Use of the Internet and electronic communications require students to think critically, analyze information, write clearly, use problem-solving skills, and hone computer and research skills that employers demand. Use of these tools also encourages an attitude of lifelong learning and offers an opportunity for students to participate in distance learning activities, ask questions of and consult with experts, communicate with other students and individuals, and locate material to meet educational and personal information needs.
The Internet and electronic communications are fluid environments in which students may access materials and information from many sources, including some that may be harmful to students. While it is impossible to predict with certainty what information students might locate or come into contact with, the district shall take reasonable steps to protect students from accessing material and information that is obscene, pornographic or otherwise harmful to minors, as defined by the Board. Students shall take responsibility for their own use of district technology devices to avoid contact with material or information that may be harmful to minors.
Blocking or filtering obscene, pornographic and harmful information
Technology that blocks or filters material and information that is obscene, child pornography or otherwise harmful to minors, as defined by the Board, shall be implemented or installed on each technology device provided by the district that allows for access to the Internet by a minor, from any location. Students shall report access to material and information that is obscene, pornographic, harmful to minors or otherwise in violation of this policy to the supervising staff member. If a student becomes aware of other students accessing such material or information, he or she shall report it to the supervising staff member.
No expectation of privacy
District technology devices are owned by the district and are intended for educational purposes at all times. Students shall have no expectation of privacy when using the Internet or electronic communications. The district reserves the right to monitor, inspect, copy, review and store (at any time and without prior notice) all usage of district technology devices, including all Internet and electronic communications access and transmission/receipt of materials and information. All material and information accessed/received through district technology devices shall remain the property of the school district.
Unauthorized and unacceptable uses
Students shall use district technology in a responsible, efficient, ethical, and legal manner.
Because technology and ways of using technology are constantly evolving, every unacceptable use of district technology devices cannot be specifically described in policy. Therefore, examples of unacceptable uses include, but are not limited to, the following:
No student shall access, create, transmit, retransmit or forward material or information or software:
Adoption Date: January 09, 2012
Last Revised: December 12, 2012
- That is not related to district education objectives
- That promotes violence or advocates destruction of property including, but not limited to, access to information concerning the manufacturing or purchasing of destructive devices or weapons
- That contains pornographic, obscene or other sexually oriented materials, either as pictures or writings, that are intended to stimulate erotic feelings or appeal to prurient interests in nudity, sex or excretion
- That harasses, threatens, demeans, or promotes violence or hatred against another person or group of persons in violation of the district's nondiscrimination policies
- For personal profit, financial gain, advertising, commercial transaction or political purposes
- That plagiarizes the work of another without express consent
- That uses inappropriate or profane language likely to be offensive to others in the school community
- That is knowingly false or could be construed as intending to purposely damage another person's reputation
- That is in violation of any federal or state law, or district policy, including but not limited to copyrighted material and material protected by trade secret
- That impersonates another or transmits through an anonymous remailer
- That accesses fee services without specific permission from the system administrator
- That accesses another individual's Internet or electronic communications account without written permission from that individual
- That runs port scans, network scans, network monitoring, keyloggers, password-cracking programs, hacking software or unauthorized file-sharing. Hacking is defined as "to gain access to a computer, computer file or network illegally or without authorization; or to view, alter, steal, damage or destroy computer data without authorization"
- Use another person's password or any other identifier
- Gain or attempt to gain unauthorized access to district technology or computer devices
- Read, alter, delete or copy or attempt to do so, electronic communications of other system users
Legal References: | 47 U.S.C. 254(h) (Children's Internet Protection Act of 2000) |
47 C.F.R. Part 54, Subpart F (Universal Support for Schools and Libraries) | |
20 U.S.C. 6751 et seq. (Enhancing Education Through Technology Act of 2001) | |
C.R.S.22-87-101 et. seq. (Children's Internet Protection Act) | |