• Image result for books
    WHS Circulation Rules
    Two (2) books maximum for two weeks
    Fines will be charged daily
     Overdue books/unpaid fines prevent further check-outs
    Faculty/staff may check out resources/materials (Classroom sets, videos, instructional aids) for the year.  


     Appropriate Use/Internet Safety


    The Birmingham City Schools District is pleased to make available to students access to interconnected computer systems within the District and to the Internet, the worldwide network that provides various means of accessing significant educational materials and opportunities.

    In order for the School District to be able to make its computer network and Internet access available, all students must take responsibility for appropriate and lawful use of this access. Students must understand that one student's misuse of the network and Internet access may jeopardize the ability of all students to enjoy such access. While the District's teachers and other staff will make reasonable efforts to supervise use of network and Internet access, they must have student cooperation in exercising and promoting responsible use of this access.

    Below is the Internet Safety Policy of the School District and the Data Acquisition Site that provides Internet access to the School District. Upon reviewing, signing, and returning this Policy as the students have been directed, each student will be given the opportunity to enjoy Internet access at School and is agreeing to follow the Policy. If a student is under 18 years of age, he or she must have his or her parents or guardians to read and sign the Policy. The School cannot provide access to any student who, if 18 or older, fails to sign and submit the Policy to the School as directed with the signatures of the student and her/his parents or guardians.

    Listed below are the provisions of the agreement regarding computer network and Internet use. Questions about these provisions, should be directed to the appropriate person designated in the school to answer such questions. If any user violates this Policy, the student's access will be denied. If not already provided, or withdrawn and he or she may be subject to additional disciplinary action.



    By signing this Policy, the individual is agreeing not only to follow the rules in this Policy, but are agreeing to report any misuse of the network to the person designated b the School for such reporting. Misuse means any violations of this Policy or any use that is not included in the Policy, but has the effect of harming another or his or her property.



    A student who submits to the School, as directed, a properly signed Policy and follows the Policy to which he or she has agreed will have computer network and Internet access during the course of the school year only. Students will be asked to sign a new Policy each year during which they are students in the School District before they are given an access account.                                                                               


           A.    Educational Purposes Only.


    The School District is providing access to its computer networks and the Internet for educational purposes only. If you have any doubt about whether a contemplated activity is educational, you may consult with the person(s) designated by the School to help you decide if a use is appropriate.

          B.     Unacceptable Use of Network.


    Among the uses that are considered unacceptable and which constitute a violation of this Policy are the following:

    1.              uses that violate the law or encourages others to violate the law. Don't transmit offensive or harassing messages, offer for sale or use any substance the possession or use of which is prohibited by the School District's Student Discipline Policy,view, transmit or download pornographic materials or materials that encourage others to violate the law, intrude into the networks or computers of others,and download or transmit confidential, trade secret information, or copyrighted materials, Even if materials on the networks are not marked with the copyright symbol, you should assume that all materials are protected unless there is explicit permission on the materials to use them.

    2.            uses that cause harm to others or damage tot heir property. For example, don't engage in defamation (harming another's reputation by lies), employ another's password or some other user identifier that misleads message recipients into believing that someone other than you is communicating or otherwise using her/his access to the network or the Internet,upload a worm, virus, "trojan horse," "time bomb"or other harmful form of programming or vandalism, participate in "hacking" activities or any form of unauthorized access to other computers, networks, or information systems.

    3.             uses that jeopardize the security of student access and of the computer network or other networks on the Internet,. For example, don't disclose or share your password with others, don't impersonate another user.

    4.             uses that are commercial transactions.Students and others may not sell or buy anything over the Internet. You should not give others private information about you or others, including credit card numbers and social security numbers.

         C.  Netiquette.

     All users must abide by rules of network etiquette, which include the    following:

    1.      .       Be polite. Use appropriate language. No swearing, vulgarities. Suggestive,obscene,belligerent,or threatening language.

    2.  .  .               Avoid language and uses which may be offensive to others users. Don't use access to make,distribute, or redistribute jokes, stories, or other , material which is based upon slurs or stereotypes relating to race, gender, ethnicity, nationality,religion, or sexual orientation.       

    3.            Don't assume that a sender of e-mail is giving his or her permission for you to forward or redistribute the message to third parties or to give his/her e-mail address to third parties. This should only be done with permission or when you know that the individual would have no objection.

    4.           Be considerate when sending attachments with e-mail (where this is permitted). Be sure that the file is not too large to be accommodated by the recipient's system and is in a format which the recipient can open.


             A.   General Warning; Individual Responsibility of Parents and Users


    All users and their parents/guardians are advised that access to the electronic network may include potential for access to materials inappropriate for school-aged pupils. Every user must take responsibility for his or her use of the computer network and Internet and stay away from these sites. Parents of minors are the best guides to materials to shun. If a student finds that other users are visiting offensive or harmful sites he or she should report such use to the person designated by the school.

           B.    Personal Safety.


    Be safe. In using the computer network and Internet, do not reveal personal information such as your home address or telephone number. Do not use your real last name or any other information which might allow a person to locate without first obtaining the permission of a supervising teacher. Do not arrange a face-to-face meeting with someone you "meet" on the computer network of Internet without your parent's permission if you are under 18. Regardless of your age, you should never agree to meet a person you have only communicated with on theInternet in a secluded place or in a private setting.

         C.  "Hacking" and Other Illegal Activities.


    It is a violation of this Policy to use the School's computer network or the Internet to gain unauthorized access to other computers or computer systems, or to attempt to gain such unauthorized access. Any use which violates state or federal law relating to copyright, trade secrets, the distribution of obscene or pornographic materials, or which violates any other applicable law or municipal ordinance, is strictly prohibited.

         D.   Confidentiality of Student Information.


    Personally identifiable information concerning students may not be disclosed or used in any way on the Internet without the permission of a parent or guardian or, if the student is 18 or over, the permission of the student himself/herself. Users should never give out private or confidential information about themselves or others on the Internet, particularly credit card numbers and Social Security numbers. A supervising teacher or administrator may authorize the release of directory information for internal administrative purposes or approved educational projects and activities.

         E.   Active Restriction Measures.


    The School will utilize filtering software or other technologies to prevent students from accessing visual depictions that are (1)obscene, (2) child pornography, or (3) harmful to minors.The School will also monitor the online activities of students, through direct observation and/or technological means, to ensure that students are not assessing such depiction or any other material which is inappropriate for minors.


    Internet filtering software or other technology-based protection systems may be disabled by a supervising teacher or school administrator, as necessary, for purposes of a bonafide research or other educational projects being conducted by students age 17 and older.


    The term "harmful to minors" is defined by the Communications Act of 1934 (47 USC Section 254 [h][7]), as meaning, any picture, image, graphic image file, or other visual depiction that:

    -  taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion;

    -  depicts,describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; taken as a whole, lacks serious literary, artistic, political, or scientific value to minors.
    Open Access to Library/Flexible Scheduling
    One of the components of a successful library media program is flexible scheduling. Flexible scheduling in Alabama has many different faces and local conditions can limit the incorporation flexible scheduling. At Woodlawn High School, there are no fixed weekly scheduled library classes to restrict flexible scheduling. Teachers and students use the library when needed. Classes may schedule time within the library for instruction or research.  Flexible scheduling/open scheduling is a part of the 21st century library.