5.305 Student Information Technology Usage Policy
Note: Not all IT regulations apply to lower school students due to distribution plans
All technology devices owned or provided by Lakeway Christian Schools (LCS) are to be used in a manner consistent with the mission and established policies of LCS. The primary purpose of all information technology is to support LCS academic and administrative functions. The use of LCS technology for functions not clearly related to LCS is discouraged and may be prohibited. LCS technology is to be used in a way that honors God.
- Information Technology Tools
- The School provides students with access to various hardware, software, and other resources in order to retrieve and transmit information available from various databases and information networks for educational purposes. As used in this policy, “Information Technology Tools” (sometimes referred to as “Tools”) refers to School equipment, hardware, software, databases, information networks, e-mail systems, files, programs, documents, data, information, and e-mail messages. Information Technology Tools also include School hardware, software, documents, and databases stored on and accessed from personal devices.
- Privacy and Limitations of Use
- All Information Technology Tools provided by the School will remain property of the School. All communications and information created by, transmitted by, received from, or stored using these Tools are also the property of the School. Any software, files, or data downloaded into the School’s network, School workstations, or School-issued devices become the property of the School and may be intercepted, accessed, or disclosed by the School. Additionally, any School software, files, or data downloaded into a student’s personal device remain property of the School and may be intercepted accessed or disclosed by the School. Any such software, files, or data may be used by students only in ways that are consistent with their licenses or copyrights.
- Students should have no expectation of personal privacy in any material stored, created, received, or transmitted using any of the School’s Tools. The School, in its discretion as owner (or licensee) and provider of the Information Technology Tools, reserves and will exercise its authority to monitor, intercept, access, retrieve, disclose and delete any material stored, created, transmitted, or received using these Tools, for any reason and without further notice to any student. This includes School material stored, created, transmitted, or received on personal devices.
- Students may encrypt e-mail, files, and programs only with the use of software approved by the LCS IT Department. This software must provide for retention by the School of any key necessary to access encrypted messages or may otherwise limit the degree of protection provided by such encryption. Use of passwords, encryption, or other security measures does not in any way diminish the School’s authority to access or disclose materials and will not create any privacy expectation for any student.
- Code of Acceptable Use
- Each user of Information Technology Tools must comply with this Policy and the terms and conditions of use of any host providers or servers to which they are granted access, including, but not limited to, external databases and cloud computing resources. All computing facilities and Information Technology Tools, whether accessed through School-issued devices or personal devices, are to be used for educational purposes in accordance with applicable School Policies and Directives. Both law and School policy prohibit, in general, the misuse, theft, or other abuse of Information Technology Tools.
- The Information Technology Tools are to be used for business and education purposes. The School may monitor usage of its Tools to ensure appropriate use in accordance with the following rules:
- Confidentiality. No student shall transmit or post confidential information in any manner inconsistent with any applicable School Policies and Directives with respect to confidential information.
- Harassment. No student shall transmit or post any information which treats school employees, other students, or others in a manner that is abusive, insulting, obscene or otherwise inappropriate or unprofessional, including:
- information that may be construed as harassment or disparagement of others based on race, ethnicity, color, national origin, religion, sex, sexual orientation, age, disability, or political beliefs;
- information that may be disruptive or harmful to morale;
- information that may be defamatory toward any person; and
- information which in any other way violates the School's standards of ethics and professional conduct.
- Purposeful Disruptive Use. No student shall use the School’s Information Technology Tools or other facilities knowingly to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user.
- Viruses. No student shall use the School’s Information Technology Tools or facilities to deliberately propagate any virus, worm, Trojan horse, trap-door or other destructive program code.
- Sexually Explicit Materials. No student shall use the School’s Information Technology Tools or facilities to access, retrieve, store or transmit any sexually explicit, obscene or pornographic materials.
- Installing Software. No student shall install software or add wireless access points to the CCA network unless they have received authorization from the CCA IT Management. Students may not knowingly use Tools to distribute pirated software or data. Under no circumstances will the School allow installation or development of any new software that may violate the license or terms of use of existing School software.
- Uploading and Downloading Files. Confidential information of the School may never be posted on the Internet or forwarded to outside companies or individuals not authorized to receive such information. Students may not upload or download any software, data or other materials owned by or licensed to the School without explicit authorization from the manager responsible for the software, data or other materials. Any posting of any School-proprietary software, data or other materials must include appropriate copyright notices and legends to indicate the School’s proprietary interest. Any materials uploaded or attached to electronic messages must comply with all applicable export laws.
- Author Identification and Disclaimers. No students shall communicate under a false name or identity (e.g., to impersonate others). Every student using Information Technology Tools shall identify himself or herself accurately and completely (including one’s School affiliation and function, where applicable). Students using Information Technology Tools shall not give the impression that they are representing, giving opinions, or otherwise making statements on behalf of the School or any subsidiary of the School unless explicitly authorized to do so by School Management.
- Lawful Use Only. No student shall use Information Technology Tools to violate any applicable local, state, national, or international law or regulation.
- The School reserves the right to limit or prohibit student internet access for specific students or groups of students. This may include blocking access to specific websites or downloads.
- Any student who discovers misuse of Information Technology Tools should immediately contact their teacher, principal, or the LCS IT Department. If a student is unsure of what constitutes acceptable use, s/he should contact his/her teacher for further guidance and clarification.
- Security and Confidentiality Issues
- The School has installed a variety of security systems to assure the safety and security of the School’s networks. It is a violation of this Policy for any student to attempt to disable, defeat, or circumvent any School security facility or system.
- If a student loses any device, whether issued by the School or not, that contains School hardware, software, documents, or data, she/he must report the lost device to his/her teacher within 48 hours.
- Use of Personal Devices
- Many students utilize their personal devices, such as mobile phones, tablets, and laptops for School business. The same policies and principles that apply to student conduct on School-issued devices also apply to student conduct while using personal devices for School business. Additionally, students who choose to use their personal devices should be aware of the following:
- LCS has the ability to track the location of any personal device that syncs data with any LCS server.
- LCS has the ability to view the applications installed on students’ personal devices and may refuse access to School servers and databases on personal devices if such applications could compromise or adversely affect the Information Technology Tools.
- Students are responsible for backing up their own personal data on their personal device.
- A password will be required on all mobile devices.
- All mobile devices must lock within 5 minutes of inactivity.
- Many students utilize their personal devices, such as mobile phones, tablets, and laptops for School business. The same policies and principles that apply to student conduct on School-issued devices also apply to student conduct while using personal devices for School business. Additionally, students who choose to use their personal devices should be aware of the following:
- Violations
- Violations of this Policy will result in appropriate disciplinary action in accordance with the School's general policies regarding student conduct, up to and including expulsion.
All technology devices owned or provided by Lakeway Christian Schools (LCS) are to be used in a manner consistent with the mission and established policies of LCS. The primary purpose of all information technology is to support LCS academic and administrative functions. The use of LCS technology for functions not clearly related to LCS is discouraged and may be prohibited. LCS technology is to be used in a way that honors God.
- User Accounts - Users are assigned network accounts enabling access to the LCS network and designated resources. Passwords are to be kept confidential and network accounts are not to be shared with anyone. Users should always logoff when they are done using a computer.
- Personal Files / E-mail - Files not related to LCS should not be stored on LCS computing resources. All files and e-mail messages stored on LCS computing resources are considered property of LCS. When a student withdraws from LCS or an employee is terminated, the network/e-mail account of that user will be disabled or deleted. Any remaining files and e-mail messages of former students or employees will be reviewed and are subject to being deleted or re-assigned to another LCS user at the discretion of the principal.
- Internet usage policies - All Internet usage is filtered, logged, and monitored in accordance with the standards set forth in this policy. Users are not permitted to visit chat rooms or social networking sites while using LCS computers unless specifically approved by the appropriate supervisor. Users are not permitted to access sites that advocate anarchy, racism, hatred, or violence; sites that contain pornography; or sites that provide information used to support destructive activities (e.g., how to make weapons, etc.). If a user enters a site prohibited by this policy that was not blocked by LCS’s filtering system, the situation will be dealt with at the discretion of the teacher and the principal. Users must never provide personal information online that would enable someone to identify or locate them.
- Exclusivity of LCS name - No internet site is to be setup under the LCS name or any associated school or organization. (including web sites, social networking sites, etc.)
- Christian Witness - All LCS faculty, staff, and students are responsible for the way they represent LCS at all times. As such, no pictures, no information, etc. may be posted on the internet that adversely affects the Christian witness, image, and/or mission of LCS.
- Care for LCS Property - Potentially damaging actions to LCS technology such as eating or drinking near technology resources, mishandling cables or removable media, or physical abuse such as hitting or dropping a computing component are to be avoided. Any user of LCS property damaged through neglect or intentional action will be required to pay for a replacement or repair.
- Theft – Any LCS property that is lost or stolen is the responsibility of the user.
- Software - No software is to be installed on a LCS computer unless the software is specifically licensed to LCS. Software licensed to LCS is not to be pirated.
- Plagiarism and Copyrights - Plagiarizing any document, image, or program is considered a violation of student conduct. In addition, all copyright restrictions all are to be followed.
- Software and Programs - Creation or distribution of programs (viruses, worms, etc.) that are designed to inhibit the functioning or use of individual or multiple computers is prohibited. Participation in the illegal distribution (including known receipt) of commercially licensed software or copyrighted materials including music, pictures, and video is prohibited. Unauthorized installation of any software, including commercially licensed software, shareware, or freeware, on LCS computers is prohibited.
- Cyber Bullying - Supportive communication of "hate" topics including racism, sexism, nationalism, religious bigotry, or the intentional pursuit or creation of pornographic images or sexually explicit communication through Internet web browsers, e-mail, chat rooms, etc., is prohibited. Use of any system to abuse (harass, coerce, threat, disrespect, or intimidate) any other person is prohibited. Use of any system to mass-mail (spam) others on campus or off campus, and the use of any system in a manner that would intentionally communicate false information, such as virus hoaxes is not allowed.
- Privacy - All aspects of Internet and computer usage are both logged and monitored. All files and e-mail created, received, or stored on LCS computer equipment, regardless of location, are subject to being monitored/searched at the discretion of the principal and, as such, no rights to privacy are granted. LCS reserves the right to inspect files or e-mail of any employee or student in order to obtain evidence of violation of any of these policies.
- Violations - Anyone caught in violation of this policy will be subject to appropriate penalties. Such penalties will be determined by the principal and may include the loss of the privilege of using LCS technology resources.
- Exceptions - If, in the interest of authentic academic or administrative work, there is a need for a student or employee to perform any of the actions specifically prohibited in this policy, the need must be documented in advance by the student and his/her teacher or by the LCS faculty/staff member and submitted to the principal. Each request will be reviewed on a case-by-case basis.