Acceptable Use Policy
Acceptable Use Policy
Acceptable Use Policy
Introduction
This document formalizes the policy for users of Braintree Public Schools (BPS)
computer network. All users, including students, teachers, administrators, and educational
organizations are covered by this policy and are expected to be familiar with its
provisions.
2. User Responsibilities
It is the responsibility of any person using BPS computer network resources to read,
understand, and follow these guidelines. In addition, users are expected to exercise
reasonable judgment in interpreting these guidelines and in making decisions about the
appropriate use of BPS computer network resources. Any person with questions
regarding the application or meaning of these guidelines should seek clarification from
the BPS computer network administrator. Use of BPS computer network resources shall
constitute acceptance of the terms of these guidelines. Upon terminating employment a
user is required to notify the BPS computer network administrator.
As with any other form of communication, these systems may not be used to transmit or
store messages or other data that are inappropriate under existing BPS Computer network
or district policies, such as those prohibiting sexual harassment. Users may not create,
send, or store messages or other data that are considered offensive, contain sexually
explicit material, or otherwise offensively address the age, race, ethnicity, gender, sexual
orientation, religious or political beliefs, national origin, or disability of a person or a
group of people. Users also may not create, send, or store messages pertaining to
dangerous devices such as weaponry or explosive devices. Users should take all
reasonable precautions against receiving or downloading messages, images, or other data
of this sort.
4. No Expectation of Privacy
BPS computer network resources are the property of the Braintree Public Schools and are
to be used in conformance with these guidelines. BPS computer network administrator
retains the right to inspect any user’s Virtual Hard Drive (VHD) and the files it contains.
Users are advised that messages in discussion forums, including deleted messages, are
regularly archived and can be retrieved. In addition, an Internet firewall automatically
checks all data moving between the local area network and the Internet and logs the
sending and receiving destinations. Use of BPS Computer network technology resources
5. Passwords
Each user shall be required to use and maintain a password that was created according to
BPS computer network guidelines. This password is to be used to access the BPS
computer network computer network and any resources that reside within the network
and require password access. The users must take precautions to maintain the secrecy of
their password so that other users will not be able to utilize that password for malicious
purposes. If a user suspects that someone has discovered the user’s password, the user
should change the password immediately. BPS computer network users are responsible
for all activity under their accounts.
6. Violations
Failure to observe these guidelines may subject users to termination of their BPS
computer network accounts. BPS administrators will be notified any inappropriate
activities by the users. BPS administrators will also advise law enforcement agencies of
illegal activities conducted through BPS computer network and will cooperate fully with
local, state, and/or federal officials in any investigation related to illegal activities
conducted through the BPS computer network.
7. Disclaimers
The Braintree Public Schools make no warranties of any kind, either expressed or
implied, for the BPS computer network’s services and resources. BPS are not responsible
for any damages incurred, including, but not limited to: loss of data resulting from delays
or interruption of service, loss of data stored on BPS computer network resources, or
damage to personal property used to access BPS computer network resources; for the
accuracy, nature, or quality of information stored on BPS computer network resources or
gathered through BPS computer network or the Internet; for unauthorized financial
obligations incurred through BPS computer network-provided access. Further, even
though the BPS computer network use’s technical and manual means to limit
unauthorized access, these limits do not provide a foolproof means for enforcing the
provisions of this policy. All provisions of this agreement are subordinate to local, state
and federal statutes.
This policy is in compliance with state and federal telecommunications rules and
regulations.