Meridian Middle School Laptop Care, Internet Safety, Acceptable Use Policy, and Meridian Middle School Guidelines.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Laptop Responsibilities Memorial Middle School Laredo ISD.
Northside I.S.D. Acceptable Use Policy
Online Learning and the Laptop Initiative Hidden Valley High School Roanoke County Public Schools 2006.
Developed by Technology Services 1:1 Laptop Initiative
WHY ARE WE CHANGING THE POLICY? Rationale: –To maximize students learning potential via technology –To utilize the natural affinity most students possess.
Hart District Acceptable Use Policy Acceptable Use Policy.
Meridian Middle School Parent Orientation and Internet Safety Evening.
Woodland Hills School District Computer Network Acceptable Use Policy.
The Woodlands High School
What and what not to do..  These devices must remain turned off during the instructional day, including during all testing, unless they are being used.
Microsoft Outlook is a tool that includes , calendaring, and tasks.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Riverside Community School District
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
VISD Acceptable Use Policy
Grade 5 Student Assistants
Computer Lab Rules No food or drink in the lab. That includes gum and candy. Obey all regular classroom rules. Treat the computer with respect: Please.
ACCEPTABLE USE POLICY HELEN CATONE TECHNOLOGY SPECIALIST WITH MARISA HARRIOTT Panther Run Elementary.
Fort Bend ISD Acceptable Use Policy Student Training.
Mattson Middle School One to One Laptop Program September 26, 2012.
LPISD Acceptable Use Guidelines La Porte ISD students are fortunate to have access to a wide variety of technology to help make learning more.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Using SWHS: The AUP [Acceptable Use Policy]
Electronic Use Policies.   Social Media  Internet.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Welcome to Causey Computer Lab! Computer Applications Mrs. Clements.
Junior High Computer Lab.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Welcome to Ms. Dickson’s Business Class.
Fort Bend ISD Acceptable Use Policy Training Student Training.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Fort Bend ISD Acceptable Use Policy Student Training.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
CEDAR HEIGHTS MIDDLE SCHOOL Parent One-to-One presentation.
The Computer Labs are a valuable tool for learning at Prattville High School While in the labs, students will Follow appropriate code of conduct. Adhere.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Leslie Lambert Q310-2, Winter 2001, Technology Policies The Technology Policies We Need Now and Why Is our current AUP acceptable?
BYOD: Bring Your Own Device
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
EPals ePals is your school account Communicate with group members/teachers stu.gbaps.org.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Woodland Hills School District Computer Network Acceptable Use Policy.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
School Accounts Presented by: Mrs. Mazzola.
JOHN MARSHALL COMMUNITY SCHOOL Media Center Mrs. Shepard Updated 2/8/14.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Technology usage - students
Crosby ISD Acceptable Use Policy Training
Acceptable Use Policy (Draft)
The Acceptable Use of Technology
Digital Citizenship Grades 4-6
Welcome to Challenger Computer Lab.
Cedar Heights Middle School
Working to Keep our Children Safe in a World Filled with Technology
Bluffs School 1:1 Digital Conversion Orientation for Parents August 2015.
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Welcome to the Computer Lab.
Student User Agreement and Policy 2022
Woodland Hills School District
Presentation transcript:

Meridian Middle School Laptop Care, Internet Safety, Acceptable Use Policy, and Meridian Middle School Guidelines

Languages Punjabi Library Spanish Library Russian Library

Laptop Care

Internet Safety Internet Safety

i-SAFE Mission To educate and empower youth to safely and responsibly take control of their Internet experience.

Personal Safety Community

Cyber Community Cyber community can be compared to a physical community. Cyber community is just as tangible as a physical community.

Personal Safety It is important to recognize dangers and danger signs in online communications. It is important to use techniques to avoid and/or respond assertively to a variety of dangerous situations.

Intellectual Property It is important to remember that there are acceptable legal and ethical behaviors related to information and technology. *KSD Acceptable Use *Release of Information

Cyber Security Cyber Security VirusesCyber-bullying

Computer Viruses What is a virus? -A computer program that can copy itself and infect another computer without user knowledge by spreading to an uninfected computer via a removable object (floppy disk, CD or USB drive). *Note: A virus can also be spread to other computers by infecting files on a network file system accessed by another computer.

Cyber Bullying

Internet Predators Dateline NBC: “To Catch a Predator”

-Discuss Internet Safety with children -Educate other parents/guardians -Advocate for internet safety to be taught in their children’s schools

KSD’s Electronic Resource Policy 2022 What does it mean?

General Guidelines for Technology Use All use of the system must support education. Must follow local, state, and federal law. No use may disrupt other users: hacking, abusing software, download or altering files, or introducing viruses.

Continued… Users may not develop programs to harass other users. Users are responsible for the appropriateness and content of public and private material on the system in any form. Using chat groups or other online services is prohibited.

Security Users should not share login or passwords (except with parents). Users should follow Internet safety guidelines.

Security continued… Users should be aware that technology use can be traced throughout the network.  Web-sense filter-even through home log in-uses KSD filter All files stored on the system are the property of the district and are subject to regular review and monitoring.

Security KSD will review and monitor all activity on the network for responsible use. KSD may remove a user’s access to the network without notice at any time if the user is engaged in any unauthorized activity. KSD will cooperate with law enforcement investigations relating to any inappropriate activities.

Meridian Middle School Students… must follow all guidelines set forth by Meridian staff. are held accountable to all school, district, local, state, and federal laws.

MM Student Acceptable Use The following regulations are in effect during all school hours for all computers unless otherwise directed by the teacher.

MM Acceptable Use Guidelines Students are prohibited from sending e- mails, instant messages, and/or hosting personal web pages with their laptops. Unless directed by a teacher. IM

Meridian Middle School Guidelines continued… Students may not put stickers on the laptops. Students should not deface the laptops in any way. This includes but is not limited to marking, painting, drawing or marring any surface of the laptops.

MMS Guidelines continued… Headphones are prohibited in class unless directed by a faculty member. Downloading music, games, and videos from the Internet is prohibited.

MMS Guidelines continued… Laptop use in study halls/detention is for instructional purposes only. Chat rooms are not to be accessed. Students are allowed to participate in educational games when and if directed by a teacher.

MMS Guidelines continued… Regulations have been addressed in the student code of conduct to emphasize that obscene language and/or materials, including screensavers, backdrops, and/or pictures are prohibited. Illegal use or transfer of copyrighted materials is prohibited.

MMS Guidelines continued… Additions, modifications or deletion of files except in the student’s document folder or personal H:Drive is prohibited. File sharing must be approved and directed by the teacher.

What’s OK at Home? Using MSN/AOL Instant-Messaging if the student… has permission from parent(s) or guardian(s) Watching DVDs or listening to CDs if the student… has permission from parent(s) or guardian(s) Using gaming sites if… student has permission from parent(s) or guardian(s) no downloading is required all work is complete and turned in games are school appropriate and educational in nature

Care at home Charge your laptop fully each night Use the laptop in a common room of the house Do not leave your laptop in the car Protect your laptop from extreme heat/cold Use laptop on a table, not on the floor or other unsteady surface Use the KSD case at all time

What happens if?

Lost, Stolen or Damaged KSD has a high recovery rate for lost laptops. Low-Jack/Compu-trace system  As soon as someone turns on the machine-information is sent to KSD about location. Damage due to gross negligence will be fined.

Meridian Middle School Technology Discipline Hierarchy Loss of all KSD Tech Privileges Loss of all KSD Tech Privileges Privileges SD Tech Privileges Fifth Offense Indefinite Restricted License4-Day Structured After-School Detention Tech Use Review Board In/out of school suspension Fifth Offense Indefinite Restricted License 4-Day Structured After- School Detention Tech Use Review Board In/out of school suspension Fourth Offense 1-Month Restricted Computer License 4-Day Structured After-School Detention Tech Use Review Board Third Offense 5-Day Restricted Computer License (computer does not go home) 4-Day Structured After-School Detention Second Offense 3-Day Restricted Computer License (computer does not go home) 2-Day Structured After-School Detention/Laptop Tagged First Offense Planning Room Referral/Plan of Improvement Form/Parent Contact Classroom Interventions Verbal WarningsSeating Changes Teacher Contact with Home Re-teaching

Typical 7 th Grade Tech Violations Placing the computer at risk of damage Placing the computer at risk of damage Off-task behavior during class Off-task behavior during class IM IM Surfing the web Surfing the web Working on assignments for other classes Working on assignments for other classes Listening to headphones when not directed by teacher Listening to headphones when not directed by teacher Multi-tasking Multi-tasking Violating the Acceptable Use Policy Violating the Acceptable Use Policy Non-school related photos Downloaded material Inappropriate content (low- level) Playing games Accessing Facebook/MySpace outside of school Applying an unapproved desktop background Violations Of A Greater Nature Should Be Treated as a Level 3 School Violation – e.g. Student and Paperwork Sent to Main Office.

Upcoming Events Parent Internet Safety training Make up: January 6 th at 4:00 pm Driver’s License Test: January 8th Laptops Go Home: Target Date: January 9 th Driver’s License retakes: January 12th

Successfully prepare all students for their future! KSD takes seriously its responsibility to prepare all students with 21st century tools and skills.

Questions and Answers Thank you for coming!!!!! Laptop Care Video