Rules of Engagement
Personal Responsibility – Coppell Independent School District employees are personally responsible for all comments/information they publish online. Be mindful that what you publish is permanent—protect your privacy.
Be Professional – Your online behavior should reflect the same standards of honesty, respect, and consideration that you use face-to-face, and be in accordance with the highest professional Standards.
Check for Disclaimers/Disclosures – Do not use photos or movies taken at school without permission. Do not post photos or movies that contain students without parent consent.
Be transparent – Your honesty—or dishonesty—will be quickly noticed in the social media environment. Do not misrepresent yourself by using someone else's identity or misrepresenting your identity. Be honest about who you are, where you work and what you do.
Communication with Students – It is inappropriate to use e-mail, text messaging, instant messaging or social networking sites to discuss with a student a matter that does not pertain to school-related activities. Appropriate discussions would include the student’s homework, class activity, school sport or club, or other school sponsored activity. Electronic communications with students are to be sent simultaneously to multiple recipients, not to just one student. An exception might be when the communication is clearly school-related and irrelevant for persons other than the individual student to receive.
Adapted From:
Individual User Responsibilities
All users are expected to abide by the generally accepted rules of network etiquette (also known as netiquette). These rules include, but are not restricted to the following:
BE POLITE AND USE APPROPRIATE LANGUAGE: Remember that you are a representative of your school and District on a non-private system. You may be alone using a technology resource or personal/CISD device, but what you say and do on your computer can be viewed globally. You should not submit, publish or display any defamatory, inaccurate, racially offensive, discriminatory, abusive, obscene, profane, sexually oriented, harassing or threatening materials or messages either public or private.
PRIVACY: Do not reveal any personal information about yourself or other persons (including, but not limited to, home address, personal phone numbers, photographs, or last name).
Users should have no expectation of privacy regarding their use of District property and technology resources. In general, communications or transmissions made through technology resources should never be considered private or confidential. The District reserves the right to monitor the use of its network and all technology resources as it deems necessary to ensure the safety and integrity of its network, diagnose problems, investigate reports of illegal or impermissible activity and ensure user compliance with state and federal laws and the District’s policies. In addition, users should be aware that the District will comply with lawful orders of courts, such as subpoenas and search warrants. The District is also subject to the Texas Public Information Act which may require disclosure of information transmitted through its technology resources, including e-mail communications.
ELECTRONIC MAIL:
All users of any electronic mail either provided by the District or transmitted through the District’s technology resources are required to comply with this Responsible Use Policy
System users are asked to purge email or outdated files on a regular basis. Employees and volunteers should ensure that any official school records that are maintained in an electronic medium that are subject to state or federal retention requirements are either retained in hard copy or archived prior to being deleted or purged.
Never assume electronic mail is private. Messages relating to or in support of illegal activities must be reported to the authorities and the District will comply with state and federal laws, as well as court orders or subpoenas that will require disclosure.
Be brief and professional: Few people will bother to read a long message or one that is not narrowly tailored to the underlying purpose of the communication. Electronic communications by District employees, volunteers and staff should be consistent with the District’s professional standards of conduct.
Include your signature (name, position, affiliation, and Internet address) at the bottom of e-mail messages.
Send only to individuals and/or groups you know.
DISRUPTIONS: Do not use the network in any way that would disrupt use of the network by others.
OWNERSHIP: Any data or communication placed on District equipment will become the property of CISD. Intellectual property created solely for the purpose of satisfying a course requirement and/or contributing to their student learning is owned by the creator.
VANDALISM: Any attempt to alter or destroy data of another user will be subject to disciplinary or corrective action in accordance with District policy.
ACCOUNTABILITY: Users are responsible for the proper use of their system accounts, passwords and District-issued technology resources. Users must control unauthorized use of their accounts, passwords and District-issued technology resources. Users should not provide their password to any person, unless authorized or directed by the District. If you permit someone else access to your account, password, or District-issued technology resources, you may be held responsible for any improper, illegal or destructive activity done by that person. Do not give others access to District technology resources unless they are authorized and authenticated to do so. Users may not extend access to District technology resources to others without permission from the District.
If you believe that your account, password or District-issued technology resource may have been stolen, hacked, or compromised, you must immediately report it to the District’s Technology Department.
Internet Safety
The Coppell Independent School District makes the Internet accessible in accordance with our mission to provide information resources and services to ensure that all users have free and open access to ideas and information. In this role, the District provides access to information resources available on the Internet. The District has no control over the information obtained through the Internet and cannot be held responsible for its content or accuracy. It may contain materials which some find offensive or inappropriate. All staff, students and other users access the Internet at their own discretion.
In accordance with the federal Children's Internet Protection Act (CIPA), (Pub. L. 106-554), all desktop computers, laptops and personal/CISD wireless devices, that utilize the CISD network, will be filtered by a centralized filtering appliance. This filtering appliance is set to screen out sites which may reasonably be construed as obscene, as that term is defined in section 1460 of title 18, United States Code; or child pornography, as that term is defined in section 2256 of title 18, United States Code; or harmful to minors as defined in section 1703, Pub. L. 106-544. The District has the ability to monitor the online activities of students and staff through direct observation and/or technological means to ensure that students and staff are following the guidelines and policies set forth by the District.
District Board Policy also prohibits harassment, bullying, retaliation, discrimination, and other conduct that creates a hostile working or educational environment for an individual. This prohibition extends to the use of the District’s technology resources. If you ever feel that you are being harassed, bullied, retaliated or discriminated against, or otherwise being subjected to illegal or inappropriate conduct through the District’s technology resources, you should immediately report it to the District.
As with any other technology resource, restriction of a child's use of the Internet is ultimately the responsibility of the parent/legal guardian, within the confines of the law.
The District assumes no responsibility for damages, direct, or indirect, for the use of the Internet. This includes, but is not limited to, damage to District or personally owned equipment caused by virus-laden material downloaded from any Internet site. Users are encouraged to purchase and use a virus detection program on their personal devices.
Users should be aware that the Internet is not a secure medium. It is possible for third parties to obtain information regarding an individual user's search activities. Users should be very cautious about providing personal information over the Internet.
Definitions
Social Media: the interactive use of online resources including, but not limited to, Facebook, YouTube, Twitter, MySpace, Ning, Google Apps, Skype, chat rooms, wikis, and blogs.
Children’s Internet Protection Act (CIPA): The Children’s Internet Protection Act (CIPA) is a federal law enacted by Congress to address concerns about access to offensive content over the Internet on school and library computers. CIPA imposes certain types of requirements on any school or library that receives funding for Internet access or internal connections from the E-rate program – a program that makes certain communications technology more affordable for eligible schools and libraries. In early 2001, the FCC issued rules implementing CIPA.
Personal Devices: the use of any technology related device that is not owned by Coppell ISD.
Digital Content: products available in digital form. It typically refers to music, information and images that are available for download or distribution on electronic media.
Hacking: to re-configure or re-program a system to function in ways not facilitated by the owner, administrator, or designer.
Copyrighted: The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work.
Computer Virus: a computer program that can copy itself and infect a computer. It is also being used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.
Technology Resources: Any and all mass storage media, online display devices, computers, computer printouts, and all computer-related activities involving any device capable of receiving e-mail, browsing Web sites, receiving, storing, managing or transmitting data including but not limited to mainframes, servers, personal computers, notebook computers, laptops, hand-held computers, personal digital assistant (PDA), pagers, distributed processing systems, telecommunication devices, network environments, telephones, fax machines and printers. Technology resources also includes the procedures, equipment, facilities, software and data that is designed, built, operated, and maintained to create, collect, record, process, store, retrieve, display and transmit information.
Parental Restriction on use of Technology Resources
Parents who have objections to the Internet or other network-delivered services may assume responsibility for imposing restrictions only on their child(ren). Any parent wishing to restrict his/her child’s access to such services must provide the school with this restriction in writing. For details, see the CISD Board policy governing the selection and adoption of instructional materials.