(Taken from the WRSD Policy Handbook)
STUDENT ACCESS TO NETWORKED INFORMATION RESOURCES
The White River School District Board of Education recognizes that as telecommunications and other new technologies shift the ways that information may be accessed, communicated and transferred by members of the society, those changes may also alter instruction and student learning. The board generally supports access by students to rich information resources along with the development by staff of appropriate skills to analyze and evaluate such resources. In a free and democratic society, access to information is a fundamental right of citizenship.
Telecommunications, electronic information sources and networked services significantly alter the information landscape for schools by opening classrooms to a broader array of resources. In the past, instructional and library media materials could usually be screened prior to use. Telecommunications, because they may lead to any publicly available fileserver in the world, will open classrooms to electronic information resources, which have not been screened by educators for use by students of various ages.
Electronic information research skills are not fundamental to preparation of citizens and future employees during an Age of Information. The Board expects that staff will blend thoughtful use of such information throughout the curriculum and that the staff will provide guidance and instruction to students in the appropriate use of such resources. Staff will consult any guidelines set forward by the district for instructional materials and will honor the goals for selection of instructional materials contained therein.
Students are responsible for good behavior on school computer networks just as they are in a classroom or a school library.Communications on the network are often public in nature. General school rules for behavior and communications apply. The network is provided for students to conduct research and communicate with others. Access to network services will be provided to students who agree to act in a considerate and responsible manner.
Independent student use of telecommunications and electronic information resources will be permitted upon submission forms and agreement forms by parents or guardians of students.
Access to telecommunications will enable students to explore thousands of libraries, databases, and bulletin boards while exchanging messages with people throughout the world. The Board believes that the benefits to students from access in the form of information resources and opportunities for collaboration, exceed the disadvantages.
The Board authorizes the Superintendent to prepare appropriate procedures for implementing this policy and for reviewing and evaluating its effect on instruction and student achievement.
Network storage areas may be treated like school lockers. Network administrators may review files and communications to maintain system integrity and insure that users are using the system responsibly. Users should not expect that files stored on district servers will always be private.
Staff will always be present when students are using the Internet at school.
The following guidelines are provided so that students are aware of the responsibilities they are about to acquire. In general this require efficient, ethical and legal utilization of the network resources. If a user violates any of these provisions, his or her access will be terminated and future access could possibly be denied. The signature at on the attached document are legally binding and indicates the parties who signed have read the terms and conditions carefully and understand their significance.
INTERNET – TERMS AND CONDITIONS
As outlined in Board policy and procedures on student access of the Internet, copies of which are available in school offices, the following are not permitted:
*Sending or displaying offensive messages or pictures
*Using obscene language
*Harassing, insulting or attacking others
*Damaging computers, computer systems or computer networks
*Violating copyright laws
*Using another’s password
*Trespassing in another’s folders, work on files
*Intentionally wasting limited resources
*Employing the network for commercial purposes
Violations may result in a loss of access as well as other disciplinary or legal action.