LOGAN CITY SCHOOL DISTRICT
POLICIES AND PROCEDURES

TitleResponsible Use of the Internet and Other Electronic Information ResourcesNumber*531
SectionStudent ServicesApproval DateAugust 11, 2015
Subsection530 TechnologyEffective DateAugust 11, 2015


*Note: This policy has the same content as *331 in the Human Resources Section

1. PURPOSE
1.1 The District supports access to and the responsible use of information and communications technology (ICT) to enhance and support learning.
1.2 The District strongly believes that the valuable information and interactions available through information and communication systems, are effective ways to connect students to the growing global information resources needed for their education and therefore necessary in learning environments.
2. REFERENCES
2.1 The Children's Internet Protection Act (CIPA)
2.2 Family Education Rights and Privacy Act (FERPA)
2.3 Utah Code Ann. § 53A-3-422 Internet and Online Access
2.4 Utah Code Ann. §53A-1-402.5 Employee Ethical Conduct
2.5 Logan City School District Electronic Device Policy
3. DEFINITIONS
3.1 User: anyone, including employees, students, and guests, using an electronic device.
3.2 Network: any wired or wireless system that allows for the exchange of data, including school and district networks, cellular networks, commercial, community, or home-based wireless networks accessible to students.
3.3 Device: electronic equipment that sends, receives, or stores data.
3.3.A Examples include but are not limited to: mobile or smart phones; MP3 players, iPods, portable gaming equipment; portable computers such as laptops, iPads, tablets, web thin clients (e.g., Chromebooks), netbooks, and wearable technology; as well as portable storage devices such as hard drives, flash drives, SD Cards, and Micro Drives.
3.4 Responsible Use Policy (RUP): the district policy that delineates appropriate use of the Internet or other electronic information resources, formerly known as the Acceptable Use Policy.
3.5 Privately Owned Device: a non-district supplied device used during school, on district property, or at district sponsored events.
3.6 Electronic Information Resources: include, but are not limited to, the Internet, digital curriculum, texts, email, chat rooms, blogs, and other network files or accounts available to users.
3.7 Reasonable or Reasonably: Efforts by administration, school staff, or law enforcement to prevent: disruption to instruction or other school sponsored activities, damage to school or district property, or interference with school operations within the confines of current state or federal law, school rules, or district policies.
4. POLICY
4.1 The District and the Utah Education Network (UEN) have taken available precautions to restrict access to objectionable materials and unauthorized access to individual data associated with information and communication systems.
4.1.A The District holds individual users responsible for personal activity with information and communication systems provided by the District, including the discovery of controversial or inappropriate information not prevented by the efforts of District and UEN personnel.
4.1.B Individuals using district networks or information and communication systems are monitored and should have no expectation of privacy.
4.2 Student Responsible Use
4.2.A Students have the privilege of accessing district information and communication systems on and off district property pending:
4.2.A.1 Receipt, understanding, and willingness to adhere to this policy, and the district's Electronic Device Policy.
4.2.A.2 Receipt, understanding, and willingness to adhere to the Responsible Use Agreement deemed appropriate by the District for each student's current age or ability level.
4.2.B Building administrators and district technology staff may search a student's network use when reasonable suspicion exists that a state or federal law, district policy, or school rule has been violated.
4.2.B.1 Building or district administration shall notify law enforcement for initial or additional investigation when reasonable suspicion exists that district or school information and communication systems were used in violation of state or federal law.
4.2.B.2 Violations of law will result in referral to law enforcement for possible criminal prosecution as well as disciplinary action by the District.
4.2.B.3 Examples of inappropriate use include, but are not limited to accessing or disseminating information construed by the District as: profane, obscene (pornographic), violent, discriminatory, harassment, bullying, intimidating, or advocating illegal acts.
4.2.C Student Access to the District Wireless Network
4.2.C.1 Access to the district wireless network, including the Internet, is permitted primarily for instructional purposes and is a privilege not a right.
4.2.C.2 Limited personal use of the district wireless network is permitted if the use:
4.2.C.2.a Imposes no tangible cost to the District;
4.2.C.2.b Does not unduly burden or cause damage to the district's computer or network resources.
4.2.C.2.c Has no adverse effect on a student's academic performance.
4.2.D Student Access Through Private Networks
4.2.D.1 Students using private networks to access content or to communicate while on district property or at district sponsored events are held to the same expectations as if they were using the district network.
4.2.D.2 School officials will discipline students using private networks to violate district policy, school rules, or classroom rules.
4.2.D.3 Students using private networks to violate federal or state law will be referred to appropriate law enforcement agencies for investigation or prosecution.
4.2.E Student Due Process
4.2.E.1 If there is an allegation that a student has violated this policy, the student shall be referred to the appropriate school authority, receive notice of the alleged violation, and provided an opportunity to present an explanation.
4.2.E.2.a In the event an allegation may lead to disciplinary action, the investigating school official or designee shall inform parents of the allegation and potential disciplinary action.
4.2.E.2.b Disciplinary actions in harmony with the school handbook will be tailored to meet the specific concerns related to the violation.
4.2.E.2.c Deliberate violations of this policy (e.g., malicious acts or omissions; searching for, viewing, or otherwise visiting pornographic or sexually explicit sites) are cause for suspension or expulsion for students.
4.3 Staff Member Responsible Use
4.3.A Staff Members have the privilege of using district information and communication systems on and off district property pending:
4.3.A.1 Receipt, understanding, and willingness to adhere to this policy, and the district's Electronic Device Policy.
4.3.A.2 Receipt, understanding, and willingness to adhere to the district's Responsible Use Agreement.
4.3.B Building administrators and district technology staff may search a staff member's network use when reasonable suspicion exists that a state or federal law, district policy, or school rule has been violated.
4.3.B.1 Building or district administration shall notify law enforcement for initial or additional investigation when reasonable suspicion exists that district or school information and communication systems were used in violation of state or federal law.
4.3.B.2 Violations of law will result in referral to law enforcement for possible criminal prosecution as well as disciplinary action by the District.
4.3.B.3 Examples of inappropriate use include, but are not limited to accessing or disseminating information construed by the District as: profane, obscene (pornographic), violent, discriminatory, harassment, bullying, intimidating or advocating illegal acts.
4.3.C Staff Member Access to the District Network
4.3.C.1 Access to the district wireless network, including the Internet, is permitted primarily for instructional purposes and is a privilege not a right.
4.3.C.2 Limited personal use of the district wireless network is permitted if the use:
4.3.C.2.a Imposes no tangible cost to the District;
4.3.C.2.b Does not unduly burden or cause damage to the district's computer or network resources.
4.3.C.2.c Has no adverse effect on job performance.
4.3.D Staff Member Access Through Private Networks
4.3.D.1 Staff members using private networks to access content or to communicate while on district property or at district sponsored events will be held to the same expectations as if they were using the district network.
4.3.D.2 School officials will discipline employees using private networks to violate district policy.
4.3.D.3 Employees using private networks to violate federal or state law will be referred to appropriate law enforcement officials for investigation or prosecution.
4.3.E Staff Member Due Process
4.3.E.1 If there is an allegation that an employee has violated this policy, the employee shall receive notice of the alleged violation and an opportunity to present an explanation.
4.3.E.2 Disciplinary actions in harmony with corrective discipline procedures will be tailored to meet the specific concerns related to the violation.
4.3.E.3 Deliberate violations of this policy (e.g., malicious acts or omissions; searching for, viewing, or otherwise visiting pornographic or sexually explicit sites) are cause for immediate termination for employees.
4.4 Community Members or Guests
4.4.A Community Members or guests may have the privilege of using private network and communication systems on school district property under the following conditions:
4.4.A.1 Community members or guests may publish content or communicate on personal websites, blogs, forums, social media sites, and other network communication sites while on school district property or when officially accompanying students to a school or district sponsored event, unless otherwise reasonably directed by administration, law enforcement, a staff member, or those about whom information is being shared.
4.4.A.2 Violations of law will result in referral to law enforcement for possible criminal prosecution.
4.4.B While on school district property or when officially accompanying students to a school or district sponsored event, unless otherwise reasonably directed by administration, law enforcement, a staff member, or those about whom information is being shared, community members or guests may share audio, images, video, or any form of electronic communication with the exception of audio and video recordings, photographs, or electronic communications that violate reasonable expectations of privacy, current law or district policy, or other issues including bullying, harassment, intimidation, interference with school operations, disrupting school activities, etc.
4.4.B.1 Examples where there is a reasonable expectation to record or share audio, video, or other forms of electronic communication, include: a school assembly or special class presentation, sporting events, fairs or events where demonstrations take place, and locations where public activity is generally recorded or documented by the school.
4.4.C Limited personal use of the district wireless guest network is permitted pending:
4.4.C.1 Receipt, understanding, and willingness to adhere to this policy, and the Guest Use Agreement explained and acknowledged upon receipt of guest network access information.
4.4.C.2 Imposes no tangible cost to the District;
4.4.C.3 Does not unduly burden or cause damage to the district's computer or network resources.
4.4.D Community Member or Guest Due Process
4.3.D.1 In the event there is an allegation that a community member or guest has violated this policy, the individual accused shall be referred to the appropriate school authority, receive notice of the alleged violation and an opportunity to present an explanation.
4.3.D.1.a In the event an allegation may be verified, the investigating school official or designee will take action to insure that the individual will comply with District policy and/or direct the individual to leave school district property.
4.3.D.1.b Deliberate violations of this policy (e.g., malicious acts or omission; searching for, viewing, or otherwise visiting pornographic or sexually explicit sites) are cause for exclusion from future school activities or blocked access.
5. PROCEDURES
5.1 Policy Acceptance
5.1.A Use agreements are signed annually or as soon as reasonably possible after the Logan City School District Board of Education adopts an update.
5.1.A.1 Use agreements are to be stored in a manner and location where they may be verified by administration or law enforcement when needed.
5.1.A.2 Use agreements are reviewed for possible updates at least every three years.
5.2 Services and Assumption of Risks
5.2.A The District makes no warranties of any kind, whether express or implied, for services provided and is not responsible for any damages suffered while on the system to include loss of data and inaccurate or poor quality information obtained from the system.
5.3 Enforcement
5.3.A Limited or Blocked Access
5.3.A.1 If a student violates this policy, his/her access may be blocked or reduced.
5.3.A.2 The level of student access will be tailored to the circumstances surrounding the violation based on parent, staff, and/or administrator input and the capabilities of the current district information and communication system.
5.3.A.4 Removing limited or blocked access will be depend on student compliance with all other aspects of the Responsible Use Agreement as well as recommendation of parents, staff, and/or administration requesting the restriction.
5.3.B Investigations
5.3.B.1 School and/or district administration, in consultations with district technology staff as needed, shall determine whether to investigate and/or make a referral to law enforcement for investigation in accordance with current state and federal law.
5.3.B.2 School administration and/or law enforcement may search school district issued devices, as well as, privately owned devices using the school district's network for activities suspected of violating this policy.
5.3.B.3 School administrations and/or law enforcement may search school district created accounts and applications, as well as, private accounts or applications accessed through the school district's network for activities suspected of violating this policy.
5.3.B.4 Privately owned devices, private accounts, or private applications used on school property or at school sponsored events suspected of violating state or federal law will be referred to law enforcement for investigation when the district network was clearly not involved in the use of the device, account or application.
5.3.C Disciplinary Actions
5.3.C.1 Violation of this policy may result in disciplinary actions up to and including the following:
5.3.C.2 Suspension in or out of school, or expulsion,
5.3.C.3 Notification of law enforcement authorities,
5.3.C.4 Permanent prohibition from possession of an electronic device at school or school-related events and only supervised, temporary access to an electronic device for instruction as deemed necessary by an staff member.
5.3.C.5 Confiscation of device for increasing periods of time for repeat violations,
5.3.C.6 Other disciplinary actions as deemed appropriate by school administration.
5.3.D District Network Access
5.3.D.1 Employees, students, and guests shall:
5.3.D.1.a Abide by all state and federal laws.
5.3.D.1.b Use the Internet primarily for education and instruction.
5.3.D.1.c Conduct themselves in a responsible, decent, ethical, and polite manner.
5.3.D.1.d Accept the responsibility for adhering to high standards of personal digital citizenship to ensure quality network access for all users expected in school environments.
5.4 Authentication
5.4.A The District claims the right to manage all network activity of individuals accessing or authenticating onto district information and communication systems, including but not limited to: verifying personally identifiable information (PII), gathering data on use for policy enforcements, and gathering PII data for administrative purposes related to the network.
5.4.A.1 Personal and device information may be required when accessing the district network to access district electronic resources or the Internet.
5.4.A.2 Information may include, but is not limited to: name, email, student identifications (where applicable), passwords, phone numbers, device credentials (e.g., IP Address), etc.
5.4.A.3 Network authentication processes are configured to support secure and safe data exchanges with district owned devices for educational purposes.
5.5 Filtering
5.5.A When authenticating onto the district network on or off of school district property:
5.5.A.1 Content will be filtered in accordance with federal and state law, including, compliance with the Children's Internet Protection Act (CIPA) and the Family Education Rights and Privacy Act (FERPA).
5.5.A.2 The District reserves the right to investigate the use history, downloads, or drives for any device accessing the district network, even when the use history, downloads, or drive configurations occurred on a non-district provided network.
5.5.B The District claims no liability for filtering related to use of privately owned devices or district provided devices on home networks or other networks not provided by the District, even when access is for school related activities or assignments.
5.5.B.1 Homeowners and other access providers are responsible for their own filter configurations.
5.6 File Storage and Access
5.6.A District technology staff will follow current best practices for protecting staff and student files and data, including but not limited to: firewall maintenance, annual penetration testing, secure server facilities, redundant back up, recovery systems, etc.
5.6.A.1 Users are responsible for storage and security of personal files unrelated to educational activities.
5.6.A.2 Personal storage requirements exceeding or inhibiting device capacity and use should be maintained through other storage options and not on the device.
5.6.B Educational files should be secured and accessed through district storage resources.
5.8 Training
5.8.A All staff will be trained in current responsible use policy annually, and as soon as reasonably possible after a change in state or federal law, school rules, or district policy.
5.8.B Students will be trained by staff or required to complete district sponsored training sessions at least annually, including but not limited to: Internet safety and digital citizenship, authentication policy and procedures, and file storage and data management.
5.8.B.1 Students violating policy or school rules may be required to complete district sponsored training activities specific to the policy or school rules violated.
5.9 Liability
5.9.A Lost, Stolen, or Corrupted Files
5.9.A.1 Personal and educational files are the responsibility of the user and users are encouraged to follow best practices to preserve files.
5.9.A.2 Logan City School District takes no responsibility for stolen, lost, or corrupted files, and encourages regular backup of both personal and educational files.
5.9.B Usage Charges and Cyber Theft
5.9.B.1 Logan City School District and its employees are not responsible for any charges to private credit, online, or other accounts that might be incurred during approved school related use.
5.9.B.2 Logan City School District and its employees are not responsible for cyber theft resulting from inappropriate sharing of personal login or authentication information under any circumstances.
5.9.B.2.a Examples include but are not limited to: sharing district provided user names or passwords, sharing a personal user names or passwords through the district network, etc. that are then used for cyber theft.