Brown County Christian School (BCC) Student Guidelines and Policies for Acceptable Use of Technology Resources
Statement
BCC provides the following policies and procedures to students and parents as information regarding their responsibilities while using personal and/or all BCC-owned electronic/technical resources including (but not limited to): Computer hardware, software, stored text/data (databases), electronic mail, communication technologies (Internet), and any other electronic/technical resources. In general, this document requires efficient, ethical, and legal utilization of all technology resources. Via this document, BCC seeks to ensure that all technology resources are used to further the Academy’s mission described below:
BCC’s mission is to effectively equip students for life. As a ministry of Victory Life Church, BCC has spent over two decades working with parents to prepare young men and women to make a positive difference in the lives of others and to impact their world for Jesus Christ. Our goal is to develop a partnership with parents that will teach and reinforce biblical values and lessons in the home, church, and school settings, and ultimately providing a consistent and healthy Christ-centered environment for your children. Engaged, supportive parents are vital to the mission of effectively educating students in the knowledge of Christ.
As a Christian school, our heart is to educate in all aspects of a child’s life by cultivating spiritual, mental, physical, and social growth. We want to nurture your child’s development through excellent academic programs, taught from a biblical world view, so that they may be examples unto the world—lighted candles bathing those around them in the illumination of Christ. With that passion as the driving force behind our educational program, our faculty and staff have dedicated their lives to Christ and to the task of helping students realize their God-given potential. To assist students in their quest for knowledge and growth, BCC (as an accredited member of the International Christian Accrediting Association) offers a rigorous, Biblically integrated, college preparatory program. More:
http://www.VL.Academy
Expectations
- Student use of any (personal or BCC-owned) technology tools and other resources (including the Internet) are only allowed when supervised and/or granted permission by a BCC staff member.
- All users are expected to follow existing copyright and/or other technology-related local, state, and federal laws.
- In accordance with BCC’s technology responsible use plan, students are expected to confidentially (i.e., not discuss with other students) notify a staff member whenever they encounter information or messages that are inappropriate, dangerous, threatening, or make them feel uncomfortable in any way.
- Students are expected to follow digital citizenship guidelines, as detailed by the International Society of Technology Education (ISTE):
https://www.iste.org/explore/articleDetail?articleid=101&category=ISTE-Connects- blog&article=Essential-elements-of-digital-citizenship
Unacceptable Conduct
Unacceptable Conduct can include, but is not limited to the following:
- Using the network for illegal, unapproved, non-academic related activities, such as: Copyright, license, and/or contract violations; downloading inappropriate materials, viruses, and/or software; hacking, and/or host file-sharing software.
- Using the network for financial or commercial gain, advertising, or political lobbying.
- Accessing or exploring online locations or materials that do not support the curriculum and/or are inappropriate for school assignments, such as pornographic sites.
- Vandalizing and/or tampering with equipment, programs, files, software, system performance, or other components of the network.
- Causing congestion (slow down) on the network or interfering with the work of others (i.e., sending large file sizes and/or mass emails).
- Intentionally wasting limited resources (i.e., Internet-use time, streaming music).
- Gaining unauthorized access anywhere on the network.
- Revealing the home address or phone number of self or another person.
- Invading the privacy of other individuals.
- Using another user’s account, password, or ID card, and/or allowing another user to access yours.
- Coaching, helping, observing, or joining any unauthorized activity on the network.
- Posting anonymous messages or unlawful information on the system.
- Engaging in harassment or using objectionable language in public or private messages, i.e., racist, terroristic, abusive, sexually explicit, threatening, demeaning, stalking, or slanderous.
- Use false permission, authorization, and/or identification documents.
- Obtaining copies of—or modifying—files, data, or passwords belonging to other users on the network.
- Knowingly placing an electronic virus on a computer or network.
Responsible Use Guidelines
Responsible Use Guidelines for the District’s network computer online services are as follows:
A. General Guidelines:
- Students will have access to all available forms of electronic resources that are in support of BCC’s educational goals and objectives. BCC will filter personal and BCC-owned resources (hardware, software, network, and data).
- Students are ethical and responsible for ensuring that all electronic resources (hardware, software, network, and data) are used in an educational manner.
- Access to BCC’s online computer services is a privilege and not a right. Each employee, student, parent, and/or stakeholder will be required to sign BCC’s Responsible Use Policies/Agreements Sheet and adhere to all guidelines/rules to be granted access to BCC’s computer network/online offerings.
- Parents interested in BCC’s technical online services at school should refer to the BCC technology plan.
- Any parent wishing to restrict their children’s access to any BCC computer online services will provide this restriction request in writing. Parents will assume responsibility for (a) imposing restrictions only for their own children, (b) as well as when their child is not under BCC’s supervision.
B. Network and Email Etiquette:
- Be polite when forwarding email, and only forward messages on a need-to-know basis.
- Use appropriate language.
- Do not reveal personal data (i.e., home address, phone number, phone numbers of other people).
- Remember that you are a representative of BCC, and that the other users of BCC’s online computer services and other networks may have a culture, language, and humor that have different points of reference from your own.
- All students age 13 or older will be provided with a school affiliated email address which is filtered to meet Child Internet Protection Act (CIPA) requirements. For more information: http://www.fcc.gov/guides/childrens-Internet-protection-act
- Email should be used for educational purposes only.
- Email transmissions, stored data, transmitted data, or any other use of BCC’s online computer services by students, employees, or any other user shall not be considered confidential and may be monitored at any time by designated staff to ensure appropriate use.
- All emails (in their entirety) composed/sent using BCC resources are property of BCC.
- Do not share passwords with other students, and make sure to keep them private and secure. If the student has issues with their password, please contact IT.
General Netbook Rules
- Inappropriate Content & Graffiti: Inappropriate content will not be allowed on netbooks. Physical appearance of the netbook may not be modified by any means, including skins, stickers, markers, etc.
- Presence of weapons, pornographic materials, inappropriate language, alcohol, drug, gang-related symbols, or related pictures on the netbook will result in disciplinary actions.
- In the case of intentional damage, students will be charged for replacement parts. See Table of Estimated Repair Pricing on page 9.
- Sound will be always muted unless permission is obtained from the teacher for instructional purposes. Student-provided headphones may be used when approved by the teacher.
- Deleting Files: Student may not delete any folders or files that he/she did not create and/or that he/ she does not recognize. Deletion of certain files will result in a computer failure and will interfere with the student’s ability to complete class work and may affect his/her grades.
- Music, Games, or Programs: Music and games may not be downloaded or streamed over the Internet; this may be a violation of copyright laws.
- All software loaded on the system must be approved by BCC 7. Unauthorized Access to another person’s account or computer without his/her consent or knowledge is considered hacking and is not allowed.
Fair Market Value
Loss, Deliberate, Damage, or Neglect | Actual Repair Costs | Repair Costs to Students |
Broken Screen/Battery | $60.00 | $45.00 |
Keyboard Replacement for broken keys | $100.00 | $60.00 |
Chromebook Replacement | $150.00 | $120.00 |
Chargers | $45.00 | $30.00 |
Netbook Usage Guidelines and Procedures
BCC is committed to providing the necessary tools for effective utilization of netbooks. To accommodate this process, the School is providing the following:
- Check-Out/Check-In Procedures: The netbook check-out/check-in process will mirror established textbook management practices.
- Sophos Enterprise Antivirus Protection: Netbooks will utilize the most effective security solution providing real-time scanning capabilities for complete protection from viruses, spyware, malware, etc., both inside and outside the BCC network.
- Web Filtering and Security: Remote Filtering extends the Websense industry-leading Web filtering and Web security technology to protect netbook users outside of BCC’s network. Remote Filtering protects remote users and frequent travelers from external security threats and prevents access to inappropriate and malicious sites, phishing sites, spyware, and malicious mobile code ensuring secure Internet use anytime and anywhere. BCC has utilized the Websense Enterprise filtering solution for the past 8 years to meet federal CIPA requirements. For more information about Internet safety, please visit www.isafe.org.
- Data Access: Students can save important files to their cloud storage accounts (Google accounts) and/or USB drives. Students can access this data from any computer connected to the BCC network. While working off-site, student data will be cached (temporarily saved) locally and synchronized once network access is established. A backup of USB saved files is not done automatically, so students might want to keep a copy of these files in their Google Drive.
- Account Profiles and Policies: Student account policies are shared from BCC’s Google Administrative Accounts for all student logins, giving sufficient access to complete tasks. While allowing for security updates, students will not have install capabilities for other software. Requests for additional software/apps can be made through their campus help desk. A district- approved default software package will be installed on all netbooks prior to checkout.
- Tracking System: BIOS level software will be installed at the manufacturer, providing the ability to GPS track, locate, and recover lost or stolen netbooks.
- Help Desk Requests: BCC Information Technology (IT) Department will strive to provide timely turnaround on all student/teacher netbook problems. All help desk requests will be submitted to the campus technology office and prioritized accordingly.
- Summer Storage
- Netbooks will be returned during the textbook check-in process at each campus and stored appropriately. All netbooks will be thoroughly inspected and re-imaged during the summer months by the IT Department.
- Limitation of Liability: BCC makes no warranties of any kind, whether express or implied, for the services provided and will not be responsible for any damages which students may suffer through use of the district system or the Internet, including, but not limited to, the loss of information or files or the interruption of service. BCC is not responsible for the accuracy or quality of information obtained through use of the Academy’s system or the Internet. BCC is not responsible for any financial obligations which may be incurred through use of BCC’s system.
- Parental Involvement: In addition to the Student/Parent Netbook Handbook, BCC will provide informational presentations/trainings detailing our one-to-one (mobile computing) initiative, including in person, a file on the netbook hard drive, and via our BCC website. A parental permission form must be signed and on file before netbook receipt and network use.
- No Loaning or Borrowing Netbooks: Do NOT loan netbooks or other equipment to anyone.
- Do NOT borrow a netbook from another student.
- Do NOT share passwords or usernames with others.
Student Technology Responsible Use Policy
BCC’s purpose for providing Internet and other computer network access is to promote the exchange of information and ideas with the global community. All network use must be consistent with the policies and goals of this school district. Inappropriate use of BCC technology will result in the loss of technology use, disciplinary action, and/or referral to legal authorities.
All Internet and other computer network users will adhere to the following network etiquette expectations:
- Follow BCC’s behavior expectations always.
- Check spelling and grammar.
- Students shall not share or receive confidential password information with anyone.
- Students shall not reveal his/her private/personal information with others. No student’s Family Educational Rights Protection Act (FERPA)-related information shall be electronically transmitted, or otherwise disseminated through the network.
- Students shall not disguise the point of origin or transmission of email.
- Students shall not send messages that contain false, malicious, or misleading information that may be injurious to a person or his/her property.
- Illegal activities that are strictly prohibited include: (a) Transferring offensive or harassing messages, (b) offering for sale or use any substance which is prohibited by the school district’s staff and student policies, (c) viewing, transmitting, or downloading pornographic materials or materials that encourage others to violate the law, (d) intruding into the network or computers of others, and (e) downloading or transmitting confidential, trade secret information, or copyrighted materials.
- BCC technology shall be used for playing multi-user or other network intensive-use games, commercial ventures, Internet relay chats lines, and/or downloading/transferring excessively large files without permission of BCC staff.
- No fees for services, products, or information shall be incurred/charged without appropriate permission.
- Student shall not use the network in such a way that would disrupt the use of the network by other users.
- Student shall respect the privacy of others and not read the mail or files of others without their permission. Copyright and licensing laws will not be intentionally violated.
- Vandalism is defined as any malicious attempt to harm or destroy hardware, another user’s data, Internet, or any other agencies or other networks that may be accessed. This includes (but is not limited) to the uploading or creation of computer viruses.
- Report security problems to the supervising teacher and/or system administrator.
- BCC, including the employees and agents, will be held harmless against all causes of action, damages, or other liability resulting from the willful or negligent violation of this policy.
Student Responsible Use Declaration
In accordance with Brown County Christian School’s (BCC) mission and vision highlighted below, I understand that our school is supporting students as they learn the skills required to become successful 21st Century learners and digital citizens.
BCC’s mission is to equip students for life. As a ministry of Victory Life Church, BCC has spent over two decades working with parents to prepare young men and women to make a positive difference in the lives of others and to impact their world for Jesus Christ. Our goal is to develop a partnership with parents that will teach and reinforce biblical values and lessons, in the home, church, and school settings, and ultimately providing a consistent and healthy Christ-centered environment for your children. Engaged, supportive parents are vital to the mission of effectively educating students in the knowledge of Christ.
As a Christian school, our heart is to educate in all aspects of a child’s life by cultivating spiritual, mental, physical, and social growth. We want to nurture your child’s development through excellent academic programs, taught from a biblical worldview, so that they may be examples unto the world—lighted candles bathing those around them in the illumination of Christ. With that passion as the driving force behind our educational program, our faculty and staff have dedicated their lives to Christ and to the task of helping students realize their God-given potential. To assist students in their quest for knowledge and growth, BCC (as an accredited member of the International Christian Accrediting Association) offers a rigorous, Biblically integrated, college preparatory program. More: http://www.victorylifeacademy.org/
I understand that these guidelines for responsible use are to be followed when using any technology at school, any school activity, and/or while using any school-owned/related technology resource (Internet, device, software, etc.). I am aware that this may include the use of a device that BCC does not own.
I understand that if I breach the Responsible Use Agreement contained in this Student Technology Responsible Use Handbook, I may lose access to school technology services, including the use of the Internet on school-owned devices or any personally owned device used at school.
Therefore, I agree that I…
- will be a confident and capable user of technology. I will ask for help when needed.
- will use technology for learning as well as other activities. I understand that technology can help me to learn. I know it can also be used to talk to people, to buy and sell things, and to have my opinion heard. I know when and where it is okay to do each one.
- will think carefully about whether the information I see online is true. I know that it is easy to put information online. This means that what I see is not always right. I will always check to make sure information is real before I use it.
- will be able to speak the language of digital technologies. When people talk online, the things they say can be quite different from a conversation they might have if they were sitting next to each other. I know that I must try to understand what people are saying before I react to them. If I am not sure, I can ask them or someone else to explain.
- understand that I may experience problems when I use technology, but I will learn to deal with them. I understand that there will be times when technology may not work as I expected it to, or that people may be mean or unkind to me online. When these things happen, I know that there are ways I can deal with them. I also know there are people I can go to for help if I don’t know what to do next.
- will always use technology to communicate with others in positive, meaningful ways. I will always talk politely and with respect to people online. I know that it is possible to bully or hurt people with what I say and do on the Internet. I will think about the effect that my actions have on other people.
- will be honest and fair in all my actions using technology. I will never do anything online that I know will hurt anyone. I will make sure what I do is not against the law. I will make sure that my actions don’t break the rules of the websites that I use. When I am not sure about what I am doing, I will ask for help.
- will always respect people’s privacy and freedom of speech online. I understand that some information is private. I will be careful when using the full names, birthdays, addresses, and photos of other people, and of my own. I also know that I will not always agree with what people say online, but that does not mean that I can stop them or use it as an excuse to be unkind to them.
- will help others to become better digital citizens. Being a good digital citizen is something that we all must work at. If I know that my friends are having problems online, I will try to help them. If I see that someone is being unfairly treated online, then I will speak up rather than just watch it happen.
Student Responsible Use Agreement
The Brown County Christian School (BCC) Technology Responsible Use Policy is located on the school website. A printed copy may be obtained upon request.
Student Section:
Student Name ___(Last, First Middle)____________________________________Grade _______________
Student ID Number ______________________
I have received a copy of BCC’s Technology Resources Handbook. I have read and agree to abide by their provisions. I understand that any violation of the use provisions may result in disciplinary action including, but not limited to, (a) suspension and/or revocation of network privileges and (b) suspension from school.
Student’s Signature _______________________Date ________________________________
Sponsoring parent or guardian section (required):
I have read BCC’s Technology Responsible Use Policy Handbook in its entirety. I understand that BCC has taken reasonable precautions to ensure that access to non-educational related material is limited to the best extent possible. I realize, however, that it is not possible to completely prevent access to inappropriate material. I will always monitor my child’s technology use possible and will accept full responsibility of his/her use when he/she is not under BCC’s direct supervision during regular school hours. I hereby release BCC from all liability if my child acquires inappropriate material through BCC’s computing resources or the Internet. I understand that if my child violates BCC’s Technology Responsible Use Policy Handbook guidelines, his/her access to BCC’s technology services may be revoked and my student may be subject to disciplinary action. I hereby give BCC permission to issue Internet- based access account(s) for my child and certify that the information contained on this form is correct.
Parent’s Signature ___________________________Date ______________
Adapted with permission from Howe Public Schools/Integrity Technology Solutions.