Skip To Main Content


  • Section I: Instruction

All students are responsible for their actions and activities involving school unit technology devices, network, and Internet services (which include, but are not limited to, Google’s G-Suite for Education), and for their digital files, passwords, and accounts. These rules provide general guidance concerning the use of the school unit’s computers/devices, network, and Internet services and examples of prohibited uses. The rules do not attempt to describe every possible prohibited activity by students. Students, parents, and school staff who have questions about whether a particular activity is prohibited are encouraged to contact a building administrator. These rules apply to all school devices and all school-provided devices wherever used, and all uses of school servers, Internet access, and networks regardless of how they are accessed.

RSU 21 is committed to the education of minors about appropriate online behavior, including interacting with other individuals on social networking websites, in chat rooms, and cyberbullying awareness and response. A Children’s Internet Protection Act (CIPA) compliant curriculum has been adopted and is being delivered to the Pre K-12 students of RSU 21. 


Acceptable Use

RSU 21’s devices, network and Internet services are provided for educational purposes and research consistent with the school unit’s educational mission, curriculum, and instructional goals. 

  1. Students must comply with all School Board of Directors’ (Board) policies, school rules, and expectations concerning student conduct and communications when using school devices, networks, and Internet services whether on or off school property.

  2. Students also must comply with all specific instructions from school staff and volunteers when using the school unit’s devices. 

  3. Students are required to provide their passwords for any school-issued computers/devices to appropriate administrator.


Prohibited Uses

Examples of unacceptable uses of school unit devices, networks, and/or Internet services that are expressly prohibited include, but are not limited to, the following:

  1. Accessing or Posting Inappropriate Materials – Accessing, submitting, posting, publishing, forwarding, downloading, scanning, or displaying defamatory, abusive, obscene, vulgar, sexually explicit, sexually suggestive, threatening, discriminatory, harassing, and/or illegal materials or engaging in “cyber bullying;”

  2. Illegal Activities – Using the school unit’s computers, networks, and Internet services for any illegal activity or in violation of any Board policy or school rules. The school unit assumes no responsibility for illegal activities of students while using school devices, networks, and/or Internet services;

  3. Violating Copyrights – Copying, downloading, or sharing any type of copyrighted materials (including music or films) without the owner’s permission (see Board policy/procedure EGAD – Copyright Compliance). The school unit assumes no responsibility for copyright violations by students;

  4. Copying Software – Copying or downloading software without the express authorization of the Technology Coordinator. Unauthorized copying of software is illegal and may subject the copier to substantial civil and criminal penalties.  The school unit assumes no responsibility for illegal software copying by students;

  5. Plagiarism – Representing as one’s own work any materials obtained on the Internet (such as term papers, articles, music, etc.).  When Internet sources are used in student work, the author, publisher, and website must be identified;

  6. Non-School-Related Uses – Using the school unit’s computers, networks, and Internet services for any personal reasons not connected with the educational program or assignments;

  7. Misuse of Passwords/Unauthorized Access – Sharing passwords, using other users’ passwords, and accessing or using other users’ accounts;

  8. Malicious Use/Vandalism – Any malicious use, disruption or harm to the school unit’s computers, networks, and Internet services, including but not limited to hacking activities and creation/uploading of computer viruses; and

  9. Unauthorized Access to Blogs/Chat Rooms/Social Networking Sites – Accessing blogs, chat rooms or social networking sites to which student access is prohibited.  



Avoiding School Filters

Students may not attempt to use or use any software, utilities, or other means to access Internet sites or content blocked by school filters. If a student believes filtering should be less restrictive on a temporary basis for specific, bona fide research purposes, he/she should discuss the matter with his/her teacher.


Compensation for Losses, Costs and/or Damages 

The student and his/her parents are responsible for compensating the school unit for any losses, costs, or damages incurred for violations of Board policies/procedures and school rules while the student is using school unit devices, networks, and/or Internet services, including the cost of investigating such violations. The school unit assumes no responsibility for any unauthorized charges or costs incurred by a student while using school unit devices, networks, and/or Internet services. 


Student Security

A student is not allowed to reveal his/her full name, address, telephone number, social security number, photograph, or other personal information on the Internet while using a school device without prior permission from a teacher. Students should never agree to meet people they have contacted through the Internet without parental permission. Students should inform their teacher if they access information or messages that are dangerous, inappropriate, or makes them uncomfortable in any way.


System Security

The security of the school unit’s devices, network and Internet services is a high priority. Any student who identifies a security problem must notify his/her teacher or building administrator immediately. The student shall not demonstrate the problem to others or access unauthorized material. Any user who attempts to breach system security, causes a breach of system security, or fails to report a system security problem shall be subject to disciplinary and/or legal action in addition to having his/her computer/device, network, and/or Internet service privileges limited, suspended, or revoked. 


Additional Rules for Technology Devices Issued to Students

  1. Devices are loaned to students as an educational tool and may be used for purposes specifically authorized by school staff and/or the MLTI program.

  2. Parents are required to attend an informational meeting before a device will be issued to their child. Both the student and his/her parent must sign the school’s acknowledgment form.

  3. Students and their families are responsible for the proper care of devices at all times, whether on or off school property, including costs associated with repairing or replacing the device. 

  4. If a device is lost or stolen, this must be reported to the building principal immediately. If a device is stolen, a report should be made to the local police and the building principal immediately.

  5. The Board’s policy and rules concerning computer and Internet use apply to use of devices at any time or place, on or off school property. Students are responsible for obeying any additional rules concerning care of devices issued by school staff.

  6. Violation of policies or rules governing the use of devices, or any careless use of a device may result in a student’s device being confiscated and/or a student only being allowed to use the device under the direct supervision of school staff. The student will also be subject to disciplinary action for any violations of Board policies/procedures or school rules. 

  7. Parents will be informed of their child’s login password. Parents are responsible for supervising their child’s use of the device and Internet access when in use at home. 

  8. The device may only be used by the student to whom it is assigned. 

  9. All use of school-loaned devices by all persons must comply with the school’s Student Computer/Device and Internet Use Policy and Rules.

  10. Devices must be returned in acceptable working order at the end of the school year or whenever requested by school staff.


Additional Rules for Use of Privately-Owned Technology Devices by Students

  1. Students are required to comply with all Board policies, administrative procedures, and school rules while using privately-owned devices at school. 

  2. Students have no expectation of privacy in their use of a privately-owned device while at school. The school unit reserves the right to search a student’s privately-owned device if there is reasonable suspicion that the student has violated Board policies, administrative procedures, school rules, or engaged in other misconduct while using the device.

  3. Personal device use may be denied if it is determined that there is not a suitable educational basis for the request and/or if the demands on the school unit’s network or staff would be unreasonable.

  4. The student is responsible for proper care of his/her privately-owned device, including any costs of repair, replacement, or any modifications needed to use the device at school. 

  5. The school unit is not responsible for damage, loss, or theft of any privately-owned device. 

  6. Violation of any Board policies, administrative procedures, or school rules involving a student’s privately-owned device may result in the revocation of the privilege of using the device at school and/or disciplinary action. 

  7. The school unit may confiscate any privately-owned device used by a student in school when a suspected violation of these rules has occurred. The contents of the device may be searched in accordance with applicable laws and policies.


Google G-Suite for Education 

The school unit will, at its discretion, create Google G-Suite for Education accounts for students. Accounts will be terminated when a student ceases to be a student in the school unit. Google G-Suite features will be enabled on a user-by-user-basis at the discretion of the Technology Director. Use of Google G-Suite is subject to Google’s acceptable use policy (a copy of which is available to employees upon request from the Information Technology Department), as well as all other school unit policies, procedures, and rules. The school unit maintains the right to suspend or terminate a student’s access to his or her account when it believes there has been a violation of school unit policy, procedure, rules, or of law. Students must, at all times, take reasonable measures to protect files and information in G-Suite, including, but not limited to, not sharing passwords or other login information, logging out of accounts when not in use, never attempting to access or accessing another user’s account without permission, and being careful and purposeful when deciding whether to share access to information with other students.        


Cross Reference:



Reviewed: 01/25/10

Revised: 03/04/13

Amended: 11/18/13

Amended: 05/19/14

Amended: 04/30/18


  • Section I