Campus Technology Policies

Before using the Holy Name High School’s technology system, each student and her parent/legal guardian shall review, sign, and return the Responsible Use Policy agreement indicating that the student understands and agrees to abide by specified user obligations and responsibilities. The signed Responsible Use Policy agreement will remain in effect while the student is enrolled in Holy Names High School.
 
Students are also required to review and abide by the policies put forth in the 1-to-1 Student Mobile Device Handbook presented below.
HOLY NAMES HIGH SCHOOL RESPONSIBLE USE POLICY
 
INTRODUCTION
Holy Names High School provides technology resources to its students and staff in furtherance of its educational and business purposes. It is the school’s goal to promote educational excellence by providing technological resources, facilitating innovation, and improving communications with the support and supervision of parents, teachers, and staff. The use of these technology resources is a privilege, not a right.
Access to devices and people all over the world through the school’s technology system entails potential access to material that may not be considered to be of educational value in the context of a school setting. The school believes that the value of the information, interaction, and research capabilities available through technology outweighs the possibility that users may obtain material that is not consistent with the educational goals of the school.
Proper behavior, as it relates to the use of technology, is no different than proper behavior in all other aspects of school activities. All users are expected to use the school’s technology system in a responsible, ethical, and polite manner. Parents are strongly encouraged to be involved in their children’s technology use and to guide them in ethical and proper use. This document is intended to clarify the terms and conditions of access to the school’s technology system and expectations as to its proper use.
 
TERMS AND CONDITIONS
1. COMPLIANCE WITH EXISTING LAWS, REGULATIONS AND POLICIES
All persons using the school’s technology system shall comply with all applicable laws and school policies including, without limitation, laws and policies regarding freedom of speech, profanity, obscenity, privacy, copyright, and misuse of technology generally. Persons using the school’s technology systems are required to comply with student conduct requirements generally as well as with the provisions of this policy.
2. DEFINITIONS
2.1 School Technology System. All computer and video hardware, electronic devices, mobile devices, software, operating systems, data, data storage media, networks and related devices, and data transmission and communications equipment and services (including Internet and e-mail).
2.2 User Area. A user area is comprised of that portion of the school technology system reserved for the personal use of an individual user, including but not limited to, user data files, programs, dynamic system work areas, or any other storage or processing resources dedicated to the user.
3. TECHNOLOGY SYSTEM ACCESS AND USE
3.1 Orientation. Prior to being permitted to access and use the school’s technology system, users will be required to complete an orientation session about proper school technology system use and conduct.
3.2 System Etiquette. Users are expected to be courteous while using the school’s technology system. Users shall not send or display material that is obscene, rude, offensive, or hate-based, or that could be construed as harassing to others based on their race, national origin, gender, sexual orientation, age, disability, religion, political belief or other protected characteristic. Users shall report any misuse of the school’s technology system to the supervising teacher, site administrator, or school technology administrator.
3.3 Messages. Users should not indiscriminately address messages to broad audiences (examples: spamming and chain letters). Message addressing should be narrowly tailored to the school-related purpose at hand. Messages should only be sent to known recipients or locations. Messages or other materials should not be sent with misleading titles.
3.4 System Modifications. Users may not modify or alter the school’s technology system in any way except under the express direction of the school’s technology administrator or designated representative. Modification and alteration of the technology system does not include ordinary operations involving saving and deleting user-generated files created in furtherance of school business or educational purposes.
3.5 Disclosure of Personal Information. Disclosure of users’ own or others’ personal information on the school’s technology system is prohibited (examples: name, address, telephone number, Social Security Number). Posting of video and photographs of others without their permission is prohibited.
3.6 Privacy/Technology System Monitoring. User information, data, and communications, including e-mails, transmitted over the school’s technology system or contained in any part thereof is not private or subject to privacy protections. The school reserves and shall have the right to monitor all aspects of the school’s technology system, including user information, data, communications, and e-mails, for the purpose of ensuring system integrity and security, preventing system abuse, maintaining the system, and furthering legitimate educational purposes.
3.7 Student Images, Names, Identifying Information and Student Work. Individual images of students, student names and student work may be posted on school websites by school employees, subject to parent/guardian approval. For safety reasons, student photos and names will not be displayed together.
3.8 Downloads/Scanned Materials. Approval must be obtained from the supervising teacher prior to downloading or scanning any materials into the school’s technology system.
3.9 Passwords and System Security. Users are personally responsible for keeping their passwords secure, complying with system security measures, and intentional or negligent harm they may cause to the technology system. Sharing passwords or using the school’s technology system under another user’s password or account number is prohibited.
3.10 Harmful/Obscene/Inappropriate Materials. Users may not access or store harmful, obscene or other inappropriate materials on the school’s technology system. The school reserves the right to limit the content of information accessed or stored on the school’s technology system for legitimate educational purposes.
4. PERMITTED USE
The technology system may only be used in furtherance and support of the school’s educational and business goals and purposes.
5. PROHIBITED USE
5.1 Illegal Use. Users may not process, transmit, download, or publish any material in violation of any local, state, or federal law, including but not limited to, the following:
a. Maliciously accessing, altering, deleting, damaging, or destroying any part of the technology system.
b. Moving another user’s accounts, changing another user’s passwords, or using unauthorized accounts.
c. Using the technology system to make money illegally or for illegal purposes.
d. Intentionally disrupting the school’s technology system.
e. Using the technology system or materials contained therein in violation of copyright, trade secret, or libel laws, or for any other illegal purpose.
f. Fraudulent conduct, including credit card fraud or electronic forgery.
5.2 Viruses and Hacking. Users may not upload, transmit, download, or participate in any manner in the creation, promulgation, publication or use of computer viruses or any other harmful computer programs. Users may not engage in any form of “hacking” while using the school’s technology system. Hacking includes, but is not limited to, gaining or attempting to gain unauthorized access to any technology systems and/or viewing, copying, downloading, or altering the computer programs, operating systems, data files, and any other materials contained therein. Use of viruses and hacking will result in denial of access to the school’s technology system and may result in further discipline as discussed in Section 9 below.
5.3 Private Security Measures. Users may not use any passwords, recognition codes, security access devices or methods, data encryption, or physical locking devices such as locks on any part of the school’s technology system without the school’s prior express written consent. Users will be assigned access levels to the school’s technology system, including but not limited to the computer desktop security system. Users may not access the school’s technology system beyond their assigned access levels.
5.4 Private Financial Gain/Business. The school’s technology system may not be used for private financial gain or to operate a private business enterprise.
5.5 Use of School Name and Symbols. Users may not use the school’s name, the name of other school facilities, or school logos or symbols outside of the school’s technology system in a manner that creates the false impression that such use is sanctioned by the school. The school reserves the right to control the unauthorized use of its name, symbols, logos, or any other proprietary materials to the extent permitted by law.
6. INTERNET USE
6.1 Technology Protection Measures. The school employs an online filtering system for student access to the Internet. At school and on school-owned devices, students may access the internet only through computers on which the filtering system is active.
6.2 Web Access Information. The school reserves the right to access user areas containing “cookies,” web browser site access trails, or other web access information and modify or delete such items in the interests of system security, maintenance, integrity and legitimate educational purposes.
6.3 Student Web Sites. All web pages created by students and student organizations on the school’s technology system will be subject to treatment as school-sponsored publications. The school reserves the right to exercise editorial control over such publications as allowed by law in order to maintain an orderly school environment and to protect the rights, health and safety of all members of the school community.
6.4 Term Paper/Course Work Sites. Accessing websites or other sources to obtain third-party term papers or course work that is to be passed off as the user’s own work is prohibited.
6.5 Use of Credit Cards & Financial Information. Users may not provide personal credit card or financial information of any type or conduct financial transactions over the school’s technology system without the prior approval of the technology administrator or supervising teacher. The school is not responsible for unauthorized costs incurred through use of the school’s technology system.
6.6 Plagiarism. Any work copied from another student, website, or third-party that is to be passed off as the user’s own work is prohibited.
7. SCHOOL OWNED MOBILE DEVICES
Students will be allowed to access the school’s network and Internet connection only with the school-owned mobile devices. Mobile devices are digital devices that can access the Internet, use Webtools such as Google Apps, run apps, and store digital media. Mobile devices include, but are not limited to Chromebooks, laptops, netbooks, and tablets.
8. DISCLAIMER
The school assumes no liability, either expressed or implied, arising out of providing the school’s technology system access to users. The school shall not be responsible for any damages suffered by users as a result of using the school’s technology system, including but not limited to, damages suffered as the result of the user’s own negligence, system delays, service interruptions, non-delivery or misdelivery of data, or the acts of other users. Use of the school’s technology system and information obtained therefrom is solely at the user’s risk. The school makes no representation as to the content, accuracy, or veracity of any information on or obtained from the school’s technology system. The school disclaims any responsibility for the accuracy of information contained in or obtained from Internet service providers, or Web sites, or other sources outside the school’s technology system.
9. HOLD HARMLESS
The user and the user’s parent or guardian agree to release and hold harmless the school and its officers, board members, employees and agents, from and against any and all liability, loss, expense, or claim for injury or damages user may have arising out of use of the school’s technology system.
10. CONSEQUENCES OF IMPROPER USE
 
10.1 Discipline and/or Loss of Use Privileges. Use of the school’s technology systems is a privilege, not a right. Users who engage in prohibited activities, or who use the school’s technology systems in such a way as to violate school rules and regulations, may be subject to appropriate discipline including loss of technology system use privileges, suspension, expulsion, and/or dismissal.
10.2 Procedural Rights. Users accused of violation of this Responsible Use Policy shall have the same rights, privileges, and disciplinary procedures to which they are entitled for infractions not related to the school’s technology systems use.