Acceptable Use Policy
The Hill believes strongly in the ability of technology to transform learning, and, thereby, to transform lives. Technology puts the world at our fingertips, changes the way we teach, accelerates our understanding, and aids us in re-imaging the solutions to problems. It is a vital resource to the educational process, enabling each of us to learn in our own style. It has reshaped the way we look at and process information, forever changing the way we educate. The Hill School is an educational institution, and, to protect this valuable resource, this policy has been created to foster and protect the educational and instructional needs of the School. In so doing, this policy seeks to provide responsible shared use of the School’s technology resources.
AS TECHNOLOGY IS A RAPIDLY-CHANGING FIELD, REGULAR CHANGES TO THIS POLICY MAY NEED TO BE MADE TO REFLECT THOSE CHANGES. THE MOST RECENT VERSION OF THIS POLICY WILL ALWAYS BE POSTED ON THE SCHOOL WEBSITE OR CAN BE REQUESTED IN HARD COPY FROM THE SCHOOL. CONTINUED USE OF THE HILL SCHOOL’S TECHNOLOGY RESOURCES – IN ANY FASHION – CONSTITUTES YOUR AGREEMENT TO ABIDE BY ANY CURRENT AND UPDATED VERSIONS OF THIS POLICY.
Please also note that this policy does not in any fashion circumvent, override, or minimize any other policies, rules, and/or regulations of the School. Those policies, rules, and/or regulations remain in full force and effect when using the School’s technology resources.
No Expectation of Privacy There should be no expectation of privacy on The Hill School’s technology infrastructure. Any data that is traveling in or on; transiting in, out, or through; residing within; or otherwise accessible on the School’s technology infrastructure is subject to review at any time for any reason, and no notification will need to be made that such review has occurred. You understand that files stored on School servers are not private, and emails transiting our network – whether from a School email address or not – are not private and are subject to being reviewed as well.
Acceptable Use Policy and Off-Campus Access The School may discipline a student, faculty, or staff member for violating this policy while accessing the internet or the School’s technology infrastructure either on campus or away from campus when a user’s activity relates to or adversely affects the School or its students, faculty, or staff. This includes, but is not limited to, postings on social networking sites such as Facebook, Twitter, Snapchat, or Instagram.
Respect for Copyrights and License Agreements Software and data may be provided to you by the School which has been obtained by various contracts and/or licenses. You agree to respect the copyrights and/or license agreements for such programs and data, and you agree not to reverse assemble or reverse compile such programs in whole or in any part. If you are unclear as to whether you have permission to copy software or data, assume that you may not.
Code of Conduct
Your online behavior is a reflection of you and your work. Please be courteous and be respectful of both yourself and others. Unacceptable and/or inappropriate use of the School’s technology infrastructure will result in disciplinary action. Examples of unacceptable and/or inappropriate use include but are not limited to:
- Posting threatening or bullying comments or pictures.
- Using the School's technology resources for any illegal activity, including copyright violations, gambling, etc.
- Viewing pornographic, sexually explicit, violent, or threatening content.
- Using or possessing software which has been downloaded or is otherwise in the user’s possession without the appropriate registration of the software, including the payment of any fees to the owner of the software.
- Creating, modifying, or willfully disseminating computer viruses, spyware, adware, or other damaging programs.
- Falsifying an email message; i.e., make a message appear to come from someone who did not send it.
- Sending spam or mass emails or postings.
- Degrading or disrupting equipment or systems performance.
- Gaining unauthorized access to resources, data, or entities.
- Invading the privacy of others.
- Using the account of another user.
- Vandalizing the data of another user.
- Wastefully using a finite resource.
- Attempting to cover for bad behavior by using anonymity; i.e., posting hurtful anonymous messages.
- Violating system and infrastructure security and/or integrity in any fashion.
We appreciate your efforts to make sure that your online behavior is becoming of a member of the Hill community so that technology resources are available and accessible to all.
Exercise of Control The Hill School may exercise, cause, create, or put into effect any controls which it determines – in its sole and absolute discretion – are necessary to enforce this policy or to otherwise insure system stability, reliability, or integrity.
Violations In addition to other remedies available in the Handbook, violations of this policy may also include restriction or revocation of access to technology resources, either for a period of time or permanently. In order to make sure that all members of The Hill School community understand and agree to these rules of conduct, all students, faculty and staff are asked to sign a copy of this Acceptable Use Policy. All members of the community are to abide by these School policies in letter and spirit, and understand that violating them will result in disciplinary action by the School, up to and including dismissal.