Code of Conduct
Internet Use and Access to Networked Information Resources
The school district’s secure network is provided to support instructional activities, including student research, testing, and assignment completion. Access to the secure network is restricted to authorized district-issued devices only.
The district also provides a guest network for limited internet access. The guest network is monitored and filtered in accordance with district policies and applicable laws.
Attempts to access the secure network without authorization or to bypass network restrictions are prohibited. All users must agree to use district network resources in a responsible and appropriate manner.
To ensure the proper use of technology, the staff will provide developmentally appropriate guidance to students as they make use of telecommunications and electronic information resources to conduct research and other studies related to the school curriculum. All students will be informed by staff of their rights and responsibilities as users of any district network prior to gaining access to that network, either as an individual user or as a member of a class or group.
Students may use the Internet and access networked information resources only if they have been granted permission and have submitted all required forms.
Permission is not transferable and may not be shared.
Parents may revoke their child’s access at any time by notifying the school in writing.
Students are responsible for good behavior on school computer networks just as they are in a classroom or a school hallway.
All school rules for student conduct and communications apply.
Technology Use Rules
Individual users of the PCSD’s computer networks are responsible for their behavior and communications over those networks. Users will comply with district standards and will honor the agreements they have signed. Network storage areas may be treated like school lockers. Network administrators may review files and communications to maintain system integrity and ensure that users are using the system responsibly. Users should not expect that files stored on district servers will be private.
During school, teachers of younger students will guide them toward appropriate materials. Outside of school, families bear responsibility for such guidance, as they must also exercise caution with information sources such as television, telephones, movies, radio, and other potentially offensive media.
Students Using School Technology Resources Shall Not
Send, download, display, or distribute offensive messages or pictures including, but not limited to, pornography, racist materials, vulgar jokes/cartoons, anti- religious propaganda, and ethnic insults.
Send, download, display, or distribute information that advocates violence and/or destruction of property or other violations of legal statutes.
Use obscene language.
Harass, insult, or attack others.
Use technology resources for non- educational purposes.
Damage computers, computer systems, or computer networks.
Change the setting on computers, computer systems, or monitor settings.
Are prohibited from using foreign vendors and software (SS-22-002). See Appendix A (below.
Use others’ passwords / logins.
Engage in practices that threaten the network (e.g. loading files that may introduce a virus, destroying data, etc.) and/or other computers and related technology.
Violate copyright laws.
Trespass in others’ folders, work, or files.
Waste limited resources (e.g. paper, disk space, cartridge ink, etc.).
Employ the network for commercial purposes.
Assist a public campaign for election of any person to any office (excluding student elections to school office).
Engage in any other such behaviors as may violate existing school and board policies.
A student and the parent/guardian will be responsible for damages and will be liable for costs incurred for service or repair.
Computers and Network Resources – Student Responsible Use Guidelines
Please read the following guidelines carefully. Violations of these guidelines may cause a student’s access privileges to be revoked, disciplinary action, and/or appropriate legal action may be taken. Students will be held accountable for any violation of the following policies (as would be the case for any classroom disciplinary matter). Students are not allowed to bring non-school issued technology devices.
A student and his/her parents will be responsible for damages and will be liable for costs incurred for service or repair.
Students are only allowed to utilize the computers and network to retrieve information and run specific software applications as directed by their teacher.
Students are not permitted to explore the configuration of the computer, operating system or network, run programs not on the menu, or attempt to do anything they are not specifically authorized to do.
Students are permitted to connect to the district network via the secure wireless connection provided by the school system, but all access must be in accordance with this policy. Students are NOT permitted to use their own computing devices to access the Internet via personal Wi-Fi accounts or by any manner other than connecting through the secure wireless connection provided by the school system.
Safety Issue Guidelines for Students
Be under the direction and with the supervision of a teacher for any online communication.
Never provide last name, address, telephone number, or school name online.
Never respond to and always report to the teacher or parent any messages that make an individual feel uncomfortable or that are from an unknown origin.
Never send personal photos of anyone else.
Never arrange face-to-face meetings with online contacts.
Never open attachments or files from unknown senders.
Always report to a teacher any inappropriate sites observed or accessed by another user, including accidental searches.
Examples of Prohibited Conduct (not limited to the following list)
Audio or video recording of any nature, regardless of the device, that is strictly prohibited except when consented to by the instructor and must be for educational purposes once consented.
Accessing, sending, creating, or posting materials or communications that are damaging to another person’s reputation; actions that are abusive, obscene, sexually oriented, threatening, or demeaning to another person; contrary to the school’s policy on harassment; and/or harassing or illegal.
Using the network for financial gain or advertising.
Posting or plagiarizing work created by another person without their consent.
Posting anonymously or forged electronic mail messages.
Attempting to read, alter, delete, or copy the electronic mail messages of other system users.
Giving out personal information such as phone numbers, addresses, driver’s license, or social security numbers, bank card, or checking account information.
Using the school’s computer hardware or network for any illegal activity such as copying or downloading copyrighted software, music or images, or violation of copyright laws.
Downloading, installing, or using games, music files, public domain, shareware, or any other unauthorized program on any school’s computer or computer system.
Purposely bringing on premises or infecting any school computer or network with a program designed to damage, alter, destroy, or provide access to unauthorized data or information.
Gaining access or attempting to access unauthorized or restricted network resources or the data and documents of another person.
Using, or attempting to use, the password or account of another person or utilizing a computer while logged on under another user’s account.
Using the school’s computers or network while access privileges have been suspended.
Using the school’s computer hardware, network, or Internet link in a manner that is inconsistent with a teacher’s directions and accepted network etiquette.
Altering, or attempting to alter, the configuration of a computer, network electronics, the operating system, or any of the software.
Attempting to vandalize, disconnect, or disassemble any network or computer component.
Utilizing the computers and network to retrieve information or run software applications not assigned by a teacher or inconsistent with school policy.
Providing another student with user account information or passwords.
Bringing on premises any computer, disk, or storage device that contains a software application or utility that could be used to alter the configuration of the operating system or network equipment, scan or probe the network, or provide access to unauthorized areas or data.
Downloading or accessing, via e-mail, file sharing or website, any software or programs not specifically authorized by technology personnel.
Bypassing or attempting to circumvent network security, virus protection, network filtering, or policies.
Possessing or accessing information on school property related to “hacking,” altering, or bypassing network security or policies.
Participating on social media sites without teacher direction or (e.g. Facebook, Twitter, and/or texting).
Connecting to or installing any computer hardware, components, or software which is not school system property or in the district’s technology resources without prior approval of the district technology supervisory personnel. (Students are permitted to connect to the district network via the secure wireless connection provided by the school system, but all access must be in accordance with this Acceptable Use Policy. Students are NOT permitted to use their own computing devices to access the Internet via personal Wi-Fi accounts or by any manner other than connecting through the secure wireless connection provided by the school system).
Internet Search Guidelines by School
Elementary Schools: Students in grades K—4 may visit sites pre-selected by a teacher. Searches may only be done with a student-safe search engine and must be done with staff supervision.
Middle School/Junior High School: Students in grades 5-8 may only perform unsupervised Internet searches using a student-safe search engine. A search using any other search engine must be conducted with teacher supervision. No unauthorized cell phone or other mobile device usage allowed.
High School: Students in grades 9—12 may use a general search engine. In compliance with the Children’s Internet Protection Act (CIPA) the PCSD has implemented filtering/blocking software restricting access to Internet sites containing inappropriate materials. However, no system is always effective and therefore, there is a risk a student using a search engine other than a student-friendly search engine could be exposed to objectionable materials. Any student who connects to such a site MUST immediately disconnect from the site and notify a teacher or supervisor.
Consequences of Violations
Violations may result in a loss of access.
Additional disciplinary action may be determined at the school level using the Discipline Matrix.
Portable Technology Use Guidelines
Use of Portable Technology Devices, such as Chromebooks, Digital Cameras, Scanners, Assistive Devices, etc., as with any other technology device, is subject to the rules and conditions contained with Acceptable Use and Technology procedures.
Individuals who have been assigned Portable Technology Devices must regard them as property of the Pickens County School District and assume the security and care of the device, all components and accessories.
Devices that are lost, stolen, or damaged will result in financial loss. If it is determined that the loss, theft, or damage are a result of an individual’s failure to comply with PCSD policies or procedures, the individual will be required to reimburse the PCSD for the cost of replacement or repair. Please do not deface or permanently mark on the device.
In cases of obvious neglect, abuse, or violations to the device, it will be taken from the individual and reassigned.
There should be no installation of unauthorized or illegal software on a PCSD device. If this occurs, the loss of data and reload of the device can result in financial reimbursement and/or privilege of the use of the device may be revoked.
Individuals must report lost, damaged or stolen equipment within 24 hours to the classroom teacher or school assigned technology staff. If units need to be sent out for repair, loaner units may be issued for use at school (if available).
Portable Devices must be immediately returned to the school staff upon request. The individual is responsible for returning all parts and accessories in working order.
Student Chromebook Replacement Costs:
Screen Replacement - $60
Keyboard Replacement - $50
Total Unit Replacement - $250
Appendix A
Prohibited Software & Services (SS-22-002)
Effective Date: 12/1/2022
Review Date: 02/21/2025
PURPOSE
Technology providers, products, applications, software, services, and websites may be developed, managed or connected to entities that have direct or indirect ties to those deemed unfriendly and/or hostile to the interests of the state of Georgia. These ties may include hostile private actors and/or foreign governments. As such, they may access, collect, store or process information from users and state systems, which poses an unreasonable and unacceptable level of risk to the state of Georgia.
The purpose of this standard is to secure the integrity and confidentiality of state information, data, and systems, and to prohibit the integration, use or deployment of certain Technology in state-owned, leased or otherwise controlled systems or equipment.
SCOPE AND AUTHORITY
O.C.G.A 50-25-4(a)(10)- State Government, Georgia Technology, General Powers
O.C.G.A 50-25-4(a)(21) - State Government, Georgia Technology, General Powers
PM-04-001 - Information Technology Policies, Standards and Guidelines
PS-08-005 - Enterprise Information Security Policy
TERMS AND DEFINITIONS
Technology - Providers, products, applications, software, services, and websites used to process, store, secure and exchange all forms of electronic data.
State entity - All state agencies, boards, authorities, and commissions of the executive branch of Georgia state government.
STANDARD
In the interest of maintaining the highest standards of security, all Technology shall be closely scrutinized by GTA, including the GTA Office of Information Security, for its overall risk to the state of Georgia and the enterprise.
GTA shall restrict or prohibit access and use of any Technology it deems to pose a risk to the state of Georgia and its networks. If required by GTA, a state entity shall immediately take necessary action(s) to remove all instances or access to the Technology and effectively prohibit further use of such Technology.
If after review of said Technology, it is deemed by GTA or the GTA Office of Information Security that the Technology presents an unacceptable level of risk to the security, confidentiality or operational integrity oi state data or systems, including a risk of unauthorized access by any entity that may fall under the jurisdictional reach of any foreign government or power, then that Technology shall be prohibited from use on state-owned, controlled or leased information technology systems and devices. If such Technology is already deployed, then immediate steps shall be taken to remove it from state of Georgia-owned, leased or controlled systems or devices.
The following list includes Technology that has been reviewed and deemed prohibited from use on state-owned, controlled or leased information technology systems and devices. If the following Technology is currently deployed on any state-owned, controlled or leased information technology system and devices, the state entity shall take immediate action to remove all instances or access and establish restrictions to further prohibit further use of such Technology.
Prohibited Vendors, Software and/or Services:
ByteDance products including but not limited to: TikTok, Lemons
Tencent Holdings products including but not limited to: WeChat
Telegram
Alibaba products and services
China Mobile International USA
China Telecom (Americas) Corp
China Unicom (Americas) Operations Limited
Dahua Technology Company
Hangzhou Hikvision Digital Technology Company
Huawei Technologies
Hytera Technologies
Kaspersky
Pacific Network Corp/ComNet (USA) LLC
ZTE Corporation
RedNote
DeepSeek
Webull
Tiger Brokers
Moomoo
State entities may request a one (1) year exemption to enable law enforcement investigations and other legitimate business use of prohibited vendors, software and/or services on state-issued devices pursuant to SM-11-007 - Exemption from State Policies and Standards by completing the "PSG Exemption Request" form and submitting it to GTA by emailing: gtapsg@gta.ga.gov. The "PSG Exemption Request" form shall identify the individual submitting the request on behalf of the agency.
A final decision to approve or deny the state entity's PSG Exemption Request shall be made by the State CIO who may also specify one or more conditions to be addressed by the state entity. The State CIO shall transmit the decision in writing to a senior executive of the requesting state entity and to the person who submitted the PSG Exemption Request.
If an extension is required, the exempted state entity shall submit a renewal request pursuant to SM-11-007 Exemption from State Policies and Standards thirty (30) days prior to the expiration of the approved exemption.
