fbpx

Acceptable Use Policy (AUP) for Students Using Technology

Technology Use Philosophy Statement

Redwood Christian Schools will provide access and instruction to students in the appropriate use of technology in an effort to improve student achievement and further the school’s goal of producing truly educated students, “equipped for daily living and for eternal life” in the 21st century.

The Importance and Role of the Internet and Technology in Society and Education

Technology is a tool in education and a necessity in preparing students to responsibly engage and participate in the student and adult world. Technology must not be viewed as an end in itself. Technology is only valuable and efficient if it provides a means of improving and supplementing the overall goal of education. Technology will be used when appropriate for the exchange and gathering of information during class or as a part of homework. The ability of technological tools to gather data, manage information and create helpful learning environments is invaluable, but also can be overwhelming if one is ill prepared to use such tools.

Effective strategy for student research and classroom instruction to meet objectives

Students at RCS will have limited access to the internet for the purpose of conducting educational research, practicing curriculum skills, and communicating with parents/teachers/classmates. Students will conduct searches for primary and secondary source materials and will use various programs to show higher level thinking skills and to show competency in technology skills. To ensure the student’s online safety a web-filter and firewall are utilized by the RCS IT Department.

Internet access and the use of computer networks is a privilege

Because using the Internet or computers is a privilege each student will be given a username and password to their own account. The RCS IT Department can monitor this account at any time and students have no expectation of privacy regarding any digital content they create or view while on a school computer. Students who use school computers inappropriately will lose this privilege and face other consequences as determined by the RCS administration.

Technology Learning Goals: Students will be able to

  1. Recognize and use computer vocabulary (i.e. megabyte, gigabyte, hardware, software, etc.).
  2. Utilize basic and universal computer functions (accessing hard drives, CDs, DVDs, flash drives and other USB connected devices, saving files to, and retrieving files from hard drives, CDs, DVDs, and other external memory devices).
  3. Be able to have the opportunity to learn proper typing on a standard computer keyboard.
  4. Correctly format (font, margins, tabs, line spacing, centering, size, style, etc.) different types of a documents: paragraph, essay, and research paper.
  5. Utilize available software, either installed locally or on the school network.
  6. Efficiently and safely use the internet for research.

The RCS AUP is in compliance with the Children’s Internet Protection Act (CIPA)

RCS uses the services of an Internet filter system to protect students from material that is harmful and deemed inappropriate on the Internet and to monitor network traffic. Additionally, while students are using the computers there will be a staff member in the vicinity to monitor proper use of the computers to protect students from potential harm and/or illegal activity.

Students are allowed to conduct electronic network-based activities that are classroom and educationally related. Additional privileges for personal enrichment and communication are permitted as long as the student is not currently in class.

Students are not permitted to obtain, download, view, or otherwise gain access to “inappropriate matter,” which includes material that may be deemed inappropriate to minors, unlawful, abusive, obscene, pornographic, descriptive, destructive, sinful, or otherwise objectionable under current RCS policy and/or legal definitions. Such behaviors can result in revocation of privileges, access to school computers, and other consequences as determined by the RCS administration.

Examples of unacceptable behavior(s) that can result in loss of privileges and other consequences include:

  • damage to, or theft of, system hardware or software;
  • alteration of system hardware or software;
  • placement of unlawful information, viruses or harmful programs on or through the computer system;
  • entry into restricted information on systems or network files in violation of password/account code restrictions;
  • unauthorized disclosure of any information about oneself or others;
  • sharing of private information with “digital citizens” on the Internet;
  • using another person’s name/password/account to send or receive messages on the network;
  • violation of other user’s rights;
  • use or dissemination of personal information regarding minors, oneself, or any RCS personnel;
  • use of network for personal gain or commercial purposes;
  • use of technology “in an act of bullying, including but not limited to, bully committed by means of an electronic act directed specifically toward a pupil or school personnel” (CA Education Code 48900, section r)

RCS will provide age-appropriate training for students who use technology and the Internet at school. The training provided will be designed to promote the school’s commitment to: 1) the standards and acceptable use of Internet services as set for in the AUP, Technology Plan, and student handbooks; 2) student safety with regard to safety on the Internet, appropriate behavior while online, on social networking websites, and in chat rooms; 3) bullying and cyber bullying awareness and response; and 4) compliance with the Children’s Internet Protection Act (CIPA) and E-rate funding requirements.

Internet Etiquette and Privacy

RCS students are Responsible & Respectful Citizens of the 21st century. They are expected to abide by the generally accepted rules of electronic network etiquette. Examples of appropriate digital citizenship include but are not limited to:

  1. Being polite and using appropriate language, etiquette, and decorum. Refusing to use or send abusive, insulting, harassing or threatening messages to others or use vulgar, obscene, or libelous language.
  2. Protecting private, personal information of oneself and others. Refusing to reveal or send telephone numbers, addresses, or other personal, private information about oneself or others.
  3. Maintaining network security. Refusing to engage in any activity that would cause damage, disrupt, or prohibit the use of the network by oneself or other users.
  4. Recognizing that all communications and information are public when transmitted via technology and may be viewed by others and that the RCS IT Department can monitor all such communication. Refusing to participate in any communication that may be deemed hurtful, harassing, threatening, or mean.
  5. Using the RCS technology for lawful purposes. Refusing to participate in unlawful activities.

Inappropriate use of RCS technology will not be tolerated and is prohibited. The RCS administration reserves the right to determine the consequences for inappropriate use.

While RCS is providing access to electronic resources, it makes no warranties, whether expressed or implied, for these services. RCS may not be held responsible for any damages including the loss of data as a result of delays, non-delivery or service interruptions caused by the information system or the user’s errors or omissions. The use or distribution of any information that is obtained through the information system is at the user’s own risk. RCS specifically denies any responsibility for the accuracy of information obtained through its technology services.

Concluding statement: As RCS continues to learn how best to utilize technology in the classroom the school reserves the right to change, add to, or delete from these Technology Agreements