St. John School provides technology resources to its students and staff for educational and administrative purposes. The goal in providing these resources is to promote educational excellence in St. John School by facilitating resource sharing, innovation and communication with the support and supervision of parents, teachers, and support staff. The use of these technology resources is a privilege, not a right.
With access to computers and people all over the world comes the potential availability of material that may not be con- sidered to be of educational value in context of the school setting. St. John School firmly believes that the value of information, interaction, and research capabilities available outweighs the possibility that users may obtain material that is not consistent with the educational goals of the school.
Proper behavior, as it relates to the use of computers, is no different than proper behavior in all other aspects of school activities. All users are expected to use the computers and computer networks in a responsible, ethical, and polite man- ner. This document is intended to clarify those expectations as they apply to computer and network usage and is consis- tent with school policy.
I. Use of St. John School’s Technology Resources
Improper use of St. John School Technology Resources is prohibited.
Uses of St. John School Technology Resources that are prohibited include, but are not limited to:
- Violating students’ rights to privacy/confidentiality.
- Attempting any unauthorized access to any computer system.
- Downloading unacceptable materials.
- Re-posting personal communication without the author’s prior consent.
- Violating copyright law.
- Using the school’s technology resources for financial gain, credit card fraud, electronic forgery, other illegal activity and for political purposes.
- Downloading, installing or storing software on a school computer without the approval of appropriate school personnel.
- Changing or attempting to alter any configuration, program, password on any computer system.
- Using a school computer without knowledge/approval of school personnel responsible for the computer.
- Using inappropriate language, pictures, gestures in any form on the Internet.
- Using the Internet for entertainment or limited self-discovery function.
- Using the Internet for unauthorized purchases.
II. General Information:
The Internet, a worldwide telecommunications network that allows millions of computers to exchange information, is accessible to students. The school has the right to place reasonable restrictions on the material accessed or posted through- out its system.
The school provides Internet access to students as a means to facilitate resource sharing, innovation, and communica- tion. Information gathered from the Internet is viewed in the same manner as other reference material in the school; such resources enhance the learning environment.
School personnel provide guidance to the student in Internet use and monitor the program to the best of their ability as a regular instructional activity. Controlling all materials on a global network is impossible, and an industrious user may discover inappropriate information or perform inappropriate actions in spite of adult supervision. Therefore, the school encourages parents to have a frank discussion with their children about Catholic Christian values and how those beliefs should guide student activities while using the Internet.
School personnel will:
- Teach proper techniques and standards for internet participation.
- Guide student access to appropriate areas of Internet.
- Assure that students understand that misuses of the Internet could result in loss of access privileges.
- Monitor related concerns . . . privacy, software policy, copyright laws, e-mail etiquette, approved/intendeduse of school’s Internet resource sources.
The student and parent/guardian must sign an Internet Use Agreement before the student is given access to the school’s Internet resource. School personnel or the parent/guardian may withdraw student Internet access at any time.
* Including but not limited to the intranet, internet access, fax, e-mail, stand alone computer, and telephone