A.
Mission Statement
The mission of the school’s technology program is to support
student learning and facilitate teaching. This includes the school network and
all technology equipment used by students, teachers, and support staff. Goals
of the BES technology program are to:
- Integrate
technology across the curriculum
- Provide
all students the opportunity to develop the technological skills necessary
to be effective participants in 21st century society and
lifelong learners
- Protect
students from inappropriate information
- Protect
hardware, software, and data (documents, files, etc.) from damage or
degradation
- Encourage
respectful, responsible, and ethical use of information technology
- Maximize
staff and student access to technology and the information it can provide
(highest priority)
- Provide
community access to school technology for educational purposes when it
doesn’t interfere with students and school staff (lower priority)
The procedures that follow clarify the BES Information
Technology Acceptable Use Policy approved by the BES School Board and provide
more specifics. If a conflict arises between these procedures and the approved
AUP, the Acceptable Use Policy takes precedence.
B.
Hardware Selection and Use
Selection:
All
hardware requests will be made through the Request Tracker system and
approved by the BES Technology Committee. Hardware includes all digital
equipment such as computers, printers, digital cameras, scanners, memory
sticks, external hard drives, Smart Boards, etc.
- Only
certain brands of equipment will be authorized for purchase to ensure
ongoing warranty assistance, ease of maintenance, and control of total
cost of ownership. Computers and printers will adhere to specifications
determined by the BES Technology Committee and approved as hardware
standards.
- Use of
equipment not listed on the hardware standard for purchase requires
approval the BES Technology Committee. Hardware standards will be updated
annually.
Use:
a.
School computers should be used for educational or job-related purposes.
b. Priority will
always be given to school-related projects and activities.
c. School computers will not be
treated as personal property and modified without
permission. Unauthorized
modifications to school computers will be reported to
the administration. This includes
instant messaging programs.
- Laptops
that go home must only be used by the person to whom the computer is
assigned, and not by other friends or family members.
- Non-school
computers or digital devices will not be connected to the network
without prior approval of the BES Technology Coordinator. All personally
owned devices brought to school must be scanned for viruses before being
connected to the school network.
- Computers
will not be moved or relocated without informing technology personnel and
soliciting their assistance.
C.
Donated Equipment
- Donated
equipment will not be accepted unless it meets minimum hardware standards
as determined by the BES Technology Committee.
- Donated
equipment should not be more than three years old and should be compatible
with existing equipment in regard to operating system.
Any donated equipment will be approved by the BES Technology
Committee prior to use in the school.
D.
Software Selection and Use
- Only
approved software will be installed on school computers. The BES
Technology Committee will review all software requests and maintain an
approved software list.
- Requests
for additional software and/or software installation will be made through
the Request Tracker system with approval required before use. Only
technology personnel will perform installations.
- No
unauthorized software will be installed from disk/CD or downloaded from
the Internet on school computers. This includes instant messenger
programs.
- Software
will only be installed on more than one computer when proper licensing is
available or acquired. No programs will be loaded on the server unless a
network license has been purchased.
- BES
technology services do not support any personally owned software or
software that is not properly licensed. BES technology support services
reserve the right to remove any unauthorized software from school
computers (e.g., instant messenger applications).
E.
Network Procedures and Use
(Access, privileges, acceptable use)
Each
staff member will have a personal network account which is password
protected. Accounts will be made available after the staff member signs an
AUP agreement. Privileges for opening attachments to e-mails will only be
available in these personal logins. The student logins will not have
similar privileges.
- All
staff members are required to read the BES Acceptable Use Policy and sign
a form stating their compliance with this policy. A signature is
required before any new accounts are activated on the network.
- Community
members will sign an AUP agreement before using school technology.
- Users
should only be accessing their own files or shared files. Accessing
another user’s files is a violation of privacy rights unless they have
given you permission.
- a.
Files should only be deleted by the owner.
b. Large files should be backed up
on removable media to conserve space on the server. Old files may be moved to
backup storage by technology personnel as required.
c. If you believe a file or folder
is missing, contact technology support for assistance.
d. At the end of the year, staff
members are responsible for deleting or organizing files in their accounts
(password-protected and classroom or students).
- For
security reasons, no one is permitted to connect a non-school-owned
computer, laptop, or personal digital assistant to the school’s network
without prior approval from the Network Administrator.
- Portable
media (disks, memory sticks, CDs, etc.) should be scanned for viruses
prior to opening any files they contain. Right click on media icon and
scan for viruses as a precaution with all portable media.
- It is
critical that passwords not be shared or divulged. Do not have the
computer save any password if prompted. Click on “No” if the computer
prompts you to save password.
If you feel your password has been compromised, you should
request a password change (new password) from the Technology Coordinator or
Technology Support Specialist.
F.
Internet Procedures and Use
- There
is a great deal of inappropriate material online. Deliberately accessing
or attempting to access inappropriate material on school computers is not
allowed.
- Filtering
is in place to protect students and many sites may not be available at
school for a variety of reasons (e.g., inappropriate materials or
content).
- Have a
clear purpose in mind when browsing. BES School Rights and
Responsibilities apply to Internet use. You have a right to be safe and a
right to learn. You have a responsibility to treat others with respect.
- Avoid
acknowledging pop-ups. Acknowledging pop-ups can allow Spyware and Adware
to be loaded onto your computer without you being aware of the activity.
Avoid pop-up offers and anything that says you’re a winner.
- If you
register, purchase, or order anything online, make sure you know whom you
are giving the information to and what it will be used for.
The school network (via the Internet) may not be used for
personal or financial gain.
G.
E-mail Accounts and Use
(School accounts, privacy, confidentiality)
Each
staff member will have a school e-mail account.
- School
e-mail is not private and can be monitored. No confidential
information or inappropriate content should be transmitted
via school e-mail.
- The
weekly staff bulletin will be distributed via school e-mail.
- Users
should know their user logon and password. Passwords are personal and
should not be shared with anyone.
- Users
of school e-mail accounts are expected to abide by the generally accepted
rules of network etiquette. These include:
- Being
polite
- Using
appropriate language
- Not
making threats
- Not
revealing personal information about students or colleagues (photos or
written information)
- Not
spreading rumors of false information
- Viruses
often come attached to e-mail. Do not open any attachments from an unknown source or that look suspicious.
Viruses commonly send e-mails in the name of a user whose computer is infected. Do
not open attachments unless you are expecting them. Even if an e-mail is from
someone you know, it could have a virus attached. When in doubt, get help or
delete the message without opening the attachment.
- If
you have a spam message with an unsubscribe link, do not use it.
Attempting to unsubscribe generally lets the spam
organization know your address is valid and makes you vulnerable to additional spam.
Always delete spam messages without responding or opening.
- Many
virus warnings are hoaxes. Do not forward virus warnings to other users unless the threat can be verified.
- Students
are not allowed to access personal e-mail accounts from school computers.
H.
Technology Support
(Requests, limitations, tracking)
- All
requests for technology support will be entered into the Request Tracker
system. This includes multimedia projects (photos, PowerPoints, brochures,
movies, etc.).
- Technology
support will be provided for all school technology and acceptable donated
equipment. Support will not be provided for personal items or unauthorized
equipment.
- Technology
requests will be tracked and prioritized. An attempt will be made to
address all requests in a timely manner. Technology requests will be
addressed based on priority and availability of parts and materials.
- Requests
that require a large expenditure of time and money may need to be
addressed through the budgeting process and will require technology
committee approval. An effort will be made to honor all reasonable requests.
Staff members who feel comfortable using technology, or who
have specific areas of expertise, should act as mentors for staff members who
need assistance. This can be done on a formal or informal basis.
I.
Computer Lab Rules (for Students)
- Follow
directions.
- No
food or drink allowed.
- Use
inside voices.
- Don’t
disturb others.
- Raise
your hand for help.
- Ask
permission before printing.
- Put
CDs and headphones away when you log out.
- Push
your chair in when you leave.
- Take
out what you bring in.
- There
will always be an adult in charge. If there is not an adult in charge, you
must leave the computer lab.
- Students
will have a clear educational purpose when using lab computers.
J.
Web Publishing
- All
school webpages must be curriculum or school related.
- No
personal homepages will be linked to the BES School Webpage.
- No
student work or photos will be published on the BES School Webpage without
written parental approval.
- Curriculum
links on the BES School Webpage will be screened by technology personnel
to make sure they are relevant and appropriate for student use.
Copyright laws must be adhered to when publishing materials
on the school’s website.
K.
Technology Caveats
- Nothing
in these procedures will override the AUP if a conflict exists. The AUP
always takes precedence.
- All
staff members must adhere to copyright laws. This includes the use of
school technology. Proper software licensing and source citations are
required for all school projects and activities.
- Student
safety while online is critical. Students should be made aware of online
dangers and how to avoid being victimized.
- The
following is a list of unacceptable uses of school technology:
- Any
use for private financial gain
- Communicating
fraudulent, harassing, abusive, or offensive information, pictures, or
messages
- Violating
copyright laws
- Downloading
software from the Internet without prior approval
- Accessing
inappropriate sites or e-mail (e.g., pornography)
- Interfering
with or disrupting network services or equipment
- Installing
unlicensed or unapproved software
- Accessing
chat rooms
- Any
use that is illegal, such as gambling or chain letters
L.
Technology Planning for Integration (Collaboration)
- Activities
in the computer lab will be planned collaboratively with classroom
teachers to ensure integration with the existing curriculum.
- Major
projects involving technology will be carefully planned ahead of time with
technology support personnel to ensure adequate time and resources are
available.
- The
classroom teacher is required to stay with his or her class during
computer lab sessions. The teacher is responsible for planning
standards-based technology lessons with support from available technology
support staff.
One technology support person will be available in
the computer lab during regularly scheduled lab times. Technology
support personnel may not be available during extra lab times that
teachers sign up for.