Acceptable Computer System Use for Students (AUP)

The Goochland County Public School Division values the impact technology can have on personal growth and academic achievement. School Board Policy IIBEA/GAB and its Regulation IIBEA-R/GAB-R serve to ensure the computer system is used as a safe and secure learning platform for all stakeholders, including students, staff, and guests to our schools. The term computer system includes, but is not limited to, hardware, software, data, communication lines and devices, terminals, display devices, printers, CD, DVD and other media devices, tape or flash drives, storage devices, servers, mainframe and personal computers, tablets, laptops, telephones, cameras, projectors, multimedia devices, workstations, the internet and other electronic services and any other internal or external network. This includes any device that may be connected to or used to connect to the school division's network or electronically stored division material.


The School Board provides a computer system, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication. The term computer system includes, but is not limited to, hardware, software, data, communication lines and devices, terminals, display devices, printers, CD, DVD and other media devices, tape or flash drives, storage devices, servers, mainframe and personal computers, tablets, laptops, telephones, cameras, projectors, multimedia devices, workstations, the internet and other electronic services and internal or external networks. This includes any device that may be connected to or used to connect to the school division's network or electronically stored division material.


School-owned devices may be audited by the division superintendent or designee at any time. These guidelines cover use of the division's computer system both on and off school campus (e.g. 1:1 laptops and tablets).


Computer System Use-Terms and Conditions:

  1. Acceptable Use. Access to the division's computer system is (1) for the purposes of education or research and be consistent with the educational objectives of the division or (2) for legitimate school business.

  2. Privilege. The use of the division's computer system is a privilege, not a right.

  3. Unacceptable Use. Each user is responsible for his or her actions on the computer system. Prohibited conduct includes but is not limited to:

  • using the network for any illegal or unauthorized activity, including violation of copyright or contracts, or transmitting any material in violation of any federal, state, or local law.

  • sending, receiving, viewing or downloading illegal material via the computer system.

  • unauthorized downloading of software.

  • using the computer system for private financial or commercial purposes.

  • wastefully using resources, such as file space.

  • gaining unauthorized access to resources or entities.

  • posting material created by another without his or her consent.

  • submitting, posting, publishing, or displaying any obscene, profane, threatening, illegal, or other inappropriate material.

  • using the computer system while access privileges are suspended or revoked.

  • vandalizing the computer system, including destroying data by creating or spreading viruses or by other means.

  • intimidating, harassing, bullying, or coercing others.

  • threatening illegal or immoral acts.

  • bypassing the network filters without authorization.

  • plagiarizing or cheating.

  1. Network Etiquette. Each user is expected to abide by generally accepted rules of etiquette, including the following:

  • be polite.

  • users shall not forge, intercept or interfere with electronic mail messages.

  • use appropriate language. The use of obscene, lewd, profane, lascivious, threatening or disrespectful language is prohibited.

  • users shall not post personal information other than directory information as defined in Policy JO Student Records about themselves or others.

  • users shall respect the computer system's resource limits.

  • users shall not post chain letters.

  • users shall not use the computer system to disrupt others.

  • users shall not modify or delete data owned by others unless given permission or access rights to do so.