• Brewster Central School District
    Code of Conduct 2022-2023


     

    XII.  Use of Personal Communication Devices (Cell Phone) and the Responsible Use Policy

    The District recognizes the critical role that technology plays in today’s learning environment.  It is our desire that our students be digital citizens who can effectively search for and critically analyze sources, and can leverage technology in a way that furthers learning outcomes and provides a better understanding of the world around us.  With that said, cell phones in the current learning environment are not needed to reach those learning outcomes or overall goals.  To best communicate the expectations regarding the use of cell phones, each building will insert language into their building level handbooks to specify the rules pertaining to these devices.

    The following are excerpts from Board Policy 5800: Computer Use in Instruction - Responsible Use:

    1. Responsible Use and Conduct

      Access to the District's computer network and its digital learning resources is provided solely for educational purposes and research consistent with the District's mission and goals.

      Each individual in whose name an access account is issued is responsible at all times-- during school as well as outside of school hours-- for its proper use.

      All users of the District's network and digital resources will be issued a username and password. Passwords must be safeguarded and changed periodically.

      Only those network users with written permission from the Director of Technology and Innovation may access the District's internal network from off-site (e.g., from home). The District will make reasonable efforts to provide digital learning tools to students and staff which are available anytime, anywhere and on any device for which the user has access to the Internet.

      All users of the District's network and digital resources are expected to abide by the District's Code.

      Network users identifying a security problem on the District's network must notify the appropriate teacher, administrator or computer network coordinator. Under no circumstance should the user demonstrate the problem to anyone other than to the District official or employee being notified.

      Any network user identified as a security risk or having a history of violations of District computer use guidelines may be denied access to the District's network.

      When using personal technology in school and/or on the school's network, students shall comply with the District's policy on Student Use of Personal Technology.  Such instruction will be provided even if the District prohibits students from accessing social   networking sites or chat rooms on District computers.

    2. Prohibited Activity and Uses

      Active Restriction Measures: The District will utilize filtering software or other technologies in an effort to prevent Network users from accessing inappropriate content. Use of such software and technologies cannot, however, guarantee that all inappropriate sites will be blocked. It is not possible to list all examples of unacceptable use, but below is a list of examples of activity that is prohibited on the District's computer network. Unacceptable use of the District resources may result in discipline or other appropriate penalty, including suspension or revocation of a user's access to the network.
      • Using the network for commercial activity, including advertising.
      • Infringing on any copyrights or other intellectual property rights, including copying, installing, receiving, transmitting or making available any copyrighted software on the District computer network.
      • Using the network to receive, transmit or make available to others obscene, offensive, or sexually explicit material.
      • Using the network to receive, transmit or make available to others messages that are racist, sexist, abusive or harassing to others.
      • Using another user's account or password without that person's knowing consent.
      • Attempting to read, delete, copy or modify the electronic mail (e-mail) of other system users and deliberately interfering with the ability of other system users to send and/or receive email.
      • Forging or attempting to forge email messages.
      • Engaging in vandalism. Vandalism is defined as any malicious attempt to harm or destroy District equipment or materials, data of another user of the District's network or of any of the entities or other networks that are connected to the Internet. This includes, but is not limited to, creating and/or placing a computer virus on the network.
      • Using the network to transmit anonymous messages or files.
      • Using the network to receive, transmit or make available to others a message that is inconsistent with the District's Code.
      • Revealing the personal address, telephone number or other personal information of oneself or another person.
      • Using the network for sending and/or receiving personal messages not related to the District's goals.
      • Intentionally disrupting network traffic or crashing the network and connected systems.
      • Installing personal software on the District's computers and/or network without the permission of the Director of Technology and Innovation.
      • Using District computing resources for commercial or financial gain or fraud.
      • Stealing data, equipment or intellectual property.
      • Gaining or seeking to gain unauthorized access to any files, resources, or computer or phone systems, or vandalize the data of another user.
      • Wastefully using finite District resources, including bandwidth and storage.
      • Changing or exceeding resource quotas as set by the District without the permission of the appropriate District official or employee.
      • Using the network while access privileges are suspended or revoked.
      • Using the network in a fashion inconsistent with directions from teachers and other staff and generally accepted network etiquette.

    3. No Privacy Guarantee

      Users of the District's computer network and equipment should not expect, nor does the District guarantee privacy for electronic mail (email) or any use of the District's computer network or digital resources. The District reserves the right to access and view any material stored on District equipment, any of its digital resources, or any material used in conjunction with the District's digital resources.

    4. Theft and Device Protection

      Damage or loss of a device must be reported to the main office and School Resource Officer. Loss of a device as a result of theft must be reported within 24 hours of the occurrence. If insurance is purchased through the District, a police report number must be produced for the school to complete an insurance claim. When a device is reported lost or stolen, the device will be disabled rendering it unusable. If the device is not insured the student is responsible for the cost as determined by the Department of Technology and Innovation and building administration. Students are strongly encouraged to purchase insurance on a device they are issued either through the District or on their own.

    5. Returning Devices

      Students will return any issued device when requested on a date determined by administration. If a device is not returned, Brewster Central School District may avail itself of all legal options available to it for collection of the device or, if necessary, collection of the fair market value of the device.

    6. Sanctions

      All users of the District's computer network and equipment are required to comply with the District's policy and regulations governing the District's computer network. Failure to comply with the policy or regulation may result in disciplinary action as well as suspension and/or revocation of computer access privileges.

      In addition, illegal activities are strictly prohibited. Any information pertaining to or implicating illegal activity may be reported to the proper authorities. Transmission of any material in violation of any federal, state and/or local law or regulation is prohibited. This includes, but is not limited to materials protected by copyright, threatening or obscene material or material protected by trade secret. Users must respect all intellectual and property rights and laws.