Computing Resource Standards
Introduction Cornerstone Charter School provides its students and employees wide access to information resources and technologies. With the advent of new forms of technology, Cornerstone has recognized that the free exchange of opinions and ideas essential to academic freedom is furthered by making technological resources more accessible. At Cornerstone , technological resources are shared by its users; misuse of these resources by some users infringes upon the opportunities of all the rest. As Cornerstone is a public institution of higher education, however, the proper use of those resources is all the more important. That Cornerstone makes its technology available for educational purposes requires users to observe Constitutional and other legal mandates whose aim is to safeguard equipment, networks, data and software that are acquired and maintained with public funds. General Responsibilities Computing resources (including, but not limited to, desktop and laptop systems, printers, central computing facilities, District-wide or classroom-wide networks, local-area networks, access to the Internet, electronic mail and similar electronic information) of the Cornerstone Charter School are available only to authorized users, and any use of those resources is subject to these Standards. All users of Cornerstone’s computing resources are presumed to have read and understood the Standards. While the Standards govern use of computing resources District-wide, an individual community college or center may establish guidelines for computing resource usage which supplement (but do not replace or waive) these Standards. Use of Cornerstone’s computing resources, including websites created by employees, is limited to educational, research, service, operational, and management purposes of the Cornerstone Charter School and its member institutions. It is not Cornerstone’s practice to monitor the content of electronic mail transmissions, files, or other data maintained in its computing resources. The maintenance, operation and security of Cornerstone’s computing resources, however, require that network administrators and other authorized personnel have access to those resources and, on occasion, review the content of data and communications maintained there. A review may be performed exclusively by persons expressly authorized for such purpose and only for cause. To the extent possible in the electronic environment and in a public setting, a user’s privacy will be honored. Nevertheless, that privacy is subject to Arizona’s public records laws and other applicable state and federal laws, as well as policies of Cornerstone’s Governing Board all of which may supersede a user’s interests in maintaining privacy in information contained in Cornerstone’s computing resources. Frequently, access to Cornerstone’s computing resources can be obtained only through use of a password known exclusively to the user. It is the user’s responsibility to keep a password confidential. While Cornerstone takes reasonable measures to ensure network security, it cannot be held accountable for unauthorized access to its computing resources by other users, both within and outside the Cornerstone community. Moreover, it cannot guarantee users protection against loss due to system failure, fire, etc. Much of the data contained in Cornerstone records that are accessible through use of computing resources is confidential under state and federal law. That a user may have the technical capability to access confidential records does not necessarily mean that such access is authorized. A user of Cornerstone’s computing resources is prohibited from the unauthorized access to, or dissemination of, confidential records. Cornerstone personnel are discouraged from offering advice to Cornerstone employees regarding personal, non-job-related use, maintenance or repair of any computer equipment or software that belongs to such employees. Cornerstone can assume no responsibility for any result from such advice. Violation of any provision of the Standards could result in immediate termination of a user’s access to Cornerstone’s computing resources, as well as appropriate disciplinary action. A violation of the Standards should be reported immediately to the appropriate administrator. Prohibited Conduct The following is prohibited conduct in the use of Cornerstone’s computing resources:
Faculty, Staff and Student Personal Website Standards Faculty, staff and students may use Cornerstone’s computing resources for development of personal websites as a learning tool. Use of Cornerstone’s resources for this purpose is a privilege, not a right. The development and maintenance of such a website is subject to the following Faculty, Staff and Student Personal Website Standards, as well as the General Standards for Use of Cornerstone’s Computing Resources:
Please Print And Sign This Form If You Agree With The Rules By signing this form you are agreeing to the terms and computing rules set forth by Cornerstone Charter School. Student or Faculty Name_________________________________ Student or Faculty Signature______________________________ Date_________________________________________ |