Cyber Bullying. ○ Definition: Cyber-bullying involves the use of information and communication technologies such as e-mail, cell phone text messages, instant messaging, defamatory personal websites, and online polling websites to support deliberate and hostile behavior by an individual or group that is intended to harm others. ○ Cyber-bullying is all forms of harassment over the internet or other forms of electronic communications, including cell phones. Students and staff will refrain from using communication devices or District property to harass or stalk another. The District’s computer network and the internet, whether accessed at school or away from school, during or after school hours, may not be used for the purposes of cyber bullying. All forms of cyberbullying are unacceptable and viewed as a violation of this policy and the District’s acceptable use policy and procedures. ○ Users are responsible for the appropriateness of the material they transmit. Hate mail, harassment, discriminatory remarks, or other antisocial behaviors are expressly prohibited. Cyber-bullying includes but is not limited to the following misuses of technology: Harassing, teasing, intimidating, threatening, or terrorizing another person by sending or posting inappropriate and hurtful email messages, instant messages, text messages, digital pictures or images, or web postings, including blogs. It is also recognized that the author (poster or sender) of the inappropriate material is often disguised (logged on) as someone else. ○ Students and community members, who believe that they have been the victims of such misuses of technology, as described in this policy, should not erase the offending material from the system. A copy of the material should be brought to the attention of a teacher or the principal. ○ The administration shall fully investigate all reports of cyber-bullying. ○ In situations in which cyber-bullying originated from a non-school computer, but brought to the attention of school officials, any disciplinary action shall be based upon whether the conduct is determined to be severely disruptive of the education process so that it markedly interrupts or severely impedes the day-to -day operations of the school. In addition, such activity must violate a school policy. Such conduct includes, but is not limited to, threats, or making a threat off school grounds, to harm a member of the school staff or a student. ○ Malicious use of the District’s computer system to develop programs or to institute practices that harass other users to gain unauthorized access to any entity on the system and/or damage the components of an entity on the network is prohibited. ○ Disciplinary action may include, but is not limited to, the loss of computer privileges, in-school suspension, or expulsion for verified perpetrators of cyber bullying. Discipline for cyber-bullying will be handled on a case by case basis. In addition when any kind of threat is communicated or when a hate crime is committed, it may be reported to local law officials.
Appears in 3 contracts
Samples: Springville Community Schools, Springville Community Schools, Springville Community Schools
Cyber Bullying. ○ Definition: Cyber-bullying involves the use of information and communication technologies such as e-mail, cell phone text messages, instant messaging, defamatory personal websites, and online polling websites to support deliberate and hostile behavior by an individual or group that is intended to harm others. ○ Cyber-bullying is all forms of harassment over the internet or other forms of electronic communications, including cell phones. Students and staff will refrain from using communication devices or District property to harass or stalk another. The District’s computer network and the internet, whether accessed at school or away from school, during or after school hours, may not be used for the purposes of cyber bullying. All forms of cyberbullying are unacceptable and viewed as a violation of this policy and the District’s acceptable use policy and procedures. ○ Users are responsible for the appropriateness of the material they transmit. Hate mail, harassment, discriminatory remarks, or other antisocial behaviors are expressly prohibited. Cyber-bullying includes but is not limited to the following misuses of technology: Harassing, teasing, intimidating, threatening, or terrorizing another person by sending or posting inappropriate and hurtful email messages, instant messages, text messages, digital pictures or images, or web postings, including blogs. It is also recognized that the author (poster or sender) of the inappropriate material is often disguised (logged on) as someone else. ○ Students and community members, who believe that they have been the victims of such misuses of technology, as described in this policy, should not erase the offending material from the system. A copy of the material should be brought to the attention of a teacher or the principal. ○ The administration shall fully investigate all reports of cyber-bullying. ○ In situations in which cyber-bullying originated from a non-school computer, but brought to the attention of school officials, any disciplinary action shall be based upon whether the conduct is determined to be severely disruptive of the education process so that it markedly interrupts or severely impedes the day-to -day operations of the school. In addition, such activity must violate a school policy. Such conduct includes, but is not limited to, threats, or making a threat off school grounds, to harm a member of the school staff or a student. ○ Malicious use of the District’s computer system to develop programs or to institute practices that harass other users to gain unauthorized access to any entity on the system and/or damage the components of an entity on the network is prohibited. ○ Disciplinary action may include, but is not limited to, the loss of computer privileges, in-school suspension, or expulsion for verified perpetrators of cyber bullying. Discipline for cyber-bullying will be handled on a case by case basis. In addition when any kind of threat is communicated or when a hate crime is committed, it may be reported to local law officials.. 6 - Consequences for Acceptable Use Violations or Misuse of Device ● The consequences listed below are examples of possible actions that could be taken. Teachers, administrators, and technology personnel will determine the appropriate consequence based on the severity of the infraction. ○ Loss of network and computer privileges which may include: ○ Restriction to school day use only OR restriction to use only in classroom under direct teacher supervision OR complete prohibition on the use of school computers or the computer network. ○ Detention. ○ Suspension or Expulsion. 7 - Equipment Lending Information
Appears in 1 contract
Samples: Springville Community Schools