Technology Staff Members

I. Student Acceptable Use Policies

Faculty and staff should be familiar with the student acceptable use policies in order that they may supervise students using the computers on the Wayland Public Schools networks. Appendices A and B are the rules and guidelines for each level. If you have any questions or concerns about the Acceptable Use Policies or about enforcing the policies, please contact the Technology Specialist in your building or the Director of Technology.

II. Faculty & Staff Rules for Acceptable Use

 A. Introduction

Wayland Public Schools (also WPS and the "District" elsewhere in this document) is committed to providing a robust information technology environment to support its students and faculty in the pursuit of their academic and instructional objectives. Wayland Public Schools makes available a range of information technology resources that are intended to be used for educational and professional purposes and in accordance with the mission of the Wayland Public Schools only. Professional purposes refers to those tasks and requirements for fulfilling professional duties as related to working at Wayland Public Schools. All those who use the information technology resources at Wayland Public Schools must comply with the written policies covering their use as well as the spirit and intent of those policies.

B. Network and Computing Facilities Provided by Wayland Public Schools 

Email
Email allows employees to communicate with people from within our district and throughout the world.

World Wide Web
The Web provides acc ess to a wide range of information in the form of text, graphics, photographs, video, and sound, from throughout the world. The Web is a valuable research and publishing tool.

File Transfer Protocol (FTP)
FTP allows users to download large files and computer software.

Local Area Network
Desktop computers are connected to local file servers to enable users to easily store and share files and share resources.

Software
A full suite of personal productivity software (word processor, spreadsheet, database, email, web browser, desktop security) is available on every networked computer in the district. Other software, including curriculum specific software is widely available on various computers throughout the district. Gradebook software is available for every computer at the High School and Middle School, as well as for the home computers of teachers.

Peripherals
Printers, digital cameras, scanners, and projection devices are provided as widely as possible throughout the district for student and staff use.

 

C. Appropriate Use

Appropriate use of the network and computing facilities include those uses that support:

  • Instruction
  • Independent Study
  • Research
  • Career or Professional-Development Activities
  • Official Work of the Offices and Departments of the Wayland Public Schools
  • Limited High-Quality Self Discovery / Exploration

 

D. Inappropriate Use

There are unacceptable uses of the District computing facilities and network. Inappropriate uses can be classified into two categories: illegal and prohibited. Examples of illegal and prohibited activities follow. This list is not to be viewed as comprehensive but as explanatory. Wayland Public Schools is responsible to refer any and all illegal activities to the appropriate law enforcement agency. Illegal uses include: obscenity, libel, threats, hate postings, sexual harassment, and copyright violations. Prohibited activities are based on the intended use of the instructional network and computing facilities. Therefore, examples of prohibited activities are: pornography, profanity, plagiarism, commercial use, political lobbying and anonymous messages. Any use that does not directly support educational and professional purposes and is in accordance with the mission of the Wayland Public Schools is considered prohibited.

Employee violations of the Staff Acceptable Use Policy will be referred to the appropriate supervisory personnel.

Examples of inappropriate activities include (but are not limited to):

  • Commercial Use
    WPS computing facilities should not be used for commercial services, defined as "offering or providing products or services."
  • Political Lobbying
    The use of a district system by district employees for political lobbying activities is generally unacceptable. Most states allow public employees to express opinions on legislative measures and, therefore, using the district system for this purpose may also be appropriate. But engaging in fundraising or other political activity will be considered unacceptable.
  • Obstructing or Disrupting Computing Facilities
    Any activity that intentionally obstructs or hinders network traffic, network resources, or desktop security is prohibited. Such actions are illegal. Activities included in this category are any that harm other people, damage the computer, network, or information that belongs to someone else.
  • Accessing Improper Material
    Use of the district computing facilities to access material that is profane, vulgar, or obscene (pornography), that advocates or condones the commission of unlawful acts (illegal), or that advocates or condones violence or discrimination towards other people (hate literature) is prohibited.
  • Accessing the Files of Others
    Any attempt to access the files of another individual is strictly not allowed. This includes attempting to log in through another person's account or accessing another person's "private" files. These actions are illegal, even if only for the purposes of "browsing." It is recognized that colleagues often need to share work. There are shared directories for this purpose and staff is encouraged to use these shared locations when they want to share a "non-private" file with others.
  • Etiquette
    Activities covered under general computing and network etiquette include viewing, sending, or displaying offensive messages or pictures, or wasting limited resources such as disk space or printing capacity.
Sharing Accounts or Passwords
Your network login and password are for your own individual use. Do not share your account or password with anyone. If you suspect that someone may have obtained your password, change it immediately. Conversely, using someone else's password to access services or data is also a violation of policy, regardless of how the password was obtained. Do not use anyone else's password, account, or email.

 

E. Privacy

The information systems of Wayland Public Schools and the files that reside on the computers are the property of Wayland Public Schools. Therefore, there is only a limited expectation of privacy within the network, just as there is for any storage facility in the schools. The District has the right to examine all data stored on computers or disks that are the property of the District to ensure that users are in compliance with these regulations. Further, these files fall within the definition of a public record and the district is obliged to archive them and treat them as they would paper copies that constitute public documents.

Individuals should be aware that our computing systems do generate logs of the activities of users including login and logout times, web sites accessed, software launched, etc. Routine maintenance and monitoring of the system and these logs may lead to discovery that a user has violated or is violating the Staff Acceptable Use Policy, or the law. Please be aware that any misuse (as outlined in this document) of the computing facilities provided by Wayland Public Schools will be referred to the appropriate supervisory personnel.

Email is simply another system resource. It is data that is stored on District computers, and is regularly backed up to tape. Under normal circumstances, system administrators will not access anyone's email. However, it should be noted that email is insecure and may be read by authorized information system management personnel when deemed necessary by the Superintendent or by local, state, or federal officials in any investigation concerning or relating to any illegal activities conducted using the District system.

 

F. Email Use

Please do not overload the communications servers and please do not abuse your communications privileges. Email is a fast, convenient form of communication. However, the following list represents email activities that are prohibited and/or discouraged.

Wayland Email Guidelines:

  • Chain Email Letters: Forwarding chain email is a violation of WPS computing policy. Phrases in the subject line can usually identify chain email, such as "Forward - do not delete," "don't break the chain," etc. Some chain emails promise good luck, promise easy money, tell stories and ask for help, or warn of false email viruses. If there are a large number of addresses in the message, chances are very good that it is a chain email. "Get rich quick" schemes will invariably claim to be "completely legal." Do not be fooled. Delete all chain email from your account and do not forward.
  • "Bombing": Sending numerous or large email messages to one person is considered "email bombing." Even if no harm was intended or it was simply a "harmless prank," an email "bomb" can disrupt service to all users and is strictly forbidden.
  • Forgery: Altering any form of electronic communication and then claiming it to be original is prohibited. Further, creating, altering, or deleting the attribution of origin (for example, the "From" in email, or the IP address in headers) is also prohibited.
  • Attachments and File Size: Users are discouraged from sending large files (greater than 2 MB) as this noticeably slows network traffic for all users. Files such as Internet "greeting cards" that contain animation and sound are discouraged for the same reason.
Harassment: Any repeated or unwanted communication may constitute harassment. Any communication with the direct intention of harassing, threatening, implying or otherwise causing harm to individuals, or classes of individuals is a violation of WPS policy. If you should receive any harassing messages electronically, you may consider notifying the sender. Often the sender may not realize that their communication is unwanted or offensive unless you tell them. However, if the sender continues after being notified, or you do not wish to contact the sender, or if the situation is serious, you should contact the Director of Technology or your supervisor. Be sure to save copies of all harassing material.

 

G. District Limitation of Liability

Wayland Public Schools makes no warranties of any kind, either express or implied, that the functions or the services provided by or through the District system will be error-free or without defect. The District will not be responsible for any damage users may suffer, including but not limited to, loss of data or interruptions of service. The District is not responsible for the accuracy or quality of the information obtained through or stored on the system. The District will not be responsible for obligations, financial, legal or other, arising through the unauthorized use of the system.

 

III. Software Guidelines

A. Purchasing of Software

Software may be purchased from specific curriculum budgets, school technology budgets, and/or the district wide technology budget. However, before purchasing software, staff should consult with the Technology Specialist in their building or with the Director of Technology. This helps to avoid duplication, allows us to order in the most economical way (lab packs and site licenses when warranted), allows for purchasing of interdisciplinary pieces of software, and ensures that the software purchased will be compatible with the hardware, network and security programs in place in the Wayland Public Schools.

B. Inventory of Software

All curriculum-based software and software purchased at the building level, that resides on teacher or student machines or on the school servers, must be catalogued with the building Technology Specialist as part of the school software inventory. District wide, server, and other software is cataloged by the office of the Director of Technology.

C. Installation of Software

As of June 2006, the Wayland Public Schools has well over 1000 networked computers. One difficulty in maintaining such a large number of machines is software compatibility and conflicts. Some software may not be compatible with other pieces of software, and once installed, other software already on the machine may not work correctly and network service may crash.

In order to prevent such conflicts with software, as well as to comply with software copyright laws, all software on Wayland Public Schools computers must be installed ONLY under the following conditions:

  • the software is licensed by the school department and the license is on file in the appropriate office
  • technology specialist or technician has given approval for installation
  • technology specialist or technician in the building has been given enough advance notice to allow for testing compatibility and installation of the new piece of software
  • the actual installation is carried out by the Technology Specialist or the Computer Technician

Note concerning Copyright:

For your use, WPS provides many programs (software applications) that have been obtained under contracts or licenses stating that they may not be copied, cross-assembled, or reverse-compiled. Specifically, these programs may not be copied for use on other computers. The Director of Technology will assist with any questions regarding software usage and licensing issues.

IV. Web Publishing Guidelines

The World Wide Web is an incredibly powerful publishing tool. Pages posted to the web have the potential for having a world wide audience in a matter of seconds. Publishing on the web is strongly encouraged. If you are considering posting to the web yourself, or having students post to the web, you should familiarize yourself with the following guidelines concerning content and technical requirements.

Any material posted for the global community should reflect the high educational standard of Wayland Public Schools. All published pages and corresponding links stored on school department servers must be related to the District's educational goals and objectives or related to school-sponsored activities. Publishing children's material on the public schools web pages is encouraged and supported.

Content and Review Guidelines for Student Publication:

  • Individual teachers will review their students' material before publication. The quality and completeness of any published work should be such that both student and teacher are proud that it can reach a global audience. Any review procedures for publishing established by the school for publishing in other formats, such as newsletters, notices sent home, should be respected. Any reviewers should validate content and first level links.
  • Teachers are encouraged to have colleagues review classroom projects or individual student work before publishing on the Web.

Safety Rules for Student Publication:

Elementary and Middle School:

  • Pictures that include the heads of students should be posted only if parents have not requested that they not be posted
  • No full names of students, associated with student work or pictures of students, except with parental permission
  • No home/school addresses or email addresses of students
  • No telephone numbers for students

About staying within the bounds of these rules:

If you are posting a class project and wish to link to the work of each student or group of students, an alias that the student has chosen can be used to attribute their work or link to it.

High School:

  • Pictures that include the heads of students may be posted only if identified only by first name and last initial or if the standard release form for videotaping and newspaper photographs has been signed by parent
  • No last names of students, except with parental permission
  • No home/school addresses or email addresses of students
  • No telephone numbers for students

About staying within the bounds of these rules:

If you are posting a class project and wish to link to the work of each student or group of students, students may decide to allow the use of their first name, or first name with last initial, or an alias that the students have chosen, unless the parent has already notified the school not to publish student work.

Technical and Procedural Guidelines:

The following information must be available on every web page:

  • The name of staff person or volunteer maintaining the page
  • Date published
  • Date to Remove Project or page
    • Unless necessary, no web page should be bigger than 35 K
    • It is helpful to include a "mailto" link with the staff or faculty person responsible for maintaining the page

Guidelines for staff publication:

Teachers are encouraged to have colleagues review projects before publication on the Web. Any review procedures for publishing established by the school for publishing in other formats, such as newsletters, notices sent home, should be respected. Any reviewers should validate content and first level links.

Types of web pages that you may consider posting include:

  • general announcements such as minutes of meetings
  • calendars
  • weekly, monthly, or quarterly classroom news
  • student projects
  • requests for participation in online projects

 

V. Purchase of Technology Supplies

A. Introduction

Each new computer will be provided with the following standard software packages:

Macintosh Computers

Windows / Intel Computers

AppleWorks (productivity package)

Microsoft Office (full office suite)

Netscape (OS 9) or Safari (OS X)

Netscape

Internet Explorer (OS 9) or FireFox (OS X)
Internet Explorer

MacManager (Mac networking and file protection)

Microsoft Network client (when appropriate)

In addition, if the Macintosh computer runs the OSXversion of the operating system, it usually has Microsoft Office.

Each new printer will come with one toner or ink cartridge.

Replacement cartridges must be purchased by the building or department that is the primary user of that printer.

 

B. Ordering Technology Supplies

The district budget for technology does not cover the following supplies:

extension cords power strips, surge protectors floppy disks disk holders ink or toner cartridge replacements replacements for broken mice replacement bulbs for projection equipment paper for printers (standard xerox paper) replacement printer and computer cables mouse pads

* replacement batteries

* canned air (for cleaning)

These supplies need to come from the building or department budget and budgets should be developed with this in mind. If there are any questions about prices, preferred vendors, or specifications, please contact the Technology Specialist in your building or the Director of Technology.

* These supplies are generally budgeted into the building technology budget and are purchased by the building Technology Specialist.

VI. Inventory and Purchase of Information Technology Hardware

Most of the Wayland Public Schools computers and printers are ordered centrally through the Office of the Director of Technology. All new hardware must be received by that office for inventory, maintenance, and installation purposes. Every new machine is inspected, and the pertinent information (model, serial number, purchase date, vendor, purchase order number, etc) is recorded into the central hardware inventory database. This information is indispensable for warranty, repair and reporting information, as well as for software licensing reasons. Then, software is installed and the computer is networked (when appropriate) before being delivered to its destination.

Please note that all new computers, whether purchased with grant or PTA monies, donated, or acquired by some other means must go through the same process of inventory and installation. Please notify the Technology Specialist in your building or the Director of Technology before computer equipment is acquired.

Before purchasing hardware with grant or PTA monies or department budgets, staff should consult with the Technology Specialist in their building or with the Director of Technology. This helps to coordinate purchasing, allows us to order in the most economical way, ensures that the hardware purchased will be compatible with the hardware, software, and networks in place, and ensures that the hardware meets the desired needs and specifications of the intended user.

VII. Donations

Anyone who would like to donate computer equipment or software to the schools should contact Leisha Simon, Director of Technology, by email ([email protected]) or by telephone at 508-358-3714. All donations must go through this office to ensure that the hardware will be compatible with the hardware, software, and networks in place, and that the hardware meets the desired needs and specifications of the intended user. We request that any equipment that is donated follow our requirements for donations. Citizens or companies that donate equipment or software meeting these criteria will be sent a thank you letter after the donation is officially accepted by the school committee. This letter can be used for tax purposes. Donations are greatly appreciated and assist the schools in providing access to students and staff. 

Requirements for Donations 

Any equipment that is donated must be in working order, free of viruses and be of immediate use to the schools. Whenever possible, the original documentation and disks that came with the equipment and software are greatly appreciated.

The following equipment and software is currently being accepted:

  • Any Windows/Intel computers with at least
    a 2.0 GHz or higher processor, and
    a 40 gigabyte hard drive, and
    a minimum of 1 gb RAM
  • Any Macintosh computer capable of running OSX (operating system 10) with a processor speed of 1.2 GHz or faster. It should also have a minimum of 1 gb RAM and with a minimum 40 gb hard drive
  • Any laptop meeting the above criteria
  • Any laser printer or ink jet printer that is compatible with any of the above specified equipment that is not older than 3 years old
  • Software and CDs that are compatible with the above
  • Scanners that are compatible with the above
  • High quality color monitors compatible with any of the above CPUs

 

VIII. "How To" Technology Guides

Free online courses can be found at the HPLearning Center at:
http://h30187.www3.hp.com/

and at LearnThat, at:
http://www.learnthat.com/computers/,

as well as at many other locations of the web.

 

IX. Technology Work Requests

A. Instructional Computers

When a network or hardware/software problem arises, or when you wish to reserve a computer or lab space, the reporting process (contact process) is as follows:

Please Email:  [email protected]

Subject:  Building, Room, Problem

Include in Email:  Type of Hardware (PC, MAC, Printer); Detail of problem; Red Tag ID

Telephone Support:  508.358.3670 (Time Sensitive Issues ONLY)

B. Administrative Computers

Same as above: all non-crisis network or hardware/software problems should be reported by sending an email to [email protected]

However, in an urgent situation (ie, the whole network is down) please call Leisha Simon, 508.358.3714.

Please note that all requests for reserving computers and computer labs for special projects, classwork and staff development should also go through the contacts listed below. Any reserving of computers or lab spaces outside of the school hours or school calendar should also be scheduled with the Director of Technology, as much of the maintenance and repair work is scheduled for those times.

X. Technology Staff

The following are the Technology Staff Members in the Wayland Public Schools:

Leisha Simon , Director of Technology
Wayland Public Schools
41 Cochituate Road
Wayland, MA 01778

[email protected]

508.358.3714


Technology Department, Secretary

Wayland Public Schools
41 Cochituate Road
Wayland, MA 01778

508.358.5981


Rita Partridge, Technology Specialist, Claypit Hill Elementary School
Adams Lane
Wayland, MA 01778

[email protected]

508.358.3671


Beth Ann Crozier, Technology Specialist, Happy Hollow Elementary School
63 Pequot Road
Wayland, MA 01778

[email protected]

508.358.3760


Nancy Colbert, Technology Specialist, Claypit Hill Elementary School
Adams Lane
Wayland, MA 01778

Nancy_Colbert @wayland.k12.ma.us

508.358.3790


Bethann Monahan, Technology Specialist, Middle School
200 Main St
Wayland, MA 01778

[email protected]

508.655.6670


Mary Barber,Technology Specialist, High School
264 Old Conn Path
Wayland, MA 01778

[email protected]

508.358.3748


Susan Pressman, Technology Assistant, High School

264 Old Conn Path
Wayland, MA 01778

[email protected]

508.358.6189


Albie Cincotti, Network Administrator
Wayland Public Schools
41 Cochituate Road
Wayland, MA 01778

[email protected]

508.358.6641


Susan Ginsberg, Systems Administrator

Loker School

47 Adams Lane
Wayland, MA 01778

[email protected]

508.652.7215


Eva Santos, Data Analyst
Wayland Public Schools
41 Cochituate Road
Wayland, MA 01778

[email protected]

508.358.3770


Joseph Anselmi, Computer Technician
Loker School

47 Adams Lane
Wayland, MA 01778

[email protected]

508.652.7215


Augusto Saviatto, PC Systems Administrator

Loker School

47 Adams Lane
Wayland, MA 01778

[email protected]

508.652.7215

 


Appendix A

Wayland Public Schools Acceptable Use Policy

ELEMENTARY SCHOOL VERSION

Computer, Network, and Internet -- Terms & Conditions

1. Acceptable Use
At school, use of computers and the Internet is for education only. Students may conduct research, learn, and communicate with others. All students agree to follow the rules of appropriate behavior:

  • Students may not copy material and say that they wrote it.
  • Students will visit only Internet sites suitable for children and for educational purposes.


2. Privileges
The use of school computers is a privilege. The teachers and principal decide when students may use computers or the Internet. If a student uses a computer or the Internet in ways that are not appropriate, he or she may have privileges taken away. Also, remember that computer files are not private. School and system administrators may see your work.


3. Etiquette
Students will follow rules for appropriate behavior. Some (but not all) of those rules are listed below:·

  • Be polite when writing.
  • Use appropriate language.
  • Students may use computers for research, but must identify where information is found.
  • Do not share account or password information with others, and do not try to log on as someone else.
  • Do not try to see the folders, work, or files of others.


4. Online Safety
Please follow these rules about online safety:·

  • Do not give your phone number or address to anyone over the Internet.
  • Notify an adult immediately if you find information on the computer that makes you uncomfortable or nervous.

5. Truthfulness
The Wayland Public School System is not responsible for the truth or the quality of the information found on the Internet.

6. Privacy
Your information and records of what you viewed, received and saved are not private. Teachers and technical staff may review files to be sure everyone is using computers responsibly.

7. Security
Security on any computer system is important. If a student knows of any times when these rules are broken, he/she must tell a teacher or principal. School personnel are in charge of Internet access. Students will not connect to the Internet unless directed to do so under the supervision of a teacher. Do not tell anyone else your password and do not log in as anyone else.

8. Filtering
WPS uses network software to filter or block material harmful to children, as required by the Children's Internet Protection Act. Students should not attempt to get around filters.

9. Vandalism
Any vandalism will result in the loss of privilege to use the Internet, and/or the computers, themselves.
Vandalism includes:·

  • physical damage to the computers
  • damage to files that belong to others
  • changing any computer settings or software
  • any attempts to bypass security settings

10. Consequences
Violations of any of these rules may result in the loss of access. There may also be disciplinary actions that your teacher or school principal determine are appropriate consequences to violating the Acceptable Use rules.

  


Appendix B

Wayland Public Schools Acceptable Use Policy

SECONDARY SCHOOL VERSION

Computer, Network, and Internet - - Terms and Conditions

The purpose of the Wayland Public Schools computer network is to advance and promote teaching and learning and to provide access to a wide variety of educational resources. Wayland Public Schools (WPS) is committed to providing a robust information technology environment to support its students and faculty in the pursuit of their academic and instructional objectives. All those who use the information technology resources at WPS must comply with the written policies covering their use as well as the spirit and intent of those policies.

1) Acceptable Use - Wayland Public Schools information technology may be used for educational purposes ONLY. All other uses are prohibited. All use must be in support of education and research and consistent with the educational objectives of the Wayland Public Schools. Use of the networks or computing resources of other organizations must comply with the rules appropriate for that network or organization. Transmission of any material in violation of any national or state regulation is prohibited. This includes, but is not limited to: copyrighted material, threatening or obscene material, or material protected by trade secret.

2) Privileges - The use of school computers is a privilege, not a right, and inappropriate use will result in a cancellation of that privilege. The system administrators, with school system administrators, will deem what is inappropriate use based on this policy. The administration, faculty, and staff of WPS may request the system administrator to deny, revoke, or suspend specific user accounts/access for misuse of said access. Students may visit only Internet sites that support education and research and are consistent with the educational objectives of the Wayland Public Schools. Further, access to computers and the Internet is at the discretion of the teacher/staff person monitoring that area. Students are prohibited from using or remotely accessing equipment, network resources, or software that are reserved for use by teaching and administrative staff.

3) Computing and Network Rules

  • Use the computing facilities of WPS and the network only for academic and instructional objectives. Use of the network for political activity, financial gain, commercial activity, or illegal activity, e.g. hacking is expressly prohibited.
  • Do not use a computer to harm other people or their work.
  • Do not damage the computer or the network in any way.
  • Do not interfere with the operation of the network in any way. This includes installing shareware, freeware, illegal software or software that you own personally.
  • Do not violate copyright laws. This includes the copying and/or downloading of commercial software or other material (e.g. music) in violation of federal copyright laws.
  • Do not view, send, or display offensive messages or pictures.
  • Do not share your account or password, nor use the password or account of another person.
  • Do not waste limited resources such as bandwidth, disk space, or printing capacity.
  • Do not trespass in the folders, work, or files of others.
  • Do notify an adult immediately, if by accident, you encounter materials that violate the rules of appropriate use.
  • Do not alter or attempt to bypass any computer or network security settings.
  • Do not access material that is profane, vulgar, or obscene (pornography), that advocates or condones the commission of unlawful acts (illegal), or that advocates or condones violence or discrimination towards other people (hate literature).
  • Do not give your phone number or address to anyone on the Internet and never agree to get together with someone you have "met" on the Internet without first checking with your parents.

5) No Warranty - WPS makes no warranties of any kind, whether expressed or implied, for the service it is providing. WPS will not be responsible for any damages you suffer. This includes loss of data resulting from delays, nondeliveries, mis-deliveries, or service interruptions from any cause. Use of any information obtained via the Internet is at your own risk. Wayland Public Schools specifically denies any responsibility for the accuracy or quality of information obtained through its services.

6) Privacy - All users of WPS computing facilities should be aware that information accessed, created, sent, received, or stored on the network and/or on all WPS computers is not private. Network system administrators may review files to maintain system integrity and to insure responsible use.

7) Security - Security on any computer system is a high priority, especially when the system involves many users. If you feel you can identify a security problem on the school network or Internet, you must notify a system administrator or the Technology Director. Do not demonstrate the problem to other users. Attempts to log on to the school network as a system administrator or as any other user (other than yourself) will result in cancellation of user privileges. Do not share your password with anyone and log on only on your own account. Any user identified as a security risk or having a history of problems with other computer systems may be denied access to the school network and/or the Internet.

8) Filtering of Internet Content - WPS uses network software to filter or block obscene material, pornographic material, and other material that is harmful to minors, as required by the Children's Internet Protection Act. Efforts to circumvent or tamper with the effectiveness of the filtering system are prohibited and may lead to disciplinary consequences. If a site is being blocked by the filtering software and a teacher or staff member wishes to access it for sound educational purposes, they may request to have the site unblocked. Such requests should go through the school Technology Specialists or the technicians. If there is doubt whether the content is appropriate, the superintendent of schools will be the final arbiter.

9) Vandalism - Vandalism will result in cancellation of privileges and could result in financial responsibility for any damages. Vandalism in terms of computers has many definitions. Vandalism is considered to include the following: altering the desktop or system folder of the workstation computer, attempts to bypass district security of same, attempts to discover or use the passwords of other users, attempts to disable the accounts of others, any physical damage to the equipment of Wayland Public Schools, and any attempt to harm or destroy data of another user on your network or over the Internet, and this includes, but is not limited to the uploading or creation of computer viruses.

10) Consequences - Violations of any aspect of the Acceptable Use policy may result in loss of access. Additional disciplinary action may be determined at the building level in keeping with existing rules of behavior and consequences as set forth at that school. When applicable, legal authorities may be contacted.

 


Appendix C

Technology Work Request / Problem Report Form

Name:

Date:

Computer Name or red id tag number:

________________________________

Computer Room / Location:

________________________________

Details of problem or request:

________________________________

 

Website by SchoolMessenger Presence. © 2024 SchoolMessenger Corporation. All rights reserved.