The GAINS Network must be carefully navigated and used. Participants will be required to adhere to a set of policies and procedures, as set forth in detail below. Further, as the owner of the
Network, Greenwich Academy reserves the right to monitor the use by members and expressly agree and acknowledge that members do not have an expectation of personal privacy.
Violations of this acceptable-use policy may lead to withdrawal of the
Access privilege up to and including expulsion from the network.
Rights and Responsibilities
Every GAINS participant using the network has a responsibility to respect and protect the rights of every other user. Participants are expected to abide by the principles of academic and personal honesty and integrity in using the network. Any user who fails to adhere to her responsibilities under this policy shall be subject to discipline up to and including expulsion from the network. Further, students who observe or otherwise learn of violations of this policy are expected to report such misconduct to their site-coordinator
Monitoring of Computer Systems
Participants are responsible for appropriate behavior on the GAINS
Network. Communications on this network often are public in nature; therefore, an expectation of appropriate and respectful behavior and communications apply. It is expected that users will act in a responsible and legal manner at all times in accordance with state and federal laws in addition to their home school expectations.
As part of the monitoring and reviewing process, Greenwich Academy will retain the capacity to bypass any individual password. The network’s security aspects, such as personal passwords and the message delete function can be bypassed for these purposes. Greenwich Academy's ability to monitor and review is not restricted or neutralized by the remote nature of participant login.
Therefore, all users must be aware that they should not have an expectation of personal privacy in the use of this network.
Participant Conduct in Connection with the GAINS network
Conduct that constitutes inappropriate use includes, but is not
Limited to, the following:
• Creating, communicating or knowingly accessing or attempting to access any form of harassing, threatening or intimidating message, web site or other electronic material, at any time, to any person (such communications also may be a crime);
• Gaining or seeking to gain unauthorized access to computer systems; using, distributing, communicating or otherwise revealing another person's password or other personally identifiable information, including, but not limited to, the person’s name, user identification, password, account number, address, phone number, social security number or credit card number, under any circumstances;
• Knowingly accessing or attempting to access, trespassing or attempting to trespass in or tampering or attempting to tamper with any other person's folders, or files
• Creating, communicating, using or knowingly accessing or attempting accessing, downloading, viewing, sending or otherwise using or attempting to access, download, view, send or otherwise use any copyrighted material over the system in violation of applicable law;
• Using or attempting to use network for personal purpose in a manner that interferes or is inconsistent with the networks intended purpose/ educational programs, including, but not limited to, accessing, uploading, downloading or viewing or attempting to access, upload, download or view inappropriate links, web sites, addresses or other electronically available materials;
• Creating, communicating, using or knowingly accessing or attempting to access any material that is obscene, contains child pornography or is harmful to minors;
• Creating, communicating, using or knowingly accessing or attempting to access email communications or information on the Internet for non-educational purposes, including transmitting or receiving obscene, abusive, lewd, vulgar, rude, disrespectful, degrading, inflammatory, threatening, sexually suggestive or otherwise inappropriate language;
• Knowingly accessing or attempting to access the computer systems, internet or email of another person, including, but not limited to, another student;
• Using or attempting to use the network or information contained in the network for commercial purposes or financial gain; and/or using or attempting to use the computer systems for any form of illegal or inappropriate behavior.
• Participants expressly agree that they are responsible for rejecting the receipt of any links, web sites, addresses or other electronic material that violate these policies or their home school rules.
• If a particular behavior or activity is generally prohibited by law, GA policy or other schools’ rules, use of this network for the purpose of carrying out such behavior or activity also is prohibited.
• Misuse of the network or violations of these policies and/or school rules may result in loss of access.
• Any participant who is aware of problems with the use of this network or is aware of misuse of this network, should report this to her local GAINS network administrator.
• Most important, GA expects and encourages any student who receives any harassing, threatening, intimidating or other improper message or other communication or transmission through the network to report this immediately to the school site coordinator or network administrator at GA. It is the policy of Greenwich Academy and the GAINS network that no student should be required to tolerate such messages, communication and/or treatment, regardless of the identity of the sender of the message. Students must report these events immediately