Page+2

= = =Acceptable Use Policy for PCA and the Library=

Providence Creek Academy Acceptable use of Computers and Networks Policy A Message to all System Users This document formalizes the State policy for state agency and public school district employees as well as contractors and other “users” of our State’s communications and computer systems. Our goal is to put controls in place that will help protect the State from sabotage and espionage. The threat is real, as each month, DTI intercepts tens of thousands of viruses and suspicious messages containing executable files trying to bypass our security systems. These controls also help minimize the potential risks of misuse. This misuse includes unnecessary Internet usage causing network and server congestion. This Acceptable Use Policy is your (the user’s) guide for helping us achieve this goal by conducting State of Delaware business with integrity, respect, and prudent judgment. Each of us is responsible for upholding the State’s commitment to the highest standards of conduct. This Acceptable Use Policy is your resource to help you make sound decisions in using communications and computer systems to do your job.

WHAT ARE STATE COMMUNICATIONS AND COMPUTER SYSTEMS? State of Delaware communications and computer systems are any equipment, hardware, software or networks (including wireless networks) owned, provided or used by or on behalf of State of Delaware that store or transmit voice or non-voice data. This includes telephones, cellular/wireless telephones, voice mail, computers, e-mail, facsimiles, pagers, and State Intranet or Internet access (including when accessed through personal computers). __Applicability__ State of Delaware’s expectations for responsible use are applicable to all parties who use the State communications and computer systems on behalf of the State, including, but not limited to, its agency, school district, and affiliate employees, consultants, in-house contractors, and other “users.”

WHAT ARE STATE OF DELAWARE COMMUNICATIONS Access, Maintenance and Protection Users must safeguard the confidentiality and integrity of State systems. Users must abide by State standards contained in this section and other State policies regarding protecting data and information stored on these systems. All DTI standards are available at http://intranet.state.de.us/dti/current_standards.html. __Unlawful and Inappropriate Use__ Users are obligated to never use State systems (such as the Intranet or Internet) to engage in activities that are unlawful, violate State policies or in ways that would: _ Be disruptive, cause offense to others, or harm morale. _ Be considered harassing or discriminatory or create a hostile work environment. _ Result in State of Delaware’s liability, embarrassment or loss of reputation. External groups or organizations are not permitted to make announcements, solicitations or otherwise access the State’s Communications and Computer Systems, except as permitted by law.

__Protection and Integrity of Data__ Users must maintain the integrity of State Information and data stored on State systems by: _ Only introducing data into our systems that serves a legitimate business purpose. State of Delaware - Acceptable Use Policy _ Only acquiring, using, altering, disposing of, or destroying data or information with proper authorization. _ Protecting data and information stored on or communicated across our systems and not accessing this data or information (for example, agency data, employee records) unless authorized. _ Protecting data and information communicated over internal or public networks (for example, the Internet) to avoid compromising or disclosing nonpublic State Information or communications. Personal Use While State systems are intended for primarily business/instructional purposes, limited (incidental and occasional) personal use may be permissible when authorized by your management and it does not: _ Interfere with your work responsibilities or business/instructional operations. _ Involve interests in personal outside business and/or other non-authorized organizations and activities (which may include, but is not limited to selling personal property/items or soliciting for or promoting commercial ventures, charitable, religious or political activities or causes). _ Violate any of the standards contained in this code or other State of Delaware policies. _ Lead to inappropriate costs to the State. (Excessive personal surfing, utilizing streaming services such as listening to music or watching video, and downloading of music and video files are specifically forbidden.) Virus Protection Users must check all electronic media, such as software, diskettes, CD-ROMs and files for viruses when acquired through public networks (for example, the Internet) or from outside parties using virus detection programs prior to installation or use. If users suspect a virus, they must not use the applicable computer systems and equipment until the virus is removed and they will report the matter immediately to the appropriate network security contact. The Department of Technology and Information has purchased anti-virus software for all government sites including home computers. Similarly the Delaware Center for Educational Technology has purchased anti-virus software for all public K-12 schools. State of Delaware Monitoring State communications and computer systems, including, but not limited to, computer networks, data files, e-mail and voice mail, may be monitored and/or accessed by the State to ensure the integrity of the technology, protect against fraud and abuse, detect unauthorized access or use, and for other business purposes. Although the Department of Technology and Information (DTI) does not randomly monitor message or network transactions, DTI may without notification or approval, monitor, access and review any and all communications originating from the State of Delaware or delivered to the State of Delaware – employees should have no expectation of privacy in regard to use of these services. This is in accordance with 19 Del. C. chapter 7. State of Delaware - Acceptable Use Policy

USE OF EMAIL AND THE INTERNET Inappropriate use of e-mail includes, but is not limited to, sending or forwarding: _ Messages, including jokes or any language, that may be considered discriminatory, harassing, unlawful, defamatory, obscene, offensive, insensitive or otherwise inappropriate (this includes but is not limited to, messages about age, race, gender, disability, sexual orientation, national origin or similar matters). _ Pornographic or sexually explicit materials. _ Chain letters. _ Information related to religious materials, activities or causes, including inspirational messages. _ Charitable solicitations unless sanctioned by State of Delaware. _ Gambling. _ Auction-related information or materials unless sanctioned by State of Delaware. _ Games or other software or copyrighted materials without a legitimate business or instructional purpose (and then only according to the rights and licenses granted by the owner of the games, software or copyrighted material). _ Messages that disparage other companies or products. _ Large personal files containing graphics materials or audio files (such as photographs and music). _ Materials related to personal commercial ventures or solicitations for personal gain (for example, messages that could be considered pyramid schemes). _ Information related to political materials, activities or causes unless sanctioned or permitted by the State of Delaware. _ Unauthorized or inappropriate mass distribution of communication. _ Any other materials that would be improper under this policy or other State of Delaware policies. Inappropriate use of the Internet includes, but is not limited to, accessing, sending or forwarding information about, or downloading (from): _ Sexually explicit, harassing or pornographic sites. _ “Hate sites” or sites that can be considered offensive or insensitive. _ Auction or gambling sites. _ Non State of Delaware business-related chat sites. _ Underground or other security sites which contain malicious software and/or instructions for compromising State of Delaware security. _ Games, software, audio, video or other materials that we are not licensed or legally permitted to use or transmit or that are inappropriate, or not required by, State of Delaware business or instruction. _ Offensive or insensitive materials, such as sexually or racially oriented topics. _ Any other materials that would be improper under this policy or other State of Delaware policies. Inappropriate use of the Internet also includes: _ Intentional importation of viruses. _ Registering Internet domain names of the State of Delaware business/school district or those of third parties without authorization from DTI. Note: In order to perform their job duties (for example, network monitoring), specific State of Delaware employees may receive management approval exempting them from some of the above restrictions.

REMEDIAL ACTION When DTI learns of a possible inappropriate use, DTI will immediately notify the agency/school district or affiliate responsible, which must take immediate remedial action and inform DTI of its action. In instances where agencies/school districts or affiliates do not respond in a timely or reasonably appropriate manner, are "repeat offenders”, or if criminal activity is suspected, DTI will work directly with the proper authorities, and follow their guidance in determining appropriate action. Any inappropriate use of State communications and computer systems may be grounds for discipline up to and including dismissal based on the just cause standard set forth by Merit Rule 15.1, or collective bargaining agreement, whichever is applicable to the subject employee. Exempt employees shall be subject to appropriate discipline without recourse, except as provided by law.

Acceptable use of digital electronics in the library of Providence Creek Academy people’s material, plagiarism and citing works properly, acknowledging the author.
 * 1) Students must ask to use the printer and receive permission prior to printing any material.
 * 2) Students will be required to inform the librarian what they are researching and stay on task.
 * 3) Students should report any offensive information or “pop-ups” that occur while using the computers.
 * 4) Students are not to go to any sites that are not related with “school business”.
 * 5) Students are expected to be ethical and courteous while using the computers in the library.
 * 6) Students are expected to show responsible behavior and respect while using the computers in the library.
 * 7) Students are expected to comply with all the regular ethical standards regarding copying of other