PEAK SCHOLARS’ INTERNET POLICY

 

Users (Peak Scholars’ Students, Clients and Employees) are responsible for good behavior on Peak Scholars’ computer networks just as they are in a classroom. Communications on the network are to be considered public in nature. General classroom rules for behavior and communications apply.

Network resources are provided for the users to conduct research and complete coursework. Access to network services is given to the users who agree to act in a responsible manner. Access is a privilege, not a right. Therefore, based upon the acceptable use guidelines outlined in this document, Peak Scholars will deem what is inappropriate use and their decisions are final. Upon identification of inappropriate use of network services by the user, access may be denied, revoked, or suspended at any time.

Technology Resources and Internet – Acceptable Use and Safety Policy

I. PURPOSE
The purpose of this policy is to set forth policies and guidelines for access to the Peak Scholars’ Internet system and acceptable and safe use of technology resources and the Internet.

II. GENERAL STATEMENT OF POLICY
In making decisions regarding user access to the Internet, Peak Scholars’ considers its own stated educational mission, goals, and objectives. Electronic information research skills are now fundamental to preparation of citizens and future employees. Access to the Peak Scholars’ Internet system and to the Internet enables users to explore thousands of libraries, databases, bulletin boards, and other resources while exchanging messages with people around the world. Peak Scholars expects that Clients will blend thoughtful use of the Peak Scholars’ Internet system and the Internet throughout the curriculum and will provide guidance and instruction to students in their use.

III. DEFINITION OF TECHNOLOGY RESOURCES
Peak Scholars’ Internet systems and networks are any configuration of hardware and software. The systems and networks include an assortment of computer hardware, operating system software, application software, stored text, and data files. This includes electronic mail, local databases, externally accessed databases (such as the Internet), CD-ROM, optical media, clip art, digital images, digitized information, communications technologies, and new technologies as they become available. Peak Scholars reserves the right to monitor all technology resource activity.

IV. LIMITED EDUCATIONAL PURPOSE
Peak Scholars is providing the User with access to the Peak Scholars’ Internet system, which includes Internet access. The purpose of the system is more specific than providing the User with general access to the Internet. Peak Scholars has an educational purpose, which includes use of the system for classroom activities, educational research, and professional or career development activities. The Users are expected to use Internet access through the Peak Scholars’ system to further educational and personal goals consistent with the mission of Peak Scholars and classroom policies. Uses which might be acceptable on a User’s private personal account on another system, may not be acceptable on this limited-purpose network.

V. ACCEPTABLE USES
The Peak Scholars’ technology resources will be used only for learning, teaching, and administrative purpose consistent with the Peak Scholars’ mission and goals. Software or external data may not be placed on any computer, whether stand alone or networked to the Peak Scholars’ system, without following the guidelines outlined by the Peak Scholars’ Technology Team.

VI. USE OF SYSTEM IS A PRIVILEGE
The use of the Peak Scholars Internet system and access to use of the Internet is a privilege, not a right. Depending on the nature and degree of the violation and the number of previous violations, unacceptable use of the Peak Scholars’ system or the Internet may result in one or more of the following consequences: possible dismissal from the class with no refunds, cancellation of use or access privileges; payments for damages and repairs; discipline under other appropriate Peak Scholars’ policies, including exclusion or termination of contract; or civil or criminal liability under other applicable laws.

VII. UNACCEPTABLE USES
A. The following uses of the Peak Scholars’ Internet system and Internet are considered unacceptable for students and staff but are not limited to the following:

  1. The Users will not use the Peak Scholars’ Internet system to access, review, upload, download, store, print, post, receive, transmit or distribute:
  2. pornographic, obscene or sexually explicit material or other visual depictions that are harmful to minors;
  3. obscene, abusive, profane, lewd, vulgar, rude, inflammatory, threatening, disrespectful, or sexually explicit language;
  4. materials that use language or images that are inappropriate in the education setting or disruptive to the educational process;
  5. information or materials that could cause damage or danger of disruption to the educational process;
    e. materials that use language or images that advocate violence or discrimination toward other people (hate literature) or that may constitute harassment or discrimination.
  6. The Users will not use the Peak Scholars’ Internet system to knowingly or recklessly post, transmit or distribute false or defamatory information about a person or organization, or to harass another person, or to engage in personal attacks, including prejudicial or discriminatory attacks.
  7. The Users will not use the Peak Scholars’ Internet system to engage in any illegal act or violate any local, state or federal statute or law.
  8. The Users will not use the Peak Scholars’ Internet system to vandalize, damage or disable the property of another person or organization, will not make deliberate attempts to degrade or disrupt equipment, software or system performance by spreading computer viruses or by any other means, will not tamper with, modify or change the Peak Scholars’ Internet system software, hardware or wiring or take any action to violate the Peak Scholars’ security system, and will not use the Peak Scholars’ Internet system in such a way as to disrupt the use of the system by other users.
  9. The Users will not use the Peak Scholars’ Internet system to gain unauthorized access to information resources or to access another persons materials, information or files without the implied or direct permission of that person.
  10. The Users will not use the Peak Scholars’ Internet system to post private information about another person or to post, transmit or distribute personal contact information about themselves or other persons, or other personally identifiable information, including, but not limited to, addresses, telephone numbers, personal addresses, work addresses, identification numbers, account numbers, access codes or passwords, labeled photographs or other information that would make the individual’s identity easily traceable, and will not repost a message that was sent to the user privately without permission of the person who sent the message.
  11. The Users will not attempt to gain unauthorized access to the Peak Scholars’ Internet system or any other system through the Peak Scholars’ Internet system, attempt to log in through another persons account, or use computer accounts, access codes or network identification other than those assigned to the user. Messages and records on the Peak Scholars’ Internet system may not be encrypted without the permission of appropriate Peak Scholars’ authorities.
  12. The Users will not use the Peak Scholars’ Internet system to violate copyright laws or usage licensing agreements, or otherwise to use another persons property without the persons prior approval or proper citation, including the downloading or exchanging of pirated software or copying software to or from any computer, and will not plagiarize works they find on the Internet.
  13. The Users will not use the Peak Scholars’ Internet system for conducting business, for unauthorized commercial purposes or for financial gain unrelated to the mission of Peak Scholars. The Users will not use the Peak Scholars’ Internet system to offer or provide goods or services or for product advertisement. The Users will not use Peak Scholars’ Internet system to purchase goods or services for personal use.
  14. If the User inadvertently accesses unacceptable materials or an unacceptable Internet site, the user shall immediately disclose the inadvertent access to Peak Scholars. This disclosure may serve as a defense against an allegation that the user has intentionally violated this policy.

 

VIII. LIMITED EXPECTATION OF PRIVACY

A. By authorizing use of the Peak Scholars’ Internet system, Peak Scholars does not relinquish control over materials on the system or contained in files on the system. Users should expect only limited privacy in the contents of personal files on the Peak Scholars’ Internet system.
B. Routine maintenance and monitoring of the Peak Scholars’ Internet system may lead to a discovery that a user has violated this policy, another Peak Scholars policy, or the law.
C. An individual investigation or search will be conducted if Peak Scholars has a reasonable suspicion that the search will uncover a violation of law or Peak Scholars’ policy.
D. Peak Scholars will cooperate fully with local, state and federal authorities in any investigation concerning or related to any illegal activities or activities not in compliance with Peak Scholars’ policies conducted through the Peak Scholars’ Internet system.

IX. INTERNET USE AGREEMENT

  1. The proper use of the Internet, and the educational value to be gained from proper Internet use, is the joint responsibility of Students, Parents, Clients and Employees of Peak Scholars.
  2. The Internet Use Agreement form for users must be read and agreed to by the user and the parent or guardian if necessary.

X. LIMITATION ON PEAK SCHOLARS’ LIABILITY

Use of the Peak Scholars’ Internet system is at the User’s own risk. The system is provided on an “as is, as available” basis. Peak Scholars’ will not be responsible for any damage the Users may suffer, including, but not limited to, loss, damage or unavailability of data stored on Peak Scholars diskettes, tapes, hard drives or servers, or for delays or changes in or interruptions of service or mis-deliveries or non-deliveries of information or materials, regardless of the cause. Peak Scholars is not responsible for the accuracy or quality of any advice or information obtained through or stored on the Peak Scholars’ Internet system. Peak Scholars will not be responsible for financial obligations arising through unauthorized use of the Peak Scholars’ Internet system or the Internet.

XI. USER NOTIFICATION

  1. All Users shall be notified of the Peak Scholars’ policies relating to Internet use.
  2. This notification shall include the following:
  3. Notification that Internet use is subject to compliance with Peak Scholars’ policies.
  4. Disclaimers limiting the Peak Scholars’ liability relative to:
  5. Information stored on Peak Scholars’ diskettes, hard drives or servers.
  6. Information retrieved through Peak Scholars’ computers, networks or online resources.
  7. Personal property used to access Peak Scholars’ computers, networks or online resources.
  8. Unauthorized financial obligations resulting from use of Peak Scholars’ resources/accounts to access the Internet.
  9. Notification that, even though Peak Scholars may use technical means to limit student Internet access, these limits do not provide a foolproof means for enforcing the provisions of this acceptable use policy.
  10. Notification that goods and services can be purchased over the Internet that could potentially result in unwanted financial obligations and that any financial obligation incurred by a User through the Internet is the sole responsibility of the User and/or the User’s parents.
  11. Notification that the collection, creation, reception, maintenance and dissemination of data via the Internet, including electronic communications, is governed by Policy 405, Public and Private Personnel Data, and Policy 514, Protection and Privacy of Pupil Records.
  12. Notification that, should the User violate the Peak Scholars acceptable use policy, the users access privileges may be revoked, consequential actions may be taken and/or appropriate legal action may be taken.
  13. Notification that all provisions of the acceptable use policy are subordinate to local, state and federal laws.

 

XII. IMPLEMENTATION; POLICY REVIEW

  1. Peak Scholars’ Internet policies and procedures are available for review by all Students, Parents, Guardians, Clients, Staff and members of the community.
  2. Because of the rapid changes in the development of the Internet, Peak Scholars shall conduct an annual review of this policy.