• General Acceptable Use Policy


    The Sharon Schools has an Acceptable Use Policy and Responsible Use Agreements for ANY access to our equipment or network.  Students, Staff, and Guests must agree to these guidelines before being granted access to our services.  Below is a link to these documents.

    SPS Technology Policy Documents

    Acceptable Use Guide

    This guide applies to any use of a technology resource belonging to, in conjunction with, or on the premises of the Sharon Public Schools.

      1.Use only those computing and information technology resources for which you have authorization.

      For example: it is a violation

      i.to use resources you have not been specifically authorized to use

      ii.to use someone else's account and password or share your account and password with someone else. This includes but is not limited to anyservice offered by or in conjunction with the Sharon Public Schools (email,online classroom environments, wikis, blogs, etc) 

      iii.to access files, data or processes without authorization

      iv.to purposely look for or exploit security flaws to gain system or data access 

      v.to gain network access for personal equipment not monitored by the SPS Technology Department. (unplugging a school computer data cable and using it for a personal device or using the wireless passkey without registering your device with the Sharon Technology Department)

      2.Use computing and information technology resources only fortheir intended purpose.

      For example: it is a violation

      i.to send forged email

      ii.to misuse Internet Relay Chat (IRC) software to allow users to hide their identity, or to interfere with other systems or users

      iii.to use electronic resources for harassment or stalking other individuals

      iv.to send bomb threats or "hoax messages"

      v.to intercept or monitor any network communications not intended for you

      vi.to use computing or network resources for advertising or other commercial purposes

      vii.to attempt to circumvent security mechanism

      viii. to use privileged access for other than official duties

      ix.to use former privileges after graduation, transfer or termination 

      3.Protect the access and integrity of computing andinformation technology resources.

      For example: it is a violation

      i.to release a virus or worm that damages or harms a system or network

      ii. to prevent others from accessing an authorized service

      iii.to send email bombs that may cause problems and disrupt service for other users

      iv.to attempt to deliberately degrade performance or deny service

      v. to corrupt or misuse information

      vi.to alter or destroy information without authorization 

      4. Abide by applicable laws and school policies and respectthe  copyrights and intellectualproperty rights of others, including the legal use of copyrighted software.

      For example: it is a violation

      i.to make more copies of licensed software than the license allows

      ii.to download, use or distribute pirated software

      iii.to operate or participate in pyramid schemes

      iv.to distribute pornography to minors

      v.to upload, download, distribute or possess child pornography 

      5. Respect the privacy and personal rights of others.

      For example: it is a violation

      i.to tap a phone line or run a network sniffer without authorization

      ii.to access or attempt to access another individual's password or data without explicit authorization

      iii.to access or copy another user's electronic mail, data, programs, or other files without permission

      6. Abide by applicable laws and school policies in regards to inter-personal communication to an individual or group through the use of any medium or device.

      i.be polite and use appropriate language in your communications. This includes and is not limited to any communication through the following mediums; texting, chat clients, blogs, wikis, social networking sites etc.

      ii.Do not reveal personal information such as school name, address, phone number, or that of other students or colleagues online or elsewhere on the Internet (i.e. MySpace, Face Book, Twitter etc.). 

      iii.It is unlawful to use the school technology resources for illegal activities involving sex, violence or drugs.

      iv.Any possession of any pornographic material (including naked images of one?s self) no matter what the intended use is illegal on schoolgrounds. 

      v.Any possession of pornographic material involving a minor (any person under the age of 18) in any medium (picture, film , digital, print etc) including any stored on a jump drive or cell phone is subject to persecution under federal laws (18 U.S.C. §2256), 18 U.S.C. §2252, 18 U.S.C.§1466A. Please Note: Conviction under these laws leadto classification as a sex offender. 

      National Center for Missing & Exploited Children: What is Child Pornography?