Acceptable Use Policy
Ada Christian School is pleased to be able to provide students with Internet and computer access to enhance, enrich, and facilitate learning and communication. As we “equip students for service in God’s world,” we hope this AUP outlines how technology can be used in positive and honorable ways.
In order to assist students in the use of technology resources, the school will do everything it can to ensure that students access the resources appropriately. This includes providing:
- an Internet connection that is protected by filtering software. Filtering blocks most sites that are objectionable for content, language, or a variety of other things that the school has defined as inappropriate, such as releasing personal information.
- a password protected school Google Apps account for students. While Google Apps is web-based and accessible via the Internet from home or school, students agree to use this account for school purposes only. Google accounts will be deleted when the student leaves ACS.
- training for students that clearly defines appropriate and inappropriate technology use. Students will receive instruction in conducting online research via the Web and other online sources and taught to manage the information found. Expectations will be clearly defined and students will be aware of what constitutes a violation.
Technology access for students is a privilege not a right. With privilege comes responsibility and as a condition of use, students and parents are required to read and abide by the things outlined in the Acceptable Use Policy. Questions about the ACS Technology Policy should be directed to school administration, technology staff, teachers or the Director of Technology. ACS expects students to make honorable choices in the following areas:
- Using the network for any illegal activity, or non-permitted activities such as downloading personal programs or software.
- Using the network for accessing any inappropriate sites.
- Using the network for financial gain or initiating any financial transactions, including obligating ACS to anything, financial or otherwise.
- Degrading or disrupting the equipment, settings, or system performance. Any security problem must be reported to the technology coordinator and not shared with other users. This includes a responsibility to report use or knowledge of unauthorized passwords or other vulnerabilities. This also includes physical care for the computer in not having food, drink, gum, or candy in the immediate vicinity of the computer.
- Accessing or vandalizing the data of another user, or using the login of another user – with or without that user's permission. This includes invading the privacy of individuals by reading mail that belongs to others without their permission.
- Giving access to login and password to another student. You must protect your password or you may be liable for loss of privileges even if your account was violated by another student.
- Wastefully using finite resources. Examples of wasting finite resources are printing, utilizing bandwidth and storage of data for non-educational reasons.
- Attempting unauthorized access to resources, including any action to get around the filter installed on a computer with Internet access.
- Posting personal communications without the author's consent or posting information containing information not meant to be made public.
- Posting rude or inappropriate messages on ACS computers or the Internet. This includes comments that could be considered defamatory against ACS or its staff.
- Disclosing personal information to websites or people through the Internet unless deemed necessary for educational purposes.
- Inappropriate use of resources resulting in plagiarism.
- Violating the spirit of Ada Christian School's Mission Statement.
- In the absence of prior written approval from the administration at ACS, the student and parent also agree not to create or maintain a social networking site or other electronic publication about ACS, about any of the ACS staff, or as though the site represents ACS or its staff.
- The technology user is held responsible for his/her actions when using the Internet, the network, and any action done under his/her login name.
Violations of the expectations may result in the following consequences:
- Discussion about incident with student(s) involved.
- Adjustment to computer privileges.
- Changing filtering options to be more restrictive.
- If any violation results in damage the device, the device deductible is waived and the family is responsible to pay full replacement value for the damaged items.
- Detention, suspension, expulsion, and/or legal prosecution depending on the severity of the infraction(s).