Menu

Acceptable Usage Policies Of All Technologies Provided / Administered By The Scott County School System

By utilizing this site as well as any technologies provided / administered by the Scott County School system, you agree to abide by all lawfully approved terms and conditions of the Scott County Board of Education, The State of Tennessee, and The Federal Government of The United States of America.

 

Technology Acceptable Use Policy (Revised 7/12/2001)

Computer and Internet access (hereafter included in the term ‘Technology’) is available to all students and personnel in the Scott County School System.  We believe the use of Technology offers vast, diverse, and unique resources to both students and teachers through various software applications and Internet access.  Our goal in providing this service to personnel and students is to promote educational excellence in schools by facilitating resource sharing, creative innovation, and communication.

 
Computer access to people all over the world (via the Internet) brings the availability of material that may not be of educational value in the context of the school setting.  However, on a global network it is impossible to control all materials and an industrious user may discover controversial materials.  The Scott County School System believes that the valuable information and interaction far outweigh the possibility that users may procure material that is not consistent with the educational goals of the Scott County School System.  Therefore, all students and personnel who have access to Technology should adhere to the following guidelines when using Technology:
 
  1. The use of technology must be in support of education and/or research and be consistent with the educational objectives of the Scott County School System.  Any use of technology that violates any national or state regulation is prohibited.  This includes, but is not limited to:
    • Copyrighted material, threatening or obscene material or material protected by trade secret.  All technology is to be used for educational purposes only.  Determination of appropriate material is at the discretion of the Director of Schools, the Director of Technology, the principal or assistant principal, and their decision is final.
    • Students and Personnel are not permitted to do any of the following without approval from the Director of Schools or the Director of Technology:  
      • To bring in or use diskettes or CD-ROMs other than software provided by the Scott County Schools.
      • To alter or attempt to change the operating system, system software, or the computer environment (desktop appearance, screen saver, etc.)
      • To delete Files or programs from the hard drive of the computer.
      • To change network rights, trustee assignments, or log-in procedures on school computer or servers.
      • To move/reposition computers.  Computer equipment is very sensitive to various environmental conditions, and contains many components that are susceptible to being damaged if handled improperly.  Also, due to the design of the school networks, any relocation or removal of computer equipment from one room may inadvertently cause network disruption to many other rooms in the building.
  2. Privileges - The use of technology is a privilege, not a right.  Inappropriate use will result in a cancellation of these privileges.  The Director of Schools, the Director of Technology, the principal or assistant principal, will deem what is inappropriate use, and their decision is final.  Also, the Director of Schools, the Director of Technology, the principal or assistant principal, may remove or shut down the technology at their discretion.  The administration, faculty, and staff of the Scott County School System may request the Director of Schools, the Director of Technology, the principal or assistant principal, to deny, revoke, or suspend specific users.

  3. Network Etiquette - The user is expected to abide by the generally accepted rules of network etiquette.  These include (but are not limited to) the following:
         • Be polite.  Do not send abusive messages to others.   
         • Use appropriate language.  Do not swear, use vulgarities, or any other inappropriate language. 
         • Illegal activities are strictly forbidden.
         • Do not save material on "public" computers that are not provided for your use.
         • Usage of technology relating to or in support of illegal activities may be reported to the authorities. 
         • Do not use the network in such a way that you disrupt the use of the network for other users.
         • Do not reveal your personal address or phone number or those of students and colleagues. 
         • Electronic Communication of any type is not guaranteed to be private and may be monitored and considered Public Record according to Tennessee Code Annotated 10-7-512 
  4. Security - Security on any technology system is a high priority, especially when the system involves many users.  If you feel you can identify a security problem on the system, you must notify the Director of Schools, Director of Technology, or principal of the school.  Do not demonstrate the problem to other users.  Do not use or access another individual's technology without permission from that person.  Attempts to use Technology in any manner that is not in accordance with this policy may result in cancellation of user privileges, and/or removal of the Technology.  Any user identified as a security risk or having a history of problems with the Technology system may be denied access to technology. Do not use another individual’s account without written permission from that person. Attempts to log on to the network as a system administrator will result in cancellation of user privileges.
  5. Vandalism/Harassment - Vandalism may result in cancellation of privileges and restitution for the replacement or repair cost of the vandalized technology. Vandalism is defined as any malicious attempt to harm or destroy, or alter any portion of the computer or any networks that are connected to the computer.  This includes, but is not limited to, the uploading or creation of computer viruses.  Harassment is defined as the persistent annoyance of another user or the interference in another user's work.  This includes, but is not limited to, the sending of unwanted electronic communications.
  6. Exception of Designees – The Director of Schools or Director of Technology may, at any given time, designate individuals to perform various computer tasks (cleaning, repairs, upgrades, etc…), which may place these individuals in contradiction with certain items in this AUP.  These individuals will be considered members of the Technology Department. They can be exempted from certain items of the AUP during their time of designation, and will report all activities primarily to the Director of Technology.

 

 

Scott County Board of Education Policies

Employee Use of Electronic Communications – Board Policy 5.6001 Adopted August 12, 2010

Use of Electronic Mail – Board Policy 1.805 – Adopted July 12, 2001

Use of Copyrighted Material – Board Policy 4.404 – Adopted August 8, 1996

Use of the Internet – Board Policy 4.406 – Adopted July 12, 2001

Web Pages – Board Policy 4.407 – Adopted August 9, 2001

Go to top