TechProcedures


Bristol Elementary School
Technology Standards and Procedure Manual


June 21, 2005 
Prepared by Neal Donahue, BES Technology Coordinator, with assistance from the following BES Technology Committee members: Susan Briere, Terrance Evarts, Kim Farnham, Kyra Ginalski, Julie Kenyon, Therese Kirby, Sarah Mangini, Patrick Reen, Jennifer Roth-Longe, and Lisa Willard

Table of Contents

A. Mission Statement

The mission of the school’s technology program is to support student learning and facilitate teaching. This includes the school network and all technology equipment used by students, teachers, and support staff. Goals of the BES technology program are to:

  • Integrate technology across the curriculum
  • Provide all students the opportunity to develop the technological skills necessary to be effective participants in 21st century society and lifelong learners
  • Protect students from inappropriate information
  • Protect hardware, software, and data (documents, files, etc.) from damage or degradation
  • Encourage respectful, responsible, and ethical use of information technology
  • Maximize staff and student access to technology and the information it can provide (highest priority)
  • Provide community access to school technology for educational purposes when it doesn’t interfere with students and school staff (lower priority)

The procedures that follow clarify the BES Information Technology Acceptable Use Policy approved by the BES School Board and provide more specifics. If a conflict arises between these procedures and the approved AUP, the Acceptable Use Policy takes precedence.

B. Hardware Selection and Use

Selection:

All hardware requests will be made through the Request Tracker system and approved by the BES Technology Committee. Hardware includes all digital equipment such as computers, printers, digital cameras, scanners, memory sticks, external hard drives, Smart Boards, etc.

  1. Only certain brands of equipment will be authorized for purchase to ensure ongoing warranty assistance, ease of maintenance, and control of total cost of ownership. Computers and printers will adhere to specifications determined by the BES Technology Committee and approved as hardware standards.
  2. Use of equipment not listed on the hardware standard for purchase requires approval the BES Technology Committee. Hardware standards will be updated annually.

Use:

            a. School computers should be used for educational or job-related purposes.

b. Priority will always be given to school-related projects and activities.

c. School computers will not be treated as personal property and modified without

permission. Unauthorized modifications to school computers will be reported to

the administration. This includes instant messaging programs.

  1. Laptops that go home must only be used by the person to whom the computer is assigned, and not by other friends or family members.
  2. Non-school computers or digital devices will not be connected to the network without prior approval of the BES Technology Coordinator. All personally owned devices brought to school must be scanned for viruses before being connected to the school network.
  3. Computers will not be moved or relocated without informing technology personnel and soliciting their assistance.

C. Donated Equipment

  1. Donated equipment will not be accepted unless it meets minimum hardware standards as determined by the BES Technology Committee.
  2. Donated equipment should not be more than three years old and should be compatible with existing equipment in regard to operating system.

Any donated equipment will be approved by the BES Technology Committee prior to use in the school.

D. Software Selection and Use

  1. Only approved software will be installed on school computers. The BES Technology Committee will review all software requests and maintain an approved software list.
  2. Requests for additional software and/or software installation will be made through the Request Tracker system with approval required before use. Only technology personnel will perform installations.
  3. No unauthorized software will be installed from disk/CD or downloaded from the Internet on school computers. This includes instant messenger programs.
  4. Software will only be installed on more than one computer when proper licensing is available or acquired. No programs will be loaded on the server unless a network license has been purchased.
  5. BES technology services do not support any personally owned software or software that is not properly licensed. BES technology support services reserve the right to remove any unauthorized software from school computers (e.g., instant messenger applications).

E. Network Procedures and Use

 (Access, privileges, acceptable use)

Each staff member will have a personal network account which is password protected. Accounts will be made available after the staff member signs an AUP agreement. Privileges for opening attachments to e-mails will only be available in these personal logins. The student logins will not have similar privileges.

  1. All staff members are required to read the BES Acceptable Use Policy and sign a form stating their compliance with this policy. A signature is required before any new accounts are activated on the network.
  2. Community members will sign an AUP agreement before using school technology.
  3. Users should only be accessing their own files or shared files. Accessing another user’s files is a violation of privacy rights unless they have given you permission.
  4. a. Files should only be deleted by the owner.

b. Large files should be backed up on removable media to conserve space on the server. Old files may be moved to backup storage by technology personnel as required.

c. If you believe a file or folder is missing, contact technology support for assistance.

d. At the end of the year, staff members are responsible for deleting or organizing files in their accounts (password-protected and classroom or students).

  1. For security reasons, no one is permitted to connect a non-school-owned computer, laptop, or personal digital assistant to the school’s network without prior approval from the Network Administrator.
  2. Portable media (disks, memory sticks, CDs, etc.) should be scanned for viruses prior to opening any files they contain. Right click on media icon and scan for viruses as a precaution with all portable media.
  3. It is critical that passwords not be shared or divulged. Do not have the computer save any password if prompted. Click on “No” if the computer prompts you to save password.

If you feel your password has been compromised, you should request a password change (new password) from the Technology Coordinator or Technology Support Specialist.

F. Internet Procedures and Use

  1. There is a great deal of inappropriate material online. Deliberately accessing or attempting to access inappropriate material on school computers is not allowed.
  2. Filtering is in place to protect students and many sites may not be available at school for a variety of reasons (e.g., inappropriate materials or content).
  3. Have a clear purpose in mind when browsing. BES School Rights and Responsibilities apply to Internet use. You have a right to be safe and a right to learn. You have a responsibility to treat others with respect.
  4. Avoid acknowledging pop-ups. Acknowledging pop-ups can allow Spyware and Adware to be loaded onto your computer without you being aware of the activity. Avoid pop-up offers and anything that says you’re a winner.
  5. If you register, purchase, or order anything online, make sure you know whom you are giving the information to and what it will be used for.

The school network (via the Internet) may not be used for personal or financial gain.

G. E-mail Accounts and Use

(School accounts, privacy, confidentiality)

 Each staff member will have a school e-mail account.

  1. School e-mail is not private and can be monitored. No confidential information or inappropriate content should be transmitted via school e-mail.
  2. The weekly staff bulletin will be distributed via school e-mail.
  3. Users should know their user logon and password. Passwords are personal and should not be shared with anyone.
  4. Users of school e-mail accounts are expected to abide by the generally accepted rules of network etiquette. These include:
    • Being polite
    • Using appropriate language
    • Not making threats
    • Not revealing personal information about students or colleagues (photos or written information)
    • Not spreading rumors of false information
  5. Viruses often come attached to e-mail. Do not open any attachments from an  unknown source or that look suspicious. Viruses commonly send e-mails in the name of a user whose computer is infected. Do not open attachments unless you are expecting them. Even if an e-mail is from someone you know, it could have a virus attached. When in doubt, get help or delete the message without opening the attachment.
  1. If you have a spam message with an unsubscribe link, do not use it. Attempting to unsubscribe generally lets the spam organization know your address is valid and makes you vulnerable to additional spam. Always delete spam messages without responding or opening.
  1. Many virus warnings are hoaxes. Do not forward virus warnings to other users unless the threat can be verified.
  1. Students are not allowed to access personal e-mail accounts from school computers.

H. Technology Support

(Requests, limitations, tracking) 

  1. All requests for technology support will be entered into the Request Tracker system. This includes multimedia projects (photos, PowerPoints, brochures, movies, etc.).
  2. Technology support will be provided for all school technology and acceptable donated equipment. Support will not be provided for personal items or unauthorized equipment.
  3. Technology requests will be tracked and prioritized. An attempt will be made to address all requests in a timely manner. Technology requests will be addressed based on priority and availability of parts and materials.
  4. Requests that require a large expenditure of time and money may need to be addressed through the budgeting process and will require technology committee approval. An effort will be made to honor all reasonable requests.

Staff members who feel comfortable using technology, or who have specific areas of expertise, should act as mentors for staff members who need assistance. This can be done on a formal or informal basis.

I. Computer Lab Rules (for Students)

  1. Follow directions.
  2. No food or drink allowed.
  3. Use inside voices.
  4. Don’t disturb others.
  5. Raise your hand for help.
  6. Ask permission before printing.
  7. Put CDs and headphones away when you log out.
  8. Push your chair in when you leave.
  9. Take out what you bring in.
  10. There will always be an adult in charge. If there is not an adult in charge, you must leave the computer lab.
  11. Students will have a clear educational purpose when using lab computers.

J. Web Publishing

  1. All school webpages must be curriculum or school related.
  2. No personal homepages will be linked to the BES School Webpage.
  3. No student work or photos will be published on the BES School Webpage without written parental approval.
  4. Curriculum links on the BES School Webpage will be screened by technology personnel to make sure they are relevant and appropriate for student use.

Copyright laws must be adhered to when publishing materials on the school’s website.

K. Technology Caveats

  1. Nothing in these procedures will override the AUP if a conflict exists. The AUP always takes precedence.
  2. All staff members must adhere to copyright laws. This includes the use of school technology. Proper software licensing and source citations are required for all school projects and activities.
  3. Student safety while online is critical. Students should be made aware of online dangers and how to avoid being victimized.
  4. The following is a list of unacceptable uses of school technology:
    • Any use for private financial gain
    • Communicating fraudulent, harassing, abusive, or offensive information, pictures, or messages
    • Violating copyright laws
    • Downloading software from the Internet without prior approval
    • Accessing inappropriate sites or e-mail (e.g., pornography)
    • Interfering with or disrupting network services or equipment
    • Installing unlicensed or unapproved software
    • Accessing chat rooms
    • Any use that is illegal, such as gambling or chain letters

L. Technology Planning for Integration (Collaboration)

  1. Activities in the computer lab will be planned collaboratively with classroom teachers to ensure integration with the existing curriculum.
  2. Major projects involving technology will be carefully planned ahead of time with technology support personnel to ensure adequate time and resources are available.
  3. The classroom teacher is required to stay with his or her class during computer lab sessions. The teacher is responsible for planning standards-based technology lessons with support from available technology support staff.

One technology support person will be available in the computer lab during regularly scheduled lab times. Technology support personnel may not be available during extra lab times that teachers sign up for.

Comments