Policies

Board Policies Administrative Guidelines can be changed Procedures can change on a regular basis. Leads to your code of conduct.
 * 1) Those policies


 * **COMPUTER/ON-LINE SERVICES** ||   ||


 * ^  ||   || **(Acceptable Use and Internet Safety)** ||   ||^   ||
 * ^  ||   || **(Acceptable Use and Internet Safety)** ||   ||^   ||
 * ^  ||   || **(Acceptable Use and Internet Safety)** ||   ||^   ||


 * ^  ||   || Technology can greatly enhance the instructional program, as well as the efficiency of the District. The Board recognizes that careful planning is essential to ensure the successful, equitable and cost-effective implementation of technology-based materials, equipment, systems and networks. ||   ||^   ||
 * ^  ||   || Technology can greatly enhance the instructional program, as well as the efficiency of the District. The Board recognizes that careful planning is essential to ensure the successful, equitable and cost-effective implementation of technology-based materials, equipment, systems and networks. ||   ||^   ||
 * ^  ||   || Technology can greatly enhance the instructional program, as well as the efficiency of the District. The Board recognizes that careful planning is essential to ensure the successful, equitable and cost-effective implementation of technology-based materials, equipment, systems and networks. ||   ||^   ||


 * ^  ||   || Computers and use of the District network or online services support learning and enhance instruction, as well as assist in administration. Computer networks allow people to interact with many computers; the Internet allows people to interact with hundreds of thousands of networks. ||   ||^   ||
 * ^  ||   || Computers and use of the District network or online services support learning and enhance instruction, as well as assist in administration. Computer networks allow people to interact with many computers; the Internet allows people to interact with hundreds of thousands of networks. ||   ||^   ||
 * ^  ||   || Computers and use of the District network or online services support learning and enhance instruction, as well as assist in administration. Computer networks allow people to interact with many computers; the Internet allows people to interact with hundreds of thousands of networks. ||   ||^   ||


 * ^  ||   || All computers are to be used in a responsible, efficient, ethical and legal manner. Failure to adhere to this policy and the guidelines below will result in the revocation of the user’s access privilege. Unacceptable uses of the computer/network include but are not limited to: ||   ||^   ||
 * ^  ||   || All computers are to be used in a responsible, efficient, ethical and legal manner. Failure to adhere to this policy and the guidelines below will result in the revocation of the user’s access privilege. Unacceptable uses of the computer/network include but are not limited to: ||   ||^   ||
 * ^  ||   || All computers are to be used in a responsible, efficient, ethical and legal manner. Failure to adhere to this policy and the guidelines below will result in the revocation of the user’s access privilege. Unacceptable uses of the computer/network include but are not limited to: ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="50" height="1"]] ||||||  ||   ||
 * ^  ||   || 1. violating the conditions of State and Federal law dealing with students’ and employees’ rights to privacy, including unauthorized disclosure, use and dissemination of personal information; ||   ||^   ||
 * ^  ||   || 1. violating the conditions of State and Federal law dealing with students’ and employees’ rights to privacy, including unauthorized disclosure, use and dissemination of personal information; ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="50" height="1"]] ||||||  ||   ||
 * ^  ||   || 2. using profanity, obscenity or other language which may be offensive to another user or intended to harass, intimidate or bully other users; ||   ||^   ||
 * ^  ||   || 2. using profanity, obscenity or other language which may be offensive to another user or intended to harass, intimidate or bully other users; ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="50" height="1"]] ||||||  ||   ||
 * ^  ||   || 3. accessing personal social networking websites for non-educational purposes; ||   ||^   ||
 * ^  ||   || 3. accessing personal social networking websites for non-educational purposes; ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="50" height="1"]] ||||||  ||   ||
 * ^  ||   || 4. reposting (forwarding) personal communication without the author’s prior consent; ||   ||^   ||
 * ^  ||   || 4. reposting (forwarding) personal communication without the author’s prior consent; ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="50" height="1"]] ||||||  ||   ||
 * ^  ||   || 5. copying commercial software and/or other material in violation of copyright law; ||   ||^   ||
 * ^  ||   || 5. copying commercial software and/or other material in violation of copyright law; ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="50" height="1"]] ||||||  ||   ||
 * ^  ||   || 6. using the network for financial gain, for commercial activity or for any illegal activity; ||   ||^   ||
 * ^  ||   || 6. using the network for financial gain, for commercial activity or for any illegal activity; ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="50" height="1"]] ||||||  ||   ||
 * ^  ||   || 7. or gaining unauthorized access to other computers or computer systems, or attempting to gain such unauthorized access; ||   ||^   ||
 * ^  ||   || 7. or gaining unauthorized access to other computers or computer systems, or attempting to gain such unauthorized access; ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="50" height="1"]] ||||||  ||   ||
 * ^  ||   || 8. accessing and/or viewing inappropriate material and ||   ||^   ||
 * ^  ||   || 8. accessing and/or viewing inappropriate material and ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="50" height="1"]] ||||||  ||   ||
 * ^  ||   || 9. downloading of freeware or shareware programs. ||   ||^   ||
 * ^  ||   || 9. downloading of freeware or shareware programs. ||   ||^   ||


 * ^  ||   || The Superintendent/designee shall develop a plan to address the short- and long-term technology needs and provide for compatibility of resources among school sites, offices and other operations. As a basis for this plan, he/she shall examine and compare the costs and benefits of various resources and shall identify the blend of technologies and level of service necessary to support the instructional program.> ||   ||^   ||
 * ^  ||   || The Superintendent/designee shall develop a plan to address the short- and long-term technology needs and provide for compatibility of resources among school sites, offices and other operations. As a basis for this plan, he/she shall examine and compare the costs and benefits of various resources and shall identify the blend of technologies and level of service necessary to support the instructional program.> ||   ||^   ||
 * ^  ||   || The Superintendent/designee shall develop a plan to address the short- and long-term technology needs and provide for compatibility of resources among school sites, offices and other operations. As a basis for this plan, he/she shall examine and compare the costs and benefits of various resources and shall identify the blend of technologies and level of service necessary to support the instructional program.> ||   ||^   ||


 * ^  ||   || Because access to online services provides connections to other computer systems located all over the world, users (and parents of users who are under 18 years old) must understand that neither the school nor the District can control the content of the information available on these systems. Some of the information available is controversial and sometimes offensive. ||   ||^   ||
 * ^  ||   || Because access to online services provides connections to other computer systems located all over the world, users (and parents of users who are under 18 years old) must understand that neither the school nor the District can control the content of the information available on these systems. Some of the information available is controversial and sometimes offensive. ||   ||^   ||
 * ^  ||   || Because access to online services provides connections to other computer systems located all over the world, users (and parents of users who are under 18 years old) must understand that neither the school nor the District can control the content of the information available on these systems. Some of the information available is controversial and sometimes offensive. ||   ||^   ||


 * ^  ||   || The Board does not condone the use of such materials. Employees, students and parents of students must be aware that the privileges to access online services are withdrawn from users who do not respect the rights of others or who do not follow the rules and regulations established. A user’s agreement is signed to indicate the user’s acknowledgment of the risks and ||   ||^   ||
 * ^  ||   || The Board does not condone the use of such materials. Employees, students and parents of students must be aware that the privileges to access online services are withdrawn from users who do not respect the rights of others or who do not follow the rules and regulations established. A user’s agreement is signed to indicate the user’s acknowledgment of the risks and ||   ||^   ||
 * ^  ||   || The Board does not condone the use of such materials. Employees, students and parents of students must be aware that the privileges to access online services are withdrawn from users who do not respect the rights of others or who do not follow the rules and regulations established. A user’s agreement is signed to indicate the user’s acknowledgment of the risks and ||   ||^   ||


 * ^  ||   || regulations for computer/online services use. The District has implemented technology-blocking measures to prevent students from accessing inappropriate material or materials considered to be harmful to minors on school computers. The District has also purchased monitoring devices which maintain a running log of Internet activity, recording which sites a particular user has visited. ||   ||^   ||
 * ^  ||   || regulations for computer/online services use. The District has implemented technology-blocking measures to prevent students from accessing inappropriate material or materials considered to be harmful to minors on school computers. The District has also purchased monitoring devices which maintain a running log of Internet activity, recording which sites a particular user has visited. ||   ||^   ||
 * ^  ||   || regulations for computer/online services use. The District has implemented technology-blocking measures to prevent students from accessing inappropriate material or materials considered to be harmful to minors on school computers. The District has also purchased monitoring devices which maintain a running log of Internet activity, recording which sites a particular user has visited. ||   ||^   ||


 * ^  ||   || to minorsis defined as any picture, image, graphic image file or other visual depiction that: ||   ||^   ||
 * ^  ||   || to minorsis defined as any picture, image, graphic image file or other visual depiction that: ||   ||^   ||
 * ^  ||   || to minorsis defined as any picture, image, graphic image file or other visual depiction that: ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="50" height="1"]] ||||||  ||   ||
 * ^  ||   || 1. taken as a whole and with respect to minors appeals to a prurient interest in nudity, sex or excretion; ||   ||^   ||
 * ^  ||   || 1. taken as a whole and with respect to minors appeals to a prurient interest in nudity, sex or excretion; ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="50" height="1"]] ||||||  ||   ||
 * ^  ||   || 2. depicts, describes or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts or lewd exhibition of genitals or ||   ||^   ||
 * ^  ||   || 2. depicts, describes or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts or lewd exhibition of genitals or ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="50" height="1"]] ||||||  ||   ||
 * ^  ||   || 3. taken as a whole, lacks serious literary, artistic, political or scientific value as to minors. ||   ||^   ||
 * ^  ||   || 3. taken as a whole, lacks serious literary, artistic, political or scientific value as to minors. ||   ||^   ||

[Adoption date: April 20, 1998] [Re-adoption date: June 17, 2002] [Re-adoption date: February 28, 2005] [Re-adoption date: January 3, 2011]
 * ^  ||   || Annually, a student who wishes to have computer network and Internet access during the school year must read the acceptable use and Internet safety policy and submit a properly signed agreement form. Students and staff are asked to sign a new agreement each year after reviewing the policies and regulations of the District. ||   ||^   ||
 * ^  ||   || Annually, a student who wishes to have computer network and Internet access during the school year must read the acceptable use and Internet safety policy and submit a properly signed agreement form. Students and staff are asked to sign a new agreement each year after reviewing the policies and regulations of the District. ||   ||^   ||
 * ^  ||   || Annually, a student who wishes to have computer network and Internet access during the school year must read the acceptable use and Internet safety policy and submit a properly signed agreement form. Students and staff are asked to sign a new agreement each year after reviewing the policies and regulations of the District. ||   ||^   ||
 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 height="1"]] ||||||  ||   ||
 * ^  ||   || LEGAL REFS.: U.S. Const. Art. I, Section 8 ||   ||^   ||
 * ^  ||   || LEGAL REFS.: U.S. Const. Art. I, Section 8 ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || Family Educational Rights and Privacy Act; 20 USC 1232g et seq. ||   ||^   ||
 * ^  ||   || Family Educational Rights and Privacy Act; 20 USC 1232g et seq. ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || Children’s Internet Protection Act; 47 USC 254 (h)(5)(b)(iii); (P.L. 106-554, ||   ||^   ||
 * ^  ||   || Children’s Internet Protection Act; 47 USC 254 (h)(5)(b)(iii); (P.L. 106-554, ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || HR 4577, 2000, 114 Stat 2763) ||   ||^   ||
 * ^  ||   || HR 4577, 2000, 114 Stat 2763) ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || ORC 3313.20 ||   ||^   ||
 * ^  ||   || ORC 3313.20 ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || 3319.321 ||   ||^   ||
 * ^  ||   || 3319.321 ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 height="1"]] ||||||  ||   ||
 * ^  ||   || CROSS REFS.: [|AC], Nondiscrimination ||   ||^   ||
 * ^  ||   || CROSS REFS.: [|AC], Nondiscrimination ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || [|ACA], Nondiscrimination on the Basis of Sex ||   ||^   ||
 * ^  ||   || [|ACA], Nondiscrimination on the Basis of Sex ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || [|ACAA], Sexual Harassment ||   ||^   ||
 * ^  ||   || [|ACAA], Sexual Harassment ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || [|GBCB], Staff Conduct ||   ||^   ||
 * ^  ||   || [|GBCB], Staff Conduct ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || [|GBH], Staff-Student Relations (Also [|JM]) ||   ||^   ||
 * ^  ||   || [|GBH], Staff-Student Relations (Also [|JM]) ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || [|IB], Academic Freedom ||   ||^   ||
 * ^  ||   || [|IB], Academic Freedom ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || [|IIA], Instructional Materials ||   ||^   ||
 * ^  ||   || [|IIA], Instructional Materials ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || [|IIBH], District Websites ||   ||^   ||
 * ^  ||   || [|IIBH], District Websites ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || [|JFC], Student Conduct (Zero Tolerance) ||   ||^   ||
 * ^  ||   || [|JFC], Student Conduct (Zero Tolerance) ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || [|JFCF], Hazing and Bullying (Harassment, Intimidation and Dating Violence) ||   ||^   ||
 * ^  ||   || [|JFCF], Hazing and Bullying (Harassment, Intimidation and Dating Violence) ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || Staff Handbooks ||   ||^   ||
 * ^  ||   || Staff Handbooks ||   ||^   ||


 * [[image:http://policy.ctspublish.com/keystone-osba/lpext.dll/Infobase/heading%20100110.htm/heading%20300124.htm?f=images&fn=doc-tab.gif&up=1&2.0 width="108" height="1"]] ||||||  ||   ||
 * ^  ||   || Student Handbooks ||   ||^   ||
 * ^  ||   || Student Handbooks ||   ||^   ||