Acceptable Use Policy

1. Overview
1.1 The Power of Technology
2. Purpose
3. Scope and Policy Change
3.1 Scope
3.2 Consistency with other school policies
3.3 Implementation, Policy Review
4. Policy
4.1  General Use and Ownership
4.1.1 Security and Proprietary Information
4.2 Student Device
4.2.1 Excessive or Repeated Damage
4.3 Bags/Backpacks and the Computer Case
4.4 Camera/Video/Audio Recording Guidelines
4.5 Cellular phones
4.6 Other devices and Electronic Media
4.7 Lost, Stolen, or Damaged Computers and Equipment
4.7.1 Reporting Procedure
4.8 Email and Communication Activities
4.8.1 Social Media and Blogging
4.9 Unacceptable Use
5. Policy Compliance
5.1 Compliance Measurement
5.2 Exceptions
5.3 Non-Compliance
5.4 Consequences
6. Student Technology Resources
6.1 Printing and photocopying
6.2 Tech Support
7. Privacy, Liability, and Parent Responsibility
7.1 Limited Expectation of Privacy
7.2 Limitation on School Liability
7.3 Parent Responsibility
8. Related Standards, Policies and Processes
9. Definitions and Terms
10. Revision History 
11. Acceptance and Acknowledgemen

1. Overview

Academy of Holy Angels (AHA) Technology Department’s intentions for publishing a Technology Acceptable Use Policy (AUP) are not to impose restrictions that are contrary to AHA’s established culture of openness, trust and integrity or its stated educational mission, goals, or objectives. AHA Technology Department is committed to protecting AHA's students and the school from illegal or damaging actions by individuals, either knowingly or unknowingly. Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing and applications, and FTP, are the property of AHA. These systems are to be used for educational or business purposes in serving the interests of the students, school, and of our families, clients and customers in the course of normal operations. Please review Human Resources policies for further details. Effective security is a team effort involving the participation and support of every AHA student, employee and affiliate who deal with information and/or information systems. The use of AHA computer system and access to the Internet is a privilege, not a right. It is the responsibility of every computer user to know these guidelines, and to conduct their activities accordingly.

1.1 The Power of Technology 

Users are reminded that technology can be a powerful tool. While it can open a window to the world and act as a catalyst for human creativity, communication and 21st century skills, it can also be a distraction if not used mindfully.  Parents and students should discuss guidelines for computer and internet use at home and students should strive to use the technology at their disposal responsibly.  The Academy of Holy Angels mission includes educating students to excel intellectually and lead responsibly.  Users are encouraged to exercise self-control, practice effective time management, discern the advantages and disadvantages of multi-tasking, use caution when social networking and intentionally monitor their own temptation to use technology as a distraction.  

2. Purpose

The purpose of this policy is to detail the acceptable use of computer equipment and Technology at AHA. These rules are in place to protect the students, employees, AHA and its property. Not following this policy can, at a minimum, cause students to not be properly equipped for class or worse, possibly expose AHA to risks including virus attacks, compromise of network systems and services, and legal issues.

3. Scope and Policy change

3.1 Scope

This policy applies to the use of information, electronic and computing devices, audio-visual, portable devices and network and server  resources to conduct AHA business or interact with internal networks and business systems, whether owned or leased by AHA, the employee, or a third party. All users at AHA and its subsidiaries are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network and server resources in accordance with AHA policies, standards, and local laws and regulation. Exceptions to this policy are documented in section 5.2

This policy applies to all technology users at AHA. This policy applies to all equipment, software, or digital services or resources that are owned, leased, or provided by AHA.

3.2 Consistency with Other School Policies

Use of Academy of Holy Angel’s Technology, including computers, systems, networking, and the Internet shall be consistent with other school policies and the mission of the school, including the policies on academic honesty, respect, harassment and theft. This Technology Acceptable Use Policy also applies to internet postings done outside of AHA computer and network. We teach our students that the Internet is a public forum. As set forth in AHA's Code of Conduct, student conduct on and off campus needs to be in line with the Holy Angels code of conduct and the rules of the Minnesota State High School League. These rules apply not only to the school day, the school hours, and the school campus, they apply daily, on or off campus. Holy Angels retains the right to discipline its students according to our policies and guidelines based upon a student's own internet postings or any internet posting that demonstrates a violation of this Policy, the AHA Code of Conduct or any AHA policy or State High School League policy. We urge users to use caution and compassion in determining the messages and pictures that they post to the Internet about themselves and others.

3.3 Implementation, Policy Review

A. AHA’s Technology policies and procedures are available for review by all parents, guardians, staff and members of the AHA community.

B. Because of the rapid rate of change in technology, the administration shall conduct an annual review of the policy and recommend changes as necessary.

4. Policy

4.1 General Use and Ownership

  • AHA proprietary information stored on electronic and computing devices whether owned or leased by AHA, the student, the employee, or a third party, remains the sole property of AHA. Users must ensure through legal or technical means that proprietary information is protected in accordance with the Data Protection Standard.
  • Users have a responsibility to promptly report the theft, loss or unauthorized disclosure of AHA proprietary information.
  • Users may access, use or share AHA proprietary information only to the extent it is authorized and necessary to fulfill academic requirements.
  • Users are responsible for exercising good judgment regarding the reasonableness of personal use and if there is any uncertainty, users should consult AHA faculty or AHA Technology Department.
  • The primary purpose of providing users of AHA with access to the school’s computer system, including Internet access, is for education and business. The system may be used for classroom and professional activities. Users of the AHA computer system including the Internet are expected to further educational and professional goals consistent with the mission of the school and school policies. Uses, which might be acceptable on a user’s personal accounts on another system, may not be acceptable on this limited-purpose network.
  • Personal, non-educational and recreational use of the school system by students will be allowed only before and after school, and only to the extent that it does not interfere with the limited educational purpose of the school system as determined by AHA.
  • For security and network maintenance purposes, authorized individuals within AHA may monitor equipment, systems and network traffic at any time, per AHA Technology requirements.
  • AHA reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
  • Compliance with teacher directions and instructions is an expectation in every classroom, in the hallways, gathering areas, library, and computer areas.
  • Users are responsible for regularly backing up their files.
    • AHA provides a limited secondary space for employees to use for storing school related files called “eCommons” but does not guarantee data integrity
    • Users should use their school-issued Google Drive account to store and backup files.
    • Users should utilize personal media (external hard drives, USB flash drives, etc.) or external services such as Google Apps for primary backup
    • Non-school-related files should not be stored on AHA backup systems or infrastructure
  • Social media (such as Facebook and Twitter), SMS or MMS text messaging, instant messaging, visiting non-academic sites, downloading music and videos are not allowed during the school day, from the beginning of period one until the end of period seven (7:50 a.m. to 2:40 p.m.) Social networking sites that are blocked by the school’s content filter are not to be accessed by students from the AHA campus.
  • Students must log on to the student monitoring system when asked by AHA staff.
  • AHA provides access to Google Apps and the Chrome Webstore.  In agreeing to this policy, parents provide consent and allow their student access to AHA-approved apps and resources. 
  • Students are given one specific personal account to access their computer and AHA Technology resources and one email account. Some other accounts for specific, non-AHA websites are also made available to students as required.

4.1.1 Security and Proprietary Information

  • System level and user level passwords must comply with the AHA Password Policy. Providing access to another individual, either deliberately or through failure to secure its access, is prohibited.
  • All computing devices must be secured with a password-protected screensaver with the automatic activation feature set to 10 minutes or less. You must lock the screen or log off when the device is unattended.
  • Postings from an AHA email address or AHA social media account should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of AHA, unless posting is in the course of business or school functions.
  • Users must use extreme caution when opening e-mail attachments received from unknown senders, which may contain malware.

4.2 Student Device

  • Users do not own the equipment they are issued or have any right to use it except as permitted in this policy, the Technology AUP
  • Students should understand that their teacher is the manager of their computer use in the classroom.
  • Students will only use their computers when their teacher instructs them to do so.
  • Each student will have their computer battery fully charged for each day of school in order to properly participate in the curriculum.
  • Students should not have screens on or open without their teacher’s permission and will be used in the classroom at the teacher’s discretion.
  • When computers are in use during the school day, students are expected to be working on class work and assignments.
  • Stickers, decorations, and similar items are not allowed on computers. 
  • Students will lock their computers or other devices in their athletic lockers during practice or home games. Bringing a computer to an away game or event is not recommended. Specific procedures for away games will be directed by the Activities Department and the coach.
  • Users will take care of AHA computer equipment.
    • Food and drink are not allowed in the library or computer labs.
    • Users will keep assigned computers away from food and liquids, or any other potential hazards (high, uneven or dangerous surfaces, weather, etc.) at all times.
    • Always carry or move computers with the screen fully closed and/or in its case, bag, or backpack.
    • Never carry a computer by its screen or fully flattened (open) as screen damage can occur.
  • AHA hardware asset tags and original manufacturer model and serial number tags will remain on all equipment and not be removed.
    • Users will report to the Helpdesk if tags become loose /damaged.
    • Computers are permitted in the Commons during study halls but not during lunch.

 4.2.1 Excessive or repeated Major damage

The school-issued device needs to be kept in good working order and condition. While normal wear and tear is expected, any excessive or repeated major damage will be charged to the family. Negligence is not excused. Damage should be reported to the helpdesk immediately. Major damage includes but is not limited to: drops which result in a shattered screen, broken body, or  other cracked components, spills which can damage motherboard, keyboard or screen.  Families do not pay for the first incident, but will be notified via email when any major damage occurs. On the second incident, families will be notified and charged a $25 fee to their tuition account.  This resets each school year.  Fees may increase for repetitive or excessive damage.

4.3 Bags/Backpacks and the Computer Case

  • School-issued computer equipment needs to be kept in good working order and condition. While normal wear and tear is expected, excessive damage will be charged to the family.  Each student is issued a school-approved case (a hard plastic cover) that is designed to help protect a computer. Devices must always be in their cases.  
  • While the case provides protection, the computer should not be tossed or dropped and students are discouraged from carrying textbooks in a bag or backpack with the computer.  Damage can be sustained from the weight of textbooks or other objects. Students do not need to carry all of their books with them during the school day. 
  • Two longer passing times during the day, after homeroom and period five, allow students to visit their lockers and gather the necessary books and materials needed for class.
  • Stickers, decorations and similar items are NOT allowed on AHA equipment.
  • If a student’s case (the hard plastic cover) is damaged, he/she should bring it to the Helpdesk and obtain a replacement.  The replacement cost is $15, which will be paid in the school store. 
  • Student backpacks or bags should be those designed to carry and protect a computer, with adequate padding.
  • Purses or small cases to hold personal items may be carried during the day but cannot exceed 8”x11”x 3” in size.

4.4 Camera/Video/Audio Recording Guidelines

  • Cameras should not be on or used during the school day.
  • Using cameras, video filming, audio recording and audio transcribing in the classroom is allowed only with teacher’s explicit permission for each request or occasion.
  • Cameras/video cameras are not allowed in locker rooms and any room where privacy is an expectation.  Cameras on computers, phones or other devices are not allowed to be turned on in locker rooms.
  • Students are not allowed to secretly make audio recordings, use audio transcription such as voice typing, take pictures or video of students or staff on campus or at school-sponsored events.

4.5 Cellular phones

  • Cellular phone use by students is not allowed during the school day (7:50 a.m. – 2:40 p.m.).
  • While phones may be in the possession of a student, they need to be turned off.
  • Students found using their cell phone or taking it out during the school day will have it confiscated by staff and turned over to the Assistant Principal.
    • Confiscated cell phones cannot be disabled – batteries and SIM cards must remain in the phone.
    • Students can retrieve the cell phone from the Assistant Principal after school. 
    • Repeated confiscations will require a parent/guardian to retrieve the cell phone after school. If family circumstances require that students be available by cell phone during the school day, families can make arrangements by contacting the Assistant Principal or the Dean of Students.  
  • School administrators will confiscate and search text-messages, call logs, e- mail messages, and voice-mail messages if they have reason to believe a student has used a cell phone for a prohibited purpose or that such a search would produce evidence of misconduct.
  • Electronic Devices used during exams will be confiscated and the use will automatically be regarded as cheating. (This may exclude the use of translators for international students.)
  • When a teacher in a class gives explicit permission to use a cell phone camera to take photos or videos, or to use an app for class purposes, students must use the cell phone for that purpose only and then turn off the phone and put it away.
  • Photos, videos and audio recordings made for class assignments during the school day should not be distributed in a public space online or on social media without the express permission of the teacher of that class.

4.6   Other devices and Electronic Media 

  • Students are not allowed to use smart watches, wearables, electronic games, beepers, tablet computers, cellular phones, laser pointers, or any other disrupting electronic devices or media during the school day including the lunch period, or the device will be taken from them.
  • Personal music players are permitted in the Commons during study halls and at lunch if the music is of appropriate volume and content. Personal music players and music via computers are also acceptable in the LaRock Media Center.  Personal music players are not allowed if the student is part of a class using the Media Center.
  • Cell phones are not permitted to be used as a personal music player.
  • If a staff member believes music playing to be of an inappropriate volume or content, then the music player will be taken.
  • Any electronic media that is taken may be claimed from the Assistant Principal. If this happens twice, the equipment will not be returned.  

4.7 Lost, Stolen, or Damaged Computers and Equipment

4.7.1 Reporting Procedure  

  • It is the expectation that a student has a working computer in his or her possession every day.
  • All students must turn their computers into the Technology Office on collection days for maintenance designated by the Technology Department.  
  • The computer vendor will determine if any damage is covered under the warranty. 
  • If the computer charger is lost, the replacement cost is $50.
  • If a computer is lost or stolen, the following four steps must be completed before the student will be supplied with a replacement computer.
    1. Notify the Technology Office immediately
    2. A police report must be filed
    3. The following information will be requested by the Technology office before a replacement computer is issued:
      • First and last name of student
      • Date of loss or theft
      • Computer make, model and serial number
      • Police station where the report was filed
      • Name and phone number of the police officer who completed the report
      • Police report case number
    4. A replacement fee must be paid to the Technology Office. Once the replacement fee is paid, the student will be issued a replacement computer like for like in functionality, appearance, warranty, and software.

4.8 Email and Communication Activities

All AHA students and staff are issued a unique school e-mail account.  The purpose of the account is to better connect students and their teachers and to give users the necessary tools to conduct school business.  The expectation is that users will use this account for academic and business purposes. Email may also be used for communication for educational purposes.  Messages from the Main Office, the College and Career Center, and the Technology Office will be distributed through the email system during the school day. AHA will exercise its right to archive, inspect, and monitor email as it deems fit. When using school resources, such as email, to access the Internet, users must realize they represent AHA. Users should treat any electronic communications as formal communications, since they may be permanently stored at the server side, even if deleted from the user’s account/inbox or computer, and because these communications are not protected from discovery in litigation.

The following are prohibited:

  • Sending unsolicited email messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material (email spam).
    • Distributing any unwanted material or sending messages to unwilling recipients.
  • Any form of harassment via email, telephone, SMS, Instant Messaging, or paging, whether through language, frequency, or size of messages.
  • Unauthorized use, or forging, of email header information.
  • Solicitation of email for any other email address, other than that of the poster's account, with the intent to harass or to collect replies.
  • Creating or forwarding "chain letters", "Ponzi" or other "pyramid" schemes of any type.
  • Use of unsolicited email originating from within AHA's networks of other Internet/Intranet/Extranet service providers on behalf of, or to advertise, any service hosted by AHA or connected via AHA's network.
  • Posting the same or similar non-school-related messages to large numbers of internet forums, newsgroups, or social media sites.
  • Posting, emailing, texting, or transmitting content that violates any current school policies regarding student behavior or Internet use.
  • Bullying or harassing using the e-mail system, AHA Technology, or the Internet
  • Sending obscene, inflammatory, or degrading images or language
  • Sharing another user’s email address without permission
  • Distributing private communications without permission of all parties.
  • Email content containing inappropriate language or subject matter
  • Communication to faculty, staff, and coaches that is not in a in formal, respectful and constructive tone

4.8.1 Social Media and Blogging

  • Social Media (such as Facebook and Twitter) or Blogging by students on campus is not allowed and access is blocked.
  • AHA’s Acceptable Use Policy also applies to social media and blogging. As such, users are prohibited from revealing any AHA confidential or proprietary information, trade secrets or any other material covered by this policy when engaged in social media and blogging away from campus.
  • Users may also not attribute personal statements, opinions or beliefs to AHA when engaged in social media and blogging.
  • Apart from following all laws pertaining to the handling and disclosure of copyrighted or export controlled materials, AHA’s trademarks, logos and any other AHA intellectual property may also not be used in connection with any social media or blogging activity.

4.9 Unacceptable Use

The following activities are prohibited.

Under no circumstances is an AHA technology user authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing AHA-owned resources.

The list below is by no means exhaustive, but attempts to provide a framework for activities that fall into the category of unacceptable use.

  • Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of "pirated" or other software products that are not appropriately licensed for use by AHA.
  • Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which AHA or the end user does not have an active license is strictly prohibited.
  • Accessing data, a server or an account for any purpose other than conducting AHA school business, even if you have authorized access, is prohibited.
  • Exporting software, technical information, encryption software or technology, in violation of international or regional export control laws, is illegal. The appropriate management should be consulted prior to export of any material that is in question.
  • Introduction of malicious programs into the network or server (e.g., viruses, worms, Trojan horses, e-mail bombs, etc.).
  • Revealing your account password to others or allowing use of your account by others.
  • Using network, computer, email, or other AHA Technology accounts to which the user is not specifically given access.
  • Using an AHA computing asset to actively engage in procuring or transmitting material that is in violation of sexual harassment or hostile workplace laws in the user's local jurisdiction.
  • Making fraudulent offers of products, items, or services originating from any AHA account.
  • Making statements about warranty, expressly or implied, unless it is a part of normal job duties.
  • Effecting security breaches or disruptions of network communication. Security breaches include, but are not limited to, accessing data of which the user is not an intended recipient or logging into a server or account that the user is not expressly authorized to access, unless, for an employee, these duties are within the scope of regular duties. For purposes of this section, "disruption" includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes. Port scanning or security scanning is expressly prohibited.
  • Executing any form of network monitoring which will intercept data not intended for the user's host, unless this activity is a part of an employee's normal job/duty.
  • Circumventing user authentication or security of any host, network or account.
  • Introducing honeypots, honeynets, or similar technology on the AHA network.
  • Interfering with or denying service to any user other than the user's host (for example, denial of service attack).
  • Using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, a user's terminal session, via any means, locally or via the Internet/Intranet/Extranet.
  • Providing information about, or lists of, AHA students or employees to parties outside AHA unless given specific instruction and permission to.
  • Commercial use of AHA Technology/computer system.
  • Using AHA’s systems to post, transmit or distribute false or defamatory information about a person or organization; to harass another person; or to engage in personal attacks, any form of cyberbullying, including prejudicial or discriminatory attacks.
  • Using  AHA’s system to vandalize, damage or disable the property of another person or organization; tamper with, modify or change the school system software, hardware or wiring; take any action to violate the school system’s security;
  • Using AHA’s Technology to gain unauthorized access to information resources, or to access another person’s materials, information or files without the implied or direct permission of that person.
  • Modifying AHA’s baseline hardware or software configuration without expressed consent from the technology department staff.
  • Being neglectful of AHA Technology equipment and hardware (including computers, multimedia, and school infrastructure). Users may be liable for any damage. 
  • Use of tunneling, VPN, or proxy software, services, or sites to bypass AHA Technology security, content filtering, or policies
  • Use of personal computing devices, including tablets and smartphones, to access the AHA local network or its resources, except for guest network. See 4.5 Cellular phone policy for additional student guidelines.
  • Using  AHA  technology system to access, review, upload, download, store, print, post, transmit, receive or distribute:
    • pornographic, obscene or sexually-explicit material
    • obscene, abusive, profane, lewd, vulgar, rude, inflammatory, threatening, disrespectful or sexually-explicit language
    • materials that use language or images that are inappropriate in the educational setting or disruptive to the educational process
    • information or materials that could cause damage, danger or disruption to the educational process
    • materials that use language or images that advocate violence or discrimination toward other people (hate literature) or that may constitute harassment or discrimination

5. Policy Compliance

5.1 Compliance Measurement

AHA Technology Department will verify compliance to this policy through various methods, including but not limited to, business tool reports, internal and external audits, and feedback to the policy owner.

5.2 Exceptions

Any exception to the policy must be approved by AHA Technology Department and/or AHA Administration in advance.

5.3 Non-Compliance

Any user found to have violated this policy may be subject to disciplinary action, up to and including suspension, expulsion or termination.  Depending on the nature and degree of the violation and the number of previous violations, unacceptable use of the school Technology systems or the Internet may result in one or more of the following consequences: cancellation of use or access privileges; removal or equipment from the user’s possession; payment for damages and repairs; discipline under other appropriate school policies, including suspension, expulsion or termination.

If a user inadvertently accesses unacceptable materials or an unacceptable Internet site, the user shall immediately exit that site and disclose the action to an appropriate school official. This disclosure may serve as a defense against an allegation that the user has intentionally violated this policy

The school’s supervisory personnel have the right to curtail or terminate usage in any given situation at their discretion.

5.4 Consequences 

  • Students who access blocked sites through tunneling, VPN, or proxy software or services will lose computer privileges. In order to regain access, a parent or guardian and the student must meet with the Assistant Principal to request reinstatement.
  • If a staff member discovers a computer unattended, the computer will be taken to the Assistant Principal or Dean of Students.
  • Students who are observed using computers for non-sanctioned activities will lose computer privileges for that day, and the computer will be given to the Assistant Principal or Dean of Students. A student will need to request the computer's return after school. Students using library or computer lab computers will have access suspended for at least 24 hours.
  • Students who repeatedly violate the Technology AUP will face suspension.  

6. Student Technology Resources

6.1 Printing and photocopying

  • All students are required to use their own account (via print card or login) to print documents from AHA computers, or to photocopy documents.  The student ID serves as the print card.
  • Families will be billed for the initial $10 worth of printing, up to 200 documents depending on whether it is printed in black and white (5 cents a copy) or color (10 cents a copy).  Additional funds may be applied to the account via the school store.
  • Two multifunction copy machines are accessible for student use throughout the school day.  By selecting the secure queue on the computer when printing and swiping their ID card at the machine’s reader, students can print to the specific machine. Students can also use their ID to photocopy documents at these locations.
  • If a student loses his/her Student ID card, he/she must go to the Helpdesk to obtain a new one after paying $15 for the replacement at the school store. The balance on the card will be transferred to the replacement card.
  • Note: Students are required to have their Students IDs with them on a daily basis.   

6.2 Tech Support

  • If a user has a problem with a school-issued computer, he or she should take the device to the Helpdesk in Room 3483 or email the helpdesk. The Helpdesk assists with all AHA related hardware and software needs.
  • If users are notified electronically by the helpdesk, they should follow the verbal and/or electronically communicated instructions given or visit the helpdesk for clarification or assistance.
  • If needed, a limited amount of loaner computers are available and may be issued to a user if their regular computer is in repair. If users do not return the loaner in a timely manner, they may be locked out of AHA systems until they return it to the Helpdesk.
  • When students need an additional loaner computer for one period or up to one school day, one of the student's current teachers must supply the helpdesk with a request specifying the student need before one will be issued, if available.
  • For home networking and internet related issues, families should contact their home internet service provider.
  • Students with inoperable computers will be sent to the Helpdesk for assistance.

7. Privacy, Liability, and Parent Responsibility

7.1 Limited Expectation of Privacy

  • The school’s computer system, school-owned cellular telephones, personal electronic devices (e.g. tablet computers, notebooks, smartphones, etc.), and other computers are AHA’s property. By authorizing use of the school system or above-mentioned devices, AHA does not relinquish control of materials on the system or contained in files on the system. Users should expect no privacy in the contents of personal files or emails created, stored, sent, or received using the school system, or a school-owned cell phones, or electronic device.
  • The school reserves the right to monitor any user’s email, Internet usage, and computer files for business and/or educational purposes. Such purposes may include, but are not limited to, general management of the system; monitoring performance or productivity; or security (preventing a suspected adverse impact on the school, its students, or its employees; and/or investigating possible violations of this or other school policies). A user of the school’s system is considered to have given consent to such monitoring. Maintenance and monitoring of the school system may lead to a discovery that a user has violated this policy, another school policy, or the law.
  • Parents have the right at any time to investigate or review the contents of their child’s files.
  • The school will cooperate fully with local, state and federal authorities in any investigation concerning or related to any illegal activities not in compliance with school policies conducted through the school’s computer system.

7.2 Limitation on School Liability

Use of AHA’s computer system and network are at the user’s own risk. The system is provided on an “as is, as available” basis. The school will not be responsible for any damage users may suffer including, but not limited to, loss, damage or unavailability of data stored on school tapes, hard drives, or servers (third party or AHA owned), or for delays, changes, or quality of service of information or materials, regardless of the cause. The school is not responsible for the accuracy or quality of any advice or information obtained through or stored in school Technology systems. The school will not be responsible for financial obligations arising through unauthorized use of the school Technology systems or the Internet.

7.3 Parent Responsibility

Outside of school, parents bear responsibility for proper guidance of Technology and Internet use as they exercise with information sources such as television, telephones, radio, movies and other possibly offensive media. If the student is accessing the school system from home or another remote location, parents are responsible for monitoring their student’s use of the AHA computers, computer system and of the Internet.

8. Related Standards, Policies and Processes

  • AHA Mission, Vision and Values
  • AHA Technology Fee Agreement
  • Technology Handbook
    • AHA Cyberbullying Policy
    • AHA Internet Safety Policy
    • AHA Mobile Device Policy
    • AHA Password Policy
  • Employee Use of Social Media Policy 

9. Definitions and Terms

Definition and specific computer security terms can be found in the SANS Glossary located at: https://www.sans.org/security-resources/glossary-of-terms/

10. Revision History

1/22/15 lj, 7/16/15 ga, 1/28/16 ga/lj, 2/1/18 ga

11. Acceptance and Acknowledgement

By signing the tuition contract and/or employment agreement, users agree to the terms of this policy.

 

 (updated 6-27-18 cd)