1) Enforcing an acceptable use policy (AUP) requires strict monitoring of internet activity, such as daily review of browsing logs, and clear consequences for violations.
2) To ensure understanding, schools should explain the AUP to students, hold staff trainings, and involve parents. Activities like software that passively monitors for violations can help enforcement when used properly.
3) Minimizing violations involves using precise language in the AUP, frequent review, and approval from the school board to apply consistently across the district. Legal issues could arise if privacy or communication policies are violated in enforcement.
Original Description:
Education
Original Title
An Educator's Guide to Enforcing Acceptable Use Policies
1) Enforcing an acceptable use policy (AUP) requires strict monitoring of internet activity, such as daily review of browsing logs, and clear consequences for violations.
2) To ensure understanding, schools should explain the AUP to students, hold staff trainings, and involve parents. Activities like software that passively monitors for violations can help enforcement when used properly.
3) Minimizing violations involves using precise language in the AUP, frequent review, and approval from the school board to apply consistently across the district. Legal issues could arise if privacy or communication policies are violated in enforcement.
1) Enforcing an acceptable use policy (AUP) requires strict monitoring of internet activity, such as daily review of browsing logs, and clear consequences for violations.
2) To ensure understanding, schools should explain the AUP to students, hold staff trainings, and involve parents. Activities like software that passively monitors for violations can help enforcement when used properly.
3) Minimizing violations involves using precise language in the AUP, frequent review, and approval from the school board to apply consistently across the district. Legal issues could arise if privacy or communication policies are violated in enforcement.
Written by Kim Fitzer, Hinsdale Central High School, Hinsdale, Illinois
Original written by Jim Peterson, Bloomington School District, Bloomington, IL Introduction Because so many school districts across the country have adopted Acceptable Use Policies, the utilization and development of these policies now seem to be somewhat standard. Much has been written on the purpose and writing of a good Acceptable Use Policy, so this paper will not dwell on these topics. However, several key issues have arisen in conjunction with the adoption of Acceptable Use Policies in recent months, and it may be important to investigate the ramifications of these issues. This paper will primarily focus on the enforcement of acceptable use policies, and additional considerations which may have to be made by school technology administrators and staff. Issues Involved with Enforcing Acceptable Use Policies A school's acceptable use policy is useless unless it is strictly enforced. A school district may have an ironclad policy which staunchly protects itself and its users from engaging in "illegal" activities, and may have state-of-the art security measures such as firewalls and tracking and filtering software installed on its servers. However, the bottom line is, unless the staff, students, parents and administrators are prepared to continually monitor Internet use, an acceptable use policy means nothing to the very people is is supposed to legally protect. The following are examples of how schools can enforce the acceptable use policy, and make the consequences for violating the policy swift and consistent. If an AUP states that all users' activities will be monitored, then the school IT staff needs to be sure that it is doing just that. The school server should maintain an "Internet log" or history of all sites visited by users. Furthermore, this log should be reviewed daily, to determine if unacceptable activity has taken place and where. If users are aware from the beginning that their goings and comings on the Internet will be observed, and that noncompliance will result in their being barred from the use of the system, inevitably fewer problems will arise (1). If the school employs the use of filters to block unacceptable content, there needs to be an understanding that filters cannot possibly block all questionable content, and may block material that is useful to staff and students. Where filters fail, a very well-written AUP can take over. The AUP should be very clear on what kinds of content is considered unacceptable, whether it be chat rooms, news groups, pornography, sites that promote hate or violence, term paper vending machine sites, gaming, or any other questionable material. By avoiding generalities and vague language in the drafting of the AUP, districts can minimize their liabilities in the even that the filters fail (2). In order to be sure that students, staff and parents understand the provisions within and consequences of violating the AUP, merely requiring the users signature may not be enough. Explaining the AUP to students in an open discussion forum, holding staff inservices on the provisions of the AUP and how to effectively use the Internet, making recommendations for meaningful assignments that use the Internet, restructuring An Educator's Guide to Enforcing Acceptable Use Policies http://education.illinois.edu/wp/crime-2002/aup.htm 1 of 5 2014-10-15, 3:10 computer labs so that all computers are visible from a single location, and involving parents in their child's computer usage are all steps that a school can take to ensure compliance with their AUP (3). Further monitoring of the school's network, especially in schools with extremely heavy technology use, may require the use of software that only activates when violations have occurred within the system. Products such as eSniff and VIEW passively sit on the school's server and do not activate until the linguistic and analyzing technology detects inappropriate use. Without the user's knowledge, the software then alerts the proper authorities and auto-saves the offending document for the administrator to view to determine if an infraction has occurred. The software also logs the time and IP address of the computer used. While this seems like a violation of privacy, one of the main features of an AUP is to notify users that they essentially have no right to privacy if they use an institution's system (4). Further, the use of a product such as this allows a greater freedom in the use of the Internet for educators and students, while only limiting unacceptable use. Filtering software is not needed (5). Minimizing Potential for AUP Violations As stated before, the enforcement of an AUP really requires strong support from everyone in the educational community: administrators, teachers, support staff, parents, and of course, students. If an AUP exists only as a document and not an inviolable entity within the culture of the school, transgressions will occur. Further, steps taken prior to the need to enforce the AUP is perhaps the best approach. Several precautions can be taken to ensure that the AUP is followed: Use clear and precise language: A well-written document will eliminate confusion and minimize liabilities for students, staff and administrators. Be sure to carefully list all circumstances in which a violation may occur and avoid generalities. Frequently review and revise the AUP. Make sure that all technology bases are covered, and eliminate any legalese that may seem deliberately confusing to the average reader (6). It may also help to consult all parties in the community to find out where the areas of concern are, and address them in the AUP. For instance, if a teacher feels that students should not be playing games, even in their free time in her computer lab, but other teachers do allow it, then a consensus needs to be reached regarding games and stated so in the AUP. Make sure that the AUP is school board approved for the entire district. Legal implications (which will be discussed later ) as well as conflicting information may arise if the school board has no knowledge of or has not voted on the provisions within the policy, especially if every school in the district drafts their own. Once again, clear and precise stipulations for accountability, consequences, what constitutes improper and proper use, liability limitations, codes of conduct, and establishment of a review and audit process should be spelled out carefully and agreed upon by the school board, in the event violations do occur (7). Legal Implications An Educator's Guide to Enforcing Acceptable Use Policies http://education.illinois.edu/wp/crime-2002/aup.htm 2 of 5 2014-10-15, 3:10 Because violations of a school's AUP can and do occur, even with the most ironclad of documents, schools need to be aware of the potential legal ramifications that may arise should a student or staff member be reprimanded for a transgression. Several cases have developed which illustrate the need for extensive research prior to drafting an AUP, so that the legal pitfalls may be avoided. In a lawsuit filed by a member of the community and parent of a student, Exeter Regional Cooperative School District's AUP was called into question when it was discovered that the Internet logs the district's servers regularly recorded were not being monitored. Furthermore, when the logs were requested by the community member for perusal, the district refused and called on their own right to privacy. Courts take a dim view of this claim, particularly when the Internet logs are intended to monitor Internet use, which is itself not subject to invasion of privacy guarantees. If the district is monitoring Internet use, there can be no claim for an invasion of privacy, by any parties involved (8). As the AUP is written for and protects the school community, the school community also needs to be aware of how the AUP applies to them. Some members of the community, such as parents and school board members may think that an AUP does not apply to them because they are not direct users of the school's system. However, an AUP should cover all electronic communication, and in particular the wording of that communication. Failing to regard "netiquette" when sending emails can subject the author to libel at the worst, and an embarrassing situation at the least. Many states have enacted "sunshine laws" requiring that when two or more school board members gather, an actual meeting is taking place and therefore subject to public disclosure. Using e-mail to voice opinions and views about faculty, administration, other board members, parents, students or board policies may be a violation of the sunshine laws, or may open the school board to litigation by the offended party (9). And some schools have taken steps to minimize teacher harassment by parents through e-mail by adding a parental code of conduct to their AUP (10). While there are currently no lawsuits regarding inflammatory and defamatory language from parents pending, the potential may exist in some areas. Frequently Asked Questions (FAQ) How can I be sure that my school's AUP is enforceable? Review the school's AUP and use the above guidelines as a reference. If the AUP seems to contain vague language, or is written in legalese, or seems to be too general in terms of what it will and won't permit, the AUP may need to revised. Also, it may be helpful to take the AUP to a member of the Language Arts Department (if that is not your subject area), and have the document scanned for improper wording, misspelling, or other potential problems (11). Remember, if it is not clear to you, a highly-educated individual, then it will not be clear to your students. What should I do if one of my students has violated the district's AUP? First, make sure that a violation has occurred. If your district does not employ tracking or "smart" technology, then it may be that your district has passed the An Educator's Guide to Enforcing Acceptable Use Policies http://education.illinois.edu/wp/crime-2002/aup.htm 3 of 5 2014-10-15, 3:10 accountability reins to you. Be aware of what content areas and transgressions constitute a violation, and then compare what the student has done with those provisions. If a violation has occurred, then the issue should be taken directly to the dean of students, or any other disciplinary team in the building. At this point it is out of your hands. The absolute worst action would be to take no action at all. This conveys several negative messages to your students: 1) That the AUP is essentially worthless, and that computer use violations are acceptable in your classroom. 2) That your authority can be challenged. As any teacher knows, one of the keys to a good classroom management plan is maintaining a position of authority when classroom or school rules have been violated. Annotated Web Site Directory (1) November 1, 2000. David A. Splitt. Ethics and Law -- "Acceptable-use policies are useless unless strictly enforced." Published online in eSchool News Online. http://www.eschoolnews.org/news/showStory.cfm?ArticleID=1764 (2) July 1, 2001. David A. Splitt. "Back up your filtering with an airtight AUP." Published online in eSchool News Online. http://www.eschoolnews.org /news/showStory.cfm?ArticleID=2755 (3) January 1, 2001. "Five Keys to Supporting an Acceptable Use Policy." abstracted from "Setting Standards for Acceptable Use" by Jerry Crystal, Cherie A. Geide, and Judy Salpeter Technology & Learning, November 2000, p. 24. Published online in eSchool News Online. http://www.eschoolnews.org/news/showStory.cfm?ArticleID=2150 (4) November 1, 2000. David A. Splitt. Ethics and Law -- "Acceptable-use policies are useless unless strictly enforced." Published online in eSchool News Online. http://www.eschoolnews.org/news/showStory.cfm?ArticleID=1764 (5) 2002. Vericept Corporation. "Content monitoring, blocking and filtering: a comparison." http://www.vericept.com/solutions/education_monitor.shtml (6) November 1, 2001. David A. Splitt. "Give your AUP a fall tune-up--here's how." Published online in eSchool News Online. http://www.eschoolnews.org /news/showStory.cfm?ArticleID=3135 (7) October 1, 2001. David A. Splitt. "Understanding the P in AUP." Published online in eSchool News Online http://www.eschoolnews.org/news/showStory.cfm?ArticleID=3055 (8) November 1, 2000. David A. Splitt. Ethics and Law -- "Acceptable-use policies are useless unless strictly enforced." Published online in eSchool News Online. http://www.eschoolnews.org/news/showStory.cfm?ArticleID=1764 (9) 2002. Kathleen Vail. "The Perils of E-mail." Published online in the American School Board Journal. Cover Story, September 2002. http://www.asbj.com/current/coverstory2.html An Educator's Guide to Enforcing Acceptable Use Policies http://education.illinois.edu/wp/crime-2002/aup.htm 4 of 5 2014-10-15, 3:10 (10) September 5, 2000. Cara Branigan. "Fear of flaming leads school to issue eMail code of conduct to parents." Published online in eSchool News Online. http://www.eschoolnews.org /news/showStory.cfm?ArticleID=1324 (11) November 1, 2001. David A. Splitt. "Give your AUP a fall tune-up--here's how." Published online in eSchool News Online. http://www.eschoolnews.org /news/showStory.cfm?ArticleID=3135 "Sunshine laws." Published online in the First Amendment Handbook by Reporters Committee for Freedom of the Press. Chapter 9, Sec. 3 http://www.rcfp.org/handbook/viewpage.cgi?0903 7 August 2002 Return to Addendum to Educator's Guide to Computer Crime and Technology Misuse Developed 29 July 2002. An Educator's Guide to Enforcing Acceptable Use Policies http://education.illinois.edu/wp/crime-2002/aup.htm 5 of 5 2014-10-15, 3:10