|
Fort Worth Independent School
District has established an Internet connection for use by students,
teachers, and administrators. The purpose of this Internet access
is to promote our educational programs and goals in the following
ways:
- Students and faculty can use
the Internet and World Wide Web for research.
- Students can be prepared to
use the Internet and electronic communications media more effectively
in college and in the work place.
- Students can take virtual "field
trips" to international Internet sites.
- The school can establish a presence
on the World Wide Web.
- Individuals and classes can
communicate locally and around the world using electronic mail.
- Schools can access current and
archived information from a variety of institutions and participate
in global collaborative projects with other schools.
- The Internet and the World Wide
Web are made up of millions of computers and users. Much of the
material available may not be considered educationally valuable
or appropriate in a school setting. Some of the material may
be controversial, and would be considered unacceptable by many
in the school community.
- Not all of the users on the
Internet and the World Wide Web have the best interests of the
children at heart, which means that strict security, vigilance,
and close supervision must be imposed by the administration of
Fort Worth ISD. While Fort Worth ISD will utilize "Firewall"
software to limit access to unacceptable material and unfriendly
users, it must be recognized that there is no impervious security.
This document provides some guidelines for security, safety,
and etiquette on the Internet, and explains how schools will
promote acceptable use and the consequences of unacceptable use.
- Users must recognize that the
school has limited computer resources that are shared by many
students and teachers. Additionally, the communications links
available provide limited bandwidth, which means that large numbers
of concurrent users may affect the speed of response times for
all users. District Computers are available for Internet access
only during limited periods during the school day under close
supervision by FWISD faculty.
CAMPUS
LEVEL RESPONSIBILITIES
|
|
As the campus-level coordinator
for the electronic communications system, the principal or designee
will:
- Be responsible for disseminating
and enforcing District policies and administrative regulations
governing use of the District's system at the campus level.
- Ensure that employees supervising
students who use the District's system provide appropriate training,
emphasizing the ethical use of this resource.
- Be authorized to monitor or
examine all systems activities as deemed appropriate to ensure
proper use of the system.
- Determine which information
groups are most applicable to the curricular needs of the District
and restrict access to only those groups as appropriate.
- Be authorized to establish a
retention schedule for messages on any electronic bulletin board
or file system and to remove messages posted locally that are
deemed to be inappropriate.
- Set quotas for disk usage on
the system as needed. By submitting a written request to the
principal or designee, system users may request that their quotas
be increased. The request must state the need for the quota increase.
- Ensure that all users of the
District's system complete and sign an agreement to abide by
all District policies and administrative regulations regarding
such use. All such agreements will be maintained on file in the
office of the principal.
Internet access is coordinated
through a complex association of government agencies, state and
regional networks, and commercial providers. The operation of
the Internet relies upon the proper conduct of users, who must
adhere to strict guidelines. If a District user violates any
of these guidelines, that account will be terminated and future
access may be denied. The following rules will apply to all users
of the District's electronic information and communications systems.
- The individual in whose name
an account is issued will be responsible at all times for its
proper use.
- System users must not encourage
the use of tobacco, alcohol, or controlled substances or otherwise
promote any other activity prohibited by District policy or local,
state or federal law.
- Transmission of material, information,
or software in violation of of any District policy or local,
state, or federal law is prohibited.
- System users identifying a security
problem in the District's systems must notify the appropriate
teacher, campus administrator, or District coordinator.
The use of an account must be
in support of education and research that is consistent with
the policies and educational goals of Fort Worth ISD. Use of
an account for frivolous purposes such as playing computer games
will be deemed a violation of guidelines.
Some examples of acceptable use
include searching for current research, visiting virtual sites
such as art museums and art galleries, using an on-line tutorial,
sending Email that conforms to these guidelines, gathering stock
market data or company profiles, searching for books or publications
in the Library of Congress, checking weather data, enhancing
the school's Web page with new artwork, and downloading or uploading
files to be used to further the academic goals of school programs.
These uses are most acceptable when used to directly support
the educational programs of the school.
- Unacceptable use of one's Internet
account will be cause to terminate the account and possibly deny
future access. Unacceptable use is determined by school faculty,
District administration, or the Internet Coordinator.
- Examples of unacceptable use
include using abusive, vulgar, or obscene language, visiting
sites that contain pornographic, exploitative, or racially offensive
images or text, participating in the "alternate.sex"
newsgroups, damaging or modifying files that are the property
of others without their permission, making illegal copies of
copyrighted materials, using the Internet for personal gain by
advertising goods or services for sale or barter, hampering or
interfering with the ability of others to use their computers
or Internet access, and downloading or uploading files that do
not further the academic goals of school programs.
- If any person suspects that
a Web link may lead to pages containing unacceptable information,
that person is responsible for avoiding the location. If anyone
does accidentally discover something unacceptable or inappropriate,
that person is responsible for notifying the faculty supervisor
or Internet coordinator. Any question about the acceptability
of a proposed Internet use should be directed to a teacher, faculty
supervisor or the Internet coordinator.
Violations of acceptable use
guidelines will result in cancellation of the user's Internet
account. Where warranted, disciplinary actions may be imposed
in accordance with codes in effect at the campus or within the
District. Some violations, such as vandalism, may be covered
by State or Federal laws, in which case civil or criminal prosecution
could result.
To encourage students to use
the Internet and the World Wide Web in productive, educational
ways, Internet access will be granted only to those who have
been trained in the use of these tools and have an educational
purpose for accessing the Internet. Students may only use the
District's Internet facilities under the supervision of a faculty
member who will assure that abuses do not occur.
- Security on the school computer
systems is a major issue. In the past computer systems have proven
to be reliable and secure, but global access introduces new and
possibly unknown security implications. Anyone who identifies
a real or possible security problem is responsible to convey
details to the Internet administrator, without discussing it
with, or demonstrating it to any other persons.
- Students, faculty, and administrators
who have their own individual accounts must guard their password,
which is like a signature. A person signing on with another user's
password can access that user's private files and that user would
be held responsible for actions taken by the other person. Therefore,
it is important that passwords remain private. Users should choose
a password that can be remembered, but which is not easily learned
by others, and passwords should be changed often without repeating
the same one. Do not try to obtain another person's password
or log on as someone else.
Use of the Internet is a privilege,
not a right. Inappropriate use will result in cancellation of
the privilege. Each individual who receives an account will be
given information pertaining to proper use of the network. Campus
and District administrators will decide what is inappropriate
use, and their decision is final. An Internet account may be
closed at any time deemed necessary by recommendation of the
faculty, administration, or staff.
NETIQUETTE is the exercise of
common courtesy rules and obeying the same rules of conduct that
you would be expected or required to follow at any campus or
office.
- The user is required to abide
by the generally accepted rules of network etiquette. The user
should be polite, and refrain from using vulgar or obscene language
in any communications.
- The user should not divulge
a personal address or phone number, or those of others, to anyone.
- The user should be aware that
electronic mail may not necessarily be private.
Vandalism in the electronic sense
is defined as any malicious attempt to harm, corrupt, or destroy
data belonging to another user on the Internet, World Wide Web,
or other networks or computers. This includes the creation of,
or intentional transmission of computer viruses. Vandalism will
result in immediate and permanent revocation of Internet access
privileges, and could result in civil or criminal prosecution.
It is especially critical to
be wary of "Friendships" developed on-line. Be that,
under the veil of electronic communications, one gender can pose
as another, and older persons may pass themselves off as younger.
The user is advised never to give an Email acquaintance a full
name, address or telephone number, and never arrange to meet
an Email acquaintance in person unless the user is accompanied
by a parent or adult. If the user receives inappropriate Email
from anyone, the message should be forwarded to the Internet
coordinator for investigation and possible action.
The user may be asked from time
to time to update Internet account registration information such
as passwords, address, campus, etc. The user must notify the
Internet coordinator any time this information changes.
The rapid growth in the number
of computers, video cassette or tape players, and CD-ROM players
in use by employees and students of the District, along with
the ease of access to computer software, applications, digital
videos, and other materials protected by copyright and trademark
laws presents many opportunities to enhance education, staff
development, and staff productivity. along with these opportunities,
there are moral, ethical, and legal issues that must be considered
in order to protect the interest of the District, its employees,
and students.
All applicable laws and statutes
that protect the creative rights of intellectual material as
defined in the copyright laws will be respected at all times
by all students of the district and all persons employed by the
District.
- Copyrighted materials, including
computer software, video films, and computer generated art, will
not be utilized on any equipment owned by the District unless
a license has been obtained granting such rights to the District.
- Copyrighted materials legally
licensed by the District for use by its students and/or employees
will not be copied or removed from the District for use on equipment
owned by individuals unless the license obtained by the District
specifically grants rights for such use.
- Copyrighted materials for which
individual students or employees have obtained a license may
not be installed or utilized on equipment owned by the District.
- The District will establish
and maintain a central inventory database where all license for
use of copyrighted materials will be recorded.
- If any student or employee of
the District acquires the legal license to use copyrighted materials
for the District, it is the responsibility of the person acquiring
the materials to notify the database administrator of such acquisition,
the date of the acquisition, the source from which the materials
were acquired, and the number of copies legally permitted by
such license. If the acquiring individual does not properly notify
the database administrator, all copies of the software will be
deleted from all District equipment.
- From time to time, the database
administrator will conduct inventories of materials stored on
District equipment. Any items found that are not incompliance
with this policy will be deleted and the user will be required
to repurchase the license.
- Any individual who downloads
computer software from bulletin boards or the Internet is responsible
for ensuring that no computer viruses are introduced by such
downloads. the information services department provides software
for detection and elimination of viruses, at no cost to users
of District computers.
- With the growing application
of computer technology in the workplace, employees find that
new possibilities in communications raises new questions about
public and personal responsibility. electronic mail has enhanced
the means by which information is exchanged; it is quick, reliable,
and convenient. For these reasons, the use of electronic mail
has expanded rapidly.
- Electronic mail resembles, but
is not identical to , communication by postal mail and telephone.
It is like postal mail because it establishes a written record
that can be directed to an individual or to a group of individuals.
It can also be stored for later reproduction, consultation, or
analysis. It is like the telephone because it provides swift
contact and because it can deposit a message for later reception,
much like voice mail.
- The ambiguity surrounding electronic
mail promotes may questions concerning privacy and responsibility.
Electronic mail has already been the focus of law suits in both
the private and public sectors. These guidelines set down an
attempt to provide information and assistance to employees of
the District.
- The District requires that all
employees comply with the state of Texas public records law and
the state retention schedule for public records, including electronic
mail.
Electronic mail is a service
provided to employees of the District to assist them in the performance
of their duties. Communication that is job-related fulfills this
purpose and constitutes proper use. May District employees regard
e-mail as an alternative to a local phone call, and therefore
assume that innocuous personal use is acceptable. However, e-mail,
like telephones, fax machines, copies and other communications
equipment, is provided to assist employe performing business-related
functions. District employees bear the responsibility and liability
that arises from the use of District e-mail systems for personal
reasons.
The following guidelines apply:
- Unauthorized use of a USERID
to send, receive, or read electronic mail is improper.
- Use of District e-mail facilities
should not be extended to non-district employees without proper
authorization by an appropriate representative of the district.
- Unauthorized alteration or deletion
of e-mail is inappropriate.
- District e-mail facilities may
not be used for any of the following purposes:
- Sending chain letters;
- Sending copies of documents
in violation of copyright laws;
- Forwarding e-mail messages without
a legitimate District business purpose and/or forwarding messages
under circumstances likely to lead to the embarrassment of the
sender or to violate the clearly expressed desire of the sender
to restrict additional dissemination;
- Sending messages that have restricted
access due to federal, state, or District regulations; or
- Sending or soliciting messages
that are obscene, that harass, or that are sent to promote a
religious, political, or other personal position not associated
with duties as an employee of District.
- If a student, an employee, or
the administration is unwilling to see the message on the evening
news or in the newspapers, it should not be sent.
The use of electronic mail works
best when each user is considerate of others on the network.
The following suggestions are provided to make users aware of
what is called good "Netiquette."
The following standards apply:
- Check e-mail at least daily,
preferably more frequently.
- Remain within your allocated
disk quota.
- Keep messages remaining in your
mailbox to a minimum.
- Periodically download stored
messages to disk to relieve storage space.
- Be concise and descriptive of
the message content on the "subject" line.
The following standards apply
to messages:
- Keep paragraphs and messages
short and to the point.
- Focus on one subject per message.
- Be professional and careful
about what you say about others.
- Cite all quotations, references,
and sources.
- Limit line length and avoid
control characters.
- Observe organizational relationships
when corresponding with superiors. Do not send a complaint directly
to the top just because it can be done.
- Include a signature footer at
the bottom with name, affiliation, and e-mail address.
- Use sarcasm and humor with care.
Without face-to-face communication, a joke may be viewed as a
criticism if the sender is not well known to the recipient.
- In the United States, no copyright
notice is required to claim copyright. International copyright
laws vary, and may require the user to include a copyright statement
which includes the author's name, the date, the copyright symbol
©, the word "Copyright", and the phrase "All
Rights Reserved." Persons publishing their original works
on the World Wide Web are permitted to include such a statement.
- Students and faculty will frequently
publish Web pages for others to peruse. These pages may provide
educational links, but they often promote the District, the school,
and school activities. The school will do its best not to publish
the full name of the author without permission, due to the possible
dangers that international publicity could bring. Student's works
will not be published without their permission.
- If the user does NOT want to
claim copyright for a work published on the Web, the user must
include a statement that allows copying and specifies the conditions
for such permission.
|