AUP
Acceptable Use Policy
The governing board intends that technological resources provided by Highlands Community Charter and
Technical Schools (HCCTS) which includes Highlands Community Charter School (HCCS) and California
Innovation and Career Academy (CICA) shall be used in a safe and responsible manner in support of the
instructional program and for the advancement of student learning. All students using these resources shall
receive instruction in the proper and appropriate use.
HCCTS and it’ schools will comply with Children’s Internet Protection Act (CIPA) and ERate requirements.
This document outlines the rules governing parents/guardians and student’s use of school data
communications networks, the intranet and internet safety, and to provide for the education of its students
about appropriate online behavior, including interacting with other individuals on social networking sites
and in chat rooms, and cyberbullying awareness and response.
Individuals affiliated with the school have numerous opportunities to use computing resources provided for
school-related activities. However, access to these computing resources is a privilege and individual
responsibilities accompany that ‘privilege’. It is the intention of the school to provide a non-hostile learning
environment that minimizes the risk of offending, intimidating, harassing, or otherwise disrespecting other
students or employees.
Restricting Access to Inappropriate Content
All Charter schools that provide pupils with access to the internet or to an online service are strongly
advised to maintain a policy regarding access to sites that contain content that is inappropriate for the
school setting.
Use of School Data Communications Networks and the Internet Safety Policy
Children’s Internet Protection Act Compliance (CIPA): It is the policy of the charter school to:
(a) prevent user access over its computer network to, or transmission of, inappropriate material via
internet, electronic mail, or other forms of direct electronic communications; (b) prevent unauthorized
access and other unlawful online activity; (c) prevent unauthorized online disclosure, use, or dissemination
of personal identification information of minors; and (d) comply with the Children’s Internet Protection Act
(“CIPA”) [Pub. L. No. 106-554 and 47 USC 254(h)].
Definitions:
1. Network: Two or more computer systems linked to allow communication. The school’s network connects
schools and support offices to provide data communications, such as e-mail, file sharing, and internet
access.
2. Internet: A global network of interconnected networks.
3. World Wide Web: A global, hypertext-based information system accessible through the internet via
HTTP protocol.
4. Universal Resource Locator (URL): The address of a source of information on the internet.
5. E-mail: Electronic mail messaging over communications network.
6. File server: A shared computer providing data storage and services to users.
7. School data: Information maintained and processed in the conduct of school business as required by
state or federal mandate and/or school procedure. Confidentiality restrictions may apply to information
maintained as school data records and to all copies of those records.
8. System administrator: Person(s) responsible for providing and/or managing network services (e.g., file
servers, electronic mail, and internet services).
9. Security administrator: Person(s) responsible for providing network security.
10. Student Acceptable Use Policy: School guidelines for students and parents/guardians regarding
acceptable use of the internet and school networks.
11. Student User Agreement: A contract between a student and parent/guardian and a school containing a
reference to acceptable use of the internet and school networks. This contract must be signed by the
student prior to the use of school technology. A new contract must be signed at each new school the
student enrolls in.
12. Technology Protection Measure: A specific technology that blocks or filters internet access to visual
depictions that are (a) obscene matter, as the term is defined in section 311 of the California Penal Code or
section 1460 of Title 18, United States Code; (b) child pornography, as that term is defined in section 2256
of Title 18, United States Code; or (c) inappropriate for minors.
13.Harmful Matter: As defined in Section 313 of the Penal Code. For the purposes of this Policy, Harmful
Matter is included in what is deemed “inappropriate” content and/or materials.
14. Sexual Act; Sexual Contact: As defined in section 2246 of Title 18, United States Code.
15. Minor: For the purposes of this administrative procedure, an individual who has not attained the age of
18.
16. Child Pornography: As defined in section 2256 of Title 18, United States Code.
17. Computer: Any hardware, software, or other technology attached or connected to, installed in, or
otherwise used in connection with a computer.
ACCEPTABLE USE
The use of school network services is a privilege and is to be limited to school business as authorized by
board policy. School-level practice should support and complement school policies or procedures, and
should be tied to specific curriculum goals and objectives. Use of the school’s network services by
students, parents, and school employees should support school policy and procedure in the performance
of their assigned duties.
PROHIBITED USE
1. Transmission of any material in violation of any federal or state law is prohibited. This includes, but is not
limited to distribution of:
a. Any information that violates or infringes upon the rights of any other person.
b. Any defamatory, inappropriate, abusive, obscene, profane, sexually oriented, threatening, racially offensive, or illegal material.
c. Advertisements, solicitations, commercial ventures, or political lobbying.
d. Any information that encourages the use of controlled substances or the use of the system for the purpose of inciting crime.
e. Any material that violates copyright laws.
2. Any vandalism, unauthorized access, “hacking,” or tampering with hardware or software, including
introducing “viruses” or pirated software, is strictly prohibited (California Penal Code section 502).
3. Cyberbullying – The use of modern communication technologies (such as listed below) to intentionally
embarrass, humiliate, threaten or intimidate an individual or group via any of the following:
a. Email
b. Instant Messaging
c. Chat Rooms
d. Web Sites
e. Social Networking Sites
f. Cell Phones and other forms of technology
4. Harassment or illegal discrimination with regard to race, sex, color, creed, religion, age, national origin,
disability, marital status, status with regard to public assistance, immigration status, sexual orientation, or
membership or activity in a local commission.
5. Misuse of the school property, including, but not limited to, theft or damage to equipment or software,
knowingly running or installing viruses, attempting to circumvent the installed technology protection
measure, using the system for mayhem or to disrupt work and school activities, or attempting to degrade
the performance of integrity of any campus network or computer system.
Warning
The school reserves the right to monitor internet/intranet, e-mail, and networked application usage. No
student or employee should have any expectation of privacy as to his/her usage. The school reserves the
right to inspect any and all files on school computers or school servers connected to school networks and
to take custody and possession of those files and computers.
Inappropriate use may result in the cancellation of network privileges. The site system administrator(s) or
school security administrator may close an account at any time deemed necessary. Depending upon the
seriousness of the offense, any combination of the following will be enforced: Penal Code, Education
Code, school procedures, or school site discipline.
Expectations
1. Etiquette: The use of the school’s data communications networks requires that users abide by accepted
rules of network etiquette. These include, but are not limited to, the following:
a. Be polite. Do not send abusive, inflammatory, or obscene messages to others. Use language that is appropriate for an educational setting.
b. Respect privacy. Do not reveal personal information about students or staff.
c. Be considerate. Do not use the network in a way that would disrupt the use of the network by other users.
2. Electronic Mail: Users of electronic mail systems should not consider electronic communications to be
either private or secure; such communications are subject to review by authorized school personnel and
may be subject to review by the public under the Public Records Act. Other conditions for use include, but
are not limited to, the following:
a. Individuals are to identify themselves accurately and honestly in e-mail communications. E-mail account names and/or addresses may not be altered to impersonate
another individual or to create a false identity.
b. The school retains the copyright to any material deemed to be school data. Use of school data sent as e-mail messages or as enclosures will be in accordance with
copyright law and school standards.
c. Messages relating to or in support of violent or illegal activities must be reported to appropriate authorities such as a school administrator.
RESPONSIBILITIES
Reasonable precautions by school staff: The school maintains reasonable precautions to restrict access to
inappropriate content and materials that do not support approved educational objectives. Staff will choose
resources on the internet that are appropriate for classroom instruction and/or research for the needs,
maturity, and ability of their students.
1. Parents/guardians and students should understand that it is not possible to control all material on a
public network and they accept responsibility for complying with school procedures and with
standards of acceptable use.
2. Guidelines for parents/students. A copy of “Student Acceptable Use Policy” must be provided to
the parents/guardians of students to whom the guidelines apply. Students and parents/guardians
accept responsibility for abiding by the “Student Acceptable Use Policy” and understand that violation
can result in loss of access privileges and disciplinary action.
3. Education, Supervision and Monitoring. It shall be the responsibility of all staff members of the
school to educate, supervise and monitor appropriate usage of the online computer network and
access to the internet in accordance with this procedure and CIPA, the Neighborhood Children’s
internet Protection Act, and the Protecting Children in the 21st Century Act.
4. Procedures for disabling or otherwise modifying any technology protection measures shall be the
responsibility of the Technology Department or designated representatives. The Technology
Department will assist the school by providing training materials and online resources for age-
appropriate training of students who use the school’s internet facilities.
5. The teacher shall be responsible for ensuring that each student receives this training before
accessing the school’s internet facilities. The training provided will be designed to promote the
school’s commitment to internet safety. Following receipt of internet safety training, the student will
acknowledge that he/she received the training, understood it, and will adhere to the provisions of the
school’s acceptable use policies.
TECHNOLOGY PROTECTION MEASURES
Technology Protection Measures: To the extent practical, technology protection measures (or “internet
filters”) shall be used to block access to inappropriate information. Specifically, as required by CIPA,
blocking shall be applied to visual depictions of material deemed obscene or child pornography, or to any
material deemed inappropriate. Subject to staff supervision, technology protection measures may be
disabled for adults or, in the case of minors, minimized only for bona fide research or other lawful
purposes.
To the extent practical, steps shall be taken to promote the safety and security of users of the school online
computer network when using electronic mail, chat rooms, instant messaging, and other forms of direct
electronic communications. Specifically, as required by CIPA, prevention of inappropriate network usage
includes (a) unauthorized access, including so-called ‘hacking,’ and other unlawful activities; and (b)
unauthorized disclosure, use, and dissemination of personal identification information regarding minors.
Security: Security on any computer system is a high priority, especially when the system involves many
users. If any user identifies a security problem with school systems, he/she must notify the security
administrator at the Technology Department, either in person, in writing, or via the network. Users should
not demonstrate the problem to other users. Any user identified as a security risk or having a history of
problems with other computer systems may be denied network access. Violations include, but are not
limited to, the following:
1. Illicitly gaining entry, or “hacking,” into a computer system or obtaining account passwords.
2. Intentionally creating or distributing a computer virus.
3. Using school systems or equipment to knowingly disable or overload any computer system or
network or to circumvent the security of a computer system.
4. Knowingly bypassing a school “firewall” used for blocking inappropriate internet sites and for
security screening.
IMPLEMENTATION
1. The school shall provide a copy of “Student User Agreement” to all students, parent/guardian of
each student before student is provided access to internet or any school network.
2. Students shall receive the internet safety training, in accordance with this procedure and will
acknowledge that he/she received the training, understood it, and will adhere to this procedure and
the school’s “Acceptable Use Policy.”
3. A student shall be provided access to internet or to the school network only after receipt of the
training in this procedure and submitting to the school his/her signed “Master Agreement” which shall
be retained at the school.
Date *
9/21/2023
First Name (Printed) * Last Name (Printed) *
LIUBOV GRYSHYNA
Name (Signed) *
SUA
Highlands Charter and Technical Schools Student Mobile Device User & Rules Agreement
http://goo.gl/ZFSi3m Link to Acceptable Use Policy
Students must:
● Respect and protect their own privacy and the privacy of others
Use only your assigned HCCS or CICA accounts
Keep personal information such as: name, address, phone number, etc., offline
Keep your passwords secret
Have permission before posting images or video of other students to the Internet
● Respect and protect your school’s electronic resources
Observe all network security practices
Conserve, protect, and share these resources with other students and Internet users
HCCTS or its schools are not responsible for damages to personal technologies or electronic
communication devices, but we expect you to treat school property as if it were your own
Treat equipment with care, report any damages, security risks or violations immediately to the tech
support team or school administrator
● Respect and protect the copyrighted/intellectual property of others
Cite all sources appropriately
Follow all copyright laws
Use electronic communication devices appropriately to assure academic integrity, cheating will
result in loss of privileges and/or subject to discipline
● Respect and practice the principles of community
Communicate only in ways that are kind, responsible, respectful and lawful
Use electronic devices for schoolwork only during class time
Only Highlands Charter School (HCCS) or California Innovations and Career Academy (CICA)
email should be used for schoolwork only
Report threatening or offensive materials to a teacher or administrator immediately
Software:
a. Google Apps for Education
● Chromebooks and other mobile devices integrate with the Google Apps for Education suite
of productivity and collaboration tools designed specifically for educational institutions. This
suite includes Google Docs (word processing), Spreadsheets, Presentations, Drawings, and Forms
● All work is stored in the cloud and is accessible using the HCCS or CICA student’s account
24/7 from any internet connected computer
E-mail Usage:
● The primary purpose of the HCCS or CICA G-mail student electronic mail system is for students
to communicate with their teacher(s), school staff, outside resources related to school
assignments, and fellow students to collaborate on school activities
● Students are responsible for good behavior while using school e-mail, just as they are in
a classroom or a school hallway; expectations and instruction for proper use will be demonstrated
and communicated by your teacher
● Access to e-mail is given to students who agree to act in a considerate and responsible
manner; access is a privilege – not a right and will be suspended for improper use
● Students are responsible for messages sent from their accounts
● Students should not share their passwords
● Students should not give out personal information over email, including home telephone numbers
or home addresses
● Students will not use email to bully, harass, or threaten other students or individuals
● Students will report any unusual activities such as "spam" communications, obscene email,
or unauthorized communication by adults to the teacher or school's technology specialist
● Students will not use email to send chain letters, viruses, or hoaxes to other students or staff
● Email accounts are filtered; messages containing inappropriate language or content will be flagged
● Student email is provided by the district and is district property; HCCTS reserves the right
to archive, monitor and/or review all use of its email system, and users should not have
any expectation of privacy in any electronic message created, sent or received on the District’s
email system.
● Student email accounts will be removed from the system after: high school graduation, leaving the
school district, or disciplinary actions; if necessary, HCCTS, at its discretion, may close accounts at
any time
Cyber Bullying:
Cyber Bullying is bullying which is carried out through an online service such as email, chat
room, discussion group or instant messaging; or through mobile phone technologies such as short
message services (SMS). It may also include inappropriate use or distribution of images, videos or
audios of another person. Any form of cyber bullying will not be tolerated under any circumstances. If
a student accidentally accesses inappropriate content, they should move on without drawing unnecessary
attention, and inform your teacher quietly if needed. Students should not access chat-rooms or social
networking sites that are not moderated or approved by the District, and should never give out any
personal details over the Internet.
No Expectation of Privacy:
Students have no expectation of confidentiality or privacy with respect to usage of any district technology,
regardless of whether that use is for district-related or personal purposes, other than as specifically
provided by law. The District may, without prior notice or consent, log, supervise, access, view, monitor,
and record use of student technology at any time for any reasons related to the operation of the District.
a. Monitoring Software
1. Teachers, school administrators, and the district technology services department staff may
use monitoring software that allows them to view the screens and activity on student mobile devices.
Content Filter:
The district utilizes an Internet content filter that is in compliance with the federally mandated Children’s
Internet Protection Act (CIPA). All mobile devices, regardless of physical location at school, will have all
Internet activity filtered and monitored by the district.
Appropriate Uses and Digital Citizenship:
School-issued mobile devices should be used for educational purposes and students are to adhere to the
HCCTS Use Agreement and all corresponding administrative procedures at all times.
While working in a digital and collaborative environment, students should always conduct themselves as
good citizens by adhering to the following:
1. Respect Yourself. I will show respect for myself through my actions. If necessary, I will
select online names that are appropriate. I will use caution with the information, images, and other
media that I post online. I will carefully consider any personal information about my life,
experiences, or relationships I post. I will not be obscene. I will act with integrity.
2. Protect Yourself. I will ensure that the information, images, and materials I post online will not put
me at risk. I will not publish my personal details, contact details, or a schedule or location of my
activities. I will report any attacks or inappropriate behavior directed at me while online. I will protect
passwords, accounts, and resources.
3. Respect Others. I will show respect to others. I will not use electronic mediums to
antagonize, bully, harass, or stalk people. I will show respect for other people in my choice of
websites: I will not visit sites that are degrading to others, racist, or inappropriate. I will not enter
other people's private spaces or areas.
4. Protect Others. I will protect others by reporting abuse and not forwarding inappropriate materials
or communications. I will avoid unacceptable materials and conversations.
5. Respect Intellectual property. I will request permission to use copyrighted or otherwise protected
materials. I will suitably cite all use of websites, books, media, etc. I will acknowledge all primary
sources. I will validate information. I will use and abide by the fair use rules.
6. Protect Intellectual Property. I will request to use the software and media others produce. I will
purchase, license, and register all software or use available free and open source alternatives rather
than pirating software. I will purchase my music and media and refrain from distributing these in
amanner that violates their licenses.
Date *
9/21/2023
First Name (Printed) * Last Name (Printed) *
LIUBOV GRYSHYNA
School *
Highlands Community Charter
Student ID Number *
57204
Student's Signature *