Acceptable use of technology resources

PEIMS

The 皇家华人 shall participate in the Public Education Information Management System (PEIMS) and through that system shall provide information required for the administration of the Foundation School Program and of other appropriate provisions of the Education Code. The PEIMS data standards, established by the Commissioner of Education, shall be used by the 皇家华人 to submit information. Education Code 42.006; 19 TAC 61.1025

Children鈥檚 Internet Protection Act

Under the Children鈥檚 Internet Protection Act (CIPA), the 皇家华人 must, as a prerequisite to receiving universal service discount rates, implement certain Internet safety measures and submit certification to the Federal Communications Commission (FCC).  47 U.S.C. 254  [See UNIVERSAL SERVICE DISCOUNTS, below, for details]

皇家华人s that do not receive universal service discounts but do receive certain federal funds under the Elementary and Secondary Education Act (ESEA) must, as a prerequisite to receiving these funds, implement certain Internet safety measures and submit certification to the Department of Education (DOE).  20 U.S.C. 6777  [See ESEA FUNDING, below, for details]

Definitions

鈥淗armful to minors鈥 means any picture, image, graphic image file, or other visual depiction that:

  1. Taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion;
  2. Depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; and
  3. Taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors.

47 U.S.C. 254(h)(7)(G); 20 U.S.C.6777(e)(6)

鈥淭echnology protection measure鈥 means a specific technology that blocks or filters Internet access. 47 U.S.C. 254(h)(7)

Universal Service Discounts

An elementary or secondary school having computers with Internet access may not receive universal service discount rates unless the 皇家华人 implements an Internet safety policy, submits certifications to the FCC, and ensures the use of computers with Internet access in accordance with the certifications. 47 U.S.C. 254(h)(5)(A), (l); 47 CFR 54.520

鈥淯niversal service鈥 means telecommunications services including Internet access, Internet services, and internal connection services and other services that are identified by the FCC as eligible for federal universal service mechanisms. 47 U.S.C. 254(c)(3),(h)(5)(A)(ii)

Internet Safety Policy

The 皇家华人 shall adopt and implement an Internet safety policy that addresses:

  1. Access by minors to inappropriate matter on the Internet and the World Wide Web;
  2. The safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications;
  3. Unauthorized access, including 鈥渉acking,鈥 and other unlawful activities by minors on-line;
  4. Unauthorized disclosure, use, and dissemination of personal identification information regarding minors; and
  5. Measures designed to restrict minors鈥 access to materials harmful to minors.

47 U.S.C. 254(l)

Public Hearing

The 皇家华人 shall provide reasonable public notice and hold at least one public hearing or meeting to address the proposed Internet safety policy. 47 U.S.C. 254(h)(5)(A), (l)(1)

Inappropriate for Minors

A determination regarding what matter is inappropriate for minors shall be made by the Board or designee. 47 U.S.C. 254(l)(2)

Technology Protection Measure

In accordance with the appropriate certification, the 皇家华人 shall operate a technology protection measure that protects minors against access to visual depictions that are obscene, child pornography, or harmful to minors; and protects adults against access to visual depictions that are obscene or child pornography. 47 U.S.C. 254(h)(5)(B), (C)

Exception for adults

An administrator, supervisor, or other person authorized by the 皇家华人 may disable the technology protection measure during use by an adult to enable access for bona fide research or other lawful purpose.  47 U.S.C. 254(h)(5)(D)

Monitored Use

In accordance with the appropriate certification, the 皇家华人 shall monitor the on-line activities of minors. 47 U.S.C. 254(h)(5)(B) 

Certifications to the FCC

To be eligible for universal service discount rates, the 皇家华人 shall certify to the FCC, in the manner prescribed at 47 CFR 54.520, that:

  1. An Internet safety policy has been adopted and implemented.
  2. With respect to use by minors, the 皇家华人 is enforcing the Internet safety policy and operating a technology protection measure during any use of the computers.
  3. With respect to use by adults, the 皇家华人 is enforcing an Internet safety policy and operating a technology protection measure during any use of the computers.

47 U.S.C. 254(h)(5); 47 CFR 54.520

ESEA Funding

Federal funds made available under Title II, Part D of the ESEA for an elementary or secondary school that does not receive universal service discount rates may not be used to purchase computers used to access the Internet, or to pay for direct costs associated with accessing the Internet unless the 皇家华人:

  1. Has in place a policy of Internet safety for minors that includes the operation of a technology protection measure that protects against access to visual depictions that are obscene, child pornography, or harmful to minors and enforces the operation of the technology protection measure during any use by minors of its computers with Internet access; and
  2. Has in place a policy of Internet safety that includes the operation of a technology protection measure that protects against access to visual depictions that are obscene or child pornography; and enforces the operation of the technology protection measure during any use of its computers with Internet access. The 皇家华人 may disable the technology protection measure to enable access to bona fide research or for another lawful purpose.

Certification to DOE

The 皇家华人 shall certify its compliance with these requirements to the Department of Education as part of the annual application process for each program funding year under the ESEA.

20 U.S.C. 6777

Transfer of Equipment to Students

The 皇家华人 may transfer to a student enrolled in the 皇家华人:

  1. Any data processing equipment donated to the 皇家华人, including equipment donated by a private donor, a state eleemosynary institution, or a state agency under Government Code 2175.126;
  2. Any equipment purchased by the 皇家华人; and
  3. Any surplus or salvage equipment owned by the 皇家华人.

Education Code 32.102(a)

Before transferring data processing equipment to a student, the 皇家华人 must:

  1. Adopt rules governing transfers, including provisions for technical assistance to the student by the 皇家华人;
  2. Determine that the transfer serves a public purpose and benefits the 皇家华人; and
  3. Remove from the equipment any offensive, confidential, or proprietary information, as determined by the 皇家华人.

Education Code 32.104

Donations

The 皇家华人 may accept:

  1. Donations of data processing equipment for transfer to students; and
  2. Gifts, grants, or donations of money or services to purchase, refurbish, or repair data processing equipment.

Education Code 32.102(b)

The 皇家华人 shall not pay a fee or other reimbursement to a state eleemosynary institution or institution or agency of higher education or other state agency for surplus or salvage data processing equipment it transfers to the 皇家华人.  Government Code 2175.905(c)

Use of Public Funds

The 皇家华人 may spend public funds to:

  1. Purchase, refurbish, or repair any data processing equipment transferred to a student; and
  2. Store, transport, or transfer data processing equipment under this policy.

Education Code 32.105

Eligibility

A student is eligible to receive data processing equipment under this policy only if the student does not otherwise have home access to data processing equipment, as determined by the 皇家华人. The 皇家华人 shall give preference to educationally disadvantaged students. Education Code 32.103

Return of Equipment

Except as provided below, a student who receives data processing equipment from the 皇家华人 under this policy shall return the equipment to the 皇家华人 not later than the earliest of:

  1. Five years after the date the student receives the equipment;
  2. The date the student graduates;
  3. The date the student transfers to another district; or
  4. The date the student withdraws from school.

If, at the time the student is required to return the equipment, the 皇家华人 determines that the equipment has no marketable value, the student is not required to return the equipment.

Education Code 32.106

Uniform Electronic Transactions Act

The 皇家华人 may agree with other parties to conduct transactions by electronic means. Any such agreement or transaction must be done in accordance with the Uniform Electronic Transactions Act.    Business and Commerce Code 43.

Cybersecurity Policy

Each district shall adopt a cybersecurity policy to:

  1. Secure district cyber infrastructure against cyber attacks and other cybersecurity incidents; and
  2. Determine cybersecurity risk and implement mitigation planning.

Cybersecurity Coordinator

The superintendent shall designate a cybersecurity coordinator to serve as a liaison

between the district and the Texas Education Agency (TEA) in cybersecurity matters.

Report to TEA

The district鈥檚 cybersecurity coordinator shall report to TEA any cyber attack or other cybersecurity incident against the district cyber infrastructure that constitutes a breach of system security as soon as practicable after the discovery of the attack or incident.

Report to Parent

The district鈥檚 cybersecurity coordinator shall provide notice to a parent of or person standing in parental relation to a student enrolled in the district of an attack or incident for which a report is required to TEA involving the student鈥檚 information.

Definitions:

For purposes of the district鈥檚 cybersecurity policy, the following definitions apply:

  1. 鈥淏reach of system security鈥 means an incident in which student information that is sensitive, protected, or confidential, as provided by state or federal law, is stolen or copied, transmitted, viewed, or used by a person unauthorized to engage in that action.
  2. 鈥淐yber attack鈥 means an attempt to damage, disrupt, or gain unauthorized access to a computer, computer network, or computer system.
  3. 鈥淐ybersecurity鈥 means the measures taken to protect a computer, computer network, or computer system against unauthorized use or access.

Education Code 11.1

Security Breach Notification to Individuals

A district that owns or licenses computerized data that includes sensitive personal information shall disclose, in accordance with the notice provisions at Business and Commerce Code 521.053(e), any breach of system security, after discovering or receiving notification of the breach, to any individual whose sensitive personal information was, or is reasonably believed to have been, acquired by an unauthorized person.  The disclosure shall be made as quickly as possible, except as provided at CRIMINAL INVESTIGATION EXCEPTION, below, or as necessary to determine the scope of the breach and restore the reasonable integrity of the data system.

 

To the Owner or License Holder

A district that maintains computerized data that includes sensitive personal information not owned by the district shall notify the owner or license holder, in accordance with Business and Commerce Code 521.053(e), of the information of any breach of system security immediately after discovering the breach, if the sensitive personal information was, or is reasonably believed to have been, acquired by an unauthorized person.

 

To a Consumer Reporting Agency

If the 皇家华人 is required to notify at one time more than 10,000 persons of a breach of system security, the 皇家华人 shall also notify each consumer reporting agency, as defined by 15 U.S.C. 1681a, that maintains files on consumers on a nationwide basis, of the timing, distribution, and content of the notices.  The 皇家华人 shall provide the notice without unreasonable delay.

 

Criminal Investigation Exception

The 皇家华人 may delay providing the required notice to state residents or the owner or license holder at the request of a law enforcement agency that determines that the notification will impede a criminal investigation.  The notification shall be made as soon as the law enforcement agency determines that the notification will not compromise the investigation.

 

Information Security Policy

A district that maintains its own notification procedures as part of an information security policy for the treatment of sensitive personal information that complies with the timing requirements for notice described above complies with Business and Commerce Code 521.053 if the district notifies affected persons in accordance with that policy.

Business and Commerce Code 521.053; Local Gov鈥檛 Code 205.010

Definitions

鈥淏reach of system security鈥 means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of sensitive personal information maintained by a person, including data that is encrypted if the person accessing the data has the key required to decrypt the data.  Good faith acquisition of sensitive personal information by an employee or agent of the person for the purposes of the person is not a breach of system security unless the person uses or discloses the sensitive personal information in an unauthorized manner.  Business and Commerce Code 521.053(a)

鈥淪ensitive personal information鈥 means:0.

  1. An individual鈥檚 first name or first initial and last name in combination with any one or more of the following items, if the name and the items are not encrypted:
    1. Social security number;
    2. Driver鈥檚 license number or government-issued identification number; or
    3. Account number or credit or debit card number in combination with any required security code, access code, or password that would permit access to an individual鈥檚 financial account; or
  2. Information that identifies an individual and relates to:
    1. The physical or mental health or condition of the individual;
    2. The provision of health care to the individual; or
    3. Payment for the provision of health care to the individual.

鈥淪ensitive personal information鈥 does not include publicly available information that is lawfully made available to the public from the federal government or a state or local government. Business and Commerce Code 521.002(a)(2), (b)

Cybersecurity Information Sharing Act

A district may, for a cybersecurity purpose and consistent with the protection of classified information, share with, or receive from, any other non-federal entity or the federal government a cyber threat indicator or defensive measure in accordance with the Cybersecurity Information Sharing Act, 6 U.S.C. Subchapter I (sections 1501鈥1510). 6 U.S.C. 1503(c)

Removal of Personal Information

A district sharing a cyber threat indicator pursuant to these provisions

shall, prior to sharing:

  1. Review such indicator to assess whether it contains any information not directly related to a cybersecurity threat that the district knows at the time of sharing to be personal information of a specific individual or information that identifies a specific individual and remove such information; or
  2. Implement and utilize a technical capability configured to remove any information not directly related to a cybersecurity threat that the district knows at the time of sharing to be personal information of a specific individual or information that identifies a specific individual.

Access to Electronic Communications

Except as otherwise provided in the Electronic Communication Privacy Act (ECPA), 18 U.S.C. 2510鈥22, a person commits an offense if the person: ELECTRONIC COMMUNICATION PRIVACY ACT

  1. Intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept any wire, oral, or electronic communication;
  2. Intentionally uses, endeavors to use, or procures any other person to use or endeavor to use any electronic, mechanical, or other device to intercept any oral communication when:
    1. Such device is affixed to, or otherwise transmits a signal through, a wire, cable, or other like connection used in wire communication; or
    2. Such device transmits communications by radio, or interferes with the transmission of such communication; or
    3. Such person knows, or has reason to know, that such device or any component thereof has been sent through the mail or transported in interstate or foreign commerce; or
    4. Such use or endeavor to use takes place on the premises of any business or other commercial establishment the operations of which affect interstate or foreign commerce; or obtains or is for the purpose of obtaining information relating to the operations of any business or other commercial establishment the operations of which affect interstate or foreign commerce; or
    5. Such person acts in the 皇家华人 of Columbia, the Commonwealth of Puerto Rico, or any territory or possession of the United States;
  3. Intentionally discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the prohibited interception of a wire, oral, or electronic communication;
  4. Intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the prohibited interception of a wire, oral, or electronic communication; or
  5. Intentionally discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication, intercepted by means authorized by 18 U.S.C. 2511(2)(a)(ii), 2511(2)(b)鈥(c), 2511(2)(e), 2516, and 2518; knowing or having reason to know that the information was obtained through the interception of such a communication in connection with a criminal investigation; having obtained or received the information in connection with a criminal investi-gation; and with intent to improperly obstruct, impede, or interfere with a duly authorized criminal investigation.

It shall not be unlawful for a person not acting under color of law to intercept a wire, oral, or electronic communication where such person is a party to the communication or where one of the parties to the communication has given prior consent to such interception unless such communication is intercepted for the purpose of committing any criminal or tortious act in violation of the Constitution or laws of the United States or of any state. 18 U.S.C. 2511(1), (2)(d)

STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS ACT

The 皇家华人 must comply with the Stored Wire and Electronic Communications and Transactional Records Access Act, 18 U.S.C. 2701鈥12. Whoever intentionally accesses without authorization a facility through which an electronic communication service is provided or intentionally exceeds an authorization to access that facility and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system commits an offense. 18 U.S.C. 2701(a)

  1. Intentionally accessing without authorization a facility through which an electronic communication service is provided; or
  2. Intentionally exceeding an authorization to access that facility.

EXCEPTIONS

This section does not apply with respect to conduct authorized:

  1. By the person or entity providing a wire or electronic communications service;
  2. By a user of that service with respect to a communication of or intended for that user; or
  3. By sections 18 U.S.C. 2703, 2704, or 2518.

Definitions

Electronic Communications

Means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photo-electronic or photo-optical system that affects interstate or foreign commerce. 18 U.S.C. 2510(12)

Electronic Storage

  1. Any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof; and
  2. Any storage of such communication by an electronic communication service for purposes of backup protection of such communication.

18 U.S.C. 2510(17)

The term encompasses only the information that has been stored by an electronic communication service provider. Information that an individual stores to the individual鈥檚 hard drive or cell phone is not in electronic storage under the statute. Garcia v. City of Laredo, 702 F.3d 788 (5th Cir. 2012)

Electronic Communications System

Means any wire, radio, electromagnetic, photo-optical or photo-electronic facilities for the trans-mission of wire or electronic communications, and any computer facilities or related electronic equipment for the electronic storage of such communications. 18 U.S.C. 2510(14)

Electronic Communications Service

Means any service which provides to users thereof the ability to send or receive wire or electron-ic communications. 18 U.S.C. 2510(15)

Authentication of Electronic Communication

A digital signature may be used to authenticate a written electronic communication sent to the 皇家华人 if it complies with rules adopted by the Board. Before adopting the rules, the Board shall consider the rules adopted by the Department of Information Resources (DIR) and, to the extent possible and practicable, shall make the Board鈥檚 rules consistent with DIR rules. Gov鈥檛 Code 2054.060; 1 TAC 203

Northside ISD Policy CQ (Local)

For purposes of this policy, 鈥渢echnology resources鈥 means electronic communication systems and electronic equipment.

Availability of access

Access to the 皇家华人鈥檚 technology resources, including computers, the Internet, and other computer resources shall be made available to students and employees primarily for instructional and administrative purposes and in accordance with administrative regulations. Limited personal use of the system shall be permitted if the use:

  1. Imposes no tangible cost on the 皇家华人;
  2. Does not unduly burden the 皇家华人鈥檚 technology resources; and
  3. Has no adverse effect on an employee鈥檚 job performance or on a student鈥檚 academic performance.

Use by Members of the Public

When possible and available and in accordance with the 皇家华人鈥檚 administrative regulations, members of the 皇家华人 community may use the 皇家华人鈥檚 technology resources, including computers, the Internet, other computer resources and software for education or 皇家华人-related activities, as long as the use:

  1. Does not hamper the primary mission of technology for students and staff; and
  2. Imposes no measurable cost on the 皇家华人; and
  3. Does not unduly burden the 皇家华人鈥檚 technology resources.

The equipment, software, and network resources provided through the 皇家华人 are and remain the property of the 皇家华人. Users of 皇家华人 equipment shall comply with all policies, procedures, and guidelines of the 皇家华人 and access may be denied to any student, employee, or community member who fails to comply with those policies, procedures, and guidelines.

Acceptable Use

The Superintendent or designee shall develop and implement administrative regulations, guidelines, and user agreements consistent with the purposes and mission of the 皇家华人 and with law and policy.

Access to 皇家华人鈥檚 technology resources, including computers, the Internet, and other computer resources is a privilege, not a right. All users shall be required to acknowledge receipt and understanding of all policies and administrative regulations governing use of the system and shall agree in writing to allow monitoring of their use and to comply with these policies, regulations, and guidelines. Noncompliance may result in suspension of access or termination of privileges and other disciplinary action consistent with 皇家华人 policies. [See DH, FN series, FO series, and the Student Code of Conduct] Violations of law may result in criminal prosecution as well as disciplinary action by the 皇家华人.

Personal Software

Personal software may not be loaded on 皇家华人 computers.

皇家华人 Software

All software used in 皇家华人 computers must be legally licensed. Proper documentation must be maintained.

Internet Safety

The Superintendent or designee shall develop and implement an Internet safety plan to:

  1. Control students鈥 access to inappropriate materials, as well as to materials that are harmful to minors;
  2. Ensure student safety and security when using electronic communications;
  3. Prevent unauthorized access, including hacking and other unlawful activities; and
  4. Restrict unauthorized disclosure, use, and dissemination of personally identifiable information regarding students; And
  5. Educate students about cyberbullying awareness and response and about appropriate online behavior, including interacting with other individuals on social networking Web sites and in chat rooms.

Filtering

Each 皇家华人 computer with Internet access shall have a filtering device or software that blocks access to visual depictions that are obscene, pornographic, inappropriate for students, or harmful to minors, as defined by the federal Children鈥檚 Internet Protection Act and as determined by the Superintendent or designee.

The Superintendent or designee shall enforce the use of such filtering devices. Upon approval from the Superintendent or designee, an administrator, supervisor, or other authorized person may disable the filtering device for bona fide research or other lawful purpose.

Monitored Use

Electronic mail transmissions and other use of the 皇家华人鈥檚 technology resources by students and employees shall not be considered private. The 皇家华人 reserves the right to monitor access to and use of e-mail, the Internet, or other network or computer-related activity, engage in routine computer maintenance and housekeeping, carry out internal investigations, prepare responses to requests for public records, or disclose messages, data, or files to law enforcement authorities. Monitoring shall occur at any time to ensure appropriate use and it shall be restricted to individuals specifically designated by the Superintendent.

Disclaimer of Liability

The 皇家华人 shall not be liable for users鈥 inappropriate use of the 皇家华人鈥檚 technology resources, violations of copyright restrictions or other laws, users鈥 mistakes or negligence, and costs incurred by users. The 皇家华人 shall not be responsible for ensuring the accuracy, age appropriateness, or usability of any information found on the Internet.

Record Retention

A 皇家华人 employee shall retain electronic records, whether created or maintained using the 皇家华人鈥檚 technology resources or using personal technology resources, in accordance with the 皇家华人鈥檚 record management program. [See CPC]

Cybersecurity Plan

The district shall develop a cybersecurity plan to secure the 皇家华人鈥檚 cyber infrastructure against a cyber attack or any other cybersecurity incidents, determine cybersecurity risk, and implement appropriate mitigation planning.

Security Breach Notification

Upon discovering or receiving notification of a breach of system security, the 皇家华人 shall disclose the breach to affected persons or entities in accordance with the time frames established by law. The 皇家华人 shall give notice by using one or more of the following methods:

  1. Written notice.
  2. Electronic mail, if the 皇家华人 has electronic mail addresses for the affected persons.
  3. Conspicuous posting on the 皇家华人鈥檚 Web site.
  4. Publication through broadcast media.

The 皇家华人鈥檚 cybersecurity coordinator shall disclose a breach involving sensitive, protected, or confidential student information to TEA and parents in accordance with law.

Northside ISD Administrative Regulation for Technology Resources

The Superintendent or designee will oversee the 皇家华人鈥檚 Technology Resources.

Technology Resources are defined as the 皇家华人鈥檚 network, servers, computer workstations, telephones, peripherals, applications, databases, library catalog, online resources, Internet access, e-mail, online class activities and any other technology designated for use by the 皇家华人 for users. Education in the proper use of technology resources will be provided for employees and students with emphasis on safe and ethical use. Education is designed to promote district standards and acceptable use of technology resources as set forth in the 皇家华人 Internet Filtering and Safety Program, Board Policy, and Acceptable Use Guidelines. Education promotes safety in electronic communications, including the internet, appropriate online behavior, and cyber bullying awareness and response. Copies of acceptable use guidelines will be provided to all users.

Consent Requirements

Copyrighted software or data may not be placed on any system connected to the 皇家华人鈥檚 computer network without permission from the holder of the copyright. Only the copyright owner, or an individual the owner specifically authorizes, may upload copyrighted material to the system.

No original work created by any 皇家华人 student or employee will be posted on a Web page under the 皇家华人鈥檚 control unless the 皇家华人 has received written consent from the student (and the student鈥檚 parent if the student is a minor) or employee who created the work. [See CQ(EXHIBIT E)]

No personally identifiable information about a 皇家华人 student will be posted on a Web page under the 皇家华人鈥檚 control unless the 皇家华人 has received written consent from the student鈥檚 parent. An exception may be made for 鈥渄irectory information鈥 as allowed by the Family Educational Rights and Privacy Act and 皇家华人 policy. [See CQ (EXHIBIT F) and policies at FL]

Filtering

The Superintendent will appoint an Internet Safety committee, to be co-chaired by the Assistant Superintendent and the Director of Academic Technology, Library & Textbook Services, to oversee the selection, implementation, and maintenance of filtering technology for monitoring and filtering Internet sites containing material considered inappropriate or harmful to minors. All internet access will be monitored and filtered for all devices connecting through the 皇家华人鈥檚 wired and wireless network.

The categories of material considered inappropriate and to which access will be blocked will include, but not be limited to: nudity/pornography; images or descriptions of sexual acts; promotion of violence, illegal use of weapons, drug use, discrimination, or participation in hate groups; instructions for performing criminal acts (e.g., bomb making, hacking, etc.); and on-line gambling.

Requests to Disable Filter

The Internet Safety committee will review and approve or disapprove requests from users who wish to use a blocked site for bona fide research or other lawful purposes. Appeals shall be made to the Superintendent or designee.

System Access

Access to the 皇家华人鈥檚 Technology Resources will be governed as follows:

  1. Students in all grades will be granted access to the 皇家华人 computer network, as appropriate.
  2. 皇家华人 employees will be granted access to the 皇家华人鈥檚 computer network as appropriate and with the approval of the immediate supervisor.
  3. A teacher with any class account(s) will be ultimately responsible for use of that account.  Teachers should never share their account or password with a student or another staff member.
  4. The district will require all passwords be changed according to Administrative Regulation TEC-02.
  5. Any system user identified as a security risk or as having violated 皇家华人 and/or campus computer use guidelines may be denied access to the 皇家华人鈥檚 system. All users will be required to sign or electronically acknowledge a user agreement annually for issuance or renewal of an account.

Technology Supervision Responsibilities

The Superintendent or designees will:

  1. Be responsible for disseminating and enforcing applicable 皇家华人 policies and acceptable use guidelines for the 皇家华人鈥檚 Technology Resources.
  2. Ensure that all users of the 皇家华人鈥檚 computer systems annually read and acknowledge the agreement to abide by 皇家华人 policies and administrative regulations regarding such use. Acknowledgement of such agreements, whether written or electronic by students and staff, will be noted and recorded for reference.
  3. Ensure that employees supervise Internet activity of students who use the 皇家华人鈥檚 Technology Resources.
  4. Ensure that employees provide training to students who use the 皇家华人鈥檚 computer resources on the appropriate and safe use of this resource.
  5. Ensure that all software loaded on 皇家华人 computers is consistent with 皇家华人 standards and is properly licensed.
  6. Be authorized to monitor or examine all system activities, including electronic mail transmissions, as deemed appropriate to ensure student on-line safety and proper use of the 皇家华人鈥檚 Technology Resources.
  7. Be authorized to modify filtering policies on a computer system for bona fide research or other lawful purpose, with approval from the Internet Safety committee co-chairs.
  8. Be authorized to establish and enforce a retention schedule for messages on the 皇家华人 e-mail system.
  9. Be authorized to establish and enforce a retention schedule for messages on any electronic bulletin board and to remove messages posted locally that are deemed to be inappropriate.
  10. Be authorized to conduct investigations on 皇家华人 owned devices when inappropriate use or for malicious activity is suspected.
  11. Set and enforce limits for data storage within the 皇家华人鈥檚 system, as needed.

Individual User Responsibilities

The following standards will apply to all users of the 皇家华人鈥檚 Technology Resources:

Conduct on the System:

System users are expected to observe the following when using the 皇家华人鈥檚 Technology Resources (e-mail, online communication applications, blogs, wikis, etc.):

  1. All users are ultimately responsible for the proper use of any 皇家华人 accounts created on their behalf. Account information such as user logins and/or passwords should NEVER be shared with anyone else.
  2. System users may not use another person鈥檚 system account to access that person鈥檚 data contents. If access to another person鈥檚 data content is needed, the supervising administrator needs written approval from the Director of Infrastructure Services, or designee who will then make the approval decision.
  3. Use of encryption software or other encryption methods to purposely hide or obscure electronic communications is prohibited.
  4. System users may not redistribute copyrighted programs or data without with the written permission of the copyright holder or designee. Such permission must be specified in the document or must be obtained directly from the copyright holder or designee in accordance with applicable copyright laws, 皇家华人 policy, and administrative regulations.
  5. System users may not send, forward, or post messages that are abusive, obscene, vulgar, pornographic, sexually oriented, threatening, harassing, damaging to another鈥檚 reputation, or illegal.
  6. System users may not waste the 皇家华人鈥檚 Technology Resources (e.g., e-mail spamming, distribution of videos or photos, listening to Internet radio, online-gaming, etc.).
  7. System users may not send text messages from a 皇家华人-provided cell phone for non-皇家华人 purposes.
  8. System users must manage electronic mail in accordance with e-mail regulations and established retention guidelines.
  9. System users should be mindful that use of school-related electronic mail addresses might cause some recipients or other readers of that communication to assume they represent the 皇家华人 or school, whether or not that was the user鈥檚 intention.
  10. E-mails or documents containing any discussion or exchange of information about a student鈥檚 or employee鈥檚 performance or behavior should not be made available to anyone (e.g., parents, other district staff, non-district staff) without proper consent.   
  11. Avoid sending e-mail to colleagues or parents that contain personally identifiable information about students or colleagues.  An employee shall not reveal confidential information concerning students or colleagues unless disclosure serves lawful professional purposes or is required by law.
  12. 皇家华人-wide e-mail broadcasts must be approved by the Executive Director of Communications.
  13. Campus/Department-wide e-mail broadcasts must be approved by the campus Principal/Department Administrator.
  14. System users may not disconnect or move 皇家华人 computer workstation(s) without first obtaining approval from their campus administrator/department chair/Director.  If the 皇家华人 computer workstation(s) require a reconnect to the network and/or configuring, then Technology Services must be contacted.  At no time shall users reconfigure 皇家华人 equipment.  Refer to TEC-04 for more information on procedures and cost.

Bring Your Own Device (BYOD) Guidelines

Northside ISD recognizes that mobile phones and other digital devices are an integral part of our culture and way of life and can provide considerable value, particularly in relation to individual safety.  It is also recognized that such technology will play a significant part in the education of the 21st century student, but this use should follow agreed rules and guidelines to prevent classroom disruption, student misuse and teacher difficulties. Northside will allow students and staff to bring personally owned mobile technology devices to school to support educational or district related goals.

Responsibility of Staff, Students and Parents

  • Anyone bringing a personally owned mobile device to a campus or department must abide by the guidelines outlined in this regulation. Failure to follow these guidelines may 皇家华人 the owner of the device to the 皇家华人鈥檚 Code of Conduct or loss of use of the device.
  • It is the parent鈥檚 decision to allow their children to bring a mobile device to school and they need to be aware when their child has the mobile device with them.
  • Responsibility for the mobile device rests with the owner of the device and the 皇家华人 accepts no financial responsibility for damage, loss or theft.  The mobile device should be kept secure when not in use.  Mobile devices should not be left  in any open area unattended.
  • Understand that mobile devices with data or Internet access plans have the capability of accessing unfiltered Internet content through the data plan.
  • All costs for data plans and fees associated with mobile devices are the responsibility of the mobile device owner.

Acceptable Use of BYOD Devices

  • Specific acceptable use of a mobile device will be determined by each campus.  These guidelines will be stated in the campus鈥 portion of the Student Handbook
  • Each teacher has the right to allow or disallow the use of devices that support student achievement during instructional time as appropriate.
  • Devices with Internet access capabilities will access the Internet only through the school鈥檚 filtered network while on school property during school hours.
  • Devices should not be used in any manner or place that is disruptive to the normal routine of class/school.

Unacceptable Use of BYOD Devices

Any use of a device that interferes with or disrupts the normal procedures of the school or classroom is prohibited.  This prohibition extends to activities that occur off school property and outside of school hours if the result of that activity causes a disruption to the educational environment.

Using unauthorized proxy software or tweaking a mobile device to bypass the 皇家华人 filter or firewall is strictly prohibited.

  • Using devices to bully and/or threaten other students or staff members is unacceptable and will not be tolerated.
  • Pictures and videos must not be taken of students, teachers or other individuals without their permission.
  • Any use of a device that is deemed a criminal offense, will be dealt with as such by the 皇家华人.

皇家华人 Responsibilities

  • The 皇家华人 will provide a safe, filtered network according to the Children鈥檚 Internet Protection Act and expects students to access the Internet through this network.
  • The Superintendent or his/her designee will deem what is appropriate for use of devices on district property or on the district鈥檚 wireless network.
  • If the 皇家华人 has reasonable cause to believe a student or employee has violated the acceptable use agreement, a student鈥檚 (or employee鈥檚)  device may be searched by authorized personnel.
  • The 皇家华人 may remove the user鈥檚 network access and suspend the right to use the device on district property if it is determined that the user is engaged in unauthorized of illegal activity or is violating the Acceptable Use Policy.  Violations of the Acceptable Use Policy may result in disciplinary action.
  • The 皇家华人 assumes no liability for students that misuse mobile devices while on school property.
  • The 皇家华人 will educate students in identifying, promoting, and encouraging best practices for Internet safety.

Vandalism Prohibited

Any malicious attempt to harm or destroy 皇家华人 equipment or data or the data of another user of the 皇家华人鈥檚 system or of any of the agencies or other networks that are connected to the Internet is prohibited. Deliberate attempts to degrade or disrupt system performance are violations of 皇家华人 policy and administrative regulations and may constitute criminal activity under applicable state and federal laws. Such prohibited activity includes, but is not limited to, the uploading, downloading, or creating of computer viruses.

Vandalism as defined above will result in the cancellation of system use privileges and will require restitution for costs associated with system restoration, as well as other appropriate consequences. [See DH, FN series, FO series, and the Student Code of Conduct]

Forgery Prohibited

Forgery or attempted forgery of electronic mail messages and/or signatures is prohibited. Attempts to read, delete, copy, modify, or deliberately interfere with another user鈥檚 ability to send/receive electronic mail, or the use of another person鈥檚 user ID and/or password is prohibited.

Information Content / Third-party Supplied Information

System users and parents of students with access to the 皇家华人鈥檚 system should be aware that, despite the 皇家华人鈥檚 use of technology protection measures as required by law, use of the system may provide access to other technology resources in the global electronic network that may contain inaccurate and/or objectionable material.

A student who gains access to such material is expected to discontinue the access as quickly as possible and to report the incident to the supervising teacher.

A student knowingly bringing prohibited materials into the school鈥檚 electronic environment will be 皇家华人 to suspension of access and/or revocation of privileges on the 皇家华人鈥檚 system and will be 皇家华人 to disciplinary action in accordance with the Student Code of Conduct.

An employee knowingly bringing prohibited materials into the school鈥檚 electronic environment will be 皇家华人 to disciplinary action in accordance with 皇家华人 policies. [See DH]

皇家华人 Website

The 皇家华人 will maintain a 皇家华人 Website for the purpose of informing employees, students, parents, and members of the community of 皇家华人 programs, policies, and practices. Requests for publication of information on the 皇家华人 Website must be directed to the designated Webmaster. The Executive Director of Communications in collaboration with Technology Services will establish guidelines for the development and format of Web pages controlled by the 皇家华人. Campus web pages will be linked to the 皇家华人 website by the 皇家华人 Webmaster.

No personally identifiable information regarding a student will be published on a Website controlled by the 皇家华人 without written permission from the student鈥檚 parent.

No commercial advertising will be permitted on a Website controlled by the 皇家华人.

School or Class Web Pages

Schools or classes may publish Web pages that present information about the school or class activities to the 皇家华人 web server upon approval from the campus principal or designee (campus webmaster). The campus principal will designate the staff member responsible for managing the campus鈥 web page. Teachers will be responsible for compliance with the 皇家华人鈥檚 Acceptable Use policies and the Web Publishing Guidelines in maintaining their class Web pages. Any links from a school or class Web page to sites outside the 皇家华人鈥檚 computer system must also be in compliance with the 皇家华人鈥檚 Acceptable Use policies and the Web Publishing Guidelines.

Student Web Pages

With the approval of the campus principal or designee, students may submit individual Web pages linked to a campus Web page. All material presented on a student鈥檚 Web page must be related to the student鈥檚 educational activities and be in compliance with the 皇家华人鈥檚 Acceptable Use policies and Web Publishing Guidelines. Any links from a student鈥檚 Web page to sites outside the 皇家华人鈥檚 Technology Resources must also be in compliance with the 皇家华人鈥檚 Acceptable Use policies and the Web Publishing Guidelines.

Extra-curricular Organization Web Pages

Campus extracurricular organizations may not link web pages to a campus website.

Personal Web Pages

皇家华人 employees, Trustees, and members of the public will not be permitted to publish personal Web pages using 皇家华人 resources.

Termination / Revocation of System User Account

Termination of an employee鈥檚 or a student鈥檚 access for violation of 皇家华人 policies or regulations will be effective on the date the principal or 皇家华人 supervisor receives/issues notice of revocation of system privileges, or on a future date if so specified in the notice.

Disclaimer

The 皇家华人鈥檚 system is provided on an 鈥渁s is, as available鈥 basis. The 皇家华人 does not make any warranties, whether express or implied, including, without limitation, those of merchantability and fitness for a particular purpose with respect to any services provided by the system and any information or software contained therein. The 皇家华人 does not warrant that the functions or services performed by, or that the information or software contained on the system will meet the system user鈥檚 requirements, or that the system will be uninterrupted or error free, or that defects will be corrected.

Opinions, advice, services, and all other information expressed by system users, information providers, service providers, or other third-party individuals in the system are those of the providers and not the 皇家华人.

The 皇家华人 will cooperate fully with local, state, or federal officials in any investigation concerning or relating to misuse of the 皇家华人鈥檚 Technology Resources.

Complaints Regarding Copyright Compliance

The 皇家华人 designates the following employee to receive any complaints that copyrighted material is improperly contained in the 皇家华人 network:

Name:  Ray Galindo

Position: Deputy Superintendent for Administration

Address: 5900 皇家华人 Road

Telephone: (210) 397-8771

E-mail:  Ray.Galindo@nisd.net

Transfer of Equipment to Students

The following rules will apply to all campuses and departments regarding transfer of computer equipment to students under provisions of law cited at CQ (LEGAL):

  1. Proposed projects to distribute computer equipment to students must be submitted to the Assistant Superintendent for Technology Services for initial approval.
  2. A student is eligible to receive computer equipment under these rules only if the student does not otherwise have home access to computer equipment, as determined by the principal and counselor.
  3. In transferring computer equipment to students, the principal will give preference to educationally disadvantaged students.
  4. Before transferring computer equipment to a student, the campus technology coordinator and principal must have clearly outlined:
    1. A process to determine eligibility of students;
    2. An application process that identifies the responsibility of the student regarding home placement, use, and ownership of the equipment;
    3. A process to distribute and initially train students in the setup and care of the equipment;
    4. A process to provide ongoing technical assistance for students using the equipment;
    5. A process to determine ongoing student use of the equipment;
    6. A process to determine any impact on student achievement the use of this equipment may provide; and
    7. A process for retrieval of the equipment from a student, as necessary.

Responsibility for Instructional Materials and Technology Equipment

Each student or the student鈥檚 parent or guardian is responsible for all instructional material and technological equipment not returned in an acceptable condition by the student. A student who fails to return in an acceptable condition all instructional materials and technological equipment forfeits the right to free instructional materials and technological equipment until all instructional materials and technological equipment previously issued but not returned in an acceptable condition are paid for by the student, parent, or guardian.

Education Code 31.104(d), (e), (h); 19 TAC 66.107(c)

Acceptable Use of the 皇家华人鈥檚 Technology Resources

Access may be given to the 皇家华人鈥檚 Technology Resources for educational or district-related goals. The 皇家华人鈥檚 Technology Resources are defined as the 皇家华人鈥檚 network, servers, computer workstations, mobile devices, telephones, peripherals, applications, databases, library catalog, online resources, internet access, email, online class activities and any other technology designated for use by the 皇家华人.

With this opportunity comes responsibility. It is important that users of the 皇家华人鈥檚 Technology Resources read the Northside ISD Administrative Regulation for Acceptable Use (in Section E) and the Parent-Student Authorization Form, and then ask any questions if you need help understanding them.

Please be advised that the rules and responsibilities outlined in the Conduct on the System section of the Student Handbook do also apply to the use of a 皇家华人 network account on a personal (BYOD) phone or mobile device. Inappropriate use of any 皇家华人 technology resource on a BYOD device can result in the consequences in this section, to include losing the privilege to access and/or use an 皇家华人 network account.

Responsible Use Guidelines

With the use of technology embedded in curriculum and events, Northside ISD is pleased to provide our students, staff, and guests with access to computer technology, including the Internet and a robust network. The operation of technology in the district relies heavily on the proper conduct of the users while using district resources. Every user has the responsibility to respect and protect the rights of every other user in our community. Users are expected to act responsibly, ethically, and legally in accordance with the missions and purposes of the resources they use with state and federal guidelines. Adherence to the following is necessary for continued access to ANY and ALL technology resources while at school or using district resources.

Northside ISD students and parent/guardians understand and agree to:

  1. Northside ISD has the right to restrict access to any technology resources at any time. 

  2. The use of Northside ISD equipment and associated technology is a privilege, and it should be used responsibly in support of academics. 

  3. There are no exceptions to privacy while using 皇家华人 technology resources.

  4. Students must secure their district credentials by implementing the following measures: 

    1. Students may only log in using their 皇家华人-assigned username. 

    2. Account Security: All users are responsible for the proper use of their 皇家华人 accounts. User logins and passwords must NEVER be shared with anyone. If a student feels their account has been compromised they must report that to the appropriate campus staff. 

    3. Accessing Others' Accounts: Using another person's system account to access their data is prohibited.

  5. Students must display appropriate use of communication tools.

    1. Prohibited Content: Users must not send, forward, or post messages that are abusive, obscene, vulgar, pornographic, sexually oriented, threatening, harassing, damaging to another鈥檚 reputation, or illegal.

    2. Resource Management: Users must not waste 皇家华人 Technology Resources (e.g., e-mail spamming, distributing videos or photos, listening to Internet radio, online gaming, etc.).

    3. Refraining from distributing private information about others or themselves (such as full name, date of birth, address, phone number, Social Security Number, etc.) on blogs, web forms, or other websites. 

  6. Students must protect the integrity of resources.

    1. Security:

      1. Observe and comply with 皇家华人 filtering

      2. Report security risks or violations to the appropriate staff

    2. Encryption: Using encryption software to hide or obscure electronic communications is prohibited.

    3. Copyright Compliance: 

      1. Users must not redistribute copyrighted programs or data without written permission from the 皇家华人.

      2. Follow copyright laws ().

      3. Cite sources when using others鈥 work or using Artificial Intelligence (AI) for assignments. 

    4. Hardware

      1. Not making changes to the setting in hardware, software, or network.

      2. Not vandalizing data, networks, or hardware. 

  7. In the context of utilizing district communication tools, students are expected to uphold the principles of digital citizenship.

    1. E-mail Management: Users must manage e-mail in accordance with established regulations and retention guidelines.

    2. Representation: Be mindful that using school-related e-mail addresses may lead recipients to assume that the user represents the 皇家华人 or school.

    3. Confidential Information: 

      1. Do not send emails/chats that contain personally identifiable information about students or staff unless required by law or for professional purposes.

      2. Do not created shared documents with personally identifiable information about students or staff unless required by law or for professional purposes.

    4. Digital Citizenship: Communicate in ways that are kind and respectful. Students should report threatening communications to staff.

  8. Students should use email and chat functionality responsibly and refraining from communication broadcasts.

    1. 皇家华人-wide: Must be approved by the Assistant Superintendent of Communications.

    2. Campus/Department-wide: Must be approved by the campus Principal.

  9. Students should be resprectuful and responsible when managing district equipment. 

    1. Relocating Equipment: 

      1. Students must obtain approval from their Principal before disconnecting or moving 皇家华人 computer workstations.

      2. Students are expected to keep equipment in good, working condition without alterations, markings, or damage of any kind. Failure to do so may result in consequences deemed appropriate by campus administration.

    2. Device 1:1: Students are responsible for:

      1. following Device 1:1 expectations and care outlined in the Northside ISD Device Care Campaign (found on )

      2. returning devices to the campus before moving from the district or transferring to another campus and at the end of hte school year. 

      3. honoring guidelines in the Technology Lending Agreement while obtaining a 皇家华人 device.

      4. Reporting wear and tear as well as damage to appropriate campus staff. 

Consequences for violation of any of the above or inappropriate use are 皇家华人 to disciplinary action as written in the Student Code of Conduct at the discretion of the campus administration team. . 

We believe that the curriculum drives technology usage in the classroom. It is the policy of the district to maintain an environment that promotes ethical and responsible conduct with all electronic resources and activities. This privilege and extraordinary opportunity to explore resources comes with a responsibility for parents/guardians and students. When utilizing technology or digital resources provided by Northside ISD, students and families must strictly adhere to the Northside ISD Responsible Use Policy at all times. This policy applies when using personal devices on 皇家华人 property, at home, or during school-related activities. 

Please acknowledge receipt and understanding of these items found in Section E by completing and returning the Parent-Student Authorization Form in the back of this handbook. This form should be received before a student can be given access to the system.

Please note that Internet access is part of the 皇家华人鈥檚 Technology Resources.  The Internet is a network of many types of communication and information networks, which are used frequently in classroom assignments and include access to library materials and purchased online databases. Some material accessible via the Internet may contain content that is illegal, inaccurate, or potentially offensive.  It is possible for users of the 皇家华人鈥檚 Technology Resources to access (accidentally or otherwise) these areas of content.  While the 皇家华人 uses filtering technology and protection measures to restrict access to such material, it is not possible to prevent such access.

Consequences for inappropriate use

  • Suspension of access to the 皇家华人鈥檚 Technology Resources; 
  • Revocation of the 皇家华人鈥檚 Technology Resources account(s); and/or  
  • Other appropriate disciplinary or legal action in accordance with the handbook(s) and applicable laws.

Note: The agreement to abide by these guidelines must be renewed each academic year. Also, 皇家华人 Policies and Administrative Regulations are included as an addendum to all handbooks for your review.

Updated