Computer Use Policy And User Agreement for Employees
The Mount Carmel Area School District encourages employees to learn to use its computer and technology resources,
including the Internet, in a creative and productive way. However, there are limitations on how these resources may be
used.
With this in mind, the Mount Carmel Area School District wishes to make user that all users understand the following:
ACCOUNT INFORMATION
1. Non-privacy of communications, messages, and files
: Users should have no expectation of privacy of their
communications, messages, and files made transmitted, received, or stored on or through District provided
computer resources. Even when computer resources may be password-protected, there is no special
confidentiality or privacy on communications, messages, or files. The user’s signature on this User Agreement
indicates the user’s agreement to this provision and the following understandings.
2. With no notice to the user, network administrators routinely monitor and make backup copies of certain District
computer resources, including but not limited to the desktop, network use, communication systems, E-mail
messages, and internet sites log, to assure the smooth functioning of the computer resources and that they have the
ability to view the user’s files, messages, or other communications.
3. With no notice to the user, network administrators may review the user’s files, messages, or other
communications and, if misuse of the computer resources is discovered, record or otherwise use them as a basis
for disciplinary action, up to and including termination, or use them as evidence in litigation. Misuse of District
provided computer resources may also result in prosecution under applicable federal and state laws and/or
required reimbursement to the District for damages.
4. The District may be subject to subpoenas or other court orders requiring the recording and/or release of the user’s
files, messages, or other communications, and that the District may comply with those subpoenas or court orders.
5. All data contained within District systems is the property of the District.
6. The network administrators may impose restrictions to ensure maximum performance and fairness to all users.
These restrictions may include, but are not limited to disk quotas, time restrictions, and concurrent connections.
7. Each user is responsible for backing up his or her files.
8. Users should be aware of any policy changes or updates. Users can check the account information section on the
Mount Carmel Area Web Page (http://www.mca.k12.pa.us
) for additional or updated information.
9. Accounts are available to all employees while he or she is employed with the district.
SECURITY GUIDELINES
1. Security is understood to include the control of access to information, protection of information against
unauthorized modification, and protection of systems against denial of service.
2. Users are responsible for understanding security guidelines and maintaining the security of the systems they are
using. Therefore, users are responsible for information system activity conducted under their username and
password.
3. All users must use only their assigned username and password when using District resources. Under no
circumstances should a user ever tell give out his or her password or allow anyone else to use your account.
Users who require access to another user’s files should see the computer engineer. If someone else uses your
account, it will be disabled without notice.
4. Periodically passwords will be checked for security. Users with guessable passwords will be required to change
them or will have his or her account disabled. Information on choosing a secure password is available on the
Mount Carmel Area Web Page.
5. Users are to report any observed violations of or attempts to violate District security to the computer engineer.
PERSONAL USE RESTRICTED
1. Personal use of District Internet resources must be at virtually no cost to the District.
2. Personal use of computers is restricted to Non-school hours.
INTERNET ACCESS
1. Network administrators will monitor all aspects of the system and will generate logs detailing all users’ access to
the Internet and E-mail, including sites visited, date, time, and duration of all sites visited by all users, and review
this log for conformity to the policy. Because of the nature of the Internet, users may inadvertently access sites