Technology Policies

Technology Purchases

Any technology purchases must follow the district's technology request procedure and use the technology request form. This is required because:
  • we cannot afford to duplicate resources
  • technology should be incorporated into the curriculum
  • the district has limited resources for technology support

Staff and Student Use of Technology

Various school board policies and regulations govern staff conduct, the use of social media, and both student and staff use of wireless telecommunications devices.

Prohibited Uses of the District Network
Prohibited uses include, but are not limited to, the following:
  1. The network may not be used to download, copy, or store any software, shareware, or freeware without prior permission from the network administrator.
  2. The network may not be used for commercial purposes.  Users may not buy or sell products or services through the system without prior permission from the Superintendent, Superintendent's designee, or Board of Education.
  3. The network may not be used for any activity, or to transmit any material, that violates United States or local laws. This includes, but is not limited to, illegal activities such as threatening the safety of another person or violating copyright laws.
  4. Users may not engage in personal attacks, harass another person, or post private information about another person.
  5. Network users may not log onto someone else’s account or attempt to access another user’s files. “Hacking” or otherwise trying to gain access to another person’s or organization’s computer system is prohibited. Likewise, the creation or distribution of computer viruses is prohibited.
  6. Network users may not access Web sites, newsgroups, or chat areas that contain material that is obscene or that promotes illegal acts. If a user accidentally accesses this type of information, he or she should immediately notify a teacher, librarian, and/or network administrator.
  7. Network users may not send a non-business e-mail to more than 10 people at the same time or participate in chain letters.
  8. Users may not deliberately attempt to vandalize, damage, disable, or disrupt the district’s property or the property of any other individual or organization.
  9. Users may not create, locate, receive, transmit, store, or print information which is profane, obscene, or sexually explicit, or which uses language that is offensive or degrading to others.
  10. Users may not campaign for or against any political candidate or ballot proposition or for political lobbying, except as authorized by law.
  11. Users may not distribute religious materials.
  12. Users may not incur charges for services, products, or information without appropriate permission.
  13. Users of the services will respect all copyright and license agreements.  Copyrighted software, pictures, or music will not be downloaded for use which violates copyright laws. 
Consequences for Misuse 
The use of the district’s computers, network, and the Internet access provided by the district is a privilege, not a right. Any student or employee who inappropriately uses the district’ computers, network, or the Internet may have the privilege of using the computers, network, or the Internet denied, revoked, restricted, or suspended and may be subject to other disciplinary sanctions or criminal action. Pending investigation into a complaint of inappropriate use, user privileges may be suspended or restricted.


Student Privacy

The Family Educational Rights and Privacy Act, FERPA, restricts what information may be released about a student.

Students and parents also fill out an Internet Acceptable Use and Access Agreement with a Media Release option which governs the release of student information. You should check a students' status on that agreement before any public release of a child's name, work, or photograph. Parents fill out that form when a student first enrolls at a school, and the data is entered into the PowerSchool system. Site administrators, counselors, and some secretaries have access to PowerSchool Admin and can look up a student's consent status by selecting a student in that service, opening Custom screens from the Information area of the left sidebar, and then selecting 06.5 NEW Internet/Media consent. 

Generally, schools must have written permission from the parent or eligible student in order to release any information from a student's education record. However, FERPA allows schools to disclose those records, without consent, to the following parties or under the following conditions (34 CFR § 99.31):
  • School officials with legitimate educational interest;
  • Other schools to which a student is transferring;
  • Specified officials for audit or evaluation purposes;
  • Appropriate parties in connection with financial aid to a student;
  • Organizations conducting certain studies for or on behalf of the school;
  • Accrediting organizations;
  • To comply with a judicial order or lawfully issued subpoena; 
  • Appropriate officials in cases of health and safety emergencies; and
  • State and local authorities, within a juvenile justice system, pursuant to specific State law.
DIRECTORY INFORMATION
Schools may disclose, without consent, "directory" information such as a student's name, address, telephone number, date and place of birth, honors and awards, and dates of attendance. This is relevant to team rosters, playbills, and awards listings.

However, schools must tell parents and eligible students about directory information and allow parents and eligible students a reasonable amount of time to request that the school not disclose directory information about them. The latest revision of ECA-R has an explicit opt-out provision parents may exercise.

Prohibited Uses of the District Network
Prohibited uses include, but are not limited to, the following:
  1. The network may not be used to download, copy, or store any software, shareware, or freeware without prior permission from the network administrator.
  2. The network may not be used for commercial purposes.  Users may not buy or sell products or services through the system without prior permission from the Superintendent, Superintendent's designee, or Board of Education.
  3. The network may not be used for any activity, or to transmit any material, that violates United States or local laws. This includes, but is not limited to, illegal activities such as threatening the safety of another person or violating copyright laws.
  4. Users may not engage in personal attacks, harass another person, or post private information about another person.
  5. Network users may not log onto someone else’s account or attempt to access another user’s files. “Hacking” or otherwise trying to gain access to another person’s or organization’s computer system is prohibited. Likewise, the creation or distribution of computer viruses is prohibited.
  6. Network users may not access Web sites, newsgroups, or chat areas that contain material that is obscene or that promotes illegal acts. If a user accidentally accesses this type of information, he or she should immediately notify a teacher, librarian, and/or network administrator.
  7. Network users may not send a non-business e-mail to more than 10 people at the same time or participate in chain letters.
  8. Users may not deliberately attempt to vandalize, damage, disable, or disrupt the district’s property or the property of any other individual or organization.
  9. Users may not create, locate, receive, transmit, store, or print information which is profane, obscene, or sexually explicit, or which uses language that is offensive or degrading to others.
  10. Users may not campaign for or against any political candidate or ballot proposition or for political lobbying, except as authorized by law.
  11. Users may not distribute religious materials.
  12. Users may not incur charges for services, products, or information without appropriate permission.
  13. Users of the services will respect all copyright and license agreements.  Copyrighted software, pictures, or music will not be downloaded for use which violates copyright laws. 
Consequences for Misuse 
The use of the district’s computers, network, and the Internet access provided by the district is a privilege, not a right. Any student or employee who inappropriately uses the district’ computers, network, or the Internet may have the privilege of using the computers, network, or the Internet denied, revoked, restricted, or suspended and may be subject to other disciplinary sanctions or criminal action. Pending investigation into a complaint of inappropriate use, user privileges may be suspended or restricted.


Staff Privacy

The safest way to live with email and the web, in general, is to err on the side of caution and presume that anyone can read any message you send or receive and access any file you create. So always be professional in your use of the district email system and cloud services. District and network administrators are not looking to violate anyone's privacy, but they do have full access to the email and Google Drive systems, and when a message or file is "deleted" a copy is still retained in the system for legal purposes.

Government emails and files are subject to subpoena and to Open Records Requests from the public as described below:

Material created and/or stored on the system or cloud services is NOT private. Network administrators may review the system from time to time to ensure that the system is being used properly, and almost any electronic communication is subject to an Open Records Request

For this reason, students and staff should expect that e-mail messages, material placed on personal or school web pages, any Google Drive files and other work that is stored on the district network or its cloud services may be viewed by a third party and could be released to the public.

Primary EXCEPTIONS to release are:
  • Teacher lesson plans, tests, and other teaching material
  • Personal communications concerning individual students
  • Personnel records related to internal investigations and when disclosure would be a "clearly unwarranted invasion of personal privacy" such as TLE observations and evaluations, personal finance information and payroll deductions, employment applications from those not hired, higher education course transcripts, birth dates, social security and employee identification numbers, home address, and personal telephone numbers
    • However, the following employee information MUST be released upon request:
      • Dates of employment
      • Title or position
      • Gross salary and benefits
      • Any final disciplinary action resulting in loss of pay, suspension, demotion of position, or termination
    • Personal notes IF they are not shared in any fashion: prior to taking action, including making a recommendation or issuing a report, a public official may keep confidential his or her personal notes and personally created materials prepared as an aid to memory or research leading to the adoption of a public policy or implementation of a public project; however, if those notes are shared or communicated with others electronically, in written form, via a presentation, etc. they must be released as a public record except as otherwise exempted
    • Bid specifications for competitive bidding prior to publication, contents of sealed bids prior to the public opening, computer programs and software (but NOT their data), appraisals prior to award of a contract
    • Campus security plans including prevention and response procedures to and notification procedures for perceived or actual security threats and incidents; assessments of the vulnerability of facilities to an act of terrorism; details for deterrence, prevention of, or protection from such an act; details for response or remediation after such an act
    • Information technology that identifies the relationship or connections between devices or systems; system configuration information; security monitoring and response equipment placement and configuration; specific location or placement of systems, components or devices; system identification numbers, names, or connecting circuits; business continuity and disaster planning or response plans; investigative information on security penetrations or denial of services