Skip To Main Content

Logo Image

Logo Title

Student Internet Use Agreement

Your physical signature or electronic agreement with the Bulloch County Schools Student Handbook Notices & Affirmation indicates that you have read the previously mentioned documents to which you are bound and by which your actions are governed if your child accesses the Internet at any time and under any circumstances as a student of Bulloch County Schools and grants express written consent to the use of the Internet and the school system’s digital media resources for students. To that end, Bulloch County Schools supports and respects each family’s right to deny Internet access and the use of Google Workspace for Education and other digital resources for their child. Parent(s) or legal guardian(s) may obtain a Request to Deny Internet Access form available in the principal’s office.

A.  Student Internet Appropriate Use Regulations and Administrative Procedures: The school district will enforce the following administrative procedures. Although some specific examples of prohibited uses by students are stated, they are intended as illustrations only and do not purport to be an all-inclusive list of inappropriate behaviors. Failure to comply with these administrative procedures shall be deemed grounds for revocation of privileges, potential disciplinary and/or appropriate legal actions.

B.  Terms and Conditions

a.  Acceptable Use: Access to the school’s Internet is provided for educational purposes and research consistent with the school system’s educational mission and goals.

b.  Privileges: The use of the school system’s Internet is a privilege, not a right. Inappropriate use may result in the cancellation of those privileges. The Superintendent or designee(s) shall make all decisions regarding whether or not a user has violated these policies and procedures and may deny, revoke, or suspend access at any time.

c.  Unacceptable Use: The user is responsible for all his/her actions and activities involving the network. Examples of prohibited conduct include but are not limited to the following:

  • Access of materials or communications meant for the following:
    1. To damage another’s reputation 
    2. To be abusive
    3. To be obscene
    4. To be sexually oriented
    5. To be threatening
    6. Contrary to the school system’s policy on harassment
    7. Harassing
    8. Unauthorized access including so-called “hacking" 
    9. Other unlawful activities
    10. Use of the network for any illegal activity, including violation of copyright or other contracts or transmitting any material in violation of U.S. and State regulations
    11. To copy or download copyrighted material on any system connected to the School System’s hardware/ software without the owner’s permission. Only the owner(s) or individuals specifically authorized in writing by the owner(s) may copy or download copyrighted material to the system
    12. To copy or download copyrighted material without the owner’s written permission - Copyrighted materials can only be distributed with the owner’s written permission. Such permission must be specified in the document or must be obtained directly from the owner in accordance with applicable copyright laws, Board policy and administrative procedures 
    13. Use of the network for private financial or commercial gain
    14. Wastefully using resources 
    15.  Use of any software that has the purpose to damage the unit’s system or user’s system
    16. To gain unauthorized access to resources or entities (hacking)
    17. To invade the privacy of individuals
    18. To use another user’s account or password
    19. To post material authorized or created by another without his/her consent
    20. To post anonymous messages
    21. To use the network for commercial or private advertising
    22. To engage in electronic mail forgery
    23. To attempt to read, delete, copy or modify the electronic mail of other system users and deliberately interfering with the ability of other system users to send/receive electronic mail
    24. Use of the network while access privileges are suspended or revoked
    25. Use of the network in a fashion inconsistent with directions from teachers and other staff and generally accepted network etiquette.
    26. The use of Generative AI programs is strictly prohibited unless expressly allowed by individual teachers and will be treated as plagiarism if identified.

d. Compensation: The student and/or the student’s parent’s/legal guardian(s) shall be responsible for compensating the school system for any losses, costs, or damages incurred by the school system relating to or arising out of any student violation of these procedures and policy.

e. Security: Network security is a high priority. If the student identifies or perceives a security problem or breach of these responsibilities on the Internet, the user must immediately notify the principal, his/her designee or other appropriate staff. They must not demonstrate the problem to other student users.

f. Vandalism: Vandalism will result in cancellation of privileges and other disciplinary action. Vandalism is defined as any malicious attempt to harm or destroy the school unit’s equipment or materials, data of another student, the Internet network, or agency. This includes but is not limited to the uploading or creation of computer viruses.

g. Telephone Charges: The Board of Education assumes no responsibility for any unauthorized charges or fees including but not limited to long distance charges, per minute surcharges and/or equipment or line costs.

h. Network Etiquette: The user is expected to abide by the generally accepted rules of network etiquette. These include but are not limited to the following:

  • Be polite. Do not become abusive in messages to others
  • Use appropriate language. Do not swear or use vulgarities or any other inappropriate language
  • Do not reveal the personal addresses or telephone numbers of any students
  • Recognize that electronic mail (E-mail) is not private. People who operate the system have access to all mail. Messages relating to or in support of illegal activities may be reported to the authorities
  • Do not use the network in any way that would disrupt its use by other users.
  • Consider all communications and information accessible via the network to be private property.
  • Limiting streaming music and video files for educational use only.

i. Unauthorized Disclosure: Unauthorized disclosure, use, and dissemination of personal information regarding minors are illegal under the Children’s Internet Protection Act. If you have questions about this policy and these procedures, you may wish to speak to your Principal, Media Specialist, and/or Technology Coordinator

j. Bullying: A pattern of behavior, which may include written, verbal, physical acts, or through a computer, computer system, computer network, or other electronic technology occurring on school property, on school vehicles, at designated school bus stops, or at school-related functions that is so severe, persistent, or pervasive so as to have the effect of substantially interfering with a student’s education, threatening the educational environment, or causing substantial physical harm or visibly bodily harm. (See Code of Conduct: Bullying)