• gallery image -
  • gallery image - Marcus Whitman Middle School
  • gallery image - Rainbow Over the School
  • gallery image -
  • gallery image - Art by John Fladd 1972

Quick Links

district home



Adoption Date: 6/8/2015
5000 - Non-Instructional/Business Operations


The District values the protection of private information of individuals in accordance with applicable law, regulations, and best practice. Accordingly, District officials and Information Technology (IT) staff will plan, implement, and monitor IT security mechanisms, procedures, and technologies necessary to prevent improper or illegal disclosure, modification, or denial of sensitive information in the District Computer System (DCS). Similarly, such IT mechanisms and procedures will also be implemented in order to safeguard District technology resources, including computer hardware and software. District network administrators may review District computers to maintain system integrity and to ensure that individuals are using the system responsibly. Users should not expect that anything stored on school computers or networks will be private.

 In order to achieve the objectives of this policy, the Board of Education entrusts the Superintendent, or his/her designee, to:

 a)      Inventory and classify personal, private, and sensitive Information on the DCS to protect the confidentiality, integrity, and availability of information;

 b)      Develop strong password standards for all users including, but not limited to, how to create passwords and how often such passwords should be changed by users to ensure security of the DCS;

 c)      Ensure that the "audit trail" function is enabled within the District's network operating system, which will allow the District to determine on a constant basis who is accessing the DCS, and establish procedures for periodically reviewing such audit trails;

d)      Develop procedures to control physical access to computer facilities, data rooms, systems, networks, and data to only authorized individuals; such procedures may include ensuring that server rooms remain locked at all times.

e)      Establish procedures for tagging new purchases as they occur, relocating assets, updating the inventory list, performing periodic physical inventories, and investigating any differences in an effort to prevent unauthorized and/or malicious access to these assets; 

f)      Review annually software systems to grant change, and terminate user access rights to the overall networked computer system and to specific software applications and ensure that users are given access based on, and necessary for, their job duties; 

g)      Restrict access to the installation of hardware or software on district owned devices and on the district network to the IT department in order to prevent the installation of malicious software or hardware.  Establish procedures for requesting hardware or software installation.

h)      Determine how, and to whom, remote access should be granted, obtain written agreements with remote access users to establish the District's needs and expectations, as appropriate, and monitor and control such remote access;

 i)      Deploy software to servers and workstations to identify and eradicate malicious software attacks such as viruses and malware;

j)      Develop a disaster recovery plan appropriate for the size and complexity of District IT operations to ensure continuous critical IT services in the event of any sudden, catastrophic event, including, but not limited to fire, computer virus or deliberate or inadvertent employee action.