Responsible Use Policy

The Post Oak School uses computers to teach the skills, knowledge, and behaviors that students will need as successful and responsible members of the community, and as life-long explorers. The school expects those who use the computers to do so in a way that is consistent with The Post Oak School’s educational mission and this policy.

In today’s world, The Post Oak School’s community spans beyond our campus. All members of the Post Oak community (including guests) are expected to abide by the terms of this document any time they are using Post Oak’s resources, acting as a representative of the school, or otherwise communicating the school name or image. 

Since electronic media change constantly and rapidly, as does the “netiquette” among users, this policy cannot lay down rules to cover every possible situation. Instead, this policy expresses the school’s philosophy and sets forth general guidelines to be applied to all users, whether they are students, faculty/staff members, volunteers, or other guests.

We follow clear principles

In both the real world and the virtual one, on campus and off, common principles apply. As a Montessori school, we advocate and require concern and respect for both persons and materials. Conscientious sharing of limited resources, offering each other space and time for uninterrupted and unmolested work, attention to grace and courtesy both to peers and neighbors and to those in the wider world, and a careful balancing of society’s needs and rules with our personal freedoms and responsibilities are also paramount. Whether on the computer or in person, our expectations are the same.

Users need to demonstrate a sense of responsibility and may not abuse their privileges.

Our computers are intended to serve education and the school community

Connect computers, laptops, or other devices to the networks that have been issued by the school or are part of the Bring Your Own Device (BYOD) program. Other devices will need specific permission from the Technology Office.

The law forbids illegally reproducing copyrighted material. Comply with all software licenses and copyrights. Do not download or install any commercial software, shareware, or freeware onto Post Oak School computers, nor copy any software from these computers, nor agree to any end-user license agreement, without the express permission of the technology director. The Post Oak School specifically forbids the use of any peer-to-peer file-sharing software whose primary or most likely purpose is copyright violation.

Unacceptable uses of the network include, but are not limited to: tampering with the school’s wiring, software, or hardware; trying to gain unauthorized access to the school’s system by hacking, using another user’s login information, or accessing the files of another user without that user’s consent; using the network for commercial or political purposes; or damaging the network by purposely activating a virus, worm, or Trojan horse program.

Content created using the school’s technology resources and/or stored on the school’s network is the property of the school and this content can continue to be used by The Post Oak School for educational purposes. The creator of the content may keep a copy of the document created.

Users may save and store data generated for school-related purposes using their designated folder on SharePoint, OneDrive, and/or Google Drive. Users are expected to remain within allocated disk space and to delete e-mail attachments or other material which takes up excessive storage space.

Users may NOT access their personal Internet-based e-mail accounts, such as Yahoo!, Gmail, Hotmail, AOL, etc., at school for any reason, unless granted specific permission from the technology director.

Users have no expectation of privacy on the computer

The Post Oak School retains the right to monitor, view, or access at any time the data stored in any given device, (laptop, tablet, phone, etc.), including but not limited to: Internet activities, e-mail activities and accounts, network activities and accounts, and all data and/or software stored on desktops, laptops, and storage media. The Post Oak School does not expect to regularly monitor or inspect users’ files and data, but retains the right to do so at its sole discretion.

Using the Internet requires caution

Do not transmit personal information (home address, telephone number, your age, or credit card numbers) through e-mail or non-secure websites.

Any e-mail should be written as if it were a public document that might be read by a third party: embarrassing or private e-mails can be forwarded or made public to others beyond the user’s control. Users should not put anything in an e-mail that they would be ashamed of seeing in The Houston Chronicle the next day. Nothing should ever be included in an e-mail that might subject the sender or the School to embarrassment or legal action.

Report the transmission of inappropriate content immediately to the division director or head of school: Individuals have access to a rapidly increasing number of easy-to-use electronic communication tools. This poses opportunities and challenges for both families and schools. Misuse of these tools, regardless of where it occurs, can have serious effects on individuals as well as the school community, and will be treated as a significant offense. Beginning in Upper Elementary and extending through High School, students receive lessons on appropriate ways to represent themselves using electronic media. As part of these lessons, we discuss the implications of sending hurtful, vulgar or explicit messages, photos, or video content. Our advice for any member of the school community receiving such content: do not erase any messages; they may be needed to take action against the offender. Cyberbullying (electronically transmitted threats and insults intended to embarrass, harass, or intimidate), and the electronic transmission of inappropriate content by a member of the Post Oak community will result in disciplinary action.

Prohibited software and sites: the use of Internet chat or instant messaging software, social networking sites, online games, proxies/VPNs to bypass filters, sites that promote hate or violence or any other questionable material is prohibited on all school computers, without exception.

All Internet access at the school is filtered by a commercially produced product that attempts to block objectionable sites, but no filter is perfect. Internet activities are logged.

The school has a limited amount of bandwidth for the transfer of information to and from the Internet. Unless specifically used for a classroom project, access to streaming media (music, video, radio stations) is not permitted.

The Post Oak School makes no guarantee that the technology services provided will be error-free or without defect. The school will not be responsible for any damage suffered including, but not limited to, loss of data or disruption of service. 

Use of social media

Social media are powerful tools and have the potential to reach audiences far beyond The Post Oak community. This translates into a greater level of responsibility and accountability for everyone.

Interacting online with other community members is no different than interacting with these individuals or groups face to face, we are required to maintain dignity and respect as outlined in the Student Conduct section of this portal.

Recognize that:

  • Social networking sites are increasingly interconnected in ways that may be largely outside the direct control of the users on any given site and social media activities may be publicly visible.
  • Serving as a role model is a critical aspect as a member of The Post Oak community.
  • Accordingly, you must exercise appropriate discretion when using social media when those communications can impact The Post Oak community.
  • How you represent yourself online is an extension of yourself. Do not misrepresent yourself by using someone else’s identity.
  • What you contribute leaves a digital footprint for all to see. Do not post anything you would not want friends, parents, teachers, or future employers to see.
  • Faculty and staff are prohibited from “friending” current students (of any age), former students under the age of 18, and parents of current or prospective students, due to the inherent conflicts of interest that this may raise.

Community members are discouraged from publishing on public media (e.g., YouTube, Facebook, Instagram, etc.) photos or videos of other students or community members without first obtaining the written permission of all those involved.

Legal and ethical behavior is expected

Respect all copyrights: do not steal music, videos, software, or ideas. When doing research on the Internet, you are committing the crime of plagiarism if you copy material directly rather than putting it into your own words. The use of term-paper vending-machine sites is specifically prohibited.

Maintain a high standard of civility: no material containing offensive, profane, rude, inflammatory, threatening, violent, sexually explicit, harassing, abusive, or impolite language or images is to be created, viewed, or accessed. In the event that any such material is encountered accidentally, log off immediately and report the event to the classroom teacher and technology director.

Violations will be taken seriously

Computer use is a privilege, not a right, and may be restricted or revoked at any time if usage is not consistent with the educational goals of the school.

Ask if you do not understand any of the cautions or prohibitions in this policy.

Consequences for any violations of this policy include but are not limited to: loss of network access privileges (including Internet access); loss of computer access privileges; and disciplinary action for students, as outlined for major misbehavior in the Student Conduct section of this portal.

For helpful information on these issues and more, please visit www.isafe.org and commonsensemedia.org.

Policy agreement

Both a parent and the student are expected to read and sign the Responsible Use Policy Agreement (RUP) to indicate that they know of and consent to follow this policy. Permission to use the school’s computers will be granted upon the return of the signed RUP via Magnus.