Serving Grades K–5 | Now Enrolling for 2024-2025

Click here to apply for the 2024-25 school year! 

Serving Grades K – 6

Now Enrolling for 2024-2025

Click here to apply for the 2024-25 school year!

TECHNOLOGY & INTERNET SAFETY POLICY

The use of technology and computer resources at the School is a revocable privilege. Users who fail to abide by this policy may be ineligible to use the School’s computer facilities and may be subject to additional disciplinary action.

The School reserves the right to monitor and log technology use, to monitor file server space utilization by users, and examine specific network usage.

Students are expected to use the technology available at the School in a manner appropriate to the School’s academic and moral goals. Technology includes, but is not limited to, cellular telephones, beepers, pagers, radios, CD/MP3/DVD players, video recorders, video games, personal data devices, computers, other hardware, electronic devices, software, Internet, e-mail and all other similar networks and devices. Obscene, pornographic, threatening, or other inappropriate use of Technology, including, but not limited to, e-mail, instant messaging, web pages, and the use of hardware and/or software which disrupts or interferes with the safety and welfare of the School community, is prohibited, even if such uses take place after or off School property.

It is the policy of the School to: (a) prevent user access over its computer network to, or transmission of, inappropriate material via Internet, electronic mail, or other forms of direct electronic communications. Inappropriate material includes visual depictions that are obscene, child pornography, or harmful to minors. ; (b) prevent unauthorized access and other unlawful online activity and damage to school resources; (c) prevent unauthorized online disclosure, use, or dissemination of personal identification information of minors; and (d) comply with the Children’s Internet Protection Act (CIPA).

Unacceptable uses of Technology/Internet include but are not limited to:

  1. Violating the conditions of federal and Ohio law dealing with students and employees’ rights to privacy. Trespassing in others’ folders, work, or files; copying other people’s work or attempting to intrude onto other people’s files; using other users’ e-mail addresses and passwords.

  2. Using profanity, obscenity or other language which may be offensive to another user; sending messages with derogatory or inflammatory remarks about an individual’s race, sex, age, disability, religion, national origin or physical attributes via the Internet or Technology; bullying, insulting, intimidating, or attacking others; transmitting any material in violation of federal or state law. This behavior is punishable both on and off campus.

  3. Obtaining, viewing, downloading, transmitting, disseminating or otherwise gaining access to profanity, obscenity, abusive, pornographic, and/ or impolite language or materials, accessing materials in violation of the Student Code of Conduct. A good rule to follow is to never view, send or access materials that you would not want your instructors and parents to see. Should a student encounter any inappropriate materials by accident, he/she should report it to their instructors immediately.

  4. Violating copyright laws by illegally downloading or installing music, any commercial software, shareware, or freeware. You are required to strictly comply with all licensing agreements relating to any software. All copyright laws must be respected.

  5. Plagiarizing works through the Internet or other Technology. Plagiarism is taking ideas of others and presenting them as if they were original to the user.

  6. Damaging Technology devices, computers, computer systems or computer networks (for example, by the creation, introduction or spreading of computer viruses, physically abusing hardware, altering source codes or software settings, etc.).

  7. Using the Technology or the Internet for commercial purposes or activities, which is defined as offering or providing goods or services or purchasing goods of services for personal use, and includes, but is not limited to, the following:

    1. any activity that requires an exchange of money and/or credit card numbers;

    2. any activity that requires entry into an area of service for which the School will be charged a fee;

    3. any purchase or sale of any kind; and

    4. any use for product advertisement or political lobbying.

  8. Intentionally seeking information on, obtaining copies of, or modifying files, other data, or passwords belong to other users.

  9. Malicious uses of technology through hate mail, harassment, profanity, vulgar statements, or discriminating remarks.

  10. Neither the Internet nor any other Technology may be used for any purpose which is illegal or against the School’s policies or contrary to the School’s mission or best interests.

All users are expected to be responsible, courteous and thoughtful when using Technology and the Internet. Common sense should prevail. The use of the School computer network system should be in support of education and research, consistent with the educational mission or objectives of the School and in accordance with federal law, Ohio law and the Student Code of Conduct.

Students have no expectation of privacy with respect to the use of Technology, the Internet, intranet, e-mail or other technology-based communication methods. Maintenance and monitoring of the School network system may lead to the discovery that a student has or is violating School policy or the law. Violations of School policy, the Student Code of Conduct or the law may result in severe penalties, up to and including expulsion.

The School makes no warranties of any kind; either expressed or implied, that the functions or the services provided by or through the School technology system will be error-free or without defect. The School will not be responsible for any damage users may suffer, including but not limited to, loss of data, interruptions of service, or computer viruses. The School is not responsible for the accuracy or quality of the information obtained through or stored on the School system. The School will not be responsible for financial obligations arising through the authorized use of the system.

User Acknowledgment

The user also acknowledges and agrees that he/she is solely responsible for the use of his/her accounts, passwords, and/or access privileges, and that misuse of such may result in appropriate disciplinary actions (including but not limited to suspension or expulsion), loss of access privileges, and /or appropriate legal action.

The user must also know and further agrees that:

  1. Should the user transfer a file, shareware, or software that infects the technology resources with a virus and causes damage, the user will be liable for any and all repair costs.

  2. The user will be liable to pay the cost or fee of any file, shareware, or software transferred or downloaded, whether intentional or accidental.

  3. Should the user intentionally destroy information of equipment that causes damage to technology resources, the user(s) will be liable for any and all costs.

In accordance with the Children’s Internet Protection Act (“CIPA”), the School has placed a filter on its Internet access as one step to help protect its users from intentionally or unintentionally viewing inappropriate material. The School blocks the categories that are

determined to be potentially inappropriate, including visual depictions that are obscene, child pornography, and harmful to minors. However, families must be aware that some material accessible via the Internet contains illegal, defamatory, inaccurate, or potentially offensive language and/or images. While the goal of the School is to use Internet resources to achieve educational goals, there is always a risk of students accessing other materials. Parents should be aware of these risks.

By signing the Parent/Student Contract Page at the end of the Parent/Student Handbook, the parent and student agree:

  • To abide by all School policies relating to the use of technology.

  • To release all School employees from any and all claims of any nature arising from the use or inability to use the technology.

  • That the use of technology is a privilege.

  • That the use of the technology will be monitored and there is no expectation of privacy in any use of the technology.