Acceptable Use Policy

We in the MacDuffie School are pleased to be able to offer our students, staff and guests access to computer technology, including access to the Internet, certain online services, and the MacDuffie School information technology network. We are dedicated to access and support of appropriate technology which unlocks our potential and connects us locally and globally. We envision a learning environment where technology is a part of us, not apart from us.

We believe that the tremendous value of technology and the information technology network as an educational resource far outweighs the potential risks. We will leverage existing and emerging technology as a means to learn and thrive in the 21st Century and prepare our students for success toward their goals in the competitive global, electronic age. We feel that access to the tools and resources of a world-wide network and understanding when and how these tools are appropriately and effectively used are imperative in each student’s education. However, if parents feel they do not want their child to have Internet access, then they will be responsible for informing their child’s teachers, in writing, before the end of the second week of school.

The school’s information technology resources, including email and Internet access, are provided for educational purposes. If you have any doubt about whether a contemplated activity is acceptable, consult with your immediate teacher, supervisor, or director to help decide if a use is appropriate. Adherence to the following policy is necessary for continued access to the school’s technological resources:

Users must respect and protect the privacy of others by:

  1. Using only assigned accounts.

  2. Only viewing, using, or copying passwords, data, or networks to which they are authorized.

  3. Refraining from distributing private information about others or themselves.

Users must respect and protect the integrity, availability, and security of all electronic resources by:

  1. Observing all school Internet filters and posted network security practices.

  2. Reporting security risks or violations to a teacher or network administrator.

  3. Not destroying or damaging data, networks, or other resources that do not belong to them, without clear permission of the owner.

  4. Conserving, protecting, and sharing these resources with other users.

  5. Notifying a staff member or administrator of computer or network malfunctions.

Users must respect and protect the intellectual property of others by:

  1. Following copyright laws (not making illegal copies of music, games, or movies).

  2. Citing sources when using others’ work (not plagiarizing).

Users must respect and practice the principles of community by:

  1. Communicating only in ways that are kind and respectful.

  2. Reporting threatening or discomforting materials to a teacher or administrator.

  3. Not intentionally accessing, transmitting, copying, or creating material that violates the school’s code of conduct or honor code (such as messages/content that are pornographic, threatening, rude, discriminatory, or meant to harass).

  4. Not intentionally accessing, transmitting, copying, or creating material that is illegal (such as obscenity, stolen materials, or illegal copies of copyrighted works).

  5. Not using the resources to further other acts that are criminal or violate the school’s code of conduct or honor code.

  6. Avoiding spam, chain letters, or other mass unsolicited mailings.

  7. Refraining from buying, selling, advertising, or otherwise conducting business, unless approved as a school project.

Users may, if in accord with the policy above:

  1. Design and post web pages and other material from school resources.

  2. Communicate electronically via tools such as email, chat, text, or videoconferencing.

  3. Install or download software, if also in conformity with laws and licenses.

  4. Use the resources for any educational purpose during school hours.

Consequences for Violation

Violations of these rules may result in disciplinary action, including the loss of a user’s privileges to use the school’s information technology resources. Further discipline may be imposed in accordance with the school’s code of conduct and honor code up to and including suspension or expulsion depending on the degree and severity of the violation.

Supervision and Monitoring

The use of school owned information technology resources is secure, but not private. School and network administrators and their authorized employees monitor the use of information technology resources to help ensure that uses are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any data found on the school’s information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect property. They may also use this information in disciplinary actions, and will furnish evidence of crime to law enforcement.

The school reserves the right to determine which uses constitute acceptable use and to limit access to such uses. The school also reserves the right to limit the time of access and use.