Hickory Public Schools -...

25

Click here to load reader

Transcript of Hickory Public Schools -...

Page 1: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

Hickory Public Schools

Hickory Career and Arts Magnet Dear HCAM Students and Parents/Guardians,

Hickory Public Schools (HPS) is committed to preparing students to be successful citizens in a global economy. Due to remaining grant funds specific to HCAM technology, we had a rare opportunity to transition the entire school to a one-to-one (1:1) digital learning environment. We know that learning is a result of continuous, dynamic interaction among students, educators, parents/guardians, and the extended community. According to studies and school reports, students who use a computing device in a 1:1 educational environment are more organized and engaged learners, attend school more regularly, advance their knowledge and understanding of technology, and become constructors and designers of information and ideas. Google Chromebooks offer this type of digital teaching and learning environment and were selected as the 1:1 device for HCAM.In order to establish and implement a successful 1:1 digital learning environment, HPS and HCAM have developed the attached handbook, including recently revised school board policies. This handbook provides guidelines and procedures to assure all HPS issued digital devices are properly used as intended, for digital teaching and learning. The handbook also outlines how to properly care for the digital devices. The expectations outlined in this handbook will be further explained to parents and students during mandatory information sessions hosted by HCAM faculty and staff. Please be sure to ask any questions you may have prior to signing the user agreement.We are excited about the opportunity to provide this type digital teaching and learning environment for HCAM students and teachers. We believe this approach transforms the “brick and mortar” classroom to a 21st Century digital learning environment where teachers are empowered to facilitate learning and students are empowered to personalize their educational experience. Sincerely, Dr. Robbie AdellSuperintendent

1

Page 2: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

Online Access ProtectionHickory Public Schools (HPS) provides access to educational resources while making every effort to restrict access to potentially objectionable material. A technology protection measure is a specific technology that blocks or filters internet access. HPS will implement a filter which protects against access to visual depictions that are obscene, child pornography or harmful to students. HPS may monitor student access to the internet. Teachers and staff will personally monitor student activity on school premises as part of their normal oversight of the instructional environment.Students will be required to access the internet through the HPS web filter on and off school campus. The filter will require students to authenticate using their HPS username and password to access the internet. This measure is to assist in preventing access to inappropriate content.Although student-use outside the school environment is filtered using the HPS web filter, it is

ultimately the responsibility of the parent/guardian’s to monitor online activity for their students. Regardless of the method of monitoring, students are ultimately accountable for the

responsible use of computing and network resources.● Students are prohibited from accessing inappropriate matter on the internet.● HPS addresses safety and security of students when using email, chat rooms and other forms of direct electronic communications through a variety of means that include filtering and staff monitoring of activity.● HPS prohibits unauthorized access including "hacking" and other unlawful activities by students online.● Unauthorized disclosure, use and dissemination of personal information regarding students by staff is prohibited.● Measures designed to restrict students' access to materials harmful to students shall be used by any and all staff and adults working with students.

Education, Supervision, and MonitoringGeneral access to the internet provides connectivity to some non-educational information and resources which have been deemed unacceptable by law for students to access. Therefore, we provide filtered access that limits this exposure and which aims to protect our students.Additionally, students and teachers are provided with a means to share information across the internet with others. Posting of information which would violate the laws pertaining to access by other students will be treated in the same manner according to the discipline plan for students and the regulations for employee conduct for staff.Every student participating in the Mobile Learning Initiative is expected to read, understand and adhere to HPS’ Acceptable Use Policy (AU P ). Failure to adhere to the policy may be grounds for discipline up to and including suspension and may result in a loss of access to the mobile learning equipment. Additionally, all HPS employees must adhere to the AUP. Parents will be provided access to the AUP.School issued digital devices are protected by security measures which have been installed on the device. Any tampering or overriding of these measures violates the acceptable use policy. Students may only use the internet access on school property to download applications and access sites that

2

Page 3: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

are educationally relevant. Social networking for joint participation in projects and other school related activities are valuable experiences which should be used with caution. The following activities are deemed unsafe practices and constitute a violation of AUP:· Using social media to bully or to threaten another person, student or otherwise· Using social media to cheat on assignments that are confined to individual completion· Using social media for personal business· Sharing personal information about yourself or others on social networks· Using social media to communicate false or misleading information· Using social media to access or demonstrate inappropriate or objectionable materials Students are provided connectivity to the internet by which they can access educationally appropriate materials and resources, which may include access to other people, students, teachers and content experts. Policies governing responsible behavior between adults and minors are applicable in online correspondence just as they would be with any in-person correspondence.Applicable policy and laws include: U.S. Const. amend. I; Children’s Internet Protection Act, 47 U.S.C. 254(h)(5); Electronic Communications Privacy Act, 18 U.S.C. 2510-2522; Family Educational Rights and Privacy Act, 20 U.S.C. 1232g; 17 U.S.C. 101 et seq.; 20 U.S.C. 6777; G.S. 115C-325(e)Hickory Public Schools: Technology in the Educational Program (policy IFBG), Internet Safety (policy IFBGB), Web Page Development (policy IFBGC), Employee Use of Social Media (policy GAMA)

DeploymentParents/guardians will be required to attend an orientation/meeting for students receiving mobile computers for the first time. The program and AUP will be explained. The student user and parent/guardian must sign the AUP in order for the student to be issued a digital device.

1. Prior to students being issued a mobile computer:• Parents/guardians and students must attend a mandatory orientation/training which provides an opportunity to receive orientation to these policies and procedures and were encouraged to ask questions and receive answers.• Student user must read, understand, and sign HPS Acceptable Use Policy (AUP) before the being issued a mobile computer.· **The district will send a report of the model and serial numbers of student mobile computers to local pawn shops and law enforcement agencies to assist in the event of loss or theft.

2. Terms of LoanHPS will loan a digital device to students for home use upon compliance with the district’s policies for all participants (student/parents/guardians).Restrictions· Legal title to the asset (mobile computer) is and all times remains with HPS. A student’s right of possession and use is limited to and conditional upon full and complete compliance with the follow HPS school policies: Technology in the Educational Program (policy IFBG), Internet Safety (policy IFBGB), Web Page Development (policy IFBGC), Employee Use of Social Media (policy GAMA)· Students may be subject to loss of privilege, fees, disciplinary action and/or legal action in the

3

Page 4: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

event of intentional damage and/or violation of policies and guidelines as outlined in this Student/Parent Mobile Computer User Guide as well as in the HPS Internet Use and Acceptable Use Guidelines.· A student’s permission to use the mobile computer terminates no later than the last day of the school year unless there is a reason for earlier termination by the district (e.g. drop-out, expulsion, and/or withdrawal, transfer to another school).

Appropriations· All students are required to turn in the digital device they were issued by the last day of the academic school year or when no HCAM.· Failure to return the property by designated deadlines and the continued use of the mobile computer for school related purposes may be considered unlawful appropriation of HPS property.· In the event a student fails to return the digital device by the end of year use, or when withdrawing from enrollment, the device will be reported as stolen property to local law enforcement and any associated damage or replacement costs will be assessed. 3. Loss, Theft, or Damage• HPS recognize that the mobile computer is a valuable asset entrusted to students for its care and maintenance during the school year.• Students and families are expected to protect the equipment from damage, loss and theft and to secure the equipment when it is in their possession to prevent damage, loss or theft.• During the time the equipment is in the possession of the student, the student is responsible for any intentional damage, loss or theft which results from negligent handling.• Each student who is issued a digital device for at home use is required to pay a yearly usage fee of $25. This fee will offset digital device maintenance costs.• All thefts must be reported to the appropriate authorities within 24 hours of discovery. Failure to report will result in an assessment of the replacement.• HPS will work with the police department to alert pawn shops and other area law enforcement agencies of lost or stolen digital devices owned by HPS.

4

Page 5: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

Refer to the table below for fees associated with damage caused to HPS digital devices.Students are required to a pay a $50 deductible upon first damage to their assigned device.

Students will pay full market price, as determined by HPS, for any subsequent repairs.Students will pay full replacement cost for a lost or irreparably damaged device.

Type of Damage Damage Fee

1st Occurrence of Broken Screen $25

2nd or more occurrences of Broken Screen $50

Intentional Keyboard Damage $50

Liquid Damage/Theft/Loss (1st Time) $100

Liquid Damage/Theft/Loss (2+) $249

Sticker Removal Fee/Cleaning Fee $25

4. Revocation of Permission to Use ComputerHPS reserves the right to revoke permission to use the mobile computer at any time if the student does not fully comply with all terms of this agreement.

5. Modification to ProgramHPS may modify these procedures or terms of use at any time.

How to Use and Take Care of Your Mobile Computer?Students are responsible for the digital devices they have been issued. Digital devices that are broken or not working properly and in need of repair or replacement must be reported within 24 hours. Students should complete a “Damage Incident Form” which can found on the HCAM and HPS website at www.hickoryschools.netHPS Technology Department and HCAM will determine whether to repair the computer on site or issue a loaner computer. A limited number of classroom computers are also available for student use. Classroom computers and loaner mobile computers are also covered by all rules and regulations as outlined in this document. All associated repair/replacement fees must be paid before receiving a loaner computer, if applicable. Failure to pay any repair/replacement fees may result in disciplinary action, in addition to being required to be a day user.

Electronic devices are property of HPS and users will follow these guidelines,as well as, information detailed within the Acceptable Use Policy.

5

Page 6: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

Mobile Computer Care Guidelines to follow:• Always close the lid before moving your mobile computer.• For prolonged periods of inactivity, the computer should be shut down completely before closing the lid. This will help to conserve the battery.• Storage and carrying of the mobile computer: Please be aware that overloading your protective backpack will damage the mobile computer. Take precaution when placing the protective backpack on a flat surface. Never sit on the mobile computer backpack.• When using the mobile computer, keep it on a flat, solid surface so that air can circulate. For example, using a mobile computer while it is directly on a bed or carpet can cause damage due to overheating.• Liquids, food and other debris can damage the mobile computer. DO NOT eat or drink while using the mobile computer. DO NOT keep food/drink or food/drink wrappers in the mobile computer backpack.• Take extreme caution with the screen. The screens are very susceptible to damage from excessive pressure or weight. In particular, avoid picking up the mobile computer by the screen or placing your finger directly on the screen with any force.• When opening your computer, open from the front center tab and never from the sides.• Never attempt repair or reconfiguration of the mobile computer. Under no circumstances are you to attempt to open or tamper with the internal components of the mobile computer. You should not remove any screws - doing so will render the warranty void.• Take care when inserting cords, cables and other removable storage devices to avoid damage to the mobile computer ports.• Do not expose your mobile computer to extreme temperatures, direct sunlight or ultraviolet light for extended periods of time. Extreme heat or cold may cause damage to the mobile computer. This includes leaving them inside a vehicle for long periods of time.• Never close objects between the lid and keyboard of the mobile computer.

Cleaning of your Mobile Computer• Always disconnect the mobile computer from the power outlet before cleaning.• Never use liquids on the mobile computer screen or keyboard.• Clean the screen with a soft, lightly dampened, lint-free cloth or use anti-static screen cleaners or wipes.• Wash hands frequently when using the mobile computer to avoid buildup on the touch pad. Hand lotions can affect the functionality of the touchpad. Grease and dirt can cause the cursor to jump around on the screen.• Clean the touch pad with lightly dampened cloth.

6

Page 7: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

Charging and General Use• Students are expected to bring his/her mobile computer to school each day with a fully charged battery. Students may be given the use of a loaner mobile computer if he/she leaves his/her mobile computer at home however, repeated offenses will not be tolerated. Students leaving mobile computers at home may be required to complete assignments using alternate means.• There is minimal, if any, opportunity to plug in your mobile computer during the school day for charging. In the extreme case of needing to charge your computer, please be mindful not to cause a tripping hazard when it is necessary to plug the mobile computer into a school electrical outlet.• Mobile computers are not allowed on overnight trips or field trips without the expressed written approval of the lead chaperone and the parent/guardian.• Students should abide by school-based procedures for use of the mobile computer during lunch periods and in areas of the building used for eating and drinking.• Some storage space may be accessible from several student accounts for the purpose of collaborative work. Students should respect the collaborative nature of this space and should not delete files that you did not create, or that you do not recognize and are not authorized by the teacher for deletion. Students should follow the procedures established in class for making edits and developing jointly created products.• Student mobile computers will be subject to routine monitoring by teachers, administrators and technology staff.• Students will provide access to any mobile computer and/or accessories that they have been assigned upon the district’s or school’s request. An individual search of the mobile computer and other stored student files may be conducted if there is suspicion that laws, policies or guidelines have been violated.There is no expectation of privacy with either the use of or the contents on the mobile computer and/or within cloud services.• Electronic messaging and transmitted data stored on servers or in online student accounts established by the district shall not be considered confidential and may be monitored at any time by designated staff to ensure appropriate use.

Filtering/Internet Access/Virus Protection• As required by the Children’s Internet Protection Act, a current filtering solution is maintained by the district for school and home use on this mobile computer. The district cannot guarantee that access to all inappropriate sites will be blocked. It is the responsibility of the user to follow guidelines for appropriate use of the network and the Internet. It is expected for students to be monitored while using the mobile computers in both the school and home environments.• HPS will not serve as the Internet Service Provider (ISP) for home use. However, HPS will provide filtering of HPS digital devices while connecting to the internet away from school from home. In order for a student to access the Internet, the parent/guardian must contract with an ISP (e.g., Century Link, Charter, etc.). At home, you would need a wireless router or gateway in order to use your school-issued mobile computer.

7

Page 8: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

General Security• Never leave your digital devices unattended or unsecured. Digital devices should be secured in a designated storage facility or a secured locker.• During after-school activities, students are still expected to maintain the security of digital devices.• Each mobile computer, accessories, may have several identifying labels (i.e., factory bar- coded serial number, medal asset tags, etc.). Under no circumstances are should labels be removed or modified. If labels or barcodes are removed, students should notify their teacher immediately and submit a Damage Incident Report.

Login ProceduresSchool Use: Students will be given a unique HPS username and password. Always abide by HPS requirements for maintaining security of these credentials.Home Use: Student HPS login credentials still apply when using HPS digital devices outside the school building. Home router passwords are not managed by HPS and must be managed with the support of the individual’s ISP (e.g., Verizon, Century Link, Charter, etc.).

Students should never share passwords, usernames or other authentication credentials. Students are responsible for activities preformed with their HPS username and password.

CopyrightCompliance with federal copyright law is expected of all. "Copyright" is legal protection for creative intellectual works, which is broadly interpreted to cover just about any expression of an idea. Text (including email and Web information), graphics, art, photographs, music and software are examples of types of works protected by copyright. Copying, distributing, downloading and uploading information on the Internet may infringe the copyright for that information. Even an innocent, unintentional infringement violates the law.

Failure to follow the guidelines for use and care of HPS digital devices will be addressed as specified in the HPS Student Code of Conduct and may result in disciplinary action.

8

Page 9: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

Glossary of Words to Know1 to 1 or 1:1 - One digital device per student. Each individual has a digital device, such as a laptop or tablet, for mobile learning.Apps- Applications, or programs running software.Chromebook- A mobile computer that runs the Chrome operating system.Cloud Computing- Data and software is being managed and stored using remote servers (web-based). Basically, little or no data is stored on a cloud-based device.Digital Device- Laptop, tablet, (e.g., Dell laptop, Chromebook, iPad, etc.) issued by HPS for digital teaching and learning purposes.Day User- An individual who only has access to an HPS digital device during the school day. S/he must check out their device each morning and check it back in at the end of the school day.Sync- Making files, programs, apps, bookmarks, etc. the same on multiple devices.Web-based- Apps and software that need access to the internet (web) in order to update and be fully functioning

Frequently Asked QuestionHow is this initiative being funded?The HPS 1:1 initiative is funded through a federal and the HPS Board of Education.Do Chromebooks require an internet connection? The Chromebook has full function using a wireless internet connection. However, it can still be used at a limited capacity without an internet connection. Student WiFi access is provided at schools.What if I don’t have wireless internet (WiFi) at home? If you do not have internet access at home, there are several low cost options available in the area. Also, free WiFi access is available at various areas through the city of Hickory and Catawba County including government building s and local businesses. Keep in mind, the Chromebooks can work in a limited capacity OFFLINE (not connected to the internet). Any work created while offline will automatically sync when connected to WiFi.What are the parents’/guardians’ responsibilities in respect to replacement or repair costs if the Chromebook is lost, stolen, or damaged? Chromebooks are considered to be comparable to a textbook or any other school-owned educational tool or resource provided to and issued to students. The expectation is that the device, its accessories, and backpack will be returned at the end of each school year (or upon withdrawal, request, or termination of attendance) in good, working condition.Regardless of circumstances resulting in the damage to the Chromebook, its accessories, and/or backpack, the student and parent/guardian who signed for the device are responsible for repair fees and/or replacement costs of the issued Chromebook and/or its accessories and backpack (see Damage Fees table on page 7).Will I be issued another Chromebook if mine gets lost, stolen, or damaged? After you pay the associated damage or replacement fees and depending on the length of repair time, you may or may not be issued a “loaner” device.What if I fail to pay the associated damage or replacement fees if my Chromebook gets lost, stolen, or damaged? The fees will be added on to your account and may affect your graduation ceremony or other disciplinary action may be taken until the fees are paid. In addition, you may not

9

Page 10: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

be able to take a mobile computer home.Does my student have to take a Chromebook home? No. Students will become day users if they choose not to take a Chromebook home. Teachers and teams will be using Chromebooks within the learning environment and will provide suggestions and alternatives to complete assignments.How are apps added to the Chromebook? Using Google Apps Store, students can apply apps and shortcuts to their school Google account. Once logged into their account, these changes can be made and applied to their account whenever and wherever they are logged in.Although HPS has deployed these safety measures, when outside of the school building home, it is ultimately the parent/guardian’s responsibility to monitor student internet access.______________________________________________________________________________________________Technology in Education Policy HPS BOE Policy: IFGBA

In alliance with state school technology goals, the Board is committed to establishing and supporting 21st century information and communications technology systems to foster globally competitive, healthy and responsible students. The Board recognizes the benefits of digital and technology-enabled teaching and learning resources that provide the ability to easily customize curriculum, provide access to current information and enable access to quality materials at a lower cost than traditional materials. To that end, the Board intends to move to classroom digital and technology-enabled teaching and learning resources that are aligned with the Common Core State and North Carolina Essential Standards as they become available. In addition, to the extent funding permits, the Board will endeavor to ensure that all students have access to personal digital and technology-enabled teaching and learning devices to foster the 21st century skills necessary for future-ready learners. The Board expects that information and communications technologies will be integrated across the curriculum and used to support student achievement. Such technologies will also be used to support programs and activities that promote safe schools and healthy and responsible students. School administrators and teachers are encouraged to develop additional strategies for integrating technological resources across the curriculum and utilizing the power of technology to improve learning outcomes while making more efficient use of resources. The strategies should be included in the school improvement plan if they require the transfer of funds or otherwise relate to any mandatory or optional components of the school improvement plan. The superintendent shall develop and submit to the Board for approval a local school system technology plan that is aligned with state guidelines and applicable federal rules. The superintendent shall incorporate this plan into school system strategic planning efforts and include various stakeholders such as curriculum leaders, teachers, administrators and representatives from technology services, instructional technology, finance and other departments as required. Once the Board has approved the plan, the superintendent shall ensure expenditures on school information and communications technologies are made in accordance with the technology plan.The superintendent shall establish relationships with businesses and seek grants and other funding sources in an effort to acquire technological resources for the educational program.

10

Page 11: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

A. SELECTION OF TECHNOLOGICAL RESOURCESTechnological resources include, but are not limited to, the following: (1) hardware, including both fixed and mobile technologies and devices such as desktop computers, laptops, netbooks, tablets, e-readers, PDAs, smartphones and gaming devices; (2) software; (3) network and telecommunications systems and services; (4) internet access; (5) multimedia equipped classrooms; (6) computer classrooms and laboratories; and (7) other existing or emerging mobile communications systems. All technological resources must be purchased and used in a manner consistent with applicable law and Board policy, including laws and policies related to copyright, public records, bidding and other purchase requirements, accessibility for students with disabilities, staff duties and standards for student behavior. Technological resources must meet or exceed the following standards before they may be considered for implementation.1. Technological resources must support the Common Core State and North Carolina Essential Standards or the programs of the school system.2. Technological resources must support the current use of learning and instructional management technologies in the school.3. Technological resources must be compatible with the condition of the network and other infrastructure resources. The technology director shall set minimum standards for technological resources that are purchased or donated. Upgrading, hardware conditions and similar requirements must be maintained to the highest standards.4. There must be sufficient staff to operate and maintain the technological equipment, programs and systems.5. There must be adequate funds budgeted to implement and support the technological resources and to train instructional staff to use the resources to improve educational outcomes.

B. DEPLOYMENT OF TECHNOLOGY TO SCHOOLSThe superintendent shall oversee the development of the school system’s technology deployment plan. The plan will be designed to ensure organized, effective and efficient means of deploying new information and communications technologies. The superintendent shall develop procedures that outline the strategy of the technology deployment plan.

C. BRING YOUR OWN TECHNOLOGY (BYOT) INITIATIVE/1:1 INITIATIVEThe superintendent is authorized to investigate and develop a plan to allow staff and students the option to use their personal electronic devices in place of or along with their school system assigned devices. The superintendent is also authorized to develop a plan to allow students to be assigned a personal electronic device for use on and off of the school campus (i.e. 1:1). The plans should address, at a minimum, the instructional use of personal devices, compatibility requirements, access limitations or requirements, content filtering, security and other issues as recommended by the technology director. The plans should assign personal responsibility to the user for repair and replacement of damaged or stolen devices and for any data or other charges arising from use of a personal device. The plans should require a written agreement for the use of personal technology

11

Page 12: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

devices from each student and staff member who wishes to participate in the BYOT/1:1 initiative. The plans should ensure that students who are unable to bring in outside technology will be able to access and utilize school equipment so that no student is excluded from instruction due to lack of access to technology.

D. ELECTRONIC COMMUNICATION AND OTHER COLLABORATIVE TOOLSThe superintendent is authorized to permit instructional personnel to incorporate email, social networking sites, blogs, wikis, video sharing sites, podcasts, video conferencing, online collaborations, PDAs, IMing, texting, virtual learning environments and/or other forms of direct electronic communications or Web 2.0 applications for educational purposes to the extent the superintendent deems appropriate and in accordance with policy GAMA, Employee Use of Social Media. The superintendent shall establish parameters and rules for use of these tools and shall require instruction for students in how to use such tools in a safe, effective and appropriate way. Instructional personnel shall make all reasonable attempts to monitor student online activity and shall otherwise comply with the requirements of policy IFBGA Technology Responsible Use, when using these tools.

E. TECHNOLOGY-RELATED PROFESSIONAL DEVELOPMENTThe superintendent shall plan a program of technology-enabled professional development that prepares the instructional staff for utilizing digital tools and resources. Professional development shall emphasize technology integration and continuous improvement, including the use of ongoing technology-integrated, online-learning activities throughout the course of study. Professional development shall also address the ethical, legal and practical issues related to social networking and mobile devices in the classroom and other topics deemed necessary by the superintendent or technology director. School improvement teams should identify any staff development appropriations for technology-related professional development in their school improvement plans. The superintendent and technology director should assist schools in coordinating staff development needs.Legal References: G.S. 115C-522; 147-33.111; State Board of Education Policy TCS-C-018Cross References: Technology Responsible Use (policy IFGBA), Internet Safety (policy IFBGB), Employee Use of Social Media (policy GAMA)Other References: North Carolina State School Technology Plan (Division of Instructional Technology) (current version)Adopted: December 2, 2013Technology Responsible Use HPS BOE Policy: IFBGAThe Board provides its students and staff access to a variety of technological resources. These resources provide opportunities to enhance learning and improve communication within the school community and with the larger global community. Through the school system’s technological resources, users can observe events as they occur around the world, interact with others on a variety of subjects, and acquire access to current and in-depth information. The Board intends that students and employees benefit from these resources while remaining within

12

Page 13: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

the bounds of safe, legal and responsible use. Accordingly, the Board establishes this policy to govern student and employee use of school system technological resources. This policy applies regardless of whether such use occurs on or off school system property, and it applies to all school system technological resources, including but not limited to computer networks and connections, the resources, tools and learning environments made available by or on the networks, and all devices that connect to those networks.

EXPECTATIONS FOR USE OF SCHOOL TECHNOLOGICAL RESOURCESThe use of school system technological resources, including access to the internet, is a privilege, not a right. Individual users of the school system’s technological resources are responsible for their behavior and communications when using those resources. Responsible use of school system technological resources is use that is ethical, respectful, academically honest and supportive of student learning. Each user has the responsibility to respect others in the school community and on the internet. Users are expected to abide by the generally accepted rules of network etiquette. General student and employee behavior standards, including those prescribed in applicable Board policies, the Code of Student Conduct and other regulations and school rules, apply to use of the internet and other school technological resources.Under certain circumstances, the Board may be required to disclose such electronic information to law enforcement or other third parties, for example, as a response to a document production request in a lawsuit against the Board, as a response to a public records request or as evidence of illegal activity in a criminal investigation.In addition, anyone who uses school system computers or electronic devices or who accesses the school network or the internet using school system resources must comply with the additional rules for responsible use listed in Section B, below. These rules are intended to clarify expectations for conduct but should not be construed as all-inclusive.Before using the internet, all students must be trained about appropriate online behavior as provided in policy IFBGB, internet Safety. All students and employees must be informed annually of the requirements of this policy and the methods by which they may obtain a copy of this policy. Before using school system technological resources, students and employees must sign a statement indicating that they understand and will strictly comply with these requirements. Failure to adhere to these requirements will result in disciplinary action, including revocation of user privileges. Willful misuse may result in disciplinary action and/or criminal prosecution under applicable state and federal law.

A. RULES FOR USE OF SCHOOL TECHNOLOGICAL RESOURCES1. School system technological resources are provided for school-related purposes only. Acceptable uses of such technological resources are limited to responsible, efficient and legal activities that support learning and teaching. Use of school system technological resources for commercial gain or profit is prohibited. Student personal use of school system technological resources for amusement or entertainment is also prohibited. Because some incidental and occasional personal use by employees is inevitable, the Board permits infrequent and brief personal use by employees so long as it occurs on personal time, does not interfere with school system business and is not otherwise prohibited by Board policy or procedure.

13

Page 14: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

2. Under no circumstance may software purchased by the school system be copied for personal use.3. Students and employees must comply with all applicable laws, including those relating to copyrights and trademarks, confidential information, and public records. Any use that violates state or federal law is strictly prohibited. Plagiarism of internet resources will be treated in the same manner as any other incidents of plagiarism, as stated in the Code of Student Conduct.4. No user of technological resources, including a person sending or receiving electronic communications, may engage in creating, intentionally viewing, accessing, downloading, storing, printing or transmitting images, graphics (including still or moving pictures), sound files, text files, documents, messages or other material that is obscene, defamatory, profane, pornographic, harassing, abusive or considered to be harmful to minors.5. The use of anonymous proxies to circumvent content filtering is prohibited.6. Users may not install or use any internet-based file sharing program designed to facilitate sharing of copyrighted material.7. Users of technological resources may not send electronic communications fraudulently (i.e., by misrepresenting the identity of the sender).8. Users must respect the privacy of others. When using e-mail, chat rooms, blogs or other forms of electronic communication, students must not reveal personal identifying information, or information that is private or confidential, such as the home address or telephone number, credit or checking account information or social security number of themselves or fellow students. In addition, school employees must not disclose on school system websites or web pages or elsewhere on the internet any personally identifiable, private or confidential information concerning students (including names, addresses or pictures) without the written permission of a parent or guardian or an eligible student, except as otherwise permitted by the Family Educational Rights and Privacy Act (FERPA). Users also may not forward or post personal communications without the author’s prior consent.9. Users may not intentionally or negligently damage computers, computer systems, electronic devices, software, computer networks or data of any user connected to school system technological resources. Users may not knowingly or negligently transmit computer viruses or self-replicating messages or deliberately try to degrade or disrupt system performance. Users must scan any downloaded files for viruses.10. Users may not create or introduce games, network communications programs or any foreign program or software onto any school system computer, electronic device or network that do not support the educational goals of the school system. 11. Users are prohibited from engaging in unauthorized or unlawful activities, such as “hacking” or using the computer network to gain or attempt to gain unauthorized or unlawful access to other computers, computer systems or accounts. 12. Users are prohibited from using another individual’s ID or password for any technological resource without permission from the individual. Students must also have permission from the teacher or other school official.13. Users may not read, alter, change, block, execute or delete files or communications belonging to another user without the owner’s express prior permission.14. Employees shall not use passwords or user IDs for any data system (e.g., Home Base, CECAS, time-keeping software, etc.) for an unauthorized or improper purpose. 15. If a user identifies a security problem on a technological resource, he or she must immediately

14

Page 15: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

notify a system administrator. Users must not demonstrate the problem to other users. Any user identified as a security risk will be denied access.16. Teachers shall make reasonable efforts to supervise students’ use of the internet during instructional time. 17. Views may be expressed on the internet or other technological resources as representing the view of the school system or part of the school system only with prior approval by the superintendent or designee.

B. RESTRICTED MATERIAL ON THE INTERNETThe internet and electronic communications offer fluid environments in which students may access or be exposed to materials and information from diverse and rapidly changing sources, including some that may be harmful to students. The Board recognizes that it is impossible to predict with certainty what information on the internet students may access or obtain. Nevertheless school system personnel shall take reasonable precautions to prevent students from accessing material and information that is obscene, pornographic or otherwise harmful to minors, including violence, nudity, or graphic language that does not serve a legitimate pedagogical purpose. The superintendent shall ensure that technology protection measures are used as provided in policy IFBGB, Internet Safety, and are disabled or minimized only when permitted by law and Board policy. The Board is not responsible for the content accessed by users who connect to the Internet via their personal mobile telephone technology.

C. PARENTAL CONSENTThe Board recognizes that parents of minors are responsible for setting and conveying the standards their children should follow when using media and information sources. Accordingly, before a student may independently access the internet, the student’s parent must be made aware of the possibility that the student could obtain access to objectionable material while engaged in independent use of the internet. The parent and student must consent to the student’s independent access to the internet and to monitoring of the student’s e-mail communication by school personnel. However, students may be required to participate in teacher directed and monitored educational activities that require the use of the internet.

D. PRIVACYNo right of privacy exists in the use of technological resources. Users should not assume that files or communications created or transmitted using school system technological resources or stored on services or hard drives of individual computers will be private. School system administrators or individuals designated by the superintendent may review files, monitor all communication and intercept e-mail messages to maintain system integrity and to ensure compliance with Board policy and applicable laws and regulations. School system personnel shall monitor online activities of individuals who access the internet via a school-owned computer.

15

Page 16: Hickory Public Schools - hickorycam.hickoryschools.nethickorycam.hickoryschools.net/UserFiles/Servers/Server_…  · Web viewHickory Public Schools (HPS) provides access to educational

E. PERSONAL WEBSITESThe superintendent may use any means available to request the removal of personal websites that substantially disrupt the school environment or that utilize school system or individual school names, logos or trademarks without permission. 1. Students: Though school personnel generally do not monitor students’ internet activity conducted on non-school system devices during non-school hours, when the student’s online behavior has a direct and immediate effect on school safety or maintaining order and discipline in the schools, the student may be disciplined in accordance with Board policy.2. Employees: Employees’ personal websites are subject to policy GAMA, Employee Use of Social Media.3. Volunteers: Volunteers are to maintain an appropriate relationship with students at all times. Volunteers are encouraged to block students from viewing personal information on volunteer personal websites or online networking profiles in order to prevent the possibility that students could view materials that are not age-appropriate. An individual volunteer’s relationship with the school system may be terminated if the volunteer engages in inappropriate online interaction with students. Legal References: U.S. Const. amend. I; Children’s Internet Protection Act, 47 U.S.C. 254(h)(5); Electronic Communications Privacy Act, 18 U.S.C. 2510-2522; Family Educational Rights and Privacy Act, 20 U.S.C. 1232g; 17 U.S.C. 101 et seq.; 20 U.S.C. 6777; G.S. 115C-325(e)Cross References: Technology in the Educational Program (policy IFBG), Internet Safety (policy IFBGB), Web Page Development (policy IFBGC), Employee Use of Social Media (policy GAMA) Adopted: December 2, 2013

16