Acceptable Use Policy

    The Internet is an electronic highway connecting thousands of computers all over the world and millions of individual subscribers. It provides access to the World Wide Web, information and news groups, experts in various fields, university library catalogues, the Library of Congress, etc.
    Internet access is available to students and teachers in the West Orange Public Schools. We are very pleased to bring this access to West Orange and believe the Internet offers diverse and unique resources to both students and teachers. Our goal in providing this service is to promote educational excellence in schools by facilitating resource sharing, innovation, and communication.
    However, with access to computers and people all over the world also comes the availability of material that is not of educational value in the context of the school setting. On a global network, it is impossible to control all materials and an industrious user may discover controversial information. We firmly believe that the valuable information and interaction available on this worldwide network far outweighs the possibility the users may find material not consistent with the educational goals of the district.

    Staff and students using the Internet do so as part of the educational process. Therefore, users must adhere to district guidelines which are provided here.  Internet access is a privilege, not a right. If a district user violates any of the acceptable use provisions outlined in this document, his/her use will be terminated and future access could be denied. Some violations may also constitute a criminal offense and may result in legal action. Any user violating these provisions, applicable state and federal laws, or posted classroom and district policies, is subject to loss of access privileges and other District disciplinary options.
    1) Guidelines
    • Vandalism and/or harassment will result in the cancellation of the offending user's access.
    • Vandalism is defined as any malicious attempt to harm or destroy data of another user or any networks that are connected to the system or the Internet backbone. This includes, but is not limited to, the uploading or the creation of computer viruses.
    • Must be in support of education and research consistent with district policy.
    • Must be consistent with the rules appropriate to any network being used/accessed.
    • Unauthorized use of copyrighted material is prohibited.
      Threatening or obscene material is prohibited.
    • Distribution of material protected by trade secret is prohibited.
      Use for commercial activities is not acceptable.
    • Project advertisement or political lobbying is prohibited.

    2) Netiquette

    • Be polite. Do not get abusive in your messages to others.
    • Use appropriate language. Do not swear, use vulgarities, or any other inappropriate language.
    • Do not reveal your personal address or phone number or that of anyone else.
    • Note that electronic mail (e-mail) is not guaranteed private.
    • Do not intentionally disrupt the network or other users.
    • All communications and information accessible via the network should be assumed to be private property.
    • Using the network for non-school related activities is not acceptable.
    • Copying software which is copyright protected is illegal. Illegal activities are strictly forbidden.
    3) Security
    Security on any computer system is a high priority, especially when the system involves many users. If you feel you can identify a security problem on the Internet, you must notify a teacher/system administrator. Any user identified as a security risk or having a history of problems with other computer systems may be denied access to the Internet. Such conduct would include but not be limited to:
    • Not following general rules of "netiquette" listed above.
    • Use of another individual's account [when they are assigned] without permission from that individual.
    • Attempts to log-in to the computer as a system administrator.
    • The placing of unlawful information on a system.
    • The sending of messages that are likely to result in the loss of recipients' work or system functionality.
    • The sending of "chain letters" or "broadcast" messages to lists or individuals, and any other types of use which would cause congestion of the network or otherwise interfere with the work of others.
    • The attempt and/or the intention to by-pass any security that has been established.
    • The attempt and/or the intention to access or transmit pornographic material.
    • The sending of messages that infringe upon the privacy of a third party.
    • Student use of the Internet for commercial gain.
Last Modified on March 31, 2021