GCSA-R -
EMPLOYEE TECHNOLOGY AND INTERNET USE RULES
NEPN/NSBA Code: GCSA-R
EMPLOYEE TECHNOLOGY AND INTERNET USE RULES
These rules accompany School Committee Policy GCSA (Employee Technology and Internet Use). Each employee is responsible for their actions and activities involving Lewiston Public Schools computers and other technological devices, networks, and Internet services, and for their computer files, passwords, and accounts. These rules provide general guidance concerning the use of the school department’s technology and examples of prohibited uses. The rules do not attempt to describe every possible prohibited activity. Employees who have questions about whether a particular activity or use is prohibited are encouraged to contact a building administrator or the Superintendent’s office.
A. Consequences for Violation of Technology Use Policy and Rules
Failure to comply with School Committee Policy GCSA, these rules, and/or other procedures or rules governing technology use may result in disciplinary action, up to and including termination. Illegal use of the school department’s technology will also result in referral to law enforcement.
B. Access to Computers and Other Technological Devices, Networks, and Internet Services
The level of employee access to Lewiston Public Schools’ technology is based upon specific job requirements and needs. Unauthorized access to secure areas of the school department’s technology system is strictly prohibited.
C. Acceptable Use
Employee access to Lewiston Public Schools’ computers and other technological devices, networks, and Internet services is provided for administrative, educational, communication, and research purposes consistent with Lewiston Public Schools’ educational mission, curriculum, and instructional goals. All School Committee policies, school rules, and expectations for professional conduct and communications apply when employees are using the District’s technology or any personally-owned technology used inside a school building or at a school activity.
D. Personal Use
Employees are to use Lewiston Public Schools’ computers and other technological devices, networks, and Internet services for purposes related to school programs and operations and to perform their job responsibilities. Incidental personal use of district technology is permitted as long as such use:
1) does not interfere with the employee’s job responsibilities and performance, 2) does not interfere with system operations or other system users, and 3) does not violate this policy and the accompanying rules, or any other School Committee policy, procedure, or school rule. Incidental personal use is defined as use by an individual employee for occasional personal communications.
E. Prohibited Uses
Examples of unacceptable uses that are expressly prohibited include, but are not limited to, the following:
Any use that is illegal or that violates another School Committee policy, procedure, or school rule, including harassing, discriminatory, -or threatening communications or behavior; violating copyright laws; etc. The District assumes no responsibility for illegal activities of employees while using it’s technology.
Any use involving materials that are obscene, pornographic, sexually explicit, or sexually suggestive.
Any inappropriate communications with students or minors.
Any use for private financial gain, or any use for commercial, advertising, or solicitation purposes.
Any use as a forum for communicating by email or any other medium with other school users or outside parties to solicit, proselytize, advocate, or communicate the views of an individual or non-school sponsored organization; to solicit membership in or support of any non-school sponsored organization; or to raise funds for any non-school sponsored purpose, whether profit or not for profit. No employee shall knowingly provide school email addresses to outside parties whose intent is to communicate with school employees, students, and/or their families for non-school purposes. Employees who are uncertain as to whether particular activities are acceptable should seek further guidance from the building principal or other appropriate administrator.
Any communication that represents an employee’s personal views as those of Lewiston Public Schools or that could be misinterpreted as such.
Downloading or installing software or applications without permission from technology staff. Unauthorized copying of software illegal and may subject the copier to substantial civil and criminal penalties. The District assumes no responsibility for illegal software copying by employees.
Sending mass or bulk e-mails to school users or outside parties for school or non-school purposes without the permission of the email administrator or building administrator.
Any malicious use or disruption of Lewiston Public Schools’ computers or other technological devices, networks, or Internet services; breach of security features; or misuse of computer passwords or accounts (the employee’s or those of other users).
Any misuse or damage to Lewiston Public Schools’ technology equipment, including opening and forwarding email attachments from unknown sources and/or that may contain viruses.
Any attempt to access unauthorized sites, or any attempt to disable or circumvent the school unit’s filtering/blocking technology (unless a filter override has been issued by the technology office for purposes that support the educational mission of the district).
Failing to report a breach of technology security to the system administrator or a building administrator.
Using technology after such access has been denied or revoked.
Any attempt to delete, erase, or otherwise conceal any information stored on a school computer or other technological device that violates these rules or other School Committee policy or school rule, or refusing to return technology equipment issued to the employee upon request.
F. Employees and Social Media
Employees shall not accept or request current Lewiston students as friends on personal/professional social networking sites. This is not intended to prevent an employees from friending a family member or close family friend, but employees are cautioned to consider these on-line relationships carefully. Employees of Lewiston Public Schools are mandated reporters to DHHS when, and if, they become aware of any potential abuse of students, whether at or away from work. Employees shall not post confidential information about students or staff.
G. No Expectation of Privacy
Lewiston Public Schools’ technology system remains under the control, custody, and supervision of the District at all times. Lewiston Public Schools reserves the right to monitor all technology activity by employees and other system users. Employees have no expectation of privacy in their use of any school technology or any technology used on school grounds, including email, stored files, and Internet access logs.
H. Disclosure of Confidential Information
Employees are expected to use appropriate judgment and caution in communications concerning students and staff to ensure that personally identifiable information remains confidential.
I. Employee/Volunteer Responsibility to Supervise Student Technology Use
Employees and volunteers who use school technology with students for instructional purposes have a duty of care to supervise such use. Teachers, staff members, and volunteers are expected to be familiar with Lewiston School Committee policies and rules concerning student technology and Internet use and to enforce them. When, in the course of their duties, employees or volunteers become aware of a student violation, they are expected to stop the activity and inform the building principal.
J. Compensation for Losses, Costs, and/or Damages
The employee is responsible for compensating Lewiston Public Schools for any losses, costs, or damages incurred by Lewiston Public Schools for violations of School Committee policies and school rules while the employee is using technology, including the cost of investigating such violations. Lewiston Public Schools assumes no responsibility for any unauthorized charges or costs incurred by an employee while using technology at school.
K. Additional Rules for Laptops or Other Technological Devices Issued to Employees
Employees are responsible for the proper care of laptops or other technological devices assigned to them at all times, whether on or off school property.
If a laptop or other technological device is lost or stolen, this must be reported to the building principal immediately.
The School Committee’s policies and rules concerning technology and Internet use apply to the use of school department laptops and other technological devices at all times and places, on or off school property.
Laptops and other technological devices must be returned in acceptable working order at the end of the term of employment or whenever requested by a district administrator.
L. Additional Rules for Laptops or Other Technological Devices Brought to School by Employees
Before connecting to any Lewiston Public Schools’ network, an employee owned device must be checked for viruses and/or other compatibility by a representative of the technology office.
Any computer or other device that will be connected to a school department network must be free of viruses and must be running acurrent version of virus detection software. The device must be configured in a way that is compatible with school department policies and rules.
The School Committee’s policies and rules concerning technology and Internet use apply to the use of personally-owned technological devices used on school grounds or during school activities.
Violation of policies or rules governing the use of technology may result in the device being banned from use at school. The employee will also be subject to disciplinary action for any violations of School Committee policies or school rules.
Lewiston Public Schools assumes no responsibility for the functioning or use of personally-owned technological devices on school grounds or at school activities.
Cross Reference: GCSA—Employee Technology and Internet Use
Revised: August 28, 2006
Reviewed: August 20, 2012
Revised: July 21, 2014
Reviewed: September 11, 2017
Reviewed: April 3, 2023