Central Dauphin School District

600 Rutherford Road Harrisburg PA, 17109 • 717.545.4703

Quality to the Core

Policies & Procedures 
 
Access to the Districts' technology resources is a privilege granted soley to Central Dauphin School District administration, teachers, staff, students, and those with special accounts.  All users of the computing facilities must act responsibly and maintain the integrity of these resources.  The District reserves the right to limit, restrict or extend computing privileges and access to its resources.  Those who do not abide by the policies listed below should expect suspension of computer privileges, and disciplinary action up to and including dismissal or expulsion.
 
IT Services should be notified about violations of computers laws and policies, as well as about potential loopholes in the security of its computer systems and networks.  The user-community is expected to cooperate with IT Services in its operation of computer systems and networks as well as in the investigation of misuse or abuse. 

ITR001 - Technology Password Procedure
ITP002 - Change Management PolicyITR002 - Change Management Procedure
ITP003 - Logical Access PolicyITR003 - Logical Access Procedure
ITP004 - Backup PolicyITR004 - Backup Procedure
ITP005 - Virus Protection/End Point Security PolicyITR005 - Virus Protection/End Point Security Procedure
ITP006 - Information Security PolicyITR006 - Information Security Procedure
ITP007- Disposal of Digital Media PolicyITR007 - Disposal of Digital Media Procedure
ITP008 - Physical Security PolicyITR008 - Physical Security Procedure
ITP010 - Professional Development PolicyITR010 - Professional Development Procedure
ITP011 - Software Development PolicyITR011 - Software Development Life Cycle Procedure
ITP012 - Enterprise Application Rights Assignment PolicyITR012.01 - eFinancePlus User Account Audit Procedure

ITR012.02 - eSchoolPlus User Account Audit Procedure

ITR012.03 - IEPPlus User Account Audit Procedure

ITR012.04 - Cafeteria User Account Audit Procedure
ITP013 - Patch Management PolicyITR013 - Patch Management Procedure
ITP014 - Server & Network Event Log Monitoring PolicyITR014.01 - Server Event Log Procedure

ITR014.02 - Network Event Log Procedure


 

BOARD RELATED TECHNOLOGY POLICIES


In Accordance with Act 197
(Pennsylvania's Children Internet Protection Act), Central Dauphin School District is required to identify the technologies that are in use to filter/block Internet Access.   Central Dauphin School District uses Content Keeper appliance and filter. 
The school district's computing policies include, but are not limited to, the list below.
  1. You must not use a Network ID that was not assigned to you, unless multiple access has been authorized for the ID. You may not try in any way to obtain a password for another's computer ID. You may not attempt to disguise the identity of the account or machine you are using.
  2. You must not use the District's network resources to gain or attempt to gain unauthorized access to remote computers.
  3. You must not deliberately perform an act which will seriously impact the operation of computers, terminals, peripherals, or networks. This includes, but is not limited to, tampering with components of a local area network (LAN) or the high-speed backbone network, otherwise blocking communication lines, or interfering with the operational readiness of a computer.
  4. You must not attempt to modify in any way a program which the District supplies for any type of use at its sites.  
  5. You must not attempt to circumvent data protection schemes or uncover security loopholes.
  6. You must abide by the terms of all software licensing agreements and copyright laws. In particular, you must not make copies of copyrighted software, unless the District has a site license specifically allowing the copying of that software. Furthermore, you may not copy site-licensed software for use at locations not covered under the terms of the license agreement.
  7. You must not deliberately perform acts which are wasteful of computing resources or which unfairly monopolize resources to the exclusion of others. These acts include, but are not limited to, sending mass mailings or chain letters, creating unnecessary multiple jobs or processes, obtaining unnecessary output, or printing or creating unnecessary network traffic.
  8. You must not attempt to monitor another user's data communications, nor may you read, copy, change, or delete another user's files or software, without permission of the owner. 

Reminders

As an example, under Pennsylvania law, it is a felony punishable by a fine of up to $15,000 and imprisonment up to seven years for any person to access, alter or damage any computer system, network, software or database, or any part thereof, with the intent to interrupt the normal functioning of an organization (18 Pa.Sub Chapter B. 7611(a)(1)). Disclosing a password to a computer system, network, etc., knowingly and without authorization, is a misdemeanor punishable by a fine of up to $10,000 and imprisonment of up to five years, as is intentional and unauthorized access to a computer, interference with the operation of a computer or network, or alteration of computer software (18 PaSub Chapter B. 7611(a)(2 and 3)).
 
See PA Title 18 - Subchapter B - Hacking and similar offenses, for more information.
 
 
CLOSE