Skip to main content

Mechanicsburg Area School District

Mobile Menu Toggle
District Home
Admin

Acceptable Use Policy

MASD Policy 815

Acceptable Use of the Communications and Information Systems

 

TABLE OF CONTENTS

  1. Purpose
  2. Definitions
  3. Authority
  4. Responsibility
  5. Delegation of Responsibility
Guidelines

Access to the CIS Systems

Parental Notification and Responsibility

School District Limitation of Liability

Student Electronic Communications Devices

Prohibitions

General Prohibitions

Access and Security Prohibitions

Operational Prohibitions

Content Guidelines

Due Process

Search and Seizure

Copyright Infringement and Plagiarism

Selection of Material

School District Website

Blogging

Safety and Privacy

Consequences for Inappropriate, Unauthorized, and Illegal Use

 

Purpose

The Mechanicsburg Area School District (“School District”) provides employees, students, and Guests

(“Users”) with hardware, software, and access to the School District’s Electronic Communication

System and network, which includes Internet access, whether wired, wireless, cellular, virtual, cloud, or by any other means. Guests include, but are not limited to, visitors, workshop attendees, volunteers, adult education staff and students, board members, independent contractors, and School

District consultants and vendors.

 

Computers, network, Internet, Electronic Communications, information systems, databases, files, software, and media, collectively called “CIS systems”, provide vast, diverse and unique resources.

The Board of School Directors will provide access to the School District’s CIS systems for Users if there is a specific School District-related purpose to access information; to research; to collaborate; to facilitate learning and teaching; and/or to foster the Educational Purpose and mission of the

School District.

 

For Users, the School District’s CIS systems must be used for Educational Purposes and performance of School District job duties in compliance with this Policy. Incidental Personal Use of School District

Computers is permitted for employees as defined in this Policy. However, they should have no expectation of privacy in anything they create, store, send, receive, or display on or over the School

District’s CIS systems, including their personal files, or any of their use. Students may only use the

CIS systems for Educational Purposes.

 

CIS systems may include School District computers which are located or installed on School District property, at School District events, connected to the School District’s network, or when using its mobile commuting equipment, telecommunication facilities in protected and unprotected areas or environments, directly from home, or indirectly through another internet service provider (“ISP”), and if relevant, when Users bring and use their own personal Computers or personal electronic devices, and, if relevant, when Users bring and use another entity’s Computer or electronic device to a School District location, event, or connect it to the School District network.

 

If users bring personal Computers or personal electronic devices onto School District property, to

School District events, or connect them to the School District’s network and systems, and if the

School District reasonably believes the personal Computers and/or personal electronic devices contain School District information or contain information that violates a School District policy or administrative regulation, the legal rights of the School District or another person, or involves significant harm to the School District or another person, or involves a criminal activity, the personal Computers or personal electronic devices may be legally accessed in accordance with the law to insure compliance with this Policy, other School District policies, regulations, rules, procedures, ISP terms, and local, state, and federal laws. Users may not use their personal Computers and personal technology electronic devices to access the School District’s intranet.

 

The School District intends to strictly protect its CIS systems against numerous outside and internal risks and vulnerabilities. Users are important and critical players in protecting these School District assets and in lessening the risks that can destroy these important and critical assets. Consequently, Users are required to fully comply with this Policy, and to immediately report any violations or suspicious activities to the Technology Coordinator, and/or designee. Conduct otherwise will result in actions further described in the Consequences for Inappropriate, Unauthorized and Illegal Use section found in the last section of this Policy, and provided in other relevant School District policies, regulations, rules, and procedures.

 

Definitions

 

Child Pornography – Under Federal law, any visual depiction, including any photograph, film, video, picture, or computer or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, of sexually explicit conduct, where:[1][2][3]

  1. The production of such visual depiction involves the use of a minor engaging in sexually explicit conduct;
  2. Such visual depiction is a digital image, computer image, or computer-generated image that is, or is indistinguishable from, that of a minor engaging in sexually explicit conduct; or
  3. Such visual depiction has been created, adapted, or modified to appear that an identifiable minor is engaging in sexually explicit conduct.

Under Pennsylvania law, any person who intentionally views or knowingly possesses or controls any book, magazine, pamphlet, slide, photograph, film, videotape, computer depiction or other material depicting a child under the age of eighteen (18) years engaging in a prohibited Sexual Act or in the simulation of such act is guilty of a felony of the third degree for their first offense, or guilty of a felony of the second degree for a second offense.[4][5]

 

Computer – Includes any School District owned, leased or licensed or User owned personal hardware, software, or other technology used on School District premises or at School District events, or connected to the School District network, containing School District programs or School District or student data (including images, files, and other information) attached or connected to, installed in, or otherwise used in connection with a Computer. Computer includes, but is not limited to, School District and Users’: desktop, notebook, powerbook, tablet PC or laptop computers, servers, firewalls/security systems, distance learning equipment, videoconference units, printers, facsimile machine, cables, modems, and other peripherals; specialized electronic equipment used for students’ special educational purposes; Global Positioning System (GPS) equipment; personal digital assistants (PDAs); iPods, MP3 players; USB/jump drives; iPads, Kindles, and other electronic readers; iPhones, cell phones, with or without Internet access and/or recording and/or camera/video and other capabilities and configurations, telephones, mobile phones, or wireless devices, two-way radios/telephones and other smartphones; beepers; paging devices, laser pointers and attachments, and any other such technology developed.[1][2][6]

 

Electronic Communications Systems – Any messaging, collaboration, publishing, broadcast, or distribution system that depends on electronic communications resources to create, send, forward, reply to, transmit, store, hold, copy, download, display, view, read, or print electronic records for purposes of communication across electronic communications network systems between or among individuals or groups, that is either explicitly denoted as a system for electronic communications or is implicitly used for such purposes. Further, an Electronic Communications System means any wire, radio, electromagnetic, photo-optical or photo-electronic facilities for the transmission of wire or electronic communications, and any computer facilities or related electronic equipment for the electronic storage of such communications.

 

Examples include, without limitation, the Internet, intranet, electronic mail services, text messaging,

GPS, PDAs, facsimile machines, cell phones with or without Internet access and/or electronic mail and/or recording devices, cameras/video, and other capabilities and configurations.

 

Educational Purpose - Includes use of the CIS systems for classroom activities, professional or career development, and to support the School District’s curriculum, policy and mission statement.

 

Harmful to Minors – Under Federal law, any picture, image, graphic image file or other visual depictions that:[2][3]

  1. Taken as a whole, with respect to minors, appeals to the prurient interest in nudity, sex, or excretion;
  2. Depicts, describes, or represents in a patently offensive way with respect to what is suitable for minors, an actual or simulated Sexual Act or Sexual Content, actual or simulated normal or perverted Sexual Acts, or lewd exhibition of the genitals, and
  3. Taken as a whole lacks serious literary, artistic, political, educational or scientific value as to minors.
  4. Under Pennsylvania law, any depiction or representation in whatever form, of nudity, sexual conduct, sexual excitement, or sadomasochistic abuse, when it:[5][7]
  5. Predominantly appeals to the prurient, shameful, or morbid interest of minors; and
  6. Is patently offensive to prevailing standards in the adult community as a whole with respect to what is suitable for minors; and
  7. Taken as a whole, lacks serious literary, artistic, political, educational or scientific value for minors.

Inappropriate Matter – includes, but is not limited to visual, graphic, video, text and any other form of Obscene, pornographic, sexually explicit, indecent, Child Pornographic, or other material that is Harmful to Minors. Examples include: taking, disseminating, transferring, or sharing, whether by electronic transfer (such as sexting, emailing, texting, among others) or otherwise, hateful, illegal, defamatory, lewd, vulgar, profane, rude, inflammatory, threatening, harassing, discriminating (as it pertains to race, color, religion, national origin, gender, marital status, age, sexual orientation, political beliefs, receipt of financial aid, or disability), violent, bullying/cyberbullying, sexting, flagging, terroristic, and other inappropriate matter and material specified throughout this Policy, and other School District policies, regulations, rules, and procedures. It also includes advocating the destruction of property.

 

Incidental Personal Use – Incidental Personal Use of school Computers is permitted for employees so long as such use does not interfere with the employee’s job duties and performance, with system operations, or with other system Users. Personal use must comply with this Policy and all other applicable School District policies, administrative regulations, procedures and rules, as well as ISP terms, local, state and federal laws and must not damage the School District’s CIS systems.

 

Minor – For purposes of compliance with the federal Children’s Internet Protection Act (“FedCIPA”), an individual who has not yet attained the age of seventeen (17). For other purposes, Minor shall mean the age of minority as defined in the relevant law.[1][2][3][7]

 

Obscene – Under Federal law, analysis of the material meets the following elements:[2][3][8]

  1. Whether the average person, applying contemporary community standards, would find that the material, taken as a whole, appeals to the prurient interest;
  2. Whether the work depicts or describes, in a patently offensive way, sexual conduct specifically designed by the applicable state or federal law to be obscene; and
  3. Whether the work taken as a whole lacks serious literary, artistic, political, educational, or scientific value.[5][7]
  4. Under Pennsylvania law, any material or performance if:
  5. The average person, applying contemporary community standards, would find that the material, taken as a whole, appeals to the prurient interest;
  6. The subject matter depicts or describes in a patently offensive way, sexual conduct described in the law to be obscene; and
  7. The subject matter, taken as a whole lacks serious literary, artistic, political, educational or scientific value.[2][3][7][9]

Sexual Act and Sexual Contact – As defined at 18 U.S.C. § 2246(2), and at 18 U.S.C. § 2246(3),

18 Pa.C.S.A. § 5903.[3][10]

 

Technology Protection Measure(s) – A specific technology that blocks or filters Internet access to

Visual Depictions that are Obscene, Child Pornography or Harmful to Minors.[1][8]

 

Visual Depictions – Undeveloped film and videotape and data stored on computer disk or by electronic means which is capable of conversion into a visual image but does not include mere words.

 

Authority

 

Access to the School District’s CIS systems through school resources is a privilege, not a right. These, as well as the User accounts and information, are the property of the School District, which reserves the right to deny access to prevent unauthorized, inappropriate or illegal activity, and may revoke those privileges and/or administer appropriate disciplinary action. The School District will cooperate to the extent legally required with other educational entities, ISP, local, state and federal officials in any investigation concerning or related to the misuse of the CIS systems.[3][10][11]

 

It is often necessary to access User accounts in order to perform routine maintenance and security tasks. System administrators have the right to access by interception, and to access the stored communication of User accounts for any reason in order to uphold this Policy, administrative regulations, the law, and to maintain the system. Users should have no privacy expectations in the contents of their personal files or any of their use of the School District’s CIS systems. USERS SHOULD HAVE NO EXPECTATION OF PRIVACY IN ANYTHING THEY CREATE, STORE, SEND, RECEIVE, OR DISPLAY ON OR OVER THE SCHOOL DISTRICT’S CIS SYSTEMS, INCLUDING THEIR PERSONAL FILES OR ANY OF THEIR USE OF THE SCHOOL DISTRICT’S CIS SYSTEMS. The School District reserves the right to record, check, receive, monitor, track, log, access and otherwise inspect any or all CIS systems use and to monitor and allocate fileserver space. Users of the School District’s CIS systems who transmit or receive communications and information shall be deemed to have consented to having the content of any such communication recorded, checked, received, monitored, tracked, logged, accessed and otherwise inspected or used by the School District, and to the monitoring and allocating fileserver space. Passwords and message delete functions do not restrict the School District’s ability or right to access such communications or information.

 

The School District reserves the right to restrict access to any Internet sites or functions it may deem inappropriate through general policy, software blocking or online server blocking. Specifically, the

School District operates and enforces Technology Protection Measure(s) that block or filter online activities of Minors on its Computers used and accessible to adults and students so as to filter or block Inappropriate Matter on the Internet as defined in this Policy. Measures designed to restrict adults’ and Minors’ access to material Harmful to Minors may be disabled to enable an adult to access bona fide research, not within the prohibitions of this Policy, or for another lawful purpose. No person may have access to material that is illegal under federal or state law.[2][12]

 

Expedited review and resolution of a claim that this Policy is denying a student or adult to access material will be enforced by an administrator, supervisor, or their designee, upon the receipt of written consent from a parent or guardian for a student, and upon the written request from an adult presented to the principal.[2][12]

 

The School District has the right, but not the duty, to inspect, review, or retain Electronic Communication created, sent, displayed, received or stored on and over the School District’s CIS systems and to monitor, record, check, track, log, access or otherwise inspect its CIS systems.

 

In addition, in accordance with the law, the School District has the right, but not the duty, to inspect, review, or retain Electronic Communications created sent, displayed, received, or stored on User’s personal computers, electronic devices, networks, Internet, Electronic Communications Systems, and in databases, files, software, and media that contain School District programs, information and/or data.

 

Also, in accordance with the law, the School District has the right, but not the duty, to inspect, review, or retain electronic communication created, sent, displayed, received or stored on another entity’s computer or electronic device when Users bring and use another entity’s computer or electronic device to a School District location, event, or connect it to the School District network and/or systems, and/or that contains School District programs, or School District data or information.

 

The above applies no matter where the use occurs whether brought onto School District property, to

School District events, or connected to the School District network, or when using mobile commuting  equipment and telecommunications facilities in protected or unprotected areas or environments, directly from home, or indirectly through another social media or ISPs, as well as by other means. All actions must be conducted in accordance with the law, assist in the protection of the School District’s resources, insure compliance with this Policy, or other School District policies, regulations, rules, and procedures, social media and internet service providers terms, or local, state, and federal laws.

 

The School District will cooperate to the extent legally required with social media sites, ISPs, local, state, and federal officials in investigations or with other legal requests, whether criminal or civil actions.

The School District additionally reserves the right to:

  1. Determine which CIS systems’ services will be provided through School District resources.
  2. Determine the types of files that may be stored on School District file servers and Computers.
  3. View and monitor network traffic, file server space, processor, and system utilization, and all applications provided through the network and communications systems, including e-mail, text messages, and other Electronic Communications.
  4. Remove excess e-mail and other Electronic Communications or files taking up an inordinate amount of file server disk space after a reasonable time.
  5. Revoke User privileges, remove User accounts, or refer to legal authorities, and/or School District authorities when violation of this and any other applicable School District policies, administrative regulations, rules, and procedures occur or ISP terms, local, state or federal law is violated, including, but not limited to, those governing network use, copyright, security, privacy, employment, social media, vendor access, data breach, and destruction of School District resources and equipment.

Responsibility

 

Due to the nature of the Internet as a global network connecting thousands of Computers around the world, Inappropriate Matter can be accessed through the network and electronic systems. Because of the nature of the technology that allows the Internet to operate, the School District cannot completely block access to these resources. Accessing these and similar types of resources may be considered an unacceptable use of School District resources and will result in actions explained further in the Consequences for Inappropriate, Unauthorized and Illegal Use section found in the last section of this Policy, and as provided in relevant School District policies, regulations, rules, and procedures.

 

The School District must publish a current version of this Policy so that all Users are informed of their responsibilities. A copy of this Policy, and the CIS Acknowledgement and Consent Form(s) must be provided to all Users, who must sign the School District’s Acknowledgement Form, either by electronic or written means.

 

Employees must be capable and able to use the School District’s CIS systems and software relevant to the employee’s responsibilities.

 

Delegation of Responsibility

The Technology Coordinator, and/or designee, will serve as the coordinator to oversee the School

District’s CIS systems and will work with other regional or state organizations as necessary to educate Users, approve activities, provide leadership for proper training for all Users in the use of the

CIS systems and the requirements of this Policy, establish a system to insure adequate supervision of the CIS systems, maintain executed User Acknowledgement and Consent Forms, and interpret and enforce this Policy.

The Technology Coordinator, and/or designee, will establish a process for setting-up individual and class accounts, set quotas for disk usage on the system, establish Record Retention and Records Destruction Policies and a Records Retention Schedule to include electronically stored information (See School District Policy and corresponding regulations), and establish the School District virus protection process.

 

Unless otherwise denied for cause, student access to the CIS systems resources must be through supervision by the professional staff. Administrators, teachers and staff have the responsibility to work together to help students develop the skills and judgment required to make effective and appropriate use of the resources. All Users have the responsibility to respect the rights of all other Users within the School District and the School District CIS systems, and to abide by the rules established by the School District, and its ISP, local, state and federal laws.

 

The Superintendent, and/or designee, has the responsibility to educate minors about appropriate online behavior, including interacting with other individuals on social networking websites and in chat rooms and cyber-bullying awareness and response.[3][13]

 

If necessary, the Superintendent is granted the authority to create and enforce an administrative regulation(s) to accompany this Policy.

 

Guidelines

 

Access to the CIS Systems

 

The CIS systems’ accounts of Users must be used only by authorized owners of the accounts and only for authorized purposes.

 

An account will be made available according to a procedure developed by appropriate School District authorities.

 

The School District’s Acceptable Use of Communications and Information Systems Policy, as well as other relevant School District policies, administrative regulations, rules, and procedures, will govern use of the School District’s CIS systems for Users.

 

Types of Services include, but are not limited to:

 

  1. Internet - School District employees, students, and Guests will have access to the Internet through the School District’s CIS systems, as needed.
  2. E-Mail and Text Messaging - School District employees may be assigned individual e-mail and text messaging accounts for work-related use, as needed. Students may be assigned individual e-mail accounts, as necessary, by the Technology Coordinator, and/or designee, and at the recommendation of the teacher who will also supervise the students’ use of the e-mail service. Students and Guests may not be assigned text message accounts.
  3. Guest Accounts - Guests may receive an individual Internet account with the approval of the Technology Coordinator, and/or designee if there is a specific School District related purpose requiring such access. Use of the CIS systems by a Guest must be specifically limited to the School District-related purpose and comply with this Policy, and all other School District policies (including the Vendor Access Policy), procedures, and rules, as well as ISP terms, local, state and federal laws and may not damage the School District’s CIS systems. A School District CIS Acknowledgement and Consent Form must be signed, and if the Guest is a Minor, a parent’s written signature also is required.
  4. Blogs -Employees may be permitted to have School District-sponsored blogs, after they receive training, and approval of the Superintendent, or designee. All bloggers must follow the rules provided in this Policy, and all other applicable policies (for example, the School District’s Social Media Policy), regulations (for example, the School District’s Social Media Administrative Regulations), rules, and procedures of the School District, as well as ISP terms, and local, state, and federal laws.
  5. Web-based Services - Certain School District authorized web-based services such as blogging, authorized social networking sites, wikis, podcasts, RSS feeds, social software, and collaboration tools that emphasize online participatory learning (where Users share ideas, comment on one another’s project, plan, design, or implement, advance or discuss practices, goals, and ideas together, co-create, collaborate and share) among Users may be permitted by the School District, however, such use must be approved by the Technology Coordinator, and/or designee, followed by training authorized by the School District. Users must comply with this Policy, as well as any other relevant policies (including the School District’s Social Media Policy), regulations (for example, the School District’s Social Media Administrative Regulations), rules, and procedures including the copyright, ISP terms, and local, state, and federal laws during such use.

 

Parental Notification and Responsibility

 

The School District will notify the parents/guardians about the School District CIS systems and the policies, regulations, rules, and procedures governing their use. This Policy contains restrictions on accessing inappropriate material. There is a wide range of material available on the Internet, some of which may not be fitting with the particular values of the families of the students. It is not practically possible for the School District to monitor and enforce a wide range of social values in student use of the Internet. Further, the School District recognizes that parents and guardians bear primary responsibility for transmitting their particular set of family values to their children. The School District will encourage parents/guardians to specify to their child(ren) what material is and is not acceptable for their child(ren) to access through the School’s District’s CIS system. Parents/Guardians are responsible to help monitor their child(ren)’s use of the School District’s CIS systems when they are accessing the systems.

 

School District Limitation of Liability

 

The School District makes no warranties of any kind, either expressed or implied, that the functions or the services provided by or through the School District’s CIS systems will be error-free or without defect. The School District does not warrant the effectiveness of Internet filtering. The electronic information available to Users does not imply endorsement of the content by the School District, nor is the School District responsible for the accuracy or quality of the information obtained through or stored on the CIS systems. The School District shall not be responsible for any damage Users may suffer, including but not limited to, information that may be lost, damaged, delayed, mis-delivered, or unavailable when using the Computers, network and Electronic Communications Systems. The School District shall not be responsible for material that is retrieved through the Internet, or the consequences that may result from them. The School District shall not be responsible for any unauthorized financial obligations, charges or fees resulting from access to the School District’s CIS systems. In no event shall the School District be liable to the User for any damages whether direct, indirect, special or consequential, arising out the use of the CIS systems.

 

Student Use of Electronic Communication Devices

 

The possession and Silent Use of Electronic Communication Devices, including Personal Electronic

Communication Devices, by School District students when in compliance with the Electronic

Communication Devices Policy, other School District policies, regulations, rules, and procedures, ISP terms, and local, state, and federal laws, and supportive of the educational program of the School

District, is permitted. However, the possession and use of Electronic Communication Devices, including Personal Electronic Communication Devices, by students that are found to be disruptive to the educational process and/or environment can be abusive in ways that negatively affect students, employees, and the School District’s mission and environment, and is prohibited in accordance with this Policy, other School District policies, regulations, rules and procedures, ISP terms, and local, state, and federal laws. See Student Electronic Communication Devices Policy # 237.[6][14]

 

Prohibitions

 

The use of the School District’s CIS systems for illegal, inappropriate, unacceptable, or unethical purposes by Users is prohibited. Such activities engaged in by Users are strictly prohibited and illustrated below. The School District reserves the right to determine if any activity not appearing in the list below constitutes an acceptable or unacceptable use of the CIS systems.

 

These prohibitions are in effect any time School District resources are accessed whether on School

District property, at School District events, while connected to the School District’s network, when using mobile commuting equipment, telecommunication facilities in protected and unprotected areas or environments, directly from home, or indirectly through another ISP, and if relevant, when an employee or student uses their own equipment.

 

General Prohibitions –

Users are prohibited from using School District CIS systems to:

 

  1. Communicate about non-work or non-school related matters unless the employees’ use comports with the definition of Incidental Personal Use in this Policy.
  2. Send, receive, view, download, store, access, print, distribute, or transmit material that is Harmful to Minors, indecent, Obscene, pornographic, Child Pornographic, terroristic, sexually explicit, sexually suggestive. This includes but is not limited to, Visual Depictions. Examples include, taking, disseminating, transferring, or sharing Obscene, pornographic, lewd, or otherwise illegal images or photographs, whether by electronic data transfer or otherwise (such as, sexting, e-mailing, texting, among others). Nor may Users advocate the destruction of property.
  3. Send, receive, view, download, store, access, print, distribute, or transmit Inappropriate Matter as defined in this Policy, and material likely to be offensive or objectionable to recipients.
  4. Cyberbully another individual or entity. See School District’s Bullying/Cyberbullying Policy #249.[13][15]
  5. Access or transmit gambling information or promote or participate in pools for money, including but not limited to, basketball and football, or any other betting or games of chance.
  6. Participate in discussion or news groups that cover inappropriate and/or objectionable topics or materials, including those that conform to the definition of Inappropriate Matter in this Policy.
  7. Send terroristic threats, hateful mail, harassing communications, discriminatory remarks, and offensive or inflammatory communications.
  8. Participate in unauthorized Internet Relay Chats, instant messaging communications and Internet voice communications (on-line; real-time conversations) that are not for school-related purposes or required for employees to perform their job duties. Students may not use IRCs.
  9. Use in an illegal manner or to facilitate any illegal activity.
  10. Communicate through e-mail or text messages for non-educational purposes or activities, unless it is for Incidental Personal Use as defined in this Policy. The use of e-mail to mass mail non-educational or non-work related information is expressly prohibited (for example, the use of the “everyone distribution list, or all staff lists, building level distribution lists, or other e-mail distributions lists to offer personal items for sale is prohibited).
  11. Engage in commercial, for-profit, or any business purposes (except where such activities are otherwise permitted or authorized under applicable School District policies); conduct unauthorized fund raising or advertising on behalf of the School District and non-school School District organizations; engage in the resale of School District computer resources to individuals or organizations; or use the School District’s name in any unauthorized manner that would reflect negatively on the School District, its employees, or students. Commercial purposes is defined as offering or providing goods or services or purchasing goods or services for personal use. School District acquisition policies will be followed for School District purchase of goods or supplies through the School District system.
  12. Engaging in political lobbying.
  13. Install, distribute, reproduce or use unauthorized copyrighted software on School District Computers, or copy School District software to unauthorized Computer systems, intentionally infringing upon the intellectual property rights of others or violating a copyright. See Copyright Infringement Section in this Policy, the School District’s Copyright Policy #814 and Copyright Guidelines Handbook for additional information.
  14. Install computer hardware, peripheral devices, network hardware or system hardware. The authority to install hardware or devices on School District Computers is restricted to the Technology Coordinator, and/or designee.
  15. Encrypt messages using encryption software that is not authorized by the School District from any access point on School District equipment or School District property. Users must use School District approved encryption to protect the confidentiality of sensitive or critical information in the School District’s approved manner.
  16. Access, interfere, possess, or distribute confidential or private information without permission of the School District’s administration. An example includes accessing other students’ accounts to obtain their grades, or accessing other employees’ accounts to obtain information.
  17. Violate the privacy or security of electronic information.
  18. Send any School District information to another party, except in the ordinary course of business as necessary or appropriate for the advancement of the School District’s business, or educational interest.
  19. Send unsolicited commercial electronic mail messages, also known as spam.
  20. Post personal or professional web pages without administrative approval.
  21. Post anonymous messages.
  22. Use the name of the “Mechanicsburg Area School District” in any form in blogs on School District Internet pages or websites not owned or related to the School District, or in forums/discussion boards, and social media sites, to express or imply the position of the Mechanicsburg Area School District without the expressed, written permission of the Superintendent, and/or designee. When such permission is granted, the posting must state that the statement does not represent the position of the School District.
  23. Bypass or attempt to bypass Internet filtering software by any method including, but not limited to, the use of anonymizers/proxies or any websites that mask the content the User is accessing or attempting to access.
  24. Advocate illegal drug use, whether expressed or through a latent pro-drug message. This does not include a restriction of political or social commentary on issues, such as the wisdom of the war on drugs or medicinal use.
  25. Attempt to or obtain personal information under false pretenses with the intent to defraud another person.
  26. Use location devices to invade a person’s privacy or to harm or put another person in jeopardy.
  27. Plagiarize works that are found on the Internet. Plagiarism is taking the ideas or writings of others and presenting them as they were yours.
  28. Post false statements, or steal the identity of another person.

 

Access and Security Prohibitions –

 

Users must immediately notify the Technology Coordinator, and/or designee, if they have identified a possible security problem. Users must read, understand, and submit a signed CIS Acknowledgement and Consent Form(s), and comply with this Policy that includes network, Internet usage, Electronic Communications, telecommunications, non-disclosure and physical and information security requirements. The following activities related to access to the School District’s CIS systems, and information are prohibited:

 

  1. Misrepresentation (including forgery) of the identity of a sender or source of communication.
  2. Acquiring or attempting to acquire User IDs and passwords of another. Users are required to use unique strong passwords that comply with the School District’s password, authentication, and syntax requirements. Users will be held responsible for any misuse of Users’ names or passwords while the Users’ systems access were left unattended and accessible to others, whether intentional or through negligence.
  3. Using or attempting to use Computer accounts of others. These actions are illegal, even with consent, or if only for the purpose of “browsing”.
  4. Altering a communication originally received from another person or Computer with the intent to deceive.
  5. Using School District resources to engage in any illegal act, which may threaten the health, safety or welfare of any person or persons. Such acts would include, but are not limited to, arranging for a drug sale or the purchase of alcohol, engaging in criminal activity, or being involved in a terroristic threat against any person or property.
  6. Disabling or circumventing any School District security, program or device, for example, but not limited to, anti-spyware, anti-spam software, and virus protection software or procedures.
  7. Transmitting Electronic Communications anonymously or under an alias unless authorized by the School District.
  8. Accessing any website that the School District has filtered or blocked as unauthorized. Examples include, but are not limited to, unauthorized social media, music and video download, and gaming sites.
  9. Installing or attaching keylogging devices, keylogging mechanisms, or keylogging software of any kind.

Users must protect and secure all electronic resources and information, data and records of School District from theft and inadvertent disclosure to unauthorized individuals or entities at all times. If any User becomes aware of the release of School District information, data or records, the release must be reported to the building principal immediately.

 

Operational Prohibitions

 

The following operational activities and behaviors are prohibited:

 

  1. Interference with, infiltration into, or disruption of the CIS systems, network accounts, services or equipment of others, including, but not limited to, the propagation of Computer “worms” and “viruses”, Trojan Horse trapdoor, robot, spider, crawler, program code, the sending of electronic chain mail, distasteful jokes, and the inappropriate sending of “broadcast” messages to large numbers of individuals or hosts. Users may not hack or crack the network or others’ Computers, whether by malware or spyware designed to steal information, or viruses and worms or other hardware or software designed to damage the CIS systems, or the system of others, or any component of the network, or strip or harvest information, or completely take over a person’s Computer, or to “look around”.
  2. Altering or attempting to alter files, system security software or the systems without authorization.
  3. Unauthorized scanning of the CIS systems for security vulnerabilities.
  4. Attempting to alter any School District computing or networking components (including, but not limited to fileservers, bridges, routers, or hubs) without authorization or beyond one’s level of authorization.
  5. Unauthorized wiring, including attempts to create unauthorized network connections, or any unauthorized extension or re-transmission of any Computer, Electronic Communications systems, or network services, whether wired, wireless, cable, virtual, cloud, cellular, or by other means."
  6. Connecting unauthorized hardware and devices to the CIS systems.
  7. Loading, downloading, or use of unauthorized games, programs, files, or other electronic media, including, but is not limited to, downloading unauthorized music and video files.
  8. Intentionally damaging or destroying the integrity of the School District’s electronic information.
  9. Intentionally destroying the School District’s Computer hardware or software.
  10. Intentionally disrupting the use of the CIS systems.
  11. Damaging the School District’s Computers, CIS systems, networking equipment through the Users’ negligence or deliberate act, including but not limited to vandalism.
  12. Failing to comply with requests from appropriate teachers or School District administrators to discontinue activities that threaten the operation or integrity of the CIS systems.

 

Content Guidelines

 

Information electronically published on the School District’s CIS systems shall be subject to the following guidelines:

 

  1. Published documents including but not limited to audio and video clips or conferences, may not include a student’s date of birth, Social Security number, driver’ license number, financial information, credit card number, health information, phone number(s), street address, or box number, name (other than first name) or the names of other family members without parental consent.
  2. Documents, web pages, Electronic Communications, or video conferences may not include personally identifiable information that indicates the physical location of a student at a given time without parental consent.
  3. Documents, web pages, Electronic Communications, or video conferences may not contain objectionable materials or point directly or indirectly to objectionable materials.
  4. Documents, web pages and Electronic Communications, must conform to all School District policies, administrative regulations, rules, and procedures.
  5. Documents to be published on the Internet must be edited and approved according to School District policies, regulations, rules, and procedures before publication.

 

Due Process

 

The School District will cooperate with the School District’s ISP’s rules, local, state, and federal officials to the extent legally required in investigations concerning or relating to any illegal activities conducted through the School District’s CIS systems.

 

If students or employees possess due process rights for discipline resulting from the violation of this

Policy, they will be provided such rights.

 

The School District may terminate the account privileges by providing notice to the User.

 

Search and Seizure

 

Users’ violations of this Policy and any other School District policies, regulations, rules, or procedures, ISP terms, or the law may be discovered by routine maintenance and monitoring of the School District CIS system, or any method stated in this Policy, or pursuant to any legal means.

 

The School District reserves the right, but not the duty, to inspect, review, or retain Electronic

Communications created, sent, displayed, received, or stored on or over its CIS systems; to monitor, track, log, access, or otherwise inspect; and/or report all aspects of its CIS systems. This includes items related to any personal Computers, network, Internet, Electronic Communication Systems, databases, files, software, and media that individuals may bring onto School District’s property, or to School District events, that were connected to the School District’s network, and/or that contain School District programs, or School District or Users’ data and information, in accordance with the law, in order to insure compliance with this Policy, other School District policies, regulations, rules, and procedures ISP terms, and local, state, and federal laws to protect the School District’s resources, and to comply with the law.

 

USERS SHOULD HAVE NO EXPECTATION OF PRIVACY IN ANYTHING THEY CREATE, STORE, SEND, RECEIVE, OR DISPLAY ON OR OVER THE SCHOOL DISTRICT’S CIS SYSTEMS, INCLUDING THEIR PERSONAL FILES OR ANY OF THEIR USE OF THE SCHOOL DISTRICT’S CIS SYSTEMS. The School District reserves the right to record, check, receive, monitor, track, log access and otherwise inspect any or all CIS systems’ use and to monitor and allocate file server space.

 

Everything that Users place in their personal files should be entered with the knowledge and understanding that it is subject to review by a third party.

 

Copyright Infringement and Plagiarism

 

Federal laws, cases, policies, regulations, and guidelines pertaining to copyright will govern the use of material accessed through the School District resources. See Policy # 814. Users will make a standard practice of requesting permission from the holder of the work, or complying with the Fair Use Doctrine, and/or complying with license agreements. Employees will instruct Users to respect copyrights, request permission when appropriate, and to comply with the Fair Use Doctrine, and/or license agreements. Employees will respect and comply as well.[16][17]

 

Violations of copyright law can be a felony and the law allows a court to hold individuals personally responsible for infringing the law. The School District does not permit illegal acts pertaining to the copyright law. Therefore, any User violating the copyright law does so at their own risk and assumes all liability.

 

Violations of copyright law include, but are not limited to, making unauthorized copies of any copyrighted material (such as commercial software, text, graphic images, audio and video recording), distributing copyrighted materials over Computer networks, remixing or preparing mashups that violate the law, and deep-linking and framing into the content of others’ websites. Further, the illegal installation of copyrighted software or files for use on the School District’s Computers is expressly prohibited. This includes all forms of licensed software – shrink-wrap, clickwrap, browsewrap, and electronic software downloaded from the Internet.

 

No one may circumvent a Technology Protection Measure that controls access to a protected work unless they are permitted to do so by law. No one may manufacture, import, offer to the public, or otherwise traffic in any technology, product, service, device, component or part that is produced or marketed to circumvent a technology protection measure to control access to a copyright protected

work.[18]

 

School District guidance on plagiarism will govern use of material accessed through the School District’s CIS systems. Users must not plagiarize works that they find. Teachers will instruct students in appropriate research and citation practices. Users understand that use of the School District’s CIS systems may involve the School District’s use of plagiarism analysis software being applied to their works.

 

Selection of Material

 

School District policies, administrative regulations, rules, and procedures on the selection of materials will govern use of the School District’s CIS systems.

 

School District Website

 

The School District has established and maintains a Website and will develop and modify its web pages that will present information about the School District under the direction of the Technology Coordinator, and/or designee. Publishers must comply with this Policy, other School District policies, regulations, rules, procedures, ISP terms, and local, state, and federal laws.

 

The School District may limit its liability by complying with the Digital Millennium Copyright Act’s safe harbor notice and takedown provisions.

 

Blogging and Online Content

 

If an employee, student or Guest creates online content with their own resources and on their own time, the employee, student, or Guest may not violate the privacy rights of employees and students, may not use School District personal and private information/data, images, equipment, resources, and copyrighted material in their online content, and may not disrupt the School District. See also the School District’s Social Media Policy # 816, and its accompanying administrative regulations.

 

Contrary conduct will result in actions further described in the Consequences for Inappropriate,

Unauthorized and Illegal Use section of this Policy, and provided in relevant School District policies, regulations, rules, and procedures.[19]

 

Safety and Privacy

 

To the extent legally required, Users of the School District’s CIS systems will be protected from harassment or commercially unsolicited Electronic Communication. Any User who receives threatening or unwelcome communications must immediately send or otherwise provide them to the Technology Coordinator, and/or designee.

 

Users must not post unauthorized personal contact information about themselves or other people on the CIS systems. Users may not steal another’s identity in any way, may not use spyware, cookies, or other program code, keyloggers, and may not use School District or personal technology or resources in any way to invade another’s privacy. Additionally, Users may not disclose, use or disseminate confidential and personal information about students or employees, unless legitimately authorized to do so. Examples include, but are not limited to, revealing biometric data, student grades, Social Security numbers, dates of birth, home addresses, telephone numbers, school addresses, work addresses, credit card numbers, health and financial information, evaluations, psychological reports, educational records, reports, and resumes or other information relevant to seeking employment at the School District.

 

If the School District requires that data and information be encrypted, Users must use School District authorized encryption to protect their security.[3]

 

Student Users, by their use of the School District’s CIS System, agree not to meet with someone they have met online unless they have parent(s)/guardian(s) consent.

 

Consequences for Inappropriate, Unauthorized and Illegal Use

 

General rules for behavior, ethics, and communications apply when using the CIS systems and information, in addition to the stipulations of this Policy, other School District policies, regulations, rules, and procedures, ISP terms, and local, state, and federal laws. Users must be aware that violations of this Policy or other School District policies, regulations, rules, and procedures, or for unlawful use of the CIS systems, may result in loss of CIS access and a variety of other disciplinary actions, including but not limited to, warnings, usage restrictions, loss of privileges, position reassignment, oral or written reprimands, student suspensions, employee suspensions (with or without pay), dismissal, expulsions, breach of contract, and/or legal proceedings. This will be handled on a case-by-case basis. This Policy incorporates all other relevant School District policies, such as, but not limited to, the student and professional employee discipline policies, Code of Student Conduct, copyright, social media, data  breach, property, curriculum, terroristic threat, vendor access, student electronic device, and harassment policies.

 

The User is responsible for damages to Computers, the network, equipment, Electronic Communications Systems, and software resulting from accidental, negligent, deliberate, and willful acts. Users will also be responsible for incidental or unintended damage resulting from negligent, willful or deliberate violations of this Policy, other School District related policies, regulations, rules, and procedures, ISP terms, and local, state, and federal laws. For example, Users will be responsible for payments related to lost or stolen Computers and/or School District equipment, and recovery and/or breach of the information and/or data contained on them.

 

Violations as described in this Policy, other School District policies, regulations, rules, and procedures may be reported to the School District, and to appropriate legal authorities, whether the ISP, local, state, or federal law enforcement. Actions that constitute a crime under state and/or federal law, could result in arrest, criminal prosecution, and/or lifetime inclusion on a sexual offender registry. The School District will cooperate to the extent legally required with authorities in all such investigations.

 

Vandalism will result in cancellation of access to the School District’s CIS systems and resources and is subject to discipline.

 

Any and all costs incurred by the School District for repairs and/or replacement of software, hardware and data files and for technological consultant services due to any violation of this Policy, other School District policies, regulations, rules, and procedures, or ISP terms, or federal, state, or local law, shall be paid by the User who caused the loss.

 

 

Legal

  1. 18 U.S.C. 2256
  2. 20 U.S.C. 6777
  3. 47 U.S.C. 254
  4. 18 Pa. C.S.A. 6312
  5. 24 P.S. 4603
  6. 237
  7. 18 Pa. C.S.A. 5903
  8. 18 U.S.C. 1460
  9. 18 U.S.C. 2246
  10. 24 P.S. 4606
  11. 24 P.S. 510
  12. 24 P.S. 4610
  13. 24 P.S. 1303.1-A
  14. 24 P.S. 1317.1
  15. 249
  16. 17 U.S.C. 101 et seq
  17. 814
  18. 17 U.S.C. 1202
  19. 17 U.S.C. 512

 

18 U.S.C. 2252

24 P.S. 4601 et seq

24 P.S. 4604

Pol. 103

Pol. 104