- Course of Study
- College Counseling
- Daily Schedule
- Documents and Forms
- Faculty Profiles
- Student Life
- Support Services
- Learning Center
- Upper School Advising
The Catlin Gabel School Information Technology
Acceptable Use Policy for Upper School Students
The Catlin Gabel School (“Catlin Gabel”) provides computer equipment, network access, Internet, and email access to students. These resources enhance the educational process by permitting students to use network access to collaborate and share information, learn new concepts and research diverse subjects. Technology is also a tool provided to enhance curriculum and student learning. It is not provided for entertainment purposes. Students are expected to make responsible choices when using technology.
Catlin Gabel has adopted this Acceptable Use Policy (“Policy”) to set guidelines for accessing the computer network, the Internet and email provided by Catlin Gabel. The guidelines are in place to protect the Catlin Gabel School and its students. Inappropriate use of technology exposes Catlin Gabel to risks including virus attacks, the compromise of network systems and services, and legal ramifications.
All Upper School students are required to review this Policy yearly. The policy will be reviewed in school each fall and a copy will be sent home for students to review with their parents. By reviewing this Policy, students agree to follow the rules set forth in this Policy. Parties agreeing to this Policy also understand that Catlin Gabel may revise the Acceptable Use Policy as it deems necessary. Catlin Gabel will provide notice of any changes by reviewing changes in the policy with students, posting a revised version of the Policy on its website or other electronic medium, posting changes in the US computer lab and library, and by providing written notice to the students.
This Policy applies to all Upper School students at Catlin Gabel. This Policy applies to all computer equipment owned or leased by Catlin Gabel. “Computer equipment” includes, but is not limited to, desktop and laptop computers, printers, scanners, digital cameras, personal digital assistants and wireless equipment. “Computer network” includes, but is not limited to, local and remote access to local and wide area networks both wired and wirelessly, file storage on servers, and printing services. “Internet and email access” includes but is not limited to World Wide Web access, email services and storage, and email web access from off campus.
4.1 General Use and Ownership
1. Authorized Catlin Gabel personnel have access to all computers owned by the school, used for school purposes, or connected to its network. The User may maintain access to files and email stored on his/her computer and on Catlin Gabel’s servers. However, to maintain the integrity and functionality of Catlin Gabel’s technology resources and to assure appropriate use, authorized individuals within Catlin Gabel may monitor, modify, delete, gain or limit access to all equipment, systems, network traffic, email, and electronic files at any time.
2. In keeping with Catlin Gabel’s philosophy, “Inspired Learning Leads to Responsible Action”, students’ personal use of technology must be reasonable and responsible.
3. Students, may not, under any circumstances, install software on school-owned machines without prior permission from the IT Staff.
4. Due to Catlin Gabel’s 501(c)(3) nonprofit status, Catlin Gabel computer equipment, networks, Internet or email access cannot be used for commercial venture or profit of any kind. Students should consult the head of their division if they have any questions regarding personal use.
4.2 Laptop Use
1. Students bringing personal laptops to school must follow Catlin Gabel’s acceptable use Policy while on campus.
2. Catlin Gabel will check laptops for anti-virus software prior to allowing them to attach to the network. Laptop Users are responsible for keeping all operating system updates and anti-virus definitions current at all times. Users will be trained in these procedures as needed.
3. Students using loaner school-owned laptops must adhere to additional guidelines. Laptops should be physically protected against loss, damage and theft at all times. Laptops should not be exposed to extreme hot or cold, such as in an unattended vehicle. Laptops should not be left unattended in any public space or vehicle. When not in use, the laptop should be kept in a heavily padded laptop case designed to protect it from accidental damage. Laptops should be locked in a locker or kept with the student.
4. School-owned laptops are not to be used for any for-profit or commercial venture of any kind.
5. Students may not install any software on school-owned laptops without prior consent from the IT department.
6. Students are responsible for keeping their personally owned laptop operating systems updated and anti-virus definitions current at all times. Users will be trained in these procedures as needed. The Catlin Gabel IT staff will routinely check machines for compliance.
7. Any laptop loss, theft, or damage should be reported immediately to the Division Head and a member of the Information Technology staff.
4.3 User Accounts
1. Students are provided Network accounts. Students with network accounts are required to adhere to all guidelines provided in this Policy.
2. Network Account includes both network and email access. Authorized Users are responsible for safeguarding their password and access. Accounts and passwords are not to be shared with other users.
3. The Account may be used during the time the User is a student of Catlin Gabel. Accounts will be deleted upon early departure or student expulsion. Graduates may have their accounts continued on a discretionary basis.
4.4 User Responsibilities
1. Technology security is the responsibility of all Catlin Gabel students who use Catlin Gabel’s technology resources.
2. If a User suspects a breach in their Account, they are to notify the IT staff immediately.
3. Users are expected to make a sincere effort to keep the systems they use secure and virus free. Users should perform routine maintenance to ensure operating system updates and anti-virus updates are current.
4. Users should refrain from opening email attachments that are from unknown sources or are suspicious in nature.
5. Users are not to install any software on school-owned machines without prior consent from the IT staff. Staff will check all software for license adherence, compatibility with other software and hardware, and academic appropriateness.
6. Users should log out of any computer if it will be left unattended.
4.5 Unacceptable Use
Catlin Gabel technology equipment and networks are for professional, academic, and administrative use. The following activities are, in general, prohibited:
1. Selling or purchasing any illegal substance.
2. Online gambling and gaming.
3. Accessing, transmitting, or downloading child pornography, pornography, sexually explicit or obscene depictions, or material that is in violation of sexual harassment laws;
4. Transmitting or downloading confidential information that the user is not legitimately entitled to access.
5. Unauthorized copying of copyrighted material is strictly prohibited. Copyrighted material includes but is not limited to digitization and distribution of photographs and articles from magazines, books or other copyrighted sources, copyrighted music, movies, games, and television broadcasts, and the installation of any copyrighted software for which Catlin Gabel or the end user does not possess an active license is strictly prohibited.
Uses that cause harm to others or damage to their property are unacceptable. Unacceptable uses include, but are not limited to the following:
1. Deleting, copying, modifying, or forging other Users' emails, files, or data. Disclosing one's Account password to other Users or allowing other Users to use one's Accounts;
2. Accessing another User’s email or network account without their permission, and as a result of that access, reading or forwarding the other User's e-mails or files without that User's permission;
3. Purposefully damaging computer equipment, files, data or the network;
4. Circumventing a Users' ability to access their Account or perform other required duties which use technology; (e.g. changing another User’s password).
5. Accessing, transmitting, downloading or executing computer viruses, Trojan horses or other harmful files, code or programs;
6. Purposefully hacking into any computer or degrading and disrupting network systems performance including but not limited to network sniffing, port scanning, packet spoofing, denial of service and forged routing information for any purpose;
7. Accessing, transmitting or downloading "chain letters" or any type of "pyramid schemes;"
8. Network use that greatly diminishes bandwidth availability including but not limited to online gaming, audio and video streaming, and large file downloads such as music, movies, television broadcasts, and software.
Unacceptable Email Uses include, but are not limited to the following:
1. Repeatedly sending unsolicited email messages, including the sending of “junk mail” or other advertising material to individuals who did not specifically request such material (email spam);
2. Any form of harassment via email, telephone, or paging, whether through language, frequency or size of messages;
3. Unauthorized use, or forging, of email header information;
4. Disguising one's identity, impersonating other users, or sending anonymous e-mail messages;
5. Solicitation of email from any other email address, other than that of the User’s account, with the intent to harass or to collect replies;
6. Creating or forwarding “chain letters,” “Ponzi” or other “pyramid schemes” of any type.
7. Posting the same or similar non-business-related messages to large numbers of usenet or listserv groups. (newsgroup spam);
Commercial uses are unacceptable. Unacceptable uses include, but are not limited to the following:
1. Selling or buying anything over the Internet for commercial financial gain; or
2. Using the Internet for commercial advertising, promotion, or financial gain; or
3. Conducting for-profit business activities and engaging in non-Catlin-related fundraising or public relations activities such as solicitation for religious purposes, lobbying for political purposes, or soliciting votes.
5.0 Internet Safety
Due to the anonymous nature of the Internet and Email it is important for students especially to follow safety precautions while using the Internet.
1. Catlin Gabel does not install Instant Messaging software on its Lower School Computers and removes it if found. Lower School students are not permitted to use Instant Messaging. Middle School Students are not permitted to using Instant Messaging during school hours unless assigned by teacher. Upper School students may use Instant Messaging during free time and during class at the instructor’s discretion.
2. Students should never give out identifying information—full name, home address, school name, or telephone number when signing up for a service, chatting, or posting to a public bulletin board. Students should use a pseudonym when posting information for school purposes.
3. Users, in general, should be cautious about providing personal information.
4. Users should never respond to email messages, chats or electronic forum items that are suggestive, obscene, belligerent, threatening, or make them feel uncomfortable.
5. All users should report and forward any messages to their Division Head and the IT Manager that are harassing, of a sexual nature, or threatening.
The use of Catlin Gabel’s computer equipment, network access, Internet services, and email access is a privilege, not a right, and inappropriate use may result in restriction or cancellation of the user’s Account and Internet access. Inappropriate use may lead to any disciplinary and/or legal action, including but not limited to suspension, expulsion from Catlin Gabel or criminal prosecution by government authorities. Catlin Gabel will attempt to tailor any disciplinary action to meet the specific concerns related to each violation.
|Chat||Instant real-time online discussion. Can be private or public. May involve 2 or more individuals.|
|Electronic Forum||An electronic bulletin board system that can be accessed through the Internet.|
|IM||Instant messaging; Instant real-time online discussion. Can be private or public. Involving 2 individuals|
|Spam||Unauthorized and/or unsolicited electronic mass mailings.|
|Streaming||A technique for transferring data such that it can be processed as a steady and continuous stream. It is especially useful for large multimedia files, but can be taxing on bandwidth.|
|Technology Resources||Includes but is not limited to computers, printers, network access, Internet access, network programs, bandwidth (wired and wireless), network file storage, hardware, and software.|