How To Run A College
|
|
|
- Britney Stafford
- 5 years ago
- Views:
Transcription
1 Integrated Learning Technology Program (Secondary Campus) 2015
2 Table of Contents Integrated Technology Program (Secondary Campus) 2015 Vision and Rationale... 3 Cost of Participation... 3 Ownership Model... 3 End of Lifecycle Process... 4 Early Return Policy... 4 Appearance / Personalisation... 4 Device Specifications... 4 Private Devices... 4 Guidelines for Participation... 5 Damage/Loss... 5 Consumables... 5 Faulty Devices... 5 Technical Support... 6 Power Issues / Battery / Charging... 6 Software, Copyright and Intellectual Property... 6 Internet Usage... 7 Users and Security... 7 Virus Protection... 7 Internet Applications / Sites... 8 Networks and Network Security... 8 Inappropriate Use... 9 Cyber Bullying... 9 Electronic Crime (e-crime)... 9 Security and Storage Backup and Data Storage Printing Caring for your ILT device Operating Conditions LCD Screens Page 2 of 11
3 Vision and Rationale St Michael s College is committed to providing an outstanding contemporary learning environment where students and teachers are afforded the very best opportunities to develop their skills and effectively utilise available technologies to improve learning outcomes. While much has been achieved in recent years, 2015 will see this continue forward in the development of integrated learning technologies across the College. This includes: The implementation of SEQTA, a web-based learning management system that enables teachers, students and parents to collaborate more effectively to establish better teaching and learning opportunities. Students having their own College supplied device. This will include ipads and ipad minis at the Primary campus and ACER tablets (with keyboards) at the secondary campus for those year levels not a part of the previous DER rollout. The devices will be issued to students during the first week of Term The IT Support Department to expand the number of Support Technicians so students are provided with ready assistance should they have any issues with learning technologies/devices. A commitment to Professional Development and technology integrated teaching and learning programs. We are excited to be moving in a direction that will further develop rich, collaborative learning opportunities that inspire engagement and lead to improved outcomes for all. Cost of Participation The cost, responsibility, liability and participation of all parties is outlined in this document. In 2015, tuition fees will include an extra charge of $200 per student This charge covers: Increased bandwidth and infrastructure costs; Costs of Integrated Learning Technologies Platform (SEQTA); Additional technical support costs; Cost of device; Software costs. The total cost of the Integrated Learning Technologies (ILT) initiative is based on a 3-year lifecycle. Ownership Model The Integrated Learning Technologies (ILT) initiative will involve the College providing technology for student use. In this model, the ILT device will be owned by the College and repairs/maintenance for the device will be arranged by the College. Distinct benefits of this arrangement include: Reducing costs of software licensing, including ensuring up-to-date software is installed as required; Ensuring a consistent platform in which to facilitate curriculum delivery; Enables management and support of devices; Enables the College to retain control over how the ILT devices are used for the lifecycle of the device in the College. The ILT device will be available for use outside the College. Parents will be required to sign an Agreement with the College before the ILT device is distributed. Page 3 of 11
4 End of Lifecycle Process The ILT device will remain the College s property for the life of the device. The device will need to be returned to the College at the end of the d3-year lifecycle. The College may negotiate a buyout option and further details will be provided before the end of the cycle. Early Return Policy If a student leaves the College prior to the end of the ILT device s 3-year lifecycle the ILT device must be returned to the College. The device must be returned in the original condition it was in when issued and personal identifications must be removed. If the device is not returned in this condition, an additional fee will apply. Appearance / Personalisation As the ILT devices are the property of the College, they are not to be altered or personalised in any way that is not completely irreversible. Labels or stickers are acceptable but must be removable. Any barcode or serial number on the device should not be altered. The protective carry case may be personalized to promote easy identification. This carry case is the property of the student and does not need to be returned (refer Early Return Policy above). The ILT device must be carried in its carry case at all times. If the device is not returned in its original condition or being purchased outright, a repair cost will be incurred. Device Specifications It is expected that all devices will be of the same specification to assist in management and curriculum development. Students are not permitted to change the device specifications, make modifications or add upgrades. Note: The manufacturer device warranty is void if attempts are made to change the hardware configuration of the device in any way. Costs for repair to the device will be the responsibility of the parent/guardian. Specifications of the College ILT device for Yr8 2015: ACER ASPIRE SWITCH PRO 11 Students beginning at other year levels will be given a device equivalent to other students in that Year Level. Private Devices The use of private devices on the College s network has consequences to management and maintenance costs. The College wireless network is not able to accommodate private devices at this time. It should be noted that the College cannot support the maintenance of any private device. The College is not licensed to put software on private machines. Page 4 of 11
5 Guidelines for Participation Parents will need to sign an Integrated Learning Technologies Agreement Form agreeing to the terms and conditions of the program if they wish to participate in the ILT scheme, before the ILT device will be issued to students. After ILT devices are issued to students: Parents will be invited to attend a Parent information night where details of the Integrated Learning Technologies Program will be discussed. Each device will be imaged with the permitted College software and registered in the College asset database with a unique identifier against the students ID. Students will be given a further induction to ensure that they are familiar with their roles / responsibilities by Pastoral and Subject Teachers. ILT devices will be required to be carried in the carry case provided. The ILT device must be available for use at the College each day. Damage/Loss Any damage or loss of a College issued ILT device must be reported to IT Support as soon as possible. Any College issued ILT device that is found by another person must be returned to IT Support as soon as possible. Wilful or malicious damage is not covered by the manufacturer s warranty nor College policies. Repairs for damage will be charged to the parent/guardian. Other damage is covered by the College, subject to a $250 cap or excess to be paid by the parent/guardian. If a device is damaged or lost, parents/guardians will be asked to pay up to a maximum of $250 to cover repair or replacement. If the device is damaged on more than one occasion in a 12 month period, additional charges may be incurred. If a device is stolen from a location outside of the College grounds, an official Police Report will need to be lodged prior to the device being replaced. Consumables Items such as power packs and cords are considered as consumables. Charges will be incurred for replacement e.g. power pack $40 + GST (as at Dec. 2014) Faulty Devices If an ILT device is faulty, technical support is available through IT Support. Students are requested to adhere to advertised opening hours. Page 5 of 11
6 Technical Support Students experiencing technical and software faults should: Back up files on a USB. Take the device to the IT Support area. If the device is unable to be repaired by the College, it may be necessary to re-image the computer resulting in all files being deleted. Be warned: a re-image process will completely reset an ILT device to original settings. PLEASE ENSURE ALL FILES ARE BACKED UP ON A USB. Loan ILT devices are provided (if available) during repair. During the year important updates that cannot be delivered wirelessly will require the ILT device to be returned for work to be completed. It is expected that the student may be without their ILT device for up to six days per year for servicing. Important updates will be delivered to devices wirelessly where possible. However, devices may need to be returned to the College for servicing from time to time. Students will be informed when updates or re-imaging are required. Power Issues / Battery / Charging Charging Students should bring the ILT device to school each day fully charged. Recharge facilities are not available in classrooms. Students will not be permitted to recharge ILT devices at the College. Battery Life New technology gives much longer life to modern batteries in computers. The College has purchased extra-long-life batteries for each ILT device. These should give 6+ hours of use, sufficient for the College day. Conditioning the Battery The battery needs to be conditioned to ensure a long life. The ILT device battery should be completely powered down before recharging. It should then be fully charged overnight. This needs to be repeated 3 times before running the ILT device from the power outlet. RUN DOWN FULLY / RECHARGE / RUN DOWN FULLY / RECHARGE / RUN DOWN FULLY / RECARGE Then, if needed, the device can be used connected to the power outlet. required as the ILT device runs effectively when fully charged. This is not usually Software, Copyright and Intellectual Property Each ILT device will be loaded with a St Michael s College approved software image configured for use on the College network. The image will contain Microsoft Windows operating system software, Microsoft anti-virus, Microsoft Office Professional software. Other software may also be loaded by the College as deemed necessary to assist in student education. Software installed by the College is copyrighted and must not be distributed or removed without written permission from the College. Students will be permitted to add their own private software if required to assist their education. All such software MUST be legally licenced by the primary user of the device and must not cause any interference with the ILT device connecting and operating at the College. The use of any peer-to-peer sharing software (like Napster, Limewire, utorrent, etc.) is not permitted. Any software loaded onto the ILT device must not be illegal, malicious or offensive in nature and should be used in accordance with the Communications Technology Policy. Page 6 of 11
7 Software Expiry In order to protect the legal status of software licences through the College, every computer must connect to the St Michael s College network at least once every 60 days, otherwise the computer will cease to operate. Games & Music The loading of this software is permitted as long as it is not used at the College and is of educational value to the student. If not, this software should not be loaded. Headphones The use of headphones for any sound from the ILT device is required to reduce the interruption to other students attempting to complete their studies, but must NOT be used for entertainment purposes whilst at the College. Interference Issues Any ILT device found to have software that causes interference with the College network will be banned from the network until such a time as the offending software is removed and the device handed to IT Support for verification. If IT Support cannot be satisfied that the offending software has been completely removed, this ILT device will be re-imaged to protect the security of the College network. Internet Usage Usage Students can access the Internet through the College s wireless network while on site. Access to the Internet through the College s wireless network will be monitored and subject to strict filtering. Students may also use the Internet for their personal use at home through their home Internet Service Provider. (Consult your ISP for processes to do this.) However, students are reminded that inappropriate downloads can be detected when the devices are connected to the College s network. More information on these topics is outlined in detail in the student diary and the Communications Technology Policy. Users and Security Each student will be required to have an individual password for logging in to the College network. This password should not be divulged to any other party under any circumstance. Sanctions will be taken against any sharing of passwords. Any attempt to break into the College network and/or a device is a breach of the Communications Technology Policy and penalties will apply. The College s network logs contain information on the user logging in, the computer which is attempting to log in and various other parameters. This information can and will be used to track user access and usage. This information includes such details as which ILT device has been used by which user. Outside access will be monitored and referred to the Police, if required. Virus Protection Anti-virus software (Microsoft Forefront) and monitoring software will be loaded onto the device through the initial imaging process. Updates of this software may be scheduled at various times. If a student machine attempts to connect to the College network and is found to have a virus the ILT device will automatically be cleaned. Page 7 of 11
8 Students should ensure that anti-virus software is kept up-to-date on their devices and regularly check for viruses. This can be done, at no cost, at the College. As students have the right to personally use their ILT devices, and connect to the Internet from home, they need to take all steps to protect the ILT device from virus attacks. Viruses can enter ILT devices through: Removable media such as USB memory sticks s The Internet (including web browsing, FTP programs and chat rooms) TIPS Do not open any files attached to suspicious or unknown s. Exercise caution when downloading files from the Internet. Save the files to the ILT device s hard disk and run the virus scanner on the files before opening them. Delete chain and junk s. Do not forward or reply to any of these. Never reply to Spam. Hundreds of viruses are discovered each month. Run your virus scan regularly. Internet Applications / Sites There are significant educational benefits for some Internet applications. Some Internet sites allow its users to interact with other users. These include web-based communities, hosted services, web applications, social-networking sites, video sharing sites, wikis and blogs. However, many of these sites can be unproductive and distracting to student learning. The use of such web sites are based on the policy that: The technologies, and the use of the technologies, do not breach any ethical and moral issues. The applications do not distract student learning. These sites are not to be accessed in class, unless specifically directed by the teacher for educational purposes. Networks and Network Security Ad-Hock Networks Ad-hock networks (the creation of a stand-alone wireless network between two or more Devices) are strictly forbidden while at the College. The College s network security system will scan for, remove and report on any ad-hock networks detected. Wired Networks Students are forbidden to plug any device into the College s wired network. Any student caught with a device plugged into the College s wired network will receive an immediate suspension of computer use. The College s network security system will scan for and report on any non-college devices plugged into the Colleges wired network. Hacking Hacking is a criminal offence under the Cybercrime Act (2001). Any hacking attempts will be reported to the Police. Packet Sniffing Any type of software or hardware device designed to capture or view network data\packets is forbidden. Any student detected capturing network traffic will be dealt with in accordance with the Communications Technology Policy. The College s network security system will scan for and report on any device capturing packets. Page 8 of 11
9 Inappropriate Use St Michael s College maintains computers and networks so that they operate effectively to ensure the resources needed are available, and that the screen interface operates in a consistent way. The following guidelines are outlined to ensure all users are able to access the latest research available, with the latest technology, in an acceptable and safe learning environment. Users will avoid sites with content that is violent, racist, sexist, pornographic, dominated by offensive language and/or illegal in any way. Engaging in chat lines or downloading files is not permitted unless forming part of a legitimate class activity guided by the teacher of that class. The Federal Communications Act and the St Michael s College Communications Technology Policy jointly determine guidelines for appropriate use. Inappropriate use of the internet and is a serious matter and can have significant consequences, e.g. sending a message over the internet using someone else's name. Passwords should remain confidential. No user should log-on using another student s password. It is the responsibility of students to maintain sufficient credit in their printing account. Do not remove files or folders that have been installed to the hard disk or network. Do not use inappropriate or offensive names for files or folders. Do not bring to the College, or use, games or any other materials which may be offensive to others. Do not engage in cyber bulling or e-crime. No ILT device (or mobile phones) with camera capabilities are to be used in change rooms or toilets. Under privacy legislation it is an offence to take photographs of individuals without their express permission and place these images on the Internet or in the public forum. Cyber Bullying E-technology provides individuals with a powerful means of communicating instantly with others in both positive and negative ways. Cyber bullying is bullying which uses e-technology as a means of victimising others. It is the use of an internet service or mobile technologies such as , chat room discussion groups, instant messaging, Web Pages or SMS (text messaging) with the intention of harming another person. Examples can include communications that seek to intimidate, control, manipulate, put down or humiliate the recipient. Activities can include flaming (repeated negative messages), sexual and racist harassment, denigration, impersonation, trickery, exclusion and cyber stalking. Electronic Crime (e-crime) Cyber bullying may involve varying levels of severity, ranging from occasional messages to frequently repeated and highly disturbing threats to a person s life. Cyber bullying can therefore be an e-crime, a fact often not clearly understood by those involved. E-crime occurs when a computer or other electronic communication devices (e.g. mobile phones) are used to commit an offence, are targeted in an offence, or act as a storage device in an offence. Page 9 of 11
10 Consequences Any form of cyber bullying or e-crime will be dealt with through the College s Harassment Policy and Acceptable Use of Information Technology Policy. Serious breaches are a Police matter and will be dealt with accordingly. Security and Storage During the College day when the devices are not being used (e.g. at lunchtime, during PE etc.), the devices should be kept either with the student or securely stored in their locker. If the student is unable to keep the device on their person, then the device needs to be securely stored in their locker. The device must be properly powered off prior to storage to preserve battery life and to prevent heat build-up. Backup and Data Storage It is important to keep backups of critical student work. There are a number of options for students to consider. Work can be stored to the ILT device s drive or the student s network drive. This should be regularly backed up to a USB device, or a portable USB hard drive. The College cannot be held responsible for lost work due to a failure to do backups. Printing Students will have access to printers on site. The use of any printer at the College will attract the same charge regardless if the printout is performed via a College desktop or student ILT device. To print at home, students can: Save work on a storage device such as a USB and use a printer-connected computer; Install the home printer to the ILT device; Printing via a wireless network card connected to a modem (refer Internet Provider for set up procedures). Caring for your ILT device Packing Away Your ILT device Always store your ILT device in the carry case and have the screen facing away from your College bag. Try to avoid moving your ILT device around when it is on. Before switching it on, gently place your ILT device on a stable surface and then switch it on. Be careful with the ILT device while it is in the bag. Do not drop the bag from your shoulder. Always place the ILT device bag down gently. Be careful when putting the ILT device in the car or bus that no other items are on top of it and nothing will roll on to the ILT device carry case. ILT devices should be switched off before being placed into the carry case. Operating Conditions Please do not place objects on top of your ILT device Avoid exposing your ILT device to: Direct sunlight or sources of heat such as desk lamps. Dust, dirt, rain, liquids or moisture. Heavy shock or vibration. Page 10 of 11
11 LCD Screens LCD screens are delicate they don t like being poked, prodded, pushed or slammed. Never pick up your ILT device by its screen. Don t slam the screen closed and always be gentle when putting your ILT device down. To clean your LCD screen: Switch off your ILT device. Lightly dampen a non-abrasive cloth with water and gently wipe the screen in a circular motion. Do not directly apply water or cleaner to the screen. Avoid applying pressure to the screen. AC Adaptor Connect your adapter only to your ILT device. Do not step on your power cord or place heavy objects on top of it. Keep your cord away from heavy traffic areas. When unplugging the power cord, pull on the plug itself, rather than the cord. Do not wrap your cord too tightly around the adapter box. Be aware of the power savings that come from running your ILT device effectively from battery after being fully charged. This can be a significant amount per year. Reminder: charging of ILT devices at the College is strictly prohibited. Page 11 of 11
LAPTOP PROGRAM HANDBOOK 2014
. LAPTOP PROGRAM HANDBOOK 2014 CONTENTS Laptop Handbook PAGE 1. Vision and Rationale 3 2. Ownership Model 3 3. Cost of Additional ICT Levy 3 4. Guidelines for Participation 4 5. Appearance / Personalisation
Parent Owned Device Program
Parent Owned Device Program Faith Excellence Community Compassion Purpose Introduction of the Parent Owned Device Program supports our vision to provide excellence in student centered learning in a global
ONE TO ONE LAPTOP PROGRAMME POLICY
ONE TO ONE LAPTOP PROGRAMME POLICY CONTENTS 1 Vision and Rationale... 2 2 Ownership Model... 2 3 End of Lifecycle Process... 2 4 Early Return Policy... 2 5 Appearance / Personalisation... 2 6 Device Specifications...
ONE-2-ONE LEARNING LAPTOP PROGRAM 2011
GLENUNGA INTERNATIONAL HIGH SCHOOL ONE-2-ONE LEARNING LAPTOP PROGRAM 2011 Department of Education and Children s Services T/A South Australian Government Schools CRICOS Provider No. 00018A 1. VISION and
Student Laptop. User Agreement
KINGSTON COMMUNITY SCHOOL Country Style Education with City Style Opportunities Student Laptop User Agreement Contents Agreement Rationale 2 TERM AND CONDITIONS 2 The Laptop 2 Software, Copyright and Intellectual
2 VISION AND RATIONALE OF THE BYOD PROGRAMME
BYOD Information Booklet 2015 1 TABLE OF CONTENTS 2 Vision and Rationale of the BYOD Programme 2 3 Ownership 3 4 Cost 3 5 Device Specifications 4 6 Procedures and Guidelines 4 7 Care of Devices 5 8 Loss
Marryatville High School. Laptop Handbook 2014
Marryatville High School Laptop Handbook 2014 Contents Battery... 3 Charging Your Battery... 3 Caring For Your Laptop... 3 Packing Away Your Laptop... 3 Operating Conditions... 3 LCD Screens... 3 AC Adaptor...
Marryatville High School. Laptop Handbook 2013
Marryatville High School Laptop Handbook 2013 Contents Battery... 3 Charging Your Battery... 3 Premium Battery Warranty... 3 Caring For Your Laptop... 3 Packing Away Your Laptop... 3 Operating Conditions...
Bring Your Own Device Handbook
Bring Your Own Device Handbook To ensure that all children have access to unlimited opportunities to learn anytime and anywhere and that they have the tools that make this possible. BYOD HANDBOOK 2016
COMMUNICATION AND NETWORK POLICY
COMMUNICATION AND NETWORK POLICY Always within REACH MOUNT BAKER SOUTH PRIMARY SCHOOL IPAD LOAN AGREEMENT Purpose To facilitate participation in all aspects of Mount Barker South Primary School curriculum.
Laptop Operation Guidelines
St Clare s College Laptop Operation Guidelines Contents Contents... 1 Responsible Care and Security... 2 Usage... 2 LCD Screen... 2 AC Adapter... 2 Keyboard... 3 Laptop Case Care... 3 Security... 3 Software...
Lowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy
BYOD Program 2015 BYOD Student Agreement/Acceptable Use Policy/Online Services Policy The student and parent/guardian must carefully read the above contract before signing it. Any questions should be addressed
7. Do not download or install software applications on WCSD issued Devices.
Wasatch County School District Student/Parent Device Agreement Handbook 2015/2016 School Year This document will outline the policies and procedures that are in place for the Wasatch School District Student/Parent
NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures. (March 2012)
NAZARETH CATHOLIC COLLEGE 1-1 LAPTOP PROGRAM Policies & Procedures (March 2012) Contents Ownership... 3 Privately-owned devices... 4 Optional peripherals... 4 Warranty & Insurance... 4 Stolen or Lost Laptops...
JGSC Laptop Agreement
JGSC Laptop Agreement The mission of the 1:1 program at JGSC is to create an innovative, collaborative learning environment for students and teachers. Together, they will implement creative uses of educational
1:1 COMPUTER PROGRAM LAPTOP POLICY
1:1 COMPUTER PROGRAM LAPTOP POLICY STATEMENT The focus of learning with laptops at Greater Clark County Schools (GCCS) is to prepare students for their future, a world of digital technology and information.
Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement
111 CASEY CRESCENT, CALWELL CALWELL WWW.CALWELLHS.ACT.EDU.AU / INFO@CALWELL HS.ACT.EDU.AU PH: 02 6205 6833 FAX 02 6205 6827 COURAGE SELF-DISCIPLINE RESPECT ACHIEVEMENT Calwell High School Acceptable Use
Student Tablet Guide
Student Tablet Guide Contents 1. School Day 2. A list of Do s 3. A list of Do Not s 4. Support Model 5. FAQ 6. File management 7. Backing up 8. Online citizenship 9. Parents 10. Tablet Keys and Ports Front
Student Laptop Program
Student Laptop Program Student Name: Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 3 2. Overview of Student and Parent Responsibilities... 4
CC. TECHNOLOGY ACCEPTABLE USE POLICY. 1. Purpose
CC. TECHNOLOGY ACCEPTABLE USE POLICY 1. Purpose a. The Children s Internet Protection Act (CIPA), 47 U.S.C. 254(h)(5), and South Dakota Consolidated Statues Section 22-24-55 require public schools to implement
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students
Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3
HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY
HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY This policy applies whenever you are using Heathfield High School information technology equipment or services. It should be read in
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
ipad Acceptable Use Regulation
ipad Acceptable Use Regulation The Mamaroneck School District has purchased Apple ipads for selected students of the Mamaroneck School District. These students will be issued ipads with predetermined applications
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
Bring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Purpose is committed to supporting student learning experiences within a highly functioning environment. Our classrooms are reliant on a range of leading-edge technologies
Kenmore State High School Student Laptop Charter
Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6
Dresden International School Computer and IT Use Policy
Dresden International School Computer and IT Use Policy Overview This document specifies the important ground rules that students must follow when using computers, IT services and IT equipment provided
Frequently Asked Questions for parents
Frequently Asked Questions for parents I had intended to purchase a laptop for my child. Should I proceed? All students in Years 10 to 12 at Kenmore State High School will have access to a high quality,
National Secondary School Computer Fund Meridan State College Q4 Take Home Tablet Charter. Student NSSCF Charter
National Secondary School Computer Fund Meridan State College Q4 Take Home Tablet Charter Student NSSCF Charter Contents Student NSSCF Charter... 3 NSSCF overview... 3 Device care... 4 Data security and
South Sydney High School Bring-Your-Own-Device (BYOD) Policy
South Sydney High School Bring-Your-Own-Device (BYOD) Policy Bring your own device (BYOD) refers to technology models where students bring a personally owned device to school for the purpose of learning.
How To Use A Tablet/Laptop At A School District Computer At Home
Tablet - Laptop Policy, Procedures, and Information 2013-2014 School Year Chester Area HS/MS Chester, South Dakota Chester Area HS/MS Tablet/laptop Program The focus of the 1:1 Classroom Connections Program
ICT Safe and Acceptable Use Policy for Students
ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...
Bring Your Own Device (BYOD) Handbook. Smackover-Norphlet School District
Bring Your Own Device (BYOD) Handbook Smackover-Norphlet School District August, 2014 For the purposes of BYOD, devices means personally owned, wireless portable electronic equipment used for instructional
LEEMING SENIOR HIGH SCHOOL. Bring Your Own Device Information and Policy 2015
LEEMING SENIOR HIGH SCHOOL Bring Your Own Device Information and Policy 2015 1 1 Dear Parent/Guardian Since the ending of the Federal Government s Digital Education Revolution funding, Leeming SHS can
TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015
TEKAMAH-HERMAN COMMUNITY SCHOOLS LEARNING INITIATIVE POLICY AND PROCEDURES 2014-2015 Tekamah-Herman Community Schools is proud to offer our High School Students Apple MacBook Air computers for use at school
1:1 Laptop Information
Laptop Information: Each student will receive an LCSC laptop (13 MacBook Air) for the school year. The student who is issued the computer and other technology equipment is responsible for it. Students
Vail School District Acceptable Use Policy 2015 2016
Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will
Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.
Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes
EMERSON PARK ACADEMY
1 ACCEPTABLE USE POLICY (AUP) EMERSON PARK ACADEMY (Signature of Headteacher) 1 St September 2014 2 ACCEPTABLE USE POLICY EMERSON PARK ACADEMY 'Acceptable and Responsible Use of ICT Resources' Contents
Laptop Handbook, Usage Agreement and Fee Schedules
Overview/Introduction Laptop Handbook, Usage Agreement and Fee Schedules August 2015 Person County Schools (PCS) is committed to preparing students for success in a changing world. To prepare our students
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+
TELECOMMUNICATION PLAN AND ELECTRONIC COMMUNICATION USE 8.60+ BYOD (Bring Your Own Device) Technology Acceptable Use Washington District Schools provides all students access to technology, the district
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
Dulwich College ICT Acceptable Use Policy
Dulwich College ICT Acceptable Use Policy Our Acceptable Use Policy is an extension to the College Rules. Dulwich College provides a computing network which allows a range of devices to be used. These
Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources
Boston Public Schools Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and Scope of Policy Technology Resources ACCEPTABLE USE POLICY AND GUIDELINES Boston
Students Acceptable Use Policy for Electronic Resources Rules Summary
Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
Acceptable Use of ICT Policy. Staff Policy
Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.
Ventura/Garner-Hayfield Junior High School. Computer Acceptable Use Policy 2014-2015 School Year
Ventura/Garner-Hayfield Junior High School Computer Acceptable Use Policy 2014-2015 School Year The focus of the one-to-one computer program at the Ventura/Garner-Hayfield Junior High School is to prepare
St Vincent s Primary School 1 : 1 Laptop Program Agreement and Policy Information Booklet
St Vincent s Primary School 1 : 1 Laptop Program Agreement and Policy Information Booklet Table of Contents Section 1. Overview Section 2. The 1 to 1 Laptop Program 2.1 The Laptop 2.2 Programs and Resources
CARE COURTESY COOPERATION CHALLENGE COMMITMENT
2015 Laptops at Chancellor State College Information and Procedures Handbook Including: Chancellor Laptop Program Bring Your Own Device National Secondary Schools Computer Fund CARE COURTESY COOPERATION
DIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
Harrisonville School District Acceptable Use Agreement for Student Laptops 2014-2015
Acceptable Use Agreement for Student Laptops 2014-2015 The student laptop that has been issued to you is the property of the Harrisonville School District. This laptop is on loan to you as a student and
Meridian Public Schools Laptop Policy
Meridian Public Schools Laptop Policy The focus of the learning with laptops program at Meridian Public School is to prepare students for their future, a world of digital technology and information. As
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
CARRAMAR PUBLIC SCHOOL
CARRAMAR PUBLIC SCHOOL Learning To Live Student Bring Your Own Device (BYOD) Policy This policy provides direction to schools choosing to allow student use of personal mobile electronic devices at school
2015-2016 ISD 518 FUTURE READY. Tablet Procedures and Information
21ST CENTURY SKILLS LEARNING ANYTIME, ANYWHERE OPTIONAL INSURANCE FUTURE READY Tablet Procedures and Information Worthington ISD 518 wants to ensure students develop the skills and knowledge necessary
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY
OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the
Loreto College, Marryatville South Australia
Loreto College, Marryatville South Australia Portable Digital Device Acceptable Use Policy Portable Digital Device Acceptable Use Policy Portable digital devices include but are not limited to: Mobile
GARDENVALE PRIMARY SCHOOL BYOD
GARDENVALE PRIMARY SCHOOL BYOD (Bring Your Own Device) POLICY This policy operates in conjunction with the Victorian Department of Education and Early Childhood development and Gardenvale Primary School
Laptops and Classrooms in Olean City School District
OLEAN CITY SCHOOL DISTRICT STUDENT LAPTOP GUIDELINES AND PROCEDURES 1. RECEIVING A LAPTOP a. Each student will receive a Dell Latitude 3340 laptop, a power adapter, and a slip on case for the laptop. b.
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
CHS 1:1 With Chromebooks Procedures and Info for Students and Parents. 1. Receiving Your Chromebook. 2. Returning Your Chromebook
CHS 1:1 With Chromebooks Procedures and Info for Students and Parents The mission of the 1:1 program in at Carmel High School is to create a collaborative learning environment for all learners. This environment
St Peter Claver College Student 1:1 Laptop Program. Years 7-12. Policy and Guidelines Booklet
St Peter Claver College Student 1:1 Laptop Program Years 7-12 Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of a 1 to 1 Laptop Program... 2 2. Acceptable use of ICT resources
How To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
MOBILE PHONE & COMPUTER USE POLICY
MOBILE PHONE & COMPUTER USE POLICY epal epal is the online learning hub for the Australian Performing Arts Grammar School. It is a main form of communication between parents, students, staff and administration.
Tri-city College Prep High School Tablet Program Handbook
Tri-city College Prep High School Tablet Program Handbook The focus of the Tablet Initiative at Tri-city College Prep High School is to prepare students for their future, a world of digital technology
1 to 1 Laptop Programs Brisbane Catholic Education
1 to 1 Laptop Programs Brisbane Catholic Education Introduction What is a one to one program? A 1 to 1 laptop program provides every student and teacher access to his or her own laptop computer in a wireless
Years 3-7 Acceptable Use Policy & Agreement
Years 3-7 Acceptable Use Policy & Agreement Reidy Park Primary School is committed to enhancing teaching and learning through the safe use of information and communication technologies (ICTs). We require
Tablet 1:1 Initiative
Tablet 1:1 Initiative Handbook Overview This handbook is intended to provide essential information about the use of student Tablet computers in. The one to one student and teacher Tablet program provides
FAQ for OOPS 1:1 Program
FAQ for OOPS 1:1 Program How often will the laptop be used during school time? The laptop will not replace the use of all the tools we currently use in class like books, pen and paper. The laptop is a
