Technology Acceptable Use Policy
Students are encouraged to use technology in a variety of ways to support their individual learning styles and to express their creative talents.
The use of technology at Stevenson School is a privilege not to be abused. The school’s technology policy applies to all authorized users who access the school’s network or equipment using school-owned or personal equipment, including wireless devices.
- The technology resources at Stevenson (e.g., all networking, hardware and software, the internet, email, telephone equipment, KSPB radio station, and voice mail) are provided to support the educational and administrative activities of the school and should be used for those purposes. Use is a privilege, not a right.
- Use should always be legal, ethical and consistent with the school's Mission Statement, its Standards of Conduct Policy, and its general standards for community behavior.
- Incidental personal use of the school's technology resources must not interfere with the community member's performance or with the community's ability to use the resources for professional and academic purposes and must not violate other school policies or Standards of Conduct.
- Except as authorized by the school, use of the school’s technology resources or data for personal business, for political campaigning or for commercial purposes is prohibited.
- An authorized user is any person who has been granted authority by the school’s technology center to access its computing, network and telephone systems and whose usage complies with this policy. Unauthorized use is strictly prohibited. By accessing the school’s network using school-owned or personally-owned equipment, you have consented to the school’s exercise of its authority and rights as set out in this policy with respect to any such equipment, as well as with respect to any information or communication stored or transmitted over such equipment.
- Faculty, staff and students are provided with email accounts, network accounts and internet access. Faculty and staff are also provided voicemail accounts as appropriate for their position.
- Whenever a user ceases being a member of the school community or if such user is assigned a new position and/or responsibilities, use of technology resources for which he or she is not authorized in his or her new position or circumstances shall cease.
- The school’s network resources, including all telephone and data lines, are the property of the school. The school reserves the right to access, view or monitor any information or communication stored on or transmitted over the network, or on or over equipment that has been used to access the school’s network, and it may be required by law to allow third parties to do so. Electronic data may become evidence in legal proceedings. In addition, others may inadvertently view messages or data as a result of routine system maintenance and monitoring or misdelivery.
- Users must recognize that there is no guarantee of privacy associated with their use of school technology resources. Users should not expect that email, voicemail or other information created or maintained in the system (even when marked “personal” or “confidential”) are private, confidential or secure.
- No user may act in ways that invade the privacy of others, are unethical or fail to comply with all legal restrictions regarding the use of electronic data. All users must also recognize and not violate the intellectual property rights of others.
- All users must maintain the confidentiality of student information in compliance with federal and state law.
- Disclosing and/or gossiping about confidential or proprietary information related to Stevenson, making public remarks that defame or disparage the school, its personnel, its students or its interests (via means including but not limited to email, voicemail, internet instant messaging, chat rooms, webpages or websites), or that recklessly disregards or distorts the truth of the matters commented on, is prohibited.
- All users must refrain from acts that waste school technology resources or prevent others from using them. Users will not access, modify or delete others’ files or system settings without express permission. Tampering of any kind is strictly forbidden. Deliberate attempts to tamper with or degrade the performance of a school computer system, telephone system or network, or to deprive authorized users of access to or use of such resources, are prohibited.
- Students may not send broadcast email or broadcast voicemail without prior permission from the dean of students or director of technology.
- Users are responsible for both the content and possible effects of their messages on the network. Prohibited activity includes, but is not limited to, creating or propagating viruses, material in any form (text, sound, pictures or video) that reflects adversely on the school, “chain letters” (which proffer incentives to relay them to others), inappropriate messages (including discriminatory or harassing material), and billable services.
- Altering electronic communications to hide your identity or impersonate another person is considered forgery and is prohibited.
- Users will abide by all copyright, trademark, patent and other laws governing intellectual property. No software may be installed, except as permitted by applicable law or school administration, copied or used on school equipment except as permitted by law. All software license provisions must be strictly adhered to.
- The school prohibits faculty, staff and students from keeping pornography in any form at school, including, but not limited to, magazines, posters, videos, electronic files or other electronic materials.
- Accessing the school’s network or equipment to create, access, download, edit, view, store, send or print materials that are illegal, offensive, harassing, intimidating, discriminatory, sexually explicit or graphic, pornographic, obscene or otherwise inconsistent with the values and general standards for community behavior of the school is prohibited. The school will respond to complaint of harassing or discriminatory use of its technology resources in accordance with its Anti-Harassment and Anti-Discrimination Policy. These provisions are not intended to prohibit an authorized user from carrying out his or her assigned educational, employment or administrative function.
- Each user is responsible for the security and integrity of information stored on his or her computer or voice mail system. Computer accounts, passwords, security codes and other types of authorization are assigned to individual users and must not be shared with or used by others. Stevenson School, at its sole discretion, reserves the right to bypass such passwords and to access, view or monitor its systems and all of their contents. By accessing the school’s system, you have consented to the school’s right to monitor its system and all of their contents.
- Removing or relocating school-owned technology resources requires prior authorization from the director of technology.
- Students and faculty who live in dormitories are provided the opportunity to connect to the school network. Student use of modems in the dormitories is prohibited. For faculty members, modem use is prohibited on computers that are directly connected to the school network.
- Users may not attempt to circumvent or subvert the security provisions of any other system.
- For security and network stability reasons, personally-owned devices such as hubs, switches, routers, wireless access points and servers or server services cannot be installed on the school’s network or anywhere on campus, unless authorized by the director of technology.
The Internet at Stevenson
- There are risks involved with using the internet. To protect personal safety, internet users should not give out personal information to others on bulletin boards, chat lines or other systems. The school cannot guarantee that users will not encounter text, pictures or references that are objectionable. Responsible attitudes and appropriate behavior are essential in using this resource. As with email, information that a user places on the internet is akin to sending a postcard rather than a sealed letter. Its contents may be accessed by system administrators on this campus and elsewhere.
- Users must be aware that some material circulating on the internet is copyrighted and subject to all copyright laws. Materials taken from the internet must be properly footnoted.
- Users must be aware that some material circulating on the internet is illegally distributed. Users must never use the school's system to download illegally distributed material.
- Users are required to have updated virus protection software on their computers when connecting to the school network. In order to avoid damaging their computers and bringing destructive viruses into the school’s system, users are cautioned not to open email attachments or download any files from unknown sources. Any computer found to be infected with viruses or malware to the extent that it may negatively affect other computers or general network performance will lose network services. Services will be restored once a member of the Technology department has verified that all viruses and malware have been removed and proper, updated antivirus software is installed.
- Students, faculty and staff may create web pages on the Stevenson network. To ensure the integrity of the site, users must abide by the Stevenson Acceptable Use Policy. It is the user's responsibility to update and maintain all links and content, keeping in mind the school’s policies on inappropriate material and copyright requirements.
Policy Enforcement and Sanctions
- All members of the community are expected to assist in the enforcement of this policy. Persons in violation of this policy are subject to a full range of sanctions, including, but, not limited to, the loss of computer, telephone or network access privileges, disciplinary action, and dismissal or termination from the school. Some violations may constitute criminal offenses as defined by local, state and federal laws, and the school may initiate or assist in the prosecution of any such violations to the full extent of the law.
- Any suspected violation of this policy should be reported immediately to the director of technology, as well as to the dean of students (if the suspected violator is a student), the head of school (if the suspected violator is a faculty member) or the director of human resources (if the suspected violator is a staff member).