All school communication will be shared through our school app! DOWNLOAD THE APP TODAY!
The app will provide updates in real-time, the school calendar, easy school and staff contact, school menus, school resources, and more.
Should you have any questions, please contact Ms. Hardy via email, Brooke.Hardy@hu-ms.2org.
STUDENT EQUIPMENT USAGE AGREEMENT
Technology and Electronic Device Policies
HUMS provides technology for educational purposes and has strict guidelines for its use.
A. Authorized Electronic Device Policy (Cell Phones):
- Students are generally prohibited from possessing cell phones or other electronic devices on school property unless part of an IEP/504 plan or with written principal permission.
- Consequences for violation:1st Offense: Confiscation, parent pick-up, possible conference.
- 2nd Offense: Confiscation, parent pick-up, loss of cell phone privilege for the remainder of the school year, and other disciplinary action.
- The school is not responsible for lost, stolen, or damaged electronic devices.
B. Acceptable Use Policy (AUP) – Technology:
- Technology access is for “educational purposes only, not for public access service, a public forum, commercial use or for political lobbying.”
- Students are responsible for appropriate behavior on school networks; misuse is a privilege violation and can lead to revocation of access.
- Prohibited Actions (examples): Accessing networks outside of school without supervision, revealing personal information online, meeting online contacts in person, using profane language, transmitting inappropriate messages/images, online game playing/gambling (unless curriculum-related and supervised), accessing chat rooms/social networking sites (unless supervised and coursework-related), spreading viruses, engaging in illegal/criminal acts, installing unauthorized software, personal financial gain, reading/modifying other students’ files, sharing passwords, logging in with others’ accounts, modifying equipment.
- Violations can result in parent notification, loss of network/access privileges, legal action, and severe school disciplinary action.
C. Student Email and Electronic Collaboration:
- Students are prohibited from using school systems to violate laws, engage in harmful/deceptive/abusive content, jeopardize account security, obtain others’ passwords, violate network security, run “spam” processes, “crawl/scrape” content, copy significant content, or reverse engineer services.
- Strict rules against using unauthorized login credentials and sharing passwords.
- Expectation to “Communicate only in ways that are kind and respectful” and report threatening materials.
- Prohibited from using resources for criminal acts, unapproved business, or creating/transmitting content that violates the code of conduct (e.g., pornographic, threatening, discriminatory).
D. Student Use of Artificial Intelligence (AI):
- HUMS aims to empower students to use AI as a learning tool to expand critical thinking and problem-solving.
- AI “is not a tool to substitute students’ participation in the learning process” and requires active student engagement due to its imperfection.
- Students must use AI “for educational purposes only, adhering to the highest standards of academic integrity and respect for others.”
- Work products must be genuine reflections of student thinking, and all sources, including AI, must be properly credited.
- Misuse of AI: Using AI for any purpose other than enhancing learning and understanding under teacher direction is prohibited. This includes “cheating, plagiarism, bullying/cyberbullying, impersonations, creation of materials, or any activities that compromise the safety and privacy of individuals.” Consequences for misuse will follow the Code of Conduct.
- The AI usage policy is dynamic and will “continue to evolve as AI technology and use evolves.”
E. Video Conferencing:
- Guidelines for online learning environments, requiring “appropriate behavior,” “privacy and security,” appropriate attire/environment, punctual attendance and active participation.
- “Recording video conferencing sessions without the explicit permission of all participants is prohibited.”
- Misuse of tools will result in disciplinary action.
F. Supervision and Monitoring:
- School and Technology Administrators monitor IT resources for security and policy conformity.
- Administrators reserve the right to “examine, use, and disclose any data found on the school’s information networks” for health, safety, discipline, or security, and may furnish evidence to law enforcement.
- Google Suite in conjunction with Gaggle monitors potentially inappropriate online activities, blocking transmissions and forwarding incidents to Assistant Principals.
- All iPad and internet-accessible device use on campus is subject to HUMS’ content filter, which blocks inappropriate websites.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.