File: I.13.

IMPLEMENTATION OF A TECHNOLOGY INFRASTRUCTURE

To meet the goal that every high school graduate will be prepared fully for college, other post-secondary education or gainful employment the Board believes that a technology infrastructure should be present in the County schools. In order to meet this goal, 21st century technologies and software resources shall be provided in grades prekindergarten through 12.

To the extent practicable, technology resources shall be used:

v  To maximize student access to learning tools and resources at all times including during regular school hours, before and after school or class, in the evenings, on weekends and holidays and for public education, noninstructional days and during vacations; and

v  For student use for homework, remedial work, independent learning, career planning and adult basic education.

v  For student use for homework, remedial work, independent learning, career planning and adult basic education.

It shall be the goal of each school within the county to provide a technology infrastructure capable of supporting multiple technology-based learning strategies designed to enable students to achieve at higher academic levels. The technology infrastructure should

facilitate student development by addressing the following areas:

v  Mastery of rigorous core academic subjects in grades prekindergarten through eight by providing software, other technology resources or both aligned with state standards in reading, arithmetic’s, writing, science, social studies, twenty- first century learning skills and 21st century learning tools;

v  Mastery of rigorous core academic subjects in grades nine through 12 by providing appropriate 21st century technology tools aligned with state standards for learning skills and technology tools;

v  Attainment of 21st century skills outcomes for all students in the use of technology tools and learning skills;

v  Proficiency in new, emerging 21st century content;

v  Participation in relevant, contextual instruction that uses dynamic, real-world contexts that are engaging and meaningful for students, making learning relevant to life outside of school and bridging the gap between how students live and how they learn in school;

v  Ability to use digital and emerging technologies to manage information, communicate effectively, think critically, solve problems, work productively as an individual and collaboratively as part of a team and demonstrate personal accountability and other self-directional skills;

v  Providing students with information on post-secondary educational opportunities, financial aid and the skills and credentials required in various occupations that will help them better prepare for a successful transition following high school;

v  Providing greater access to advanced and other curricular offerings than could be provided efficiently through traditional on-site delivery formats, including increasing student access to quality distance learning curricula and online distance education tools;

v  Providing resources for teachers in differentiated instructional strategies, technology integration, sample lesson plans, curriculum resources and online staff development that enhance student achievement; and

v  Providing resources to support basic skills acquisition and improvement at the above mastery and distinguished levels.

(WVC §18-2E-7)

(P) I.13.1. Meeting SBP 2470 Requirements

To assure the accomplishment of the above student outcomes, the board shall implement the requirements of SBP 2470 which include the following:

v  Pendleton County shall have a county technology team and a comprehensive technology plan that is part of the Electronic Strategic County Improvement Plan.

v  Computer technology skills shall be included in all programs of study, particularly in the areas of career awareness, career exploration, experiential learning and for use in accessing post-secondary education information.

v  The board shall, whenever possible and appropriate, make available facilities and technology to facilitate distance learning.

v  The board, in cooperation with schools, shall, to the extent practicable and as funds and other resources are available, provide students (including those enrolled in adult basic educational), teachers, parents and citizens access to technology, especially computers, in the public schools during non-school hours.

v  The board shall provide staff development in the use of technology and its application in the teaching and learning process.

v  Local school improvement councils shall include in the Electronic Strategic School Improvement Plan mechanisms to foster the use, to the extent practicable and as funds and other resources are available, of school facilities for the purpose of accessing technology, especially computers, by students, teachers, parents and citizens during non-school hours.

v  Every school shall have a school technology team and a comprehensive technology plan that is part of the Unified School Improvement Plan. (September 30, 1997) Schools may choose to have the local school improvement council or the faculty senate or the curriculum team serve as the technology team.

v  Computer/technology skills shall be taught and utilized throughout the programs of study.

(P) I.13.2. Internet and Telecommunication Acceptable Use Procedures

The Pendleton County School System embraces the use of technology to promote educational excellence, resource sharing, assist innovative instruction; provide electronic access to a wide range of information and the ability to communicate. Use of our technology must be in support of education and/or research or for school business, support West Virginia Content Standards and Objectives, and be in accordance with all School Board Policies.

As the use of telecommunication networks by students increase, there is a need to clarify acceptable use and safety of those networks and to include federal regulations from the Children's Online Privacy Protection Act (COPPA) and the Children's Internet Protection Act (CIP A).

Privileges

v  The use of the Internet as part of an educational program is a privilege, not a right, and inappropriate or unauthorized use or safety violations could result in revocation or suspension of that privilege.

v  Each student who will access the Internet will be provided acceptable use training and shall have an acceptable use form, signed by a parent or legal guardian, on file.

Accountability and Responsibility

The use of telecommunications and or access to the internet is an extension of the educator’s responsibility in his/her classroom. Therefore, it is the educator’s responsibility to ensure classroom activities that utilize Internet-related technologies that focus on appropriate and specific learning goals and objectives. All student use of Internet-related applications must be authorized by the educator. Specific examples of unauthorized use include, but are not limited to the following:

v  Executing non-educational gaming.

v  Creating, storing, sending, or viewing pornographic material.

v  Downloading executable files, uploading, storing, or saving any games, music, utilities, screen savers, zip files, and/or executing viruses,

v  Using e-mail user ID's other than one's own ID.

v  Corrupting, destroying, deleting, or manipulating system data with malicious intent.

v  Violating safety and/or security measures when using e-mail, chat rooms, and other forms of direct electronic communications. Chat rooms and/or use of instant messaging programs are prohibited unless they are needed for educational use only and under the supervision of the instructor.

v  "Hacking'" or any other unlawful online activity.

v  Disclosing, using, or disseminating personal information regarding minors.

v  Users will respect the rights of copyright owners.

Due Process:

v  In the event that there is an allegation that a student has violated the school’s Acceptable Use Policy, his/her student service account will be disabled cutting off access to the school’s internal network and all internet websites until an administrative investigation may be conducted.

v  As a part of the administrative investigation, the student will be provided with a written notice of the alleged violation and an opportunity to present an explanation of the alleged breech of computer protocol.

v  Disciplinary actions will be tailored to meet the specific concerns related to the violation and to assist the student in gaining the self-discipline necessary to behave appropriately on an electronic network.

v  Disciplinary actions may include, but are not limited to, actions that are defined in The Student Code of Conduct, Violation Level I.

E-mail Accounts

v  The WVDE and WVNET can only monitor those e-mail accounts issued to the “access.k12.wv.us” server, which is administered by WVDE and WVNET. The responsibility for a “non-access.k12.wv.us” e-mail accounts lies with the administrator(s) and/or educator(s) identified as responsible for those students using alternative e-mail accounts or the administrator(s) and/or educator(s) identified as responsible for the e-mail server being used.

v  The privacy of electronic email cannot be guaranteed

v  Students are responsible for their individual accounts and should take all reasonable precautions to prevent others from being able to use their account. Under no conditions should students provide their password to another person. Students will notify a teacher or administrator if they have identified a possible security problem.

Web Publishing

v  The school's web page will adhere to the WVDE State Policy 2460. Every effort will be made to provide links relating to the county and school curriculum.

v  Student pictures and names may be published on the school/county web site at the discretion of the school/county. Parental permission will be obtained. Student's last names, home address, home telephone, credit card information, mother's maiden name, and other personal information should not be published.

Network Etiquette

Users are expected to aide by the accepted rules of network etiquette. These include, but are not limited to the following:

v  Be polite. Do not write or send abusive messages to others.

v  Use appropriate language. Do not swear, use vulgarities or any other inappropriate language.

v  Do not reveal the personal home address or phone number of students or colleagues. Messages related, to or in support of illegal activities may be reported to the authorities.

v  Do not use the Internet in a way that would disrupt the use of the Internet by others (e.g., downloading huge files during prime time; sending mass e-mail messages; annoying other users).

Security

Users who identify a security problem on the system must notify a system administrator. Users must not demonstrate the problem to others.

Plagiarism and Copyright Infringement:

v  Users will not plagiarize works that they find on the Internet. Plagiarism is taking the ideas of writings of others and presenting them as if they were original to the user.

v  Users will respect the rights of copyright owners. Copyright infringement occurs when an individual inappropriately reproduces a work that is protected by a copyright.

Vandalism

Vandalism will result in revocation of user privileges. Vandalism is defined as an attempt to harm or destroy data of another user or any connections that are part of the Internet.

Safety

v  Safety measures must be enforced to carry out policies at the state, county, and school to implement the intent of CIPA, COPPA and E-rate guidelines.

v  The WVDE, county school systems and schools, in partnership with WVNET will organize technical protection measures to guard against visual depictions that are "inappropriate to minors." Filtering will be installed at the state level for Internet access.

v  The county school system may also add other electronic filters at the local level.

Protecting the School’s Computer Network

v  Any attempt to disrupt the school’s computer network through viruses, modification or deletion of files is strictly prohibited.

v  Routine maintenance and monitoring of the system will be conducted to assure proper use of this electronic network.

(P) I.13.2.1 Internet and Telecommunications Access Consent and Waiver Form

Agreement and Parent Permission Form

After reading the AUP policy, please complete this form to indicate that you agree with the terms and conditions. The signatures of both student and parent/guardian are mandatory before Internet access may be granted. Use of the telecommunications network or telecommunication must be in support of education and/or research or for school business, support of the West Virginia Content Standards and Objectives and be in accordance with all Pendleton County Board of Education policies and State Board Policy 2460.

School Name______

STUDENT SECTION

I have read the Acceptable Use Policy concerning all computer usage. I agree to follow the rules contained in this Policy. I understand that if I violate the rules my privileges may be terminated or other disciplinary action taken.

User Name (please print)______Grade: ______

User’s Signature: ______Date: ______

PARENT SECTION

I have read the AUP policy for use of telecommunications in the school and have discussed this with my son/daughter. I understand that this access is for educational purposes only, and that it is the responsibility of my child to restrict his/her use to the classroom projects/activities assigned by the teacher. I also understand that my child cannot hold the teacher responsible for intentional infractions of the above rules.

Parent/Guardian (please print)-______

Parent/Guardian (signature) ______Date______

SCHOOL INTERNET WEB STIE STUDENT INFORMATION

I hereby give my permission to use the following information on the school web site. Initial all that you approve.

______Student’s first name ______Student’s photo

____ Student in group photo

This form will be kept in the school listed above. It will not be transferred to another school.

(P) I.13.3. Copyrighted Computer Software Use

All Pendleton County Board of Education employees shall adhere to copyright laws that apply to computer software. To discourage violation of copyright laws, the following compliance requirements are to be followed by all personnel utilizing County purchased copyrighted computer software.

v  Students enrolled in programs of study using copyrighted software shall be taught the ethical, practical and legal problems and potential consequences of software piracy.

v  Employees are expected to adhere to the provisions of P. L. 96-517, which permits the making of a single backup copy of copyrighted programs. Additional copies can only be made with the express written permission of the corporation, which holds the copyright to the program.

v  Illegal copies of copyright programs shall not be made or used on school equipment.

v  Under federal law, employees violating the copyright laws may be subject to fines, confiscation of material, and other criminal prosecution. Violations may also result in the employee's suspension and/or dismissal for insubordination or immorality.

Each principal shall establish practices to implement this policy at the school level. Yearly reminders of this policy should be made at the first faculty senate meeting of the year. (SBP 5711)