Wiki source code of Policy Center

Last modified by christine_sklareski on 2025/01/22 16:22

Show last authors
1 (% class="row" %)
2 (((
3 (% class="col-xs-12 col-sm-8" %)
4 (((
5 As the Elizabethtown Area School District embarks on the journey to enrich learning experiences, students are encouraged to use District resources such as computers, software, email, and the Internet for educational or school-related activities and for the exchange of useful information.  Each device is the property of the District and is to be used solely by the student to which it is issued for academic pursuits. 
6
7 ----
8
9 == EASD Policies ==
10
11 * (((
12 **[[Policy No. 224>>http://www.boarddocs.com/pa/etwn/Board.nsf/goto?open&id=A89KY65057BC||rel="noopener noreferrer" target="_blank"]] - Care of School Property**
13
14 This is a summary of the board policy. For the full policy, click the link above. The Board policy places responsibility on each student for the proper care of school property, school supplies, and equipment entrusted to their use. This includes the responsibilities of cleaning, proper use, and security of devices under their care. Students who willfully cause damage to school property or equipment shall be subject to disciplinary measures. Parents/Guardians or responsible parties shall make restitution for any school property lost, stolen, or damaged at the replacement cost of such property if their child fails to exercise a reasonable standard of care for this equipment.
15
16 )))
17 * **[[Policy No. 815>>https://go.boarddocs.com/pa/etwn/Board.nsf/goto?open&id=CZXL2P546E53||rel="noopener noreferrer" target="_blank"]] - Acceptable Use of Internet, Computers and Network Resources**(((
18 This is a summary of the board policy. For the full policy, click the link above. Elizabethtown's Acceptable Use Policy is designed to protect students, teachers, and the District. This policy states that technology is to be used only for instructional purposes in support of curricular objectives. All staff and students should use technology in a manner that is appropriate, ethical, and legal. Staff members are to monitor student use of technology and teach them to utilize it appropriately, ethically, and legally.
19
20 As required by the Children’s Internet Protection Act (CIPA), Elizabethtown has in place technology protection measures designed to block Internet material deemed to be obscene or harmful, both on and off campus. These measures are smart and dynamic but not foolproof. The following categories of websites will be blocked: Pornography, Drugs, Gambling, Other Adult Content, Social Media, Anonymous Proxys, Chat/Messaging, Web Mail, Hate Speech, Streaming Media, and Games. Staff, students or parents should report any inappropriate content to the Technology Department if content is mis-categorized and bypasses the filtering systems. Staff or students should have no expectations of privacy when using Elizabethtown's equipment or resources, either on or off campus.
21
22 )))
23
24 ----
25
26 == Personal Electronic Devices ==
27
28 The Board prohibits the use of data devices by students except for instructional use as directed by the teacher or administrator. Students are prohibited from using any electronic device that can take photographs or record audio or video except for instructional use directed by the teacher or administrator. The district shall not be liable for the loss, damage, or misuse of any personal electronic device brought to school by a student.
29
30 ----
31
32 == Disciplinary Measures ==
33
34 Students receive a disciplinary incident/referral for, but not limited to, any of the following:
35
36 * Failing to comply with rules & procedures
37 * Causing harm or damage to the computer in any way
38 * Leaving their computer unattended
39 * Having food and/or drink around the computer
40 * Writing, drawing, adding stickers, applying labels, or defacing the computer in any way
41 * Swapping or sharing computers
42 * Bullying others via the school computer
43 * Using the school-issued computer to make threats
44 * Neglecting to transport computer in the school-issued computer bag
45 * Placing textbooks or other items in the computer bag with the device
46 * Mishandling the computer
47 * Not taking care of the screen
48 * Setting an inappropriate background or avatar
49 * Failing to bring the laptop to school
50 * Creating, downloading, or accessing inappropriate content on the computer
51 * Removing ID tags/stickers
52 * Attempting to breach school filtering and security measures
53
54 ----
55
56 == Consequences for Computer Violations ==
57
58 The following consequences will be given to students who receive a computer violation. Depending on the nature and severity of the computer violation (ex: bullying, inappropriate content, etc.), students may receive multiple disciplinary consequences. Contact your student's building office for specific disciplinary guidelines.
59
60 * **First Time** – Student receives a Teacher Warning, which will be documented in Sapphire.
61 * **Second Time** – Student receives a Lunch Restriction
62 * **Third Time** – Student receives three days of Lunch Restriction
63 * **Fourth Time**- Student receives an Administrative Detention.
64 * **Fifth Time**-Student receives one day of ISS from Administration.
65 * **Sixth Time**-Teachers, student, parent(s), and Administration will develop an Improvement Plan for the student.
66 )))
67
68
69 (% class="col-xs-12 col-sm-4" %)
70 (((
71 {{box title="**Contents**"}}
72 {{toc/}}
73 {{/box}}
74
75
76 )))
77 )))