Computing Resource Standards

Download the printable PDF

Introduction

Cornerstone Charter School  provides its students and employees wide access to information resources and technologies. With the advent of new forms of technology, Cornerstone  has recognized that the free exchange of opinions and ideas essential to academic freedom is furthered by making technological resources more accessible.

At Cornerstone , technological resources are shared by its users; misuse of these resources by some users infringes upon the opportunities of all the rest. As Cornerstone  is a public institution of higher education, however, the proper use of those resources is all the more important. That Cornerstone  makes its technology available for educational purposes requires users to observe Constitutional and other legal mandates whose aim is to safeguard equipment, networks, data and software that are acquired and maintained with public funds.

General Responsibilities

Computing resources (including, but not limited to, desktop and laptop systems, printers, central computing facilities, District-wide or classroom-wide networks, local-area networks, access to the Internet, electronic mail and similar electronic information) of the Cornerstone Charter School  are available only to authorized users, and any use of those resources is subject to these Standards. All users of Cornerstone’s computing resources are presumed to have read and understood the Standards. While the Standards govern use of computing resources District-wide, an individual community college or center may establish guidelines for computing resource usage which supplement (but do not replace or waive) these Standards.

Use of Cornerstone’s  computing resources, including websites created by employees, is limited to educational, research, service, operational, and management purposes of the Cornerstone Charter School  and its member institutions.

It is not Cornerstone’s  practice to monitor the content of electronic mail transmissions, files, or other data maintained in its computing resources. The maintenance, operation and security of Cornerstone’s  computing resources, however, require that network administrators and other authorized personnel have access to those resources and, on occasion, review the content of data and communications maintained there. A review may be performed exclusively by persons expressly authorized for such purpose and only for cause. To the extent possible in the electronic environment and in a public setting, a user’s privacy will be honored. Nevertheless, that privacy is subject to Arizona’s public records laws and other applicable state and federal laws, as well as policies of Cornerstone’s  Governing Board all of which may supersede a user’s interests in maintaining privacy in information contained in Cornerstone’s  computing resources.

Frequently, access to Cornerstone’s  computing resources can be obtained only through use of a password known exclusively to the user. It is the user’s responsibility to keep a password confidential. While Cornerstone  takes reasonable measures to ensure network security, it cannot be held accountable for unauthorized access to its computing resources by other users, both within and outside the Cornerstone  community. Moreover, it cannot guarantee users protection against loss due to system failure, fire, etc.

Much of the data contained in Cornerstone  records that are accessible through use of computing resources is confidential under state and federal law. That a user may have the technical capability to access confidential records does not necessarily mean that such access is authorized. A user of Cornerstone’s  computing resources is prohibited from the unauthorized access to, or dissemination of, confidential records.

Cornerstone  personnel are discouraged from offering advice to Cornerstone  employees regarding personal, non-job-related use, maintenance or repair of any computer equipment or software that belongs to such employees. Cornerstone  can assume no responsibility for any result from such advice.

Violation of any provision of the Standards could result in immediate termination of a user’s access to Cornerstone’s  computing resources, as well as appropriate disciplinary action. A violation of the Standards should be reported immediately to the appropriate administrator.

Prohibited Conduct

The following is prohibited conduct in the use of Cornerstone’s  computing resources:

  1. Posting to the network, downloading or transporting any material that would constitute a violation of Cornerstone Charter School  contracts.
  2. Unauthorized attempts to monitor another user’s password protected data or electronic communication, or delete another user’s password protected data, electronic communications or software, without that person’s permission.
  3. Installing or running on any system a program that is intended to or is likely to result in eventual damage to a file or computer system.
  4. Performing acts that would unfairly monopolize computing resources to the exclusion of other users, including (but not limited to) unauthorized installation of server system software.
  5. Hosting a website through the use of Cornerstone’s  computing resources without the use of “gsmith.org” in its URL. If an institution owns additional domain names, those services should directly reroute visitors to a “gsmith.org” domain and not host web pages directly.
  6. Use of computing resources for non-Cornerstone  commercial purposes.
  7. Use of software, graphics, photographs, or any other tangible form of expression that would violate or infringe any copyright or similar legally-recognized protection of intellectual property rights.
  8. Activities that would constitute a violation of any policy of Cornerstone’s  Governing Board, including (but not limited to) Cornerstone’s  non-discrimination policy and its policy against sexual harassment.
  9. Transmitting, storing, or receiving data, or otherwise using computing resources in a manner that would constitute a violation of state or federal law, including (but not limited to) obscenity, defamation, threats, harassment, and theft.
  10. Attempting to gain unauthorized access to a remote network or remote computer system.
  11. Exploiting any computing resources system by attempting to prevent or circumvent access, or using unauthorized data protection schemes.
  12. Performing any act that would disrupt normal operations of computers, workstations, terminals, peripherals, or networks.
  13. Using computing resources in such a way as to wrongfully hide the identity of the user or pose as another person.
  14. Bypassing a Proxy Server Firewall, or attempting to access web sites not contained in Cornerstone’s Internet Web White List.
  15. Connecting through remote access and NOT using proper security practices, including; Faculty and Staff must have approved Anti-virus software and anti-spy-ware software installed on their personal computers they use to remotely access any Cornerstone network, server, or computer systems.
  16. Students are strictly prohibited to change any computer settings or use backdoor access (defeat administrator computer policies) to access any files or computer settings.

Faculty, Staff and Student Personal Website Standards

Faculty, staff and students may use Cornerstone’s  computing resources for development of personal websites as a learning tool. Use of Cornerstone’s  resources for this purpose is a privilege, not a right. The development and maintenance of such a website is subject to the following Faculty, Staff and Student Personal Website Standards, as well as the General Standards for Use of Cornerstone’s  Computing Resources:

  1. The author of a website may not use the site to advertise personal services, whether or not for financial gain, nor for any commercial purpose.
  2. A website may not be created in such a way as to allow any person unauthorized access to Cornerstone’s  computing resources.
  3. The author of a website is solely responsible for the contents of the site. The home page of a personal website must display, or link to, the following disclaimer in a conspicuous manner:

    “This site is authored and maintained by [name of author]. It is not an official website of the Cornerstone Charter School , and Cornerstone  is not responsible for the contents of this site.” 

  4. Cornerstone  does not endorse the contents of any personal website. It is solely the author’s responsibility to ensure that the personal website comply with all relevant Standards, as well as state and federal law, and any relevant policy of Cornerstone’s  Governing Board.
  5. Upon discovery of a violation of any relevant Standard, Cornerstone  may unilaterally delete a personal website from its computing resources and terminate the author’s access to those resources.

Please Print And Sign This Form If You Agree With The Rules

By signing this form you are agreeing to the terms and computing rules set forth by Cornerstone Charter School.

Student or Faculty Name_________________________________

Student or Faculty Signature______________________________

Date_________________________________________