Internet access is now available to students and instructional staff in the Pamlico County Schools. The Board provides this service in the belief that the Internet offers vast, diverse and unique educational resources, and in the hopes of promoting educational excellence through resource sharing, innovation and communication.
The Internet is a vast collection of interconnected computer networks involving millions of computers and users around the world. It is a collaboration of private, public, educational, governmental, and industrial-sponsored networks whose operators cooperate to maintain the network infrastructure. Through the Internet, students and instructional staff will have access to:
Electronic mail communication with people all over the world;
Information and news from a variety of research institutions;
Public domain software and shareware of all types;
Discussion groups on a plethora of topics; and
Many university library catalogs, the Library of Congress, and ERIC.
With access to computers and people all over the world also comes the availability of material that may not be considered of educational value in the school setting. The Pamlico County Schools will take precautions to restrict access to questionable materials. However, on a global network, it is impossible to control all materials and an industrious user may discover such materials. Nevertheless, the Board firmly believes that the valuable information and interaction available on this worldwide network far outweigh the possibility that users may procure material inconsistent with the educational goals of the Pamlico County Schools.
The smooth operation of the network depends on the proper conduct of the end users. Accordingly, all users must adhere to strict guidelines. These guidelines are contained in Board policies 5451 Appropriate Internet Use, 5452 Student Internet Use, and 5453 Internet Use - Instructional Staff Responsibilities and in any regulations adopted by the Superintendent. Board of Education members will be notified in writing of any regulations adopted by the Superintendent under this policy. In general, these guidelines require efficient, ethical, and legal utilization of the network resources. If a Pamlico County Schools user violates any of these provisions, his or her access privileges may be revoked, and disciplinary action and/or appropriate legal action may be taken.
Pamlico County Schools users will take full responsibility for their use of the Internet. The students and instructional staff will sign forms acknowledging that they have read and understand the applicable Board policies, that they will comply with these policies, and that they understand the consequences for violation of these policies. Parents will be required to sign a permission form to allow their children to access the Internet.
Legal Reference: G.S. 115C-36, -47, -391
Adopted: June 5, 2000
Revised: September 3, 2002.
All Pamlico County Schools users will observe the following guidelines regarding Internet use.
5451.1 Acceptable Use - Use of the Internet must be in support of education and research and consistent with the educational objectives of the Pamlico County Schools. Transmission of any material in violation of any law or regulation, including any Board policy, is prohibited. Use of the Internet for commercial activities is prohibited, as is use for political lobbying.
5451.2 Restricted Material - Users shall not intentionally access or download any text file, picture (including video), graphic or sound clip, or engage in any conference that includes material which is obscene, libelous, indecent, vulgar, profane or lewd, or which advertises any product or service not permitted to minors by law.
5451.2(a) Active Restriction and Measures. The Pamlico County Schools will utilize filtering software or other technologies to prevent students and adults from accessing visual depictions that are: (1) obscene or (2) child pornography, and to prevent students from accessing visual depictions that are (3) harmful to minors. The Pamlico County Schools will also monitor the online activities of students, through direct observation and/or technological means, to ensure that students are not accessing such depictions or any other material which is inappropriate for minors.
Internet filtering software and other technology-based protection systems may be disabled, as necessary, for purposes of bona fide research or other educational projects being conducted by adults.
The term “harmful to minors” is defined as meaning any picture, image, graphic image file, or other visual depiction that:
a. taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion;
b. depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual
act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; and
c. taken as a whole, lacks serious literacy, artistic, political, or scientific value as to minors.
5451.3 Copyright Infringement - Users shall respect all copyright, trademark and licensing agreements and laws, including seeking permission when required.
5451.4 Network Etiquette - Users are expected to abide by the following rules of network etiquette:
a. Use appropriate language. Use of language which is vulgar, profane or lewd is prohibited.
b. Do not send messages which include insulting or fighting words or expressions which are designed, intended or likely to injure or harass others.
c. Do not give out personal information such as a home address, home phone number or last name, social security numbers, or credit card numbers whether about yourself or about other students or colleagues.
d. Note that electronic mail (e-mail) is not guaranteed to be private. People who operate the system may be able to access all mail.
Messages relating to or in support of illegal activities may be reported to the authorities.
e. Do not use the network in such a way as to disrupt the use of the network by other users.
f. All communications and information accessible via the network should be assumed to be private property.
g. Do not use the school’s computer network for the purpose of hacking or to gain unauthorized access to other computers or computer systems, files, or data.
h. Network users are provided with a User ID and password for accessing the network. Users should not use another person’s User ID and password for accessing the network, nor should a user allow another person to use his or her User ID and password.
i. Users shall not attempt to alter the network, disable security features, or evade network filtering. Personal devices shall not be attached to the network without explicit permission of the network administrator.
j. Users should respect all copyright, trademark and licensing agreements and laws, including seeking permission when required.
k. The school network or computer equipment shall not be used for personal commercial transactions.
5451.5 Quality of Information - The Board makes no warranties of any kind, whether express or implied, for the service it is providing. The Pamlico County Schools will not be responsible for any damages suffered by any user. Such damages include, but are not limited to, loss of data resulting from delays, non- deliveries, misdeliveries or service interruptions, whether caused by the school system's or the user's negligence, errors or omissions. Use of any information obtained via the Internet is at the risk of the user. The Pamlico County Schools specifically disclaim any responsibility for the accuracy or quality of information obtained through its Internet services.
5451.6 Proper Citation - When using information obtained via the Internet, provide proper citations for all quotes, references and sources. It is unethical to plagiarize Internet resources, just as it is unethical to plagiarize print resources.
5451.7 Vandalism - Vandalism may result in loss of laptop or school computer access or user privileges and will require restitution. Vandalism is defined as any deliberate attempt to harm or destroy the hardware, software, or data of another user, including, but not limited to, the uploading or creation of computer viruses.
5451.8 Privileges - The use of the Internet is a privilege, not a right. This privilege may be revoked for violation of Board policy. Inappropriate or illegal use of the Internet may also result in disciplinary or legal action.
Legal Reference: G.S. 115C-36, -47, -391; Trademark Act of 1946, 15 U.S.C. 1051 et seq.; Copyright Act of 1976, 17 U.S.C. 101 et seq.; Children’s Internet Protection Act, 47 U.S.C. 254(h)(5)
Adopted: June 5, 2000
Revised: September 3, 2002
Revised: December 1, 2008
Revised: April 4, 2011
Students will have access to the Internet through individual student or classroom accounts and/or electronic mail addresses issued to them. Internet use will be monitored by instructional staff.
Making Internet access available to students carries with it the potential that some students may encounter information that may not be appropriate for them. The Internet is not only an open system, but one in continual flux--with information appearing, disappearing, and changing quite rapidly. Thus, it is not possible to fully predict or control what students may locate. Though supervising instructors will guide students in their use of the Internet, and attempt to restrict their access to inappropriate materials, the Board cannot guarantee that students will not encounter such materials.
If, in using the Internet, a student gains access to any service via the Internet which has a cost involved, he or she will be responsible for any costs incurred.
Legal Reference: G.S. 115C-47, -391
Adopted: June 5, 2000
Revised: April 4, 2011
Data loss or corruption resulting from security attacks can be catastrophic to individuals, schools, or the entire school system. Security attacks can also result in interruption of network services thereby negatively impacting students and staff.
With the increased use of technology and networked applications, the Pamlico County Board of Education believes it is vital that all users understand the role they play in protecting the integrity and performance of the network, as well as, the confidentiality of information.
The Technology Department will implement and utilize a variety of security measures to do the following: 1) protect the school system’s network and computers from a security breach, abuse and inappropriate use; and 2) safeguard confidential data.
1.A. Definitions
The following definitions apply to this policy:
A.Firewall
A firewall is used to control who and what enters the network by using rules and filters. It also is used as an effective monitoring tool.
I.Proxy Server
The proxy server allows Network Address Translation to be used and removes the workstation’s identity on the Internet thereby removing the vulnerability for attack. The proxy server is also useful for identifying intrusion attempts and Internet misuse.
I.Network Address Translation
This is a method of translating a single public IP address to internal private IP addresses which allows individual obscurity to the Internet.
I.Access Control
By way of network rights or permissions to server locations, individual users have access only to the information or data that is relevant to the work they are permitted to do.
A.Intrusion Detection System
An intrusion detection is software used to detect and alert abnormal port, protocol or network traffic activity.
I.B. Technology Department Responsibilities
The Technology Department, partnered with North Carolina’s Office of Information Technology Services (ITS), will
monitor the network to insure the appropriate privacy to users and sensitive information.
notify the appropriate contacts when an identified security problem or a potential security problem is identified in order to resolve the associated problems. Temporary isolation of systems or devices from the network may be necessary to resolve these problems.
install and maintain virus protection software on all computer equipment.
stay updated on vulnerability notices, patches and updates.
carry out automatic network-based vulnerability updates, patches, compromise assessments, and compliance scans.
submit network summary reports to the technology director.
prepare recommendations for additions or upgrades for network equipment or utilities to help the Technology Department remain effective in their efforts to keep the Pamlico County Schools network and electronic information secure.
maintain user accounts and workstations.
maintain user access control so information will not be accessible to unauthorized users.
force all authorized users to log onto the network and authenticate in order to have access to the network and resources.
require that employee network passwords be changed on a to-be-determined basis to maintain security.
provide a guest account for mobile users that will allow Internet connectivity but not threaten the existing network.
prohibit the connection to the system’s network of any equipment or devices that are not the property of Pamlico County Schools without explicit permission of the network administrator or technology director.
prohibit the unauthorized installation of software on any school system owned equipment.
assume no responsibility for the maintenance or repair of an employee’s personal equipment
use a problem-reporting database to report all technical support requests or notifications. Problem reporting will be done by a member of Technology Services (building level support). Problems will be addressed based upon the impact of the problem. Most urgent problems will be addressed first or in order of being reported.
evaluate all procedures and policies annually.
revise policies and procedures as needed.
A layered approach will be used to provide security for the school system’s network. Network security will be accomplished by use of: Firewalls, Proxy Server, Network Address Translation, Intrusion Detection Systems, 24 x 7 monitoring (ITS), and access control and monitoring.
Internet bandwidth management hardware and utilities will be used to prioritize as well as monitor Internet traffic and network access. Internal network traffic will be monitored using software applications.
Workstation security will be elevated with the use of a restore or “rollback” program which puts the computer back in the exact condition it was in when it was started thereby removing any changes made by viruses, spyware, or user mistakes.
Technology Services personnel will subscribe to security alert advisories to receive notices daily of software and hardware vulnerabilities. Advisories that have impact to Pamlico County Schools will be reviewed and appropriate action will be taken.
1.C. User Rights and Responsibilities
All employees and students who use the school system’s network and computer equipment are subject to all procedures and guidelines stated in Board Policies related to student and staff acceptable use. Failure to comply with these policies can result in suspension of rights to use the network and computer equipment, and other disciplinary actions. Guest users are subject to this policy and the guidelines as stated in acceptable use policies.
Users should understand that data stored, sent or received by them within the school system’s computers or networks may be monitored to either insure the security and optimal operating performance of the network, to enforce system policies, or to provide compliance with state or federal law.
It is the responsibility of all users to backup their data files to the server. Failure to do so may result in lost data.
A firewall exists between the school system’s private network and the Internet in order to protect the network. Employees, students, and guests must not circumvent the firewall. Some protocols may be blocked or redirected for security purposes.
Internet use is monitored and is provided for educational purposes. Users who violate this policy are subject to disciplinary or legal action.
1.D. Web Applications
Electronic systems and software applications may be remotely accessible from any source capable of Internet access. Users of such systems should take every precaution to prevent compromising confidential data. Such precautions include security of the actual device used for access. Devices used to access the systems should have the latest anti-virus software and definition files installed along with controls for adware and spyware in place. The user must meet user id and password requirements.
Employees should not transfer confidential data electronically over the Internet without using appropriate encryption technologies. Appropriate encryption technologies shall be specified by Technical Services.
2.E. Reporting of Information Technology Security Incidents
Security incidents determined by school administrators or program directors to be serious enough to compromise the integrity of the network or data shall be reported immediately to Technical Services. Appropriate action will be taken to eliminate any determined weakness in the security system. High-level security breaches shall be reported to the Office of the Superintendent.
(a) F. Disaster Recovery of Data and Hardware
The business functions of the school system, which include administration, instruction, and operations, are heavily dependent upon computer resources. The following procedures are followed to minimize any possible disaster.
As part of the ITS service contract, ITS will continuously monitor the server hardware remotely. In the event of failed hardware components, ITS will ship replacement hardware to the agency site within 24 hours of failure notification, except in cases of a large-scale disaster. For this purpose, large-scale disasters are defined as any event or action that causes more than two sites across North Carolina to fail at nearly the same time. During a large-scale disaster, the 24-hour hardware replacement commitment does not apply. Instead, ITS will make its best effort to recover each site in accordance with the agency disaster recovery plan. In addition to shipping replacement hardware, ITS will, if required, send network technicians to the site to repair and restore service in a timely manner. These repairs may include installation of any replacement hardware and restoration of agency files from backup tapes.
Servers that are not ITS managed servers will be monitored and checked daily by Technology Department personnel. If hardware failures are beyond the expertise of the school system's Technology Department, ITS will be contacted and the best action plan will be determined.
Backups of all data files will be performed daily and stored in a separate facility. These data files include, but are not limited to, financial and personnel data, student data (TIMS/ILS), and GroupWise data. These data files would provide the means of recovering critical student and personnel data.
All school employees will be encouraged to save critical files to their local hard drives and to their home directories on the school system's server. User failure to backup critical files will not be the responsibility of the Technology Department and may result in loss of files.
Students will be provided at least 10MB of hard drive space on the server for personal files. These files will be backed up daily.
Faculty and staff will be provided at least 25 MB of hard drive server space. These files will be backed up daily.
Backup logs will be maintained by individuals responsible for system backups.
Legal Reference: G.S. 115C-47, 391
Cross Reference: Internet Access (Policy 5450), Appropriate Internet Use (Policy 5451), Student Internet Use (Policy 5452), Internet Use – Instructional Staff Responsibility (Policy 5453).
Adopted: June 5, 2006
Students with computer access to the Internet will be educated about appropriate online behavior, including online interaction with other individuals in social networking websites and chat rooms and cyber bullying awareness and response.
Legal Reference: 47 U.S.C. 254 (h)(5)(b) (Public Law 110-385,
Protecting Children in the 21st Century)
Adopted: September 7, 2010
The board recognizes the importance of incorporating current technology tools, including new methods of electronic communication, into the classroom to enhance student learning. It further recognizes the importance of employees, students and parents engaging, learning, collaborating and sharing in digital environments as part of 21st Century learning. The board strives to ensure that electronic communication tools incorporated into the school curriculum are used responsibly and safely. As practicable, the board will provide access to secure social media tools and board approved technologies for use during instructional time and for school-sponsored activities in accordance with policy 5450/5451/5452/5453/5454/5455 Internet Access, Appropriate Internet Use, Student Internet Use, Internet Use-Instructional Staff Responsibility, Network Security and Internet Safety.
The board acknowledges that school employees may engage in the use of social media during their personal time. School employees who use social media for personal purposes must be mindful that they are responsible for their public conduct even when not acting in their capacities as school system employees. All school employees, including student teachers and independent contractors shall comply with the requirements of this policy when using electronic social media for personal purposes.
For the purposes of this policy, “social media” includes, but is not limited to: personal websites, web logs (blogs), wikis, social network sites, online forums, virtual worlds, video-sharing websites and any other social media generally available to the public or consumers that does not fall within the board’s technologies network (e.g., Web 2.0 tools, MySpace, Facebook, Twitter, LinkedIn, Flickr, YouTube).
5456.1 SOCIAL MEDIA COMMUNICATIONS INVOLVING STUDENTS
Employees are to maintain professional relationships with students at all times in accordance with policies 3036/4036/8336, Prohibited Relationships with Students. All electronic communications with students who are currently enrolled in the school system must be school-related and within the scope of the employees’ professional responsibilities, unless otherwise authorized by this policy. School personnel may use only school-controlled technological resources and social media tools to communicate directly with students or to comment on student matters through use of the Internet. An employee seeking to establish a social networking website for school-related purposes must have prior written approval from the principal and meet the requirements of policies and 5450/5451/5452/5453/5454/5455 Internet Access, Appropriate Internet Use, Student Internet Use, Internet Use-Instructional Staff Responsibility, Network Security and Internet Safety.
The use of electronic media for communicating with students and parents is an extension of the employee’s workplace responsibilities. Accordingly, the board expects employees to use professional judgment when using social media or other electronic communications.
Employees are prohibited from knowingly communicating with current students through a personal social network page. An internet posting on a personal social media website intended for a particular student will be considered a form of direct communication with that student in violation of this policy. However, an employee may communicate with a student using personal social media networks to the extent the employee and student have a family relationship or other type of appropriate relationship which originated outside of the school setting. For example, an employee may have a relationship with a niece or nephew, a student who is the child of an adult friend, a student who is a friend of the employee’s child, or a member or participant in the same civic, social, recreational, sport or religious organization.
5456.2 EMPLOYEE PERSONAL USE OF SOCIAL MEDIA
The board respects the right of employees to use social media as a medium of self expression on their personal time. As role models for the school system’s students, however, employees are responsible for their public conduct even when they are not performing their job duties as employees of the school system. Employees will be held to the same professional standards in their public use of social media and other electronic communications as they are for any other public conduct. Further, school employees remain subject to applicable state and federal laws, board policies, administrative regulations and the Code of Ethics for North Carolina Educators, even if communicating with others concerning personal and private matters. If an employee’s use of social media interferes with the employee’s ability to effectively perform his or her job duties, the employee is subject to disciplinary action, up to and including termination of employment.
Employees are responsible for the content on their social media sites, including content added by the employee, the employee’s friends or members of the public who can access the employee’s site, and for Web links on the employee’s site. Employees shall take reasonable precautions, such as using available security settings, to restrict students from viewing their personal information on social media websites and to prevent students from accessing materials that are not age-appropriate.
School employees are prohibited from accessing social networking websites for personal use during instructional time or with school system technological resources.
5456.3 POSTING TO SOCIAL MEDIA SITES
Employees who use social media for personal purposes must be aware that the content they post may be viewed by anyone, including students, parents and community members. Employees shall observe the following principles when communicating through social networking sites:
5456.3.1 Employees shall not post confidential information about students, employees or school system business.
5456.3.2 Employees shall not list current students as “friends” on social networking sites.
5456.3.3 Employees shall not knowingly allow students access to their personal social networking sites that discuss or portray sex, nudity, alcohol or
drug use or other behaviors associated with the employees’ private lives that would be inappropriate to discuss with a student at school.
5456.3.4 Employees may not knowingly grant students access to any portions of their personal social networking sites that are not accessible to the
general public.
5456.3.5 Employees shall be professional in all internet postings related to or referencing the school system, students and other employees.
5456.3.6 Employees shall not use profane, pornographic, obscene, indecent, lewd, vulgar or sexually offensive language, pictures or graphics or other
communication that could reasonably be anticipated to cause a substantial disruption to the school environment.
5456.3.7 Employee shall not use the school system’s logo or other copyrighted material of the system without express, written consent from the board.
5456.3.8 Employees shall not post identifiable images of a student or student’s family without permission from the student and the student’s parent or
legal guardian.
5456.3.9 Employees shall not use internet postings to libel or defame the board individual board members, students or other school employees.
5456.3.10 Employees shall not use internet postings to harass, bully or intimidate other employees or students in violation of policy 3037/4037/8337,
Prohibition of Bullying, Harassment and Discrimination, or state and federal laws.
5456.3.11 Employees shall not post inappropriate content that negatively impacts their ability to perform their jobs.
5456.3.12 Employees shall not use internet postings to engage in any other conduct that violates board policy and administrative procedures or state
and federal laws.
5456.4 CONSEQUENCES
School system personnel shall monitor online activities of employees who access the
Internet using school technological resources. Additionally, the superintendent or designee may periodically conduct public internet searches to determine if an employee has engaged in conduct that violates this policy. Any employee who has been found by the superintendent to have violated this policy may be subject to disciplinary action, up to and including dismissal.
The superintendent shall establish and communicate to employees guidelines that are consistent with this policy.
Legal References: U.S. Const. amend. I; Children’s Internet Protection Act, 47 U.S.C. 254(h)(5); Electronic Communications Privacy Act, 18 U.S.C. 2510-2522; Family Educational Rights and Privacy Act, 20 U.S.C. 1232g; 17 U.S.C. 101 et seq.; 20 U.S.C. 6777; G.S. 115C-325(e); 16 N.C.A.C. 6C .0601, .0602; State Board of Education Policy TCP-C-014.
Cross References: Internet Access (5450), Appropriate Internet Use (5451), Student Internet Use (5452), Internet Use-Instructional Staff Responsibility (5453), Network Security (5454), Internet Safety (5455), Prohibited Relationship With Students (3036/4036/8336), Prohibition of Bullying, Harassment and Discrimination (3037/4037/8337).
Adopted: September 10, 2012
All computers, software, or any technology bought for use in Pamlico County Schools must get approval from the Director of Digital Learning & Technology.
Donations and donation methods must also be approved.
The district is happy to offer wireless internet access for employee personal devices through our Bring Your Own Device Program (BYOD). Each employee must use their Active Directory login information to connect to BYOD and can connect up to two devices. This service is a courtesy to employees. It is expected that employees do not share this information with students.
The IT Department does not provide support for home computers or other devices that are not owned by Pamlico County Schools. Our technical staff is not responsible for fixing or maintaining personal equipment, as stated in Board Policy 5454.
You must use the BYOD network to connect your personal device. Connecting your personal device to the wired school network is not allowed, according to Board Policy 5451.4 (i).
We believe technology makes learning more engaging and improves the quality of education. Our district offers various tools to meet students' academic needs.
Employees must follow these guidelines, especially regarding security and confidentiality. Here are some key expectations:
Complete cyber security training at the start of each school year.
Before buying new technology, check with the IT team to ensure we have the support needed.
Report device issues using Incident IQ or the tech support email.
Show students how to care for their devices properly.
Lock or log off devices when not in use to keep data secure.
Shut down computers at least once a week or when not used for a while.
Teach students about the Digital Citizenship Education Plan.
Go over Device Usage Expectations and Guidelines with students.
Monitor students’ technology use.
Talk to school leaders if there’s misuse of technology.
Avoid opening suspicious email attachments.
Never share passwords or personal information in emails.
Do not download "free" applications from the internet, as they can contain viruses and spyware.
All employees of Pamlico County Schools have access to the network and email accounts. These resources are meant to help you do your job. Remember, everything you send, receive, or store on these systems belongs to Pamlico County Schools, and you should not expect privacy.
Use of the school's electronic resources must follow Board Policies 5450, 5451, 5452, and 5453. The network administrator will check files and messages to ensure everyone uses our services properly.
Your account security is important due to cybersecurity threats. The district uses multi-factor authentication for email accounts to keep them safe. Employees get their email accounts through Google Workspace for Education.