Template Shadow

Little Elm ISD

Equip. Engage. Empower.

Little Elm ISD Responsible Use Expectations

Student Expectations for Responsible Use of Technology Resources

 

Student expectations explicitly explain student/parent responsibilities when using district-provided technology.  This includes District-owned computer hardware, operating system software, application software, stored text, data files, electronic mail, local databases, removable media, digitized information, communication technologies, and Internet access. In general, this requires efficient, ethical, and legal utilization of all technology resources.


  1. General Expectations Regarding Student Computer Use

    1. Student use of computers, other technology hardware, software, and computer networks, including the Internet, is only allowed when supervised or granted permission by a teacher or campus/district administrator.

    2. Students/Parents will be held liable for damage not covered by warranties or insurance. Insurance covers accidental damage and theft.  It does not cover intentional damage or loss of the device or any device accessories.

    3. In accordance with the Children’s Internet Protection Act (CIPA), the District has an Internet safety plan in place. Students are expected to notify a staff member whenever they come across information or messages that are inappropriate, dangerous, threatening, or make them feel uncomfortable.

    4. Students who identify or know about a security problem are expected to report the details to their teacher or campus/district administrator without discussing it with other students.

    5. All users are expected to follow existing copyright laws. Copyright guidelines are posted and/or available in the media center of each campus as well as posted on the District’s web site.

    6. Students should expect only limited privacy in the contents of personal files on District systems/devices. Student devices will be routinely maintained and monitored. An individual search will be conducted if there is reasonable suspicion that a student has violated the network expectations, the district’s code of Conduct, or the law. The investigation will be reasonable and related to the suspected violation. Parents have the right at any time to see the contents of your child’s files.


  1. Unacceptable conduct includes but is not limited to the following:

    1. Using the network for illegal activities, such as copyright, license, or contract violations or downloading inappropriate materials, viruses, and/or software, including but not limited to hacking and host file sharing software.

    2. Using the network for financial or commercial gain, advertising, or political activities.

    3. Accessing or exploring online content that does not support the curriculum and/or is inappropriate for school assignments, including but not limited to pornographic sites.

    4. Vandalizing, tampering, or accessing without permission, equipment, programs, files, software, system performance, or other technology. Use or possession of hacking software is strictly prohibited.

    5. Causing congestion on the network or interfering with the work of others, e.g., chain letters, jokes, or pictures to lists or individuals.

    6. Unauthorized or non-curricular use of online video, music or streaming content.

    7. Gaining unauthorized access anywhere on the network.

    8. Invading the privacy of other individuals.

    9. Using another user’s account, password, or ID card or allowing another user to access your account, password, or ID.

    10. Coaching, helping, or joining in any unauthorized activity on the network.

    11. Posting anonymous, unlawful, or inappropriate messages or information on a district-owned system.

    12. Engaging in sexual harassment or using any language of a sexual or otherwise objectionable nature (e. g., racist, terroristic, abusive, threatening, demeaning, stalking, or slanderous) in public or private messages.

    13. Falsifying permission and/or authorization of identification documents.

    14. Obtaining copies of or modifying files, data, or passwords belonging to other users on the network without authorization.

    15. Knowingly placing a computer virus on a computer or network.

    16. Transmission of any material that is in violation of any federal or state law. This includes, but is not limited to confidential information, copyrighted material, threatening or obscene material, and computer viruses.


  1. Responsible Use Expectations

    1. General Expectations

      1. Students are responsible for the ethical and educational use of technology on District-owned devices.

      2. Students will have access to available forms of electronic media and communication that support education and research, and support the educational goals and objectives of the District.

      3. All technology policies and restrictions must be followed.

      4. Access to the District’s computer online services is a privilege and not a right. Each student will be required to view and adhere to the Responsible Use Expectations.

      5. When placing, removing, or restricting access to data or online services, school officials shall apply the same criteria used for other education resources.

      6. Parents concerned with the District’s computer online services at their child’s school should refer to the EFA (LOCAL): Instructional Resources: Instructional Material Selection and Adoption policy and follow the stated procedure.


  1. E-Mail

    1. E-mail may be used for educational or administrative purposes only. Students are provided a Google email account if email is required in the course in which they are enrolled.

    2. E-mail transmissions, stored data, transmitted data, or any other use of district-owned technology by students or any other user is subject to being monitored at any time by designated staff to ensure appropriate use.

    3. All e-mail and all contents are property of the District.


  1. Consequences

The student in whose name a system account and/or computer hardware is issued will be responsible at all times for its appropriate use. Noncompliance with the expectations published here, in the Student Handbook / Student Code of Conduct, and in Board policy CQ may result in suspension or termination of technology privileges and/or disciplinary action. Use or possession of hacking software is strictly prohibited and violators will be subject to consequences in the Student Code of Conduct. Violations of applicable state and federal law, including the Texas Penal Code, Computer Crimes, Chapter 33, may result in criminal prosecution, as well as disciplinary action by the District. The District cooperates fully with local, state, or federal officials in any investigation concerning or relating to violations of computer crime laws. In addition, contents of email and network communications are governed by the Texas Public Information Act, and therefore, may be subject to public disclosure as required by law.


Any attempt to alter data, the physical appearance of the device, the configuration of a computer, or the files of another user without the consent of the individual, campus or district administrator, will be considered an act of vandalism and subject to disciplinary action in accordance with the Student Code of Conduct.


In the event there is a claim that a student has violated the network expectations or the district’s Student Code of Conduct, the violation will be handled in a manner described in that code of conduct. Additional restrictions may be placed on the use of my account. The District will cooperate fully with local, state, or federal officials in any investigation related to any illegal activities conducted through the District’s servers.


  1. Web 2.0 and Social Media Tools

    1. Approved for Classroom Use

      1. Little Elm ISD students, under the supervision and guidance of their teachers, will use Web 2.0 and social media tools commonly used in K- 12 education today as part of instruction in their classrooms.

      2. Students use these tools to meet the communication, collaboration, creation, research, and information fluency skills required by the Texas Essential Knowledge and Skills (TEKS). Tools such as these are hosted on the Internet making some of the students’ work and/or other information relating to students visible to parents/guardians/relatives, and in some circumstances, other Internet users around the world.

    2. Safety

      1. When using Web 2.0 and social media tools, the following safeguards are in place to protect and assure the safety of students. Please be aware that in some instances:

        1. Individual or identifiable profiles (which include personally identifiable information of students such as first and last name, campus, home address, email address, etc.) may be used that are open to the public.

        2. Public viewing and commenting might occur on district-approved sites.

        3. Classroom lessons or projects may require publicly identifiable student information (first and last name, campus, home address, email address, etc.) to be made available on the Internet.

      2. Use of these tools must be in accordance with the Little Elm ISD’s Policies and Procedures including but not limited to these Responsible Use Expectations.


  1. Limitation of Liability

The district makes no guarantee that the functions or the services provided by or through the district’s system will be error-free or without defect. The district will not be responsible for any damage users may suffer including but not limited to, loss of data or interruptions of service. The district is not responsible for the accuracy or quality of the information obtained through or stores on the system. The district will not be responsible for financial obligations arising through the unauthorized use of the system.

Template Shadow
CLOSE