Skip to end of metadata
Go to start of metadata

School Internet Rules

Schools provide their students and faculty with internet access. Though the
free exchange of all information is what the internet embodies, there are many
categories of information which are not only poor in educational value, but
also offensive or harmful. As such, most schools have a standard of
acceptable use for the connection they provide. The policies of given districts
are influenced by the Children's Internet Protection Act (CIPA) , and therefore
share some similarities. The policies are typically written "in house" and as a
result do also include some variation. Below are some examples of the various    
parts of a school internet policy, including but not limited to: restricted content,
usage exclusions, safety guidelines, security procedures, and administrative


Restricted content includes that which is:                                                                                              

  • Defamatory
  • Inaccurate (libelous)
  • Abusive
  • Obscene
  • Profane
  • Sexually oriented
  • Threatening
  • Racially offensive
  • Illegal

Usage exclusions:

  • Transmission of any material that is restricted by United States or State regulation                              
    • Copyrighted material
    • Threatening or obscene material
    • Material protected by trade secret
  • Commercial activities by for-profit entities
  • Political lobbying
  • Other illegal activities

Safety guidelines:

  • No personal meetings to be arranged
  • Names not published barring some exceptions
    • School publications (newspaper)
    • First name only including the use of district email
  • Pictures are not published without express consent from student and parent                                   

Security procedures:

  • Any security risks must be reported to a system administrator
  • Passwords should never be shared with any other user for any reason
  • User accounts should only be used by the individual for whom it was created                                       
  • Any user identified as a security risk may have access privileges revoked

Administrative precautions:

  • Access is not guaranteed and shall be revoked is necessary
  • Restrictions and policies include faculty, staff, students, and administrators
  • A signed copy of the acceptable use policy should be obtained before issuance of an access account  
  • Administrators have absolute control over what constitutes acceptable use

References Cited:

  • No labels

1 Comment

  1. This is a great page.  Not only does it have good graphics and excellent information, but the navigation is clear and simple, and the accompanying links and video are relevant to the topic and great resources to have for future reference.