Skip To Main Content
graphic

 We envision classrooms in which teachers are confident and comfortable utilizing a wide variety of technology in new, exciting, and educational ways to maximize student engagement in learning. Student centered, technology infused instruction for every Gramon Family student as facilitated by every educator. 

GRAMON FAMILY OF SCHOOLS TECHNOLOGY ACCEPTABLE USE GUIDELINES 

The Gramon Family of Schools recognizes that access to technology in school gives students great opportunities to learn, engage, communicate, and develop skills that will prepare them for work, life, and citizenship. We are committed to helping students develop 21st Century technology and communication skills. To that end, we provide access to technologies for student and staff use. 

These guidelines outline the behaviors that students are expected to follow when using technologies in school or when using devices, including but not limited to computers & iPads. 

  • The Gramon Family of Schools wireless network is intended for educational purposes. 
  • All activity over the network or using school technologies will be monitored and retained. Access to online content via the network is restricted in accordance with our policies and federal regulations, such as the Children’s Internet Protection Act (CIPA). 
  • Misuse of school resources can result in disciplinary action. The Gramon Family of Schools makes a reasonable effort to ensure students’ safety and security online but will not be held accountable for any harm or damages that result from use of school safety or security. 
  • Users of the GFS Network or other technologies are expected to alert school faculty or administration immediately of any concerns for safety or security. 

 

WEB ACCESS: 

The Gramon Family of Schools provides students with access to the Internet, including web sites, resources, content, and online tools. That access will be restricted in compliance with CIPA.  

 

LIMITATION OF LIABILITY: 

The Gramon Family of Schools will not be responsible for damage, harm or theft to personally owned or district- owned technology devices. 

While the Gramon Family of Schools employs filtering and other safety and security mechanisms, and attempts to ensure their proper function, it makes no guarantees as to their effectiveness. 

The Gramon Family of Schools will not be responsible, financially or otherwise, for unauthorized transactions conducted over the school network. 

 

VIOLATIONS OF THE GUIDELINES: 

Violations of these guidelines may have disciplinary repercussions, including but not limited to: 

  • Suspension of network, technology, or computer privileges. 
  • Loss of device use for a determined period of time (student still responsible for all required work). 
  • Notification of parents/guardians 
  • Detention or suspension from school and school-related activities. 
  • Legal action and/or prosecution. 

 

We are pleased to offer students access to our Internet. To gain access to the Internet, all students must have parental/guardian permission. A permission form appears on the right side of the folder. If a parent/guardian prefers that his/her child not have Internet access, use of technology will still be possible for educational and therapeutic purposes. 

 

What is possible? 

Access to the internet will enable students to explore thousands of libraries, databases, museums, and other repositories of information and to exchange personal communication with other Internet users around the world. Families should be aware that some material accessible via the Internet may contain items that are illegal, defamatory, inaccurate, or potentially offensive. While the purposes of the school are to use Internet resources for constructive educational goals, students may find ways to access other materials. We believe that the benefits to students from access to the Internet in the form of information resources and opportunities for collaboration exceed the disadvantages. But ultimately, parents and guardians of minors are responsible for setting and conveying the standards that their children should follow when using media and information sources. Therefore, we support and respect each family's right to decide whether or not to apply for access. 

 

What is expected?  

Students are responsible for appropriate behavior on the school's computer network just as they are in a classroom or on a school playground. Communications on the network are often public in nature. General school rules for behavior and communications apply. It is expected that users will comply with our standards and the specific rules listed below. The use of the network is a privilege, not a right, and may be revoked at any time. The user is personally responsible for his/her actions in accessing and utilizing the school's computer resources. The students are advised never to access, keep, or send anything that they would not want their parents or teachers to see. 

Inappropriate materials or language -- No profane, abusive, or impolite language should be used to communicate, nor should materials be accessed which are not in line with the rules of school behavior. A good rule to follow is never view, send, or access materials which you would not want your teachers and parents to see. Should students encounter such material by accident, they should report it to their teacher immediately.

 

TECHNOLOGY ACCEPTABLE USE GUIDELINES 

These are guidelines to follow to prevent the loss of network privileges. 

 

  1. Do not use technology to harm other people or their work. 
  2. Do not damage technology or the network in any way. 
  3. Do not install illegal software, shareware, or freeware. 
  4. Do not violate copyright laws. 
  5. Do not view, send, or display offensive messages, videos or pictures. 
  6. Do not share your password with another person. 
  7. Do not waste limited resources such as disk space or printing capacity. 
  8. Do not trespass in another’s folders, work, or files. 
  9. Notify admin immediately, if by accident, you encounter materials which violate the guidelines of appropriate use. 
  10.  Be prepared to be held accountable for your actions and for the loss of privileges if the rules of appropriate use are violated.