Saturday, September 29, 2012

Assignment 1: After having looked at these resources on school technology policies, go to your blog and answer the following questions:

Does your school district have an Internet Acceptable Use Policy? See below
Does your school district have an Internet Publishing Policy? See below
Does your school district have a Distance Education Policy? See below
What does your district need to do to get these policies up-to-date? Our school technology policies were just updated this past year to try and stay up-to-date with the changes in technologies that are being used in the classroom. I think as more things become available for us to use such as smart phones and ipads we will again have to adjust our technology policies. I think that the district should reevaluate their technology polices every year because technology is constantly changing and it is important to stay up with the times and current.


The Yankton School District does have an Internet Acceptable Use Policy. This is found by going to the Yankton School District website under the staff page. Once you get to the staff page click the 'policies' link and then click, policy handbook. Once you have opened the policy handbook link the acceptable use for network and Internet user access can be found under Part V BB. Page 438. Directly following that link is the enrichment and technology link which can be found under the same section page 442. The following is what is stated in our online handbook regarding our Internet acceptable use policy.

BB. ACCEPTABLE USE FOR NETWORK AND INTERNET USER ACCESS The Children’s Internet Protection Act (CIPA), 47 U.S.C. §254(h)(5), and South Dakota Consolidated Statues Section 22-24-55 require public schools to implement certain measures and actions to ensure that students are restricted from accessing inappropriate materials online using school-owned computers. This policy is adopted to implement these state and federal requirements.
The purpose of Yankton School District network and internet is to provide additional educational resources and communication tools for students and teachers. Access to the internet allows users to explore an unlimited amount of information on a global electronic highway. Some materials available on the internet are not appropriate for students; but the benefits of such a system far outweigh the risk that users may access controversial information. The district will take reasonable steps to help prevent students from accessing inappropriate materials. However, complete denial of access to such material is 439
impossible. This policy is designed to define acceptable use of any network and/or internet structure established by the school district.
The use of the network and internet is a privilege, not a right. Those accessing networks and internet are expected to demonstrate ethically and morally responsible behavior. If the use of these resources is inappropriate, persons using the internet will be denied access and their privileges revoked.
Students will be educated annually about appropriate online behavior, including interacting with other individuals on social networking websites and in chat rooms, and cyberbullying awareness and response. The implementation of this provision is delegated to the building principals who shall report annually to the superintendent on the educational activities undertaken to comply with this subsection.
Use of networks and internet is limited to the following terms and conditions:
1. Use must be for educational and/or research purposes consistent with the mission, goals and objectives of Yankton School District along with state and federal regulations;
2. All messages sent by e-mail are Yankton School District’s (YSD’s) records. Messages sent over YSD’s internal e-mail systems are not subject to the privacy provisions of the Electronic and Communications Privacy Act of 1986 and therefore may be read by YSD’s management and system administrators. YSD reserves the right to access and disclose messages sent over its e-mail system, for any purpose. Supervisors may review the e-mail communications of employees to determine whether security has been violated.
3. Yankton School District is not responsible for the accuracy or loss of information or any damages suffered from internet use.
4. No financial obligations stemming directly or indirectly from unauthorized individual use of the internet is binding on the district.
5. The user is responsible for reporting to a system administrator any security or equipment problems arising from the use of network or internet.
6. Internet addresses are the property of the district and may be revoked or changed at any time.
7. Independent student access, with limited supervision, may be allowed to the internet unless the parent notifies the building principal, in writing, that he/she does not want the student to have the use of the internet in school.
8. The following uses are not permitted:
a. to transmit, receive, access, unload, download or distribute offensive, threatening, pornographic, obscene or sexually explicit material;
b. to vandalize, damage or disable property of the school or another individual or organization;
c. to access another individual’s materials, information or files without permission
d. to use the network or internet for commercial or political campaign purposes;
e. to release personal information, files, addresses, passwords or other vital accessing information;
f. to promote or solicit for illegal activities;
g. to interfere with another person’s use or account in any way;
h. to violate copyright or other protected material laws;
440
i. to attempt to log on to the internet as a system administrator;
j. to subscribe, without authorization, to mailing lists, e-mail messages, games or other services;
k. to circumvent security measures on school or remote computers or networks;
l. to enroll in or engage in any activity on the internet which results in an unauthorized charge or assessment to Yankton School District or its representatives.
9. E-mail.
YSD uses MS Exchange as its electronic mail (e-mail) system, which enables users to efficiently and effectively send, receive, organize, and share information between each other. MS Exchange allows users to send mail internally within the organization, as well as, outside the organization via the Internet. This means that a user who has an e-mail account automatically has an Internet e-mail address. With more than 1,500 e-mail users in Yankton School District, the use of e-mail is restricted to business related issues.
a. E-Mail Conventions
The following points are required for the use of e-mail:
1) Communication must not involve solicitation, be associated with any for-profit outside business activity or potentially embarrass YSD;
2) Identify yourself and your purpose;
3) Keep messages short, coherent, and to the point;
4) Use caution when sending e-mail with attachments as they can slow mail services;
5) Maintain professionalism when composing or responding to mail;
6) Check mail regularly;
7) Return Receipt feature should be used with discretion as it slows traffic across the network.
b. Harassment
E-mail which is threatening, unsolicited, obnoxious, or sexually explicit are forms of harassment. E-mail harassment violates ethical usage of a YSD network account and may provoke recipients to seek criminal charges.
c. Mass Mailings and Junk E-mail
Never send uninvited e-mail or forward junk mail to large numbers of persons (known as "spam"). A YSD mail account may not be used to send commercial advertisements. Junk e-mail wastes both system resources and the time of those who receive it. Recipients may contact the system administrator with complaints.441
d. Chain Mail
Chain mail is another form of junk mail. E-mail accounts may not be used to forward such messages and should be deleted at once. If a user is knowingly participating in e-mail abuse, that user may be suspended from network access and may be subject to further disciplinary action.
10. Security
With the spread of telecommunications, the district recognizes that employees and students will shift the ways they share ideas, transmit information, communicate with others, and learn. The district utilizes filtering procedures on the server(s) that regulate access to the Internet. Use of new tools and systems brings new responsibilities as well as opportunities. Users will be held strictly responsible for activity that takes place under their user accounts. Failure to comply with the policies and procedures set forth may be considered cause for disciplinary action.
Communication over networks should not be considered private. Network supervision and maintenance may require review and inspection of directories or messages. Messages may sometimes be sent accidentally to a destination other than the one intended. Privacy in these communications is not guaranteed. The district reserves the right to access stored records in cases where there are reasonable cause to expect wrongdoing or misuse of the system. Courts have ruled that old messages may be subpoenaed, and network supervisors may examine communications in order to ascertain compliance with network guidelines for acceptable use.
YSD will not be liable for the actions of anyone. All users shall assume full liability, legal, financial, or otherwise for their actions.
Security management occurs at three different levels: personal, desktop, and network. Personal security management activities are primarily centered on password management. Desktop security management activities involve password management and physical security (primarily with laptop computers). Network security management involves passwords, virus detection and the physical security of equipment.
a. Password Management
The combination of User ID and password is the basic authentication to a user's identity. The User ID, in and of itself, is not protected as a component of an individual's security. This means that all security inherent in a user's account is vested in the password. Therefore, a user should choose his or her passwords carefully. The most frequently encountered problem with security systems is human error, and choosing an easily guessed password is one of the most common security-related mistakes.
b. Virus Detection
A computer virus is an unauthorized program that replicates itself and spreads onto various data storage media (floppy disks, magnetic tapes, etc.) across a network. The symptoms of virus infections include considerably slower computer response time, inexplicable loss of files, changed modification dates for files, increased file sizes, and total failure of computers. Because viruses have become very complex, users must not attempt to eradicate them from their systems. If users suspect infection by a computer virus, they must immediately stop using the involved computer and contact the network/systems administrator.
It is YSD's standard that all computer workstations have Antivirus software installed by the network/systems administrator. The Antivirus will be running at all times and 442
configured to perform automatic virus detection and disinfection. This will provide continual protection from a potentially harmful software virus infecting the workstations, servers, or the YSD network. No one may tamper with or alter the installation of Antivirus software.
c. Physical
All users must take reasonable precautions to protect YSD property against theft, vandalism, and natural or man-made disaster. Locked buildings or offices, keyboard and equipment locks are all acceptable ways to protect equipment. It is the responsibility of each building to enforce physical security procedures.
The user's responsibilities for security management include:
1) using the YSD system for authorized purposes only;
2) protecting individual account and personal authentication passwords from disclosure;
3) never leaving a terminal or workstation unattended or unsecured while logged on to a host computer or network;
4) abiding by the security procedures developed by YSD; and
5) reporting all observed or suspected security problems immediately to a supervisor or the network administrator.
11. This policy will be published in all student handbooks, elementary informational policies for parents, faculty handbooks, classified employee employment practices handbook, and disseminated in an annual notification to all students at the beginning of each school year.
Adopted February 9, 1998, Action #98-266
Revised June 14, 1999, Action #99-394
Revised May 12, 2003, Action #2003-189
CC. ENRICHMENT AND TECHNOLOGY The Yankton School District 63-3 believes in the value and dignity of life. Recognizing that variance exists in the background and ability of individuals, the district endeavors to provide, through enrichment and technology, curriculum experiences which meet the needs of students.

No comments:

Post a Comment