abide by such rules.
STUDENT USE OF SOCIAL MEDIA
Students are prohibited from accessing social media platforms on electronic devices owned by the Board, except when expressly directed by a teacher solely for an educational purpose.
WEB PUBLISHING
ACS websites are limited to usage associated with activities of the school district. The web site(s) cannot be used for profit, for commercial purposes, to express personal opinions, or to editorialize.
  • Student pictures or other personally identifiable information can be used in accordance with FERPA guidelines.
  • Individual students may be identified by full name unless permission to do so is denied in writing by the parent or guardian to the school principal. Full names may only be used in reporting student participation in school sponsored extracurricular activities, achievements, and other positive recognitions.
  • Infringement of copyright laws, obscene, harassing, or threatening materials on web sites are against the law and are subject to prosecution.
The school system’s web sites are publications designed to inform students, parents, and the community about school activities.
  • The term "web site(s)" includes the web pages that are an integral part of the site as well as the web sites and/or pages to which a link has been provided within a school system site or page. Only schools, departments, activities, and teachers of ACS will have web pages sponsored by and linked together under the ACS homepage. ACS takes no responsibility for sites that may unknowingly link to school-sponsored web pages.
  • Material (including but not limited to text, graphics, photographs, artwork, audio, video, etc.) generated by or using the resources of a school, a school-sponsored activity, or the school system may only be shown on a web site or page with the approval of the technology coordinator, principal and/or superintendent.
  • The provisions of the Family Educational Rights and Privacy Act, 20 U.S. C. 1232g, will be observed regarding the inclusion of student and family data on web sites.
  • Many teachers post assignments on websites. Although this is an excellent instructional tool, there are times when the internet may not be available. Lack of Internet access does not relieve the student of the responsibility of complying with classroom instructions from the teacher or contacting the teacher or school to obtain current instructions, assignments, or other guidance.
  • Students attempting to or found to have tampered with web site content or operation without authorization shall be considered to have committed a Class III offense punishable as provided in the Student Code of Conduct.
DATA SECURITY
  • Students are expected to follow all local, state, and federal laws and system policies regarding the protection of student and staff confidential data.
  • Users should not have any expectation that their usage of such resources is private. Reasonable efforts will be taken to maintain security of technology resources, but the school district cannot ensure that such security will not be penetrated or breached and cannot assume any liability arising out of any such penetration or breach of security.
  • Users are responsible for their individual network accounts and must take all reasonable precautions to prevent unauthorized access to accounts, data, and any other unauthorized usage within and outside ACS. Individuals must take all reasonable precautions to prevent any such unauthorized usage, which shall be reported immediately to the local school principal and/or the district technology supervisor.
  • Students shall be responsible for reporting suspected or actual breaches of data security, whether due to inappropriate actions, carelessness, loss/theft of devices or failures of technical security measures. Students should not go looking for security problems, as this will be construed as an illegal attempt to gain access.
  • Individuals may not attempt to log into the network using any network account and/or password other than the login(s) assigned to him/her. Individuals may not allow someone to use his/her network account and/or password to access the network, email, specific software packages, or the Internet.
  • The system-wide technology staff performs routine backups in an effort to assure continuity of business. There can be no assurance, however, that technology resources will be available within a particular time frame following an outage. There is no guarantee that information that existed prior to an outage, malfunction, or deletion can be recovered.
  • Users are expected to maintain and back up their critical files and data. To maintain effective network performance, data stored on the servers will be deleted on a regular basis.
  • If any policy violation or inappropriate behavior is suspected, the technology team, local school administrators, and/or other designated technology staff reserve the right to inspect any and all data, including data stored by individual users on individual school or personal devices. Users should be aware that activities might be monitored at any time without notice.
  • Users should not have any expectation that their use of technology resources, including files stored by them on the ACS network, will be private and will be secure from access by others.
  • Because communications on the Internet are public in nature, all users should be careful to maintain appropriate and responsible communications.
  • ACS cannot guarantee the privacy, security, or confidentiality of any information sent or received, either via the Internet, an email facility, telephone, or otherwise.
  • Users should not store personal and/or private information on the district and/or school’s technology resources.
RULES AND USES
The following rules and policies govern the use of ACS technology resources:
  • PERSONAL SAFETY AND PERSONAL PRIVACY You are prohibited from posting personal contact information about yourself. Personal contact information includes your address, telephone, school address, work address, etc. This information may not be provided to an individual, organization, or company, including websites that solicit personal information. Never meet or agree to meet with a person you communicated with online. You will promptly disclose to your teacher, counselor, or principal any message you receive that is inappropriate or makes you feel uncomfortable. Under no conditions should you provide your password to another person. You must not use school computers and resources to participate in Internet chat rooms that are not related to instruction. Entry into chat rooms during school hours must be pre-approved by teachers.
  • ILLEGAL ACTIVITIES You will not use the school’s technology resources to engage in any illegal act. In the event there is a claim that you have violated this policy, you will be provided due process rights and will be subject to criminal prosecution and civil liability.
  • INAPPROPRIATE COMMUNICATION AND CYBERBULLYING Restrictions against inappropriate language apply to public messages, private messages, and material posted on web pages. You will not use obscene, profane, lewd, vulgar, rude, inflammatory, threatening, or disrespectful language. You will not post information that could cause damage or a danger of disruption. You will not engage in personal attacks, including prejudicial or discriminatory attacks. You will not harass another person. Harassment is persistently acting in a manner that causes distress or annoyance to another person. If you are told by a person to stop sending messages, you must stop. You will not knowingly or recklessly post false or defamatory information about a person or organization. Athens City School Board Policy JNA – Jamari Terrell Williams Student Bullying Prevention Act Policy.
  • RESPECTING RESOURCE LIMITS You will use the system only for educational activities. You will not download large files unless approved by the school’s computer lab manager/teacher. If it is necessary to download a large file, you should do so during a time when the system is not being heavily used, and will remove the file from the system as soon as it is used for the required educational activity. You will not post chain letters or engage in "spamming.” Spamming is the act of sending an annoying or unnecessary message to a large number of people.
  • PLAGIARISM You will not plagiarize works that you find on the Internet. Plagiarism is the act of taking the ideas or writings of others and presenting them as if they were one’s own. Artificial intelligence is a vastly emerging technology. As such, its uses and the implications of its use are still being discovered. However, its use will be treated like any established technology resource in ACS. Any work produced must be properly cited and/or attributed to the generative AI engine. Any malicious or unethical use will be subject to the disciplinary actions outlined in the Code of Conduct.
  • CARE OF EQUIPMENT You will take care to protect the school system’s equipment from damage and will follow all rules established by the school regarding use of the equipment. You are prohibited from installing software on school equipment. You and your parents can be held financially responsible for any and all harm to the system’s equipment and/or network as a result of misuse and/or intentional damage.
  • INAPPROPRIATE ACCESS TO MATERIAL You will not use the school’s technology resources to access material that is designated for adults only or is profane or obscene (pornography), that advocates illegal or dangerous acts, or that advocates violence or discrimination towards other people (hate literature). If you mistakenly access inappropriate information, please notify your teacher immediately. Your parents should instruct you if there is additional material they think would be inappropriate for you to access. The school system fully expects that you will follow your parent's instructions in this matter.
It is the obligation and intent of ACS to comply with the copyright laws of the United States – including those pertaining to computer software and peer-to-peer file sharing. You will respect the rights of copyright owners. Copyright infringement occurs when you inappropriately reproduce a work that is protected by a copyright. If a work contains language that specifies appropriate use of that work, you should follow the expressed requirements. If you are unsure whether or not you can use that work, you should request permission from the copyright owner.
You are not authorized to make copies of any software owned by ACS without the knowledge and permission of the System Technology Coordinator. In addition, you are prohibited from using school equipment to make illegal copies of personal software or to download copyrighted materials. Illegal, unauthorized, or unlicensed copies of software or files must not be used on school system equipment and will be removed if identified.
DISCIPLINARY ACTIONS
Routine maintenance and monitoring of the network may lead to discovery that you have violated school policies or the law. The school system will cooperate fully with local, state, or federal officials in any investigation related to any illegal activities conducted while using school technology resources. In the event there is a claim that you have violated any of these policies, you will be provided due process rights and will be subject to criminal prosecution and civil liability. In addition, you will be subject to punishment as defined in the Student Code of Conduct.
LIMITATION OF LIABILITY
ACS expressly denies all warranties of any kind, either express or implied, in connection with its provision of access to and use of its computer networks and the Internet provided under this Policy. It shall not be responsible for any claims, losses, damages, or costs (including attorney's fees) of any kind suffered, directly or indirectly, by any user or his or her parent(s) or guardian(s) arising out of the user’s use of its computer networks or the Internet under this Policy. By signing this Policy, users are taking full responsibility for his or her use. The user who is 18 or older or, in the case of a user under 18, the parent(s) or guardian(s) are agreeing to indemnify and hold the Athens City Schools Board, the Athens City School System, and all of their administrators, teachers, agents, and staff harmless from any and all loss, costs, claims or damages resulting from the user’s access to its computer network and the Internet, including but not limited to any fees or charges incurred through purchases of goods or services by the user. The user or, if the user is a minor, the user’s parent(s) or guardian(s) agree to cooperate with the school Board in the event of the Board’s initiating an investigation of a user’s use of his or her access to its computer network and the Internet, whether that use is on a school computer or on another computer outside the school system’s network.

Grades 6-12 Student Parent Handbook Quick Links

MirrorElf镜像精灵