Presentation is loading. Please wait.

Presentation is loading. Please wait.

WOW! Resources Resources Time Time Paperwork Paperwork Relationships Relationships So many resources, so little time, so much paperwork, and so many relationships.

Similar presentations


Presentation on theme: "WOW! Resources Resources Time Time Paperwork Paperwork Relationships Relationships So many resources, so little time, so much paperwork, and so many relationships."— Presentation transcript:

1 WOW! Resources Resources Time Time Paperwork Paperwork Relationships Relationships So many resources, so little time, so much paperwork, and so many relationships to form…..

2 Let Us Help You Presented By Donna Williamson Technology Director Technology Director Mountain Brook Schools

3 District Technology Team Jason Falconer Jason Falconer Jeff Green Jeff Green Kay Wilks Kay Wilks Donna Williamson Donna Williamson Sonia Montana Sonia Montana Patsy Combs Patsy Combs Ken Hyatt Ken Hyatt Donna Williamson Donna Williamson

4 Local School Technology Staff Joani Kay Joani Kay MBHS (Mtn. Brook High School) Suzan Brandt Suzan Brandt MBJH ( Mtn. Brook Junior High) Lynne Colley Lynne Colley CES (Crestline Elem.) Kenneth Camp Kenneth Camp CBES ( Cherokee Bend Elem.) Paula Stanbridge Paula Stanbridge MBE (Mountain Brook Elem.) Sharon Mumm Sharon Mumm BWF (Brookwood Forest Elem.)

5 Getting Technology Assistance Quick Answers or call your local technology coordinator Quick Answers or call your local technology coordinator Actionenter your problem into our online help desk called IT Direct. Actionenter your problem into our online help desk called IT Direct. Login: Your address Login: Your address Organization Number: Organization Number: Submit Password: mtnbrook Submit Password: mtnbrook

6 Technology Education Curriculum We have an extensive technology education curriculum that was developed by Mountain Brook teachers. We have an extensive technology education curriculum that was developed by Mountain Brook teachers. It is based on the AL State Technology Curriculum which is in turn based on the ISTE standards. It is based on the AL State Technology Curriculum which is in turn based on the ISTE standards. All core subject teachers teach the appropriate skills as outlined in the framework. All core subject teachers teach the appropriate skills as outlined in the framework. Lisa Beckham will provide a copy of the framework with your other curriculum guides. Lisa Beckham will provide a copy of the framework with your other curriculum guides. The curriculum is also online. The curriculum is also online. Additional links to this site can be accessed from the main technology page then clicking on Technology Education, or by going to the district Instruction web page and clicking on Technology.

7 Enter URL:

8 Software All Windows XP and Windows 7 computers have the Microsoft Office Suite 2007 loaded which includes Outlook, Word, Excel, PowerPoint, Publisher, and Access. All Windows XP and Windows 7 computers have the Microsoft Office Suite 2007 loaded which includes Outlook, Word, Excel, PowerPoint, Publisher, and Access. All computers have Internet access. Our standard browser is Internet Explorer. All computers have Internet access. Our standard browser is Internet Explorer. All schools use the Destiny library software. All schools use the Destiny library software. All schools use STI as their student management software. All schools use STI as their student management software. All computers are protected from viruses by a product called Sophos. All computers are protected from viruses by a product called Sophos. All schools have access to AVL and various other online resources. All schools have access to AVL and various other online resources..

9 SoftwareHighlighted Tools for All teachers have access to Moodle, an online content management system. All teachers have access to Moodle, an online content management system. All teachers and students have access to their files from home through the Mountain Brook Portal which can be accessed from the district technology webpage. All teachers and students have access to their files from home through the Mountain Brook Portal which can be accessed from the district technology webpage. All teachers and students have access to Google Apps including accounts for students. All teachers and students have access to Google Apps including accounts for students. All teachers and students have access to the online tool VoiceThread. All teachers and students have access to the online tool VoiceThread. All teachers and students have access to WikiSpaces. All teachers and students have access to WikiSpaces.

10

11 Accessing Available Software We use a standard Windows desktop. We use a standard Windows desktop. Your desktop consists of links to programs or folders. Your desktop consists of links to programs or folders. Staff members do not have network rights to place shortcuts on the desktop. Staff members do not have network rights to place shortcuts on the desktop. Staff members are asked NOT to install software on their computers, laptops, or network (g:\) drive without discussing with the technology department. Staff members are asked NOT to install software on their computers, laptops, or network (g:\) drive without discussing with the technology department. Staff are asked to save files on network drives (g:/ and s:/) not c:/ drive. Staff are asked to save files on network drives (g:/ and s:/) not c:/ drive.

12 Available Technologies All instructional areas are equipped with at least one networked, multi-media, Windows XP or Windows 7 computer with printing capabilities to a networked laser printer. All instructional areas are equipped with at least one networked, multi-media, Windows XP or Windows 7 computer with printing capabilities to a networked laser printer. All schools have wireless laptop labs for grades All schools have wireless laptop labs for grades All schools have at least 1 hardwired lab and computers in all media centers. All schools have at least 1 hardwired lab and computers in all media centers. All classrooms have a speaker phone and voice mail. You will be asked to record a greeting on your classroom telephone and initialize your voice mail. All classrooms have a speaker phone and voice mail. You will be asked to record a greeting on your classroom telephone and initialize your voice mail. All schools have access to Interactive classroom devices. All schools have access to Interactive classroom devices. mounted data projector mounted data projector InterWrite School Pad InterWrite School Pad digital document camera digital document camera student response systems (clickers) student response systems (clickers) Almost all classrooms have sound enhancement systems which consists of two microphone (1 teacher, 1 student) and the ability to project sound from a DVD/VCR or the computer equally distributed throughout the room. Almost all classrooms have sound enhancement systems which consists of two microphone (1 teacher, 1 student) and the ability to project sound from a DVD/VCR or the computer equally distributed throughout the room.

13 Other Technologies All teachers have the ability to post information on a class webpage for parents, students, and colleagues. All teachers have the ability to post information on a class webpage for parents, students, and colleagues. All network storage is backed-up at the district level All network storage is backed-up at the district level (G:\) Individual (G:\) Individual (S:\) Shared (S:\) Shared All teachers have the ability to schedule substitutes using Aesop. All teachers have the ability to schedule substitutes using Aesop.

14 Protecting You The following are a few of the ways we attempt to protect our users and technology resources: Internet Filteringwe filter and record all Internet activity. Internet Filteringwe filter and record all Internet activity.

15

16 Protecting You A few ways we attempt to protect our users and technology resources: Internet Filteringwe filter all Internet activity by category; Internet Filteringwe filter all Internet activity by category; Filteringwe filter all staff incoming and outgoing s for spam, inappropriate content, and viruses Filteringwe filter all staff incoming and outgoing s for spam, inappropriate content, and viruses

17 Revised Technology Usage Policy Adopted by the Board of Education July 2007

18 POLICY STATEMENT The primary goal of the technology environment is to support the educational and instructional endeavors of students and employees of Mountain Brook Schools. The primary goal of the technology environment is to support the educational and instructional endeavors of students and employees of Mountain Brook Schools. Use of any and all technology resources is a privilege and not a right. Use of any and all technology resources is a privilege and not a right.

19 Introduction To ensure that students receive a quality education and that employees are able to work in a professional and intellectually stimulating environment, it is the policy of the Mountain Brook Schools to provide all students and employees with access to a variety of technology resources. All Mountain Brook students and staff must acknowledge and adhere to this policy. The creation of a large and varied technology environment demands that technology usage be conducted in legally and ethically appropriate ways, consistent with the Mission Statement and instructional goals of the Mountain Brook Schools. We recognize that the use of technology always requires attempts to balance the benefits against the possibilities of danger, security problems, and abuse. Rapid changes in technology and growth in the range of content available makes this a constant challenge. Thus, it is the intention of the Mountain Brook Schools that all technology resources will be used in accordance with any and all school system policies and procedures as well as local, state, and federal laws and/or guidelines governing the usage of technology and its component parts. Additionally, it is implied that all students and employees of the Mountain Brook Schools will use the provided technology resources so as not to waste them, abuse them, interfere with or cause harm to other individuals, institutions, or companies. The administrators of each school will be responsible for establishing specific practices to enforce this policy at individual schools.

20 What equipment and content are subject to the policy other than equipment purchased with school system funds? Some of these policies pertain to all personal technologies used on any Mountain Brook campus are subject to this policy and may be used only if such usage is in compliance with all school system policies, procedures, and guidelines as well as local, state, and federal laws. All electronic content stored on any external storage medium or personal off-site storage location that is brought to or accessed from a Mountain Brook Schools campus is subject to all school system policies and guidelines, as well as local, state, and federal laws.

21 We are serious about protecting information about you and our students! Employees are prohibited from ing outside the school system or storing/saving on external storage devices or portable devices that do not remain on campus, electronic copies of student or staff personal information. This information includes, but is not limited to data containing social security numbers, information protected by FERPA, and any other sensitive and/or protected information. This information includes, but is not limited to data containing social security numbers, information protected by FERPA, and any other sensitive and/or protected information.

22 What if your flash drive, CD, or external drive is lost or stolen? In the event that this type of information is stored on a portable or external device and said device is lost or stolen, the Technology Director should be notified immediately. In the event that this type of information is stored on a portable or external device and said device is lost or stolen, the Technology Director should be notified immediately.

23 Access A. …inappropriate or suspected inappropriate use will result in a cancellation of those privileges, pending investigation. …Mountain Brook Schools cannot assume any liability arising out of the illegal or inappropriate use of technology resources. B. Users should not purchase or dispose of software, hardware, peripherals, or other technology-related devices without consulting the technology staff. Regardless of purchase date, location or funding source, all personnel should adhere to the Electronics Purchasing and Disposal Guidelines in regard to all purchases and disposals. C. Individuals may use only accounts, files, software, and/or other technology resources that are assigned to, provided, or approved for him/her. D. Individuals identified as a real or suspected security risk will be denied access. E. Any use of technology resources that reduces the efficiency of use for others will be considered a violation of this policy. F. Individuals must not attempt to disrupt any computer services or data by engaging in inappropriate activities. Examples include, but are not limited to, spreading viruses, spamming, excess network and/or Internet activity, or modification of equipment or infrastructure. G. Individuals must not attempt to modify technology resources, utilities, and configurations, or change the restrictions associated with his/her accounts, or attempt to breach technology resources security system or filtering system, either with or without malicious intent.

24 Access Continued… Personal technology-related devices such as, but not limited to laptops, PDAs, smartphones, iPods, etc. used on school grounds are subject to all items covered in this policy and other applicable published guidelines. The user should not access local area network or wide area network resources without the explicit permission of the technology staff. Public Internet access is available for visiting devices and is subject to the conditions outlined in this policy and all other school system policies and guidelines, as well as local, state, and federal laws. such as personal laptops

25 Privacy A. To maintain network integrity and to insure that the network is being used responsibly, local school Technology Coordinators and/or other designated technology staff reserve the right to inspect any and all data, including data stored by individual users on individual school or personal devices. Users should be aware that activities may be monitored at any time, without notice. B. …Reasonable steps will be taken to maintain the security of technology resources, but no assurance can be given that penetration of such security will not occur. C. …be careful to maintain appropriate and responsible communications. D. Mountain Brook Schools cannot guarantee the privacy, security, or confidentiality of any information sent or received, either via the Internet, an facility, telephone, or otherwise. E. Users are encouraged to avoid storing personal and/or private information on the district and/or schools technology resources.

26 Data Security and Backups A. Students and staff are expected to follow all local, state and federal laws and system policy regarding the protection of student and staff confidential data. B. Users should not have any expectation that their usage of such resources is private. Reasonable efforts will be taken to maintain security of technology resources, but Mountain Brook Schools cannot ensure that such security will not be penetrated or breached and cannot assume any liability arising out of any such penetration or breach of security. C. Individuals must take all reasonable precautions to prevent unauthorized access to accounts and data and any other unauthorized usage within and outside the Mountain Brook Schools. Any such unauthorized usage shall be reported immediately to the local school Technology Coordinator and/or the district Technology Director. D. All employees shall be responsible for reporting suspected or actual breaches of data security whether due to inappropriate actions, carelessness, loss/theft of devices or failures of technical security measures. E. Individuals may not attempt to log into the network using any network account and/or password other than the login(s) assigned to him/her. Individuals may not allow someone to use his/her network account and/or password to access the network, , or the Internet. F. Reasonable steps and procedures will be taken to secure student records, media center collections, child nutrition, and accounting information, and such information shall be backed up in a routine manner, with such information being maintained in secure offsite storage. G. The system-wide technology staff does perform routine backups in an effort to assure continuity of business. There can be no assurance, however, that technology resources will be available within a particular time frame following an outage. There is no guarantee that information that existed prior to an outage, malfunction, or deletion, can be recovered. Users are expected to maintain and back up their critical files and data.

27 Copyright A A. Illegal copies of software may not be created or used on school equipment. B. Any questions about copyright provisions should be directed to the district Technology Director, local school Technology Coordinator, or local school media specialist. C. Legal and ethical practices of appropriate use of technology resources will be taught to students and employees in the system (i.e. as part of the Technology Education Curriculum, during lab orientation, network orientation, or faculty meetings, etc). Again, all questions regarding legal and ethical practices of appropriate use should be directed to the local school Technology Coordinator and/or district Technology Director. D. Copyright is implied for all information (text, data, and graphics) published on the Internet. Student and employee web page authors will be held responsible for the contents of their pages. Do not "borrow" icons, sounds, or graphics from other pages without documented permission. It is the students or employees responsibility to secure proper usage permission. E. Duplication of any copyrighted software is prohibited unless specifically allowed in the license agreement and, then, should occur only under the supervision and direction of the technology staff. F. A backup copy of all purchased software programs should be made and, thus, become the working copy. G. All original copies of software programs, including those purchased with departmental funds, will be stored in a secure place. H. For security and insurance purposes, the local school Technology Coordinators, technology aides, and/or the district level technology staff will be the only people with access to original software disks at a given school location, with the exception of CDROMs required when accessing the program. System-wide software originals will be housed at the district Technology Directors office.

28 Copyright I I. In almost every case, if a single copy of a given software package is purchased, it may only be used on one computer at a time. Multiple loading or "loading the contents of one disk onto multiple computers," (1987 Statement on Software Copyright) is NOT allowed. J. If more than one copy of a software package is needed, a site license, lab pack, network version, or Internet portal license must be purchased. The district Technology Director and/or local Technology Coordinator and the person requesting the software will be responsible for determining how many copies should be purchased. K. Either the district Technology Director or the local school Technology Coordinator is authorized to sign license agreements for a school within the system. Copies of any system-wide license agreements must be signed by the district Technology Coordinator and/or Superintendent and distributed to all schools that will use the software. L. The district technology staff or local Technology Coordinator is responsible for installation of all software in use on the wide area network, local area network and/or individual workstations/laptops within the Mountain Brook Schools. Technology lab aides or other designated staff may install software on local workstations with permission by the district Technology Director and/or local school Technology Coordinator. M. Written permission to post student work on the internet is obtained through the Mountain Brook City School Technology Usage Agreement.

29 A. A.Mountain Brook Schools provide access to accounts for all employees, long- term substitutes, and, on a limited basis, for students. accounts may be granted for school related organizations or classes with designated employee sponsors. B. Mountain Brook Schools make a reasonable effort to maintain (backup) for normal business operations. Backups are maintained for a maximum of 13 days. (Therefore, when you delete a message, it is still accessible.) C. Technical support is provided for Mountain Brook Schools accounts used to conduct educational and/or instructional business. D. Personal use of is permitted as long as it does not violate Mountain Brook Schools' policy and/or adversely affect others or the speed of the network. E. Use of Mountain Brook Schools accounts for harassing or threatening is strictly prohibited. F. Mountain Brook Schools' accounts may not be used for political activity, personal gain, commercial purposes, or profit.

30 G. G. When employing , all employees are responsible for maintaining professionalism at all times. Avoid impulsive and informal communication. Employees must be constantly mindful of the need to review carefully and reconsider communications before responding to and/or sending . As a general rule, the content of an should be acceptable to a general audience. H. Mountain Brook Schools' accounts may not be used for attempting to send or sending anonymous messages. I. Mountain Brook Schools' accounts may not be used for sending mass s unless to parent lists or for other for educational purposes. J. Mountain Brook Schools' accounts may not be used for posting or forwarding other user's personal communication without the author's consent. K. Because is not securely transmitted, discretion must be used when sending, or encouraging the receipt of containing sensitive information about students, families, school system employees, or any individuals. There can be no assurance that will be confidential and/or private. L. There is a system imposed limit on storage for accounts. Users meeting or exceeding the limit will be unable to send or receive s.

31 M M. Users required to maintain for more than 365 days should print said s. N. The technology staff, Mountain Brook Schools administrative staff, or Mountain Brook Board of Education do not support or advocate the use of archives. O. Incoming and outgoing is filtered by the district for inappropriate content. However, no filtering system is foolproof, and material deemed inappropriate by individual users may be transmitted in spite of filtering. Mountain Brook Schools cannot assume any liability for such breaches of the filter. P. accounts will automatically expire on the last full day of employment. Q. At the discretion of the Technology Director, accounts may be locked without notice. s needed for documentation should be printed and filed.

32 Concerns Inherently non-secure method of communicating. Inherently non-secure method of communicating. Encourages impulsive communication Encourages impulsive communication Creates a permanent written record Creates a permanent written record Problems with REPLY-TO-ALL and FORWARD. Problems with REPLY-TO-ALL and FORWARD.

33 Basic Guidelines Avoid specifics, sensitive material. Avoid specifics, sensitive material. Respond promptly BUT NOT IMPULSIVELY. Respond promptly BUT NOT IMPULSIVELY. Be very careful about REPLY-TO-ALL and FORWARDING. Be very careful about REPLY-TO-ALL and FORWARDING.

34 When sending an assume it will be permanent. When sending an assume it will be permanent. If about a student, assume it may be read by student and parents. If about a student, assume it may be read by student and parents. Avoid for conveying unwelcome, negative information. (Criticize locally and praise globally.) Avoid for conveying unwelcome, negative information. (Criticize locally and praise globally.)

35 ALWAYS ask self: Would this be better handled in person or on the phone? ALWAYS ask self: Would this be better handled in person or on the phone? NEVER fire off an . Think it over, consult, craft language as if a business letter. NEVER fire off an . Think it over, consult, craft language as if a business letter.

36 Do not send personal mass mailings. Do not send personal mass mailings. Do not send s for personal gain, to solicit business for friends, family, etc., or for political purposes. Do not send s for personal gain, to solicit business for friends, family, etc., or for political purposes.

37 Religious messages may make people feel uncomfortable, excluded, pressured. Religious messages may make people feel uncomfortable, excluded, pressured. Dont put burden on the receiver to express discomfort with it or to opt out. Burden is on the SENDER not to send any message that others might find unwelcome. Dont put burden on the receiver to express discomfort with it or to opt out. Burden is on the SENDER not to send any message that others might find unwelcome.

38 Check Technology Usage guidelines for MBS teacher websites. Check Technology Usage guidelines for MBS teacher websites. Personal websites: Be mindful of websites you create or participate in. Personal websites: Be mindful of websites you create or participate in. REPUTATION MANAGEMENT: What happens if someone Googles you? REPUTATION MANAGEMENT: What happens if someone Googles you? Let us know if students post something upsetting about you on the web. Let us know if students post something upsetting about you on the web. Websites By/About Teachers Websites By/About Teachers

39 As with websites, consider what you should and shouldnt reveal about yourself on Facebook, MySpace, etc. As with websites, consider what you should and shouldnt reveal about yourself on Facebook, MySpace, etc. If you havent already, this is probably a good time to review what youve got out there. If you havent already, this is probably a good time to review what youve got out there. Social Networking

40 If a teacher/employee initiates personal contact with students outside of school, the teacher/employee may create impression of unhealthy interest in student and may leave the adult open to an accusation of inappropriate conduct. If a teacher/employee initiates personal contact with students outside of school, the teacher/employee may create impression of unhealthy interest in student and may leave the adult open to an accusation of inappropriate conduct. Students are being trained to be cautious, even suspicious of interacting with adults on the web. Students are being trained to be cautious, even suspicious of interacting with adults on the web. Do not send personal messages to students or reply to them. Do not send personal messages to students or reply to them. Is it ok for me to initiate electronic communications with a student?

41 Recommend against social networking/ texting with students unless site is used only for school information or academic reasons. If you have a personal social networking page, recommend that you be extremely cautious about content of your profiles and pages. Recommend against social networking/ texting with students unless site is used only for school information or academic reasons. If you have a personal social networking page, recommend that you be extremely cautious about content of your profiles and pages. What about Facebook or MySpace accounts? Should I respond to an invitation to become a students Friend?

42 …see Technology Usage Policy and Guidelines. …see Technology Usage Policy and Guidelines. School system website School system website Technology Technology Teacher Resources Teacher Resources Techology Usage Policy Techology Usage Policy For more guidance

43 Remember… is public record. is public record. Nothing should be written in an that you would not want a colleague or your administrator to read. Nothing should be written in an that you would not want a colleague or your administrator to read.

44 The Internet A. A. The intent of the Mountain Brook Schools is to provide access to resources available via the Internet with the understanding that staff and students will access and use information that is appropriate for their various curricula. B. All school rules and guidelines for appropriate technology usage, as well as local, state, and federal laws apply to usage of the Internet. C. Teachers should screen all Internet resources before projecting them in the classroom. D. Students gain access to the Internet by agreeing to conduct themselves in a considerate and responsible manner and by providing written permission from their parents. E. Students are allowed to conduct independent research on the Internet upon the receipt of the appropriate permission forms. F. Permission is not transferable, and therefore, may not be shared. Existing permission forms are valid until new forms are received. Students are required to have new forms signed when changing schools.

45 Web Publishing A. A. The Mountain Brook Schools' web site is limited to usage associated with activities of Mountain Brook Schools. The web site cannot be used for profit, for commercial purposes, to express personal opinions, or to editorialize. B. The Technology Staff reserves the right to reject all or part of a proposed or posted web page. C. All pages posted on the Mountain Brook Schools' web site must be designed/written with approved software. D. It must be easy to determine the name or title of the person responsible for the content on each web page or sections of web pages housed on the Mountain Brook Schools website. E. A staff members primary web page should be housed on the Mountain Brook Schools web site. F. Links from pages housed on the Mountain Brook Schools website to personal blogs, social networking sites, advertisements unrelated to school system business, and/or personal web pages are prohibited. G. Student pictures or other personally identifiable information can be used in accordance with the signed Mountain Brook City Schools Technology Usage Agreement and in accordance with FERPA guidelines. H Student posting of personally identifying information of any kind on the Mountain Brook website or linking to personal information from the Mountain Brook website is prohibited. Personally identifying information includes home and/or school address, work address, home and/or school phone numbers, full name, social security number, etc. only

46 Web Publishing I. I. Individual students may be identified by first name and first letter of last name unless permission to do so is denied by the parent or guardian in writing on the Technology Resource Agreement form. Full names, for secondary students only, may only be used in reporting student participation in school sponsored extracurricular activities, achievements, and other positive recognitions. J. Caution should be used when photographs of any students are included on web pages. Group photographs without names are preferred for all students. In some cases, use of first names, last initial is appropriate for secondary students. Photographs of individual secondary students, with full names, may be used to recognize student achievements, and other positive recognitions. K. No written permission is required to list faculty/staff and their school contact information (phone extension, address, etc.) L. Permission for publishing employee photographs on the Mountain Brook website is assumed unless the employee specifies otherwise in writing to his or her direct supervisor. M. Infringement of copyright laws, obscene, harassing or threatening materials on web sites are against the law and are subject to prosecution.

47 So what happens if you accidentally violate the policy? For example you… stream Internet video or audio that is not directly tied to the curriculum stream Internet video or audio that is not directly tied to the curriculum download a file that contains a virus or is so large it clogs the network; download a file that contains a virus or is so large it clogs the network; your vacation photos to everyone in the school system; your vacation photos to everyone in the school system; purchase equipment or software that hasnt been approved; or purchase equipment or software that hasnt been approved; or bring a wireless hub from home and hook it up to the school system network. bring a wireless hub from home and hook it up to the school system network. just to name a few violations.

48 You may end up in the… Donna Doghouse!

49 It is easy to get out… Just Fess Up and Clean Up


Download ppt "WOW! Resources Resources Time Time Paperwork Paperwork Relationships Relationships So many resources, so little time, so much paperwork, and so many relationships."

Similar presentations


Ads by Google