Main Menu 

WCS Technology Acceptable Use Policy

NOTE: Each school has a separate form to sign and return to the school office. You can find those forms among the admissions forms.

Introduction

Wilmington Christian School has a commitment to provide programs for students to develop awareness, and a degree of proficiency, in the understanding and use of technology. Our goal is to integrate technology into all aspects of a student’s experience at WCS so that he/she can become a life-long learner and user of these resources. Our technological equipment is located in all of the classrooms and in other specialized areas of the campus. There has been a major investment of funds in order to provide our students with the appropriate technological resources for their education. Desiring to be good stewards of God’s provision for WCS, we have formulated this Acceptable Use Policy (AUP) for all persons involved in using school technology. As an overriding principle, we require those using school technologies, to exercise godly discernment and judgment, be willing to follow stated procedures, and show consideration to both the equipment and others in its usage. It is to be understood that there will be serious consequences for any inappropriate use, deliberate damage, or failure to follow directions in handling the equipment, including hardware, software, printers, scanners, cameras, etc. Willful destruction of school property is considered vandalism and will be dealt with in accordance with the WCS Discipline Code. In addition to appropriate discipline, restitution will be required for repairs or replacement of damaged equipment. Persons willfully or maliciously damaging, or violating this AUP will lose the privilege of using the school’s technology in the future. Personal equipment from home may not be brought to school without expressed written permission from the administration.

About this Document

This document presents the technology acceptable use policy of Wilmington Christian School. All users of WCS technology must use WCS technology in accordance with this policy. Separate policies and agreements exist for other aspects of technology use at WCS. This document contains several acronyms and italicized words or phrases. Definitions or descriptions of those acronyms, words, and phrases are provided in the last section.

Separate Policies & Agreements

General Guidelines

  • All usage is not to violate existing copyright laws.
  • All WCS technology equipment resides within the United States. WCS users are bound by U.S. laws concerning peer-to-peer file sharing networks.
  • Any violation of this AUP is to be reported to WCS administration
  • Installation of software of any kind on WCS clients or servers without express written permission from the director of technology is strictly prohibited.
  • Illegal Activity is strictly prohibited.
  • Inappropriate content is strictly prohibited.
  • Violating the rules, regulations, policies, or terms of any network, server, computer database, or web site will be considered a violation of these policies.
  • Removing WCS technology without the express written permission from the director of technology is strictly prohibited.
  • Use of technology equipment owned by the school must be normal and ordinnary

Security

  • Each user is responsible for the security of his or her account.
  • Passwords are to be kept confidential.
  • Leaving a workstation unattended and logged-in is strictly prohibited.
  • Locking a workstation without express written permission from the director of technology is strictly prohibited.
  • Any user who suspects his or her account has been used by someone else must report this to WCS administration.
  • Circumventing the security of any host, network or domain is strictly prohibited.
  • Cracking is strictly prohibited.
  • The use of laptops without express written permission of the director of technology is strictly prohibited.
  • Wireless networking without express written permission of the director of technology is strictly prohibited.
  • Serving without express written permission of the director of technology is strictly prohibited.

The User Community

  • Interfering with the operation of any WCS technology, the WCS domain or any host, network or domain is strictly prohibited.
  • Running automated tasks, unattended processes, bots, cron jobs, scheduled tasks, etc. without express written permission from the director of technology is strictly prohibited.
  • Running any process, unattended or not, that is run simply for the purpose of hindering the operation of the WCS domain or any host, network or domain is strictly prohibited.
  • Trespassing into other’s folders, files, or work is prohibited.
  • WCS technology is not to be used to harm other people or their work.

File Transmission & Data Storage

  • Each user is responsible to know where to save files. The hard drives in most clients are regularly ’emptied’ of files and folders. Saving work in the wrong place will result in data loss eventually.
  • Anonymous FTP without express written permission from the director of technology is strictly prohibited.
  • Binary files, including most kind of proprietary file formats (MS Word, Excel, etc.) must be transmitted via e-mail unless the user has express written permission of the director of technology to use another method.
  • Transfer of images and executable programs by any means without express written permission from the director of technology is strictly prohibited.
  • Use of removable media other than software purchased by WCS without the express written permission of the director of technology is strictly prohibited.
  • All file and data transfer over the WCS network must be normal and ordinary.
  • The transfer of inappropriate content is strictly prohibited.
  • The preferred method of file transfer is e-mail.

Definitions & Descriptions

WCS

Wilmington Christian School

AUP

Acceptable Use Policy

FTP

File Transfer Protocol

Illegal Activity

Posting, storing, transmitting or disseminating information, data or material which is libelous, obscene, unlawful, threatening, defamatory, or which infringes the intellectual property rights of any person or entity, or which in any way constitutes a criminal offense, give rise to civil liability, or otherwise violate any local, state, federal or international law, order or regulation.

Inappropriate Content

Posting, storing, sending, transmitting, or disseminating any information or material which a reasonable person could deem to be objectionable, offensive, indecent, pornographic, harassing, threatening, embarrassing, distressing, vulgar, hateful, racially or ethnically offensive, or otherwise inappropriate, regardless of whether this material or its dissemination is unlawful.

Removable Storage Media

Any medium used for the purpose of data storage and transport between computers and computer systems. This includes, but is not limited to, floppy disks, CDs, USB drives, flash drives, PDAs, phones, and digital cameras.

Circumventing

Accessing or attempting to access any host, network, domain, system, software, or data without proper authorization to do so; breaching the security of another user on any host, network, domain, or system; attempting to bypass the user authentication or security of any host, network, domain, system, server or client. This includes, but is not limited to, accessing data not intended for you, logging into or making use of a server or account you are not expressly authorized to access, or probing the security of other hosts, networks, or accounts.

Cracking

Using or distributing tools designed or used for compromising security, such as password guessing programs, decoders, password gatherers, analyzers, cracking tools, packet sniffers, encryption circumvention devices, or Trojan horse programs; network probing; port scanning; or using or distributing programs that remove locks or time-outs built into software (cracks).

Interfering

Restricting, inhibiting, or otherwise disrupt the ability of any other person, regardless of intent, purpose or knowledge, to use or enjoy the service of any host, network, domain, system, website, or database; posting or transmitting any information or software which contains a worm, virus, or other harmful feature, or generating levels of traffic sufficient to impede others’ ability to send or retrieve information; restricting, inhibiting, or otherwise disrupting or causing a performance degradation, regardless of intent, purpose, or knowledge, to any server, backbone network, node or service; issuing denial of service attacks; port-flooding; improperly seizing administrator or root privileges; or attempting to “crash” a server or client.

Serving

Reselling or otherwise making available to anyone outside of WCS the services of the WCS domain in whole or in part; or accepting inbound requests from any other client.This includes, but is not limited to, operating your own HTTP, FTP, email, proxy or print server; offering wi-fi, bluetooth, ad-hoc or other types of wireless connections to your client; sharing your files over the WCS network; running any kind of chat, talk, IRC, or IM service; or making your files available via peer-to-peer or distributed file sharing systems.

Normal and Ordinary

Any use of WCS technology or the WCS network that any reasonable person would find acceptable by faculty, staff, or students. Examples include, accessing the Internet for the purpose of developing lesson plans, completing a homework or classwork assignment, reinforcing a learning experience, or professional development.

"Wilmington Christian School takes what my children are learning at home and at church, and presents these same values in their education."

WCS high school parent