34
1 Learning with Technology August 13, 2012 Seoul International School We develop curious minds, creative spirits and compassionate hearts A Tradition of Excellence Since 1973

Student Technology Handbook

Embed Size (px)

DESCRIPTION

Seoul International School Technology Handbook

Citation preview

Page 1: Student Technology Handbook

1

Learning with TechnologyAugust  13,  2012

Seoul International SchoolWe develop curious minds, creative spirits and compassionate hearts

A Tradition of Excellence Since 1973

Page 2: Student Technology Handbook

Table of Contents

1

This Handbook 2

The SIS Learning with Technology Program: Introduction 3

SIS 1:1 Technology Program Policy 4

Laptop Purchase

Service and Repair

Lost Laptop

Backup and Software Updates

Responsible Use Agreement & Technology Use Expectations 8

GENERAL Expectations

Responsible Use Agreement 9

SIS Student Technology Use Expectations

Elementary School - iPad Use Expectations 12

The Use of iPads in School 14

Middle & High School Technology Use Expectations 15

SIS Email Protocols

SIS Student Email Protocol 18

SIS Students Email Naming Protocol 19

File and Data Backup

Backup 20

Setting up Time Machine Backup Using External Drive

Manually setup Time Machine for backup

About the first backup to an external drive

Selecting Items to Backup

Restoring Files

Restoring specific files or folders 26

Parental Controls

Setting up Parental Controls on your Mac 28

Acknowledgment and Acceptance 33

Page 3: Student Technology Handbook

This Handbook

SEOUL INTERNATIONAL SCHOOL

This technology handbook aims to provide SIS students and parents with

comprehensive information about the SIS Learning with Technology program, focusing on policies, guidelines and practical information on using laptops and

school-provided iPads.

We would like to acknowledge all educators and technology professionals who

generously contributed their time and insights in implementing this program. In particular, we acknowledge Hong Kong International School and Yokohama

International School for inspiring the preparation of this handbook.

2

Page 4: Student Technology Handbook

The SIS Learning with Technology Program

INTRODUCTION: A Message from the Director of Schools

Welcome to SIS Learning with Technology Program!

Six years ago our school embarked on an ambitious goal – not to be the first or

the flashiest international school in Korea to use mobile technology to support learning – but to be smartest.

Those six years have taken us from a couple of labs used for art design,

yearbook and computer science to now where every student grade 6-12 in our school will be using a laptop to enhance their learning and improve their

academic achievement.

Over the next two years our technology initiative will extend to the elementary

school where students will be introduced to iPods, iPads and Macbooks from

kindergarten through to Grade 5.

Our goal is the seamless integration of technology to promote creativity and

problem solving and support authentic learning, assessment and individualized instruction.

This work is a partnership between our teachers, parents and students. We

invite you to browse through our Learning with Technology Handbook and contact us if you have any questions or suggestions.

Sincerely yours,

Mr. Corcoran

Director of SchoolSeoul International School

3

Page 5: Student Technology Handbook

SIS 1:1 Technology Program Policy

COMPULSORY FOR ALL STUDENTS IN GRADE 6-12

Laptop Purchase

Students may purchase their computers either through the school or directly from other off-site vendors. Students who purchase computers through the

school will get a model of laptop specified in the order form/letter sent to

parents during the laptop purchasing month of the previous school year. -- see copy of letter to parent for laptop purchase

Purchasing Laptops through SIS

1. School-purchased laptops are bundled with standard and course-specific software. Other software not included in the bundle may be purchased and

paid for separately by the students either through the school or from any other off-site vendors.

2. School-purchased laptops are provided with technical/software support if

reasonably needed.

3. The school, through its partner-vendor, is able to offer SIS students laptops at

a lower price than the standard education price offered by some off-site vendors.

4

Page 6: Student Technology Handbook

Service and Repair

Middle and High SchoolStudents are expected to have an operational laptop at all times. If repairs are

necessary and the service does not fall in any category covered by the Apple Care Protection Plan, students are expected to have their laptop repaired by any

private off-site service centers and/or through the school. Students whose

laptops are being repaired have access to a loaner unit. Due to the limited number of loaner units available, it is important that students get their computer

repaired as quickly as possible.

Elementary SchoolElementary students are expected to follow procedures set by their classroom teachers on safety and responsible use of iPads provided by SIS. In case of

damage due to failure to follow operating procedures, parents of students will be contacted and be required to pay the cost of damage.

Lost Laptop

If student loses his/her laptop, they are expected to immediately report the loss

to the IT Office. The student’s family will be informed and must purchase and replace the lost laptop as soon as possible (see laptop purchase). While a

replacement laptop is being purchased, a loaner will be provided by the IT office. The loaner pool is not unlimited; therefore, it is important that students find a

replacement to avoid missing school work. If a new laptop is purchased, the

student is required to bring the laptop to the IT office for re-imaging (see re-imaging).

5

Page 7: Student Technology Handbook

Backup and Software Updates

Students are responsible for backing up personal information and for running

software updates on their laptops. Data/files management is the sole responsibility of the student. SIS recommends that students should have their own portable

hard drive with at least 250 GB of memory for backup and storage. Students are also recommended to regularly schedule backups and software updates (weekly

or every 2 weeks) using any of the following methods:

Backup:1. Using a portable hard drive with Apple Time machine. 2. Copying school-appropriate files onto their personal network location or

portable device;

(See Backup Section for specific information)

Internet and Network Use

Access to the internet and other network services at school is provided for

educational purposes only. To manage bandwidth use, students are required to

register their laptops with the IT Department. Unregistered laptops will not be given access to the internet and/or any network services. It is recommended

that students use only school provided user-accounts and the SIS_Student Wifi Protected Access at all times to connect to the internet and the school

network. Downloading games, programs, movies, and files not related to school

6

Page 8: Student Technology Handbook

use are strictly prohibited. See Technology Use Policy and Responsible Use

Agreement

7

Page 9: Student Technology Handbook

Responsible Use Agreement & Expectations

SEOUL INTERNATIONAL SCHOOL STUDENTS

GENERAL Expectations:

SIS students should:

• Understand, agree, and follow the Responsible Use Agreement and the

Technology Use Expectations when using any electronic/technology

devices.• Follow these guidelines, classroom agreements, as well as the student use

expectations around use of all electronic devices.• Understand that failure to follow the SIS Responsible Use Agreement,

the Student Use Expectations, and other classroom rules and procedures

related to technology use will be addressed through SIS disciplinary procedures.

8

Page 10: Student Technology Handbook

RESPONSIBLE USE AGREEMENT

SIS students must:

I. Respect and protect the privacy of others.◦ Use only valid and clearly identified accounts.◦ Not view, use, or copy passwords, data, or networks to which they

are not authorized.◦ Not distribute private information about others or themselves.

II. Respect and protect the integrity, availability, and security of all electronic resources.

◦ Observe all network security practices, as posted.◦ Report security risks or violations to a teacher or network

administrator.◦ Not destroy or damage data, networks, or other resources that do

not belong to them, without clear permission of the owner.◦ Conserve, protect, and share these resources with other students

and Internet users.

III. Respect and protect the intellectual property of others.◦ Not infringe copyrights (no making illegal copies of music, games,

or movies!).◦ Not plagiarize.

IV. Respect and practice the principles of community.◦ Communicate only in ways that are kind and respectful.◦ Report threatening or discomforting materials to a teacher.◦ Not intentionally access, transmit, copy, or create material that

violates the school's code of conduct (such as messages that are

pornographic, threatening, rude, discriminatory, or meant to

harass).

9

Page 11: Student Technology Handbook

◦ Not intentionally access, transmit, copy, or create material that is

illegal (such as obscenity, stolen materials, or illegal copies of

copyrighted works).◦ Not use the resources to further other acts that are criminal or

violate the school's code of conduct.◦ Not send spam, chain letters, or other mass unsolicited mailings.◦ Not buy, sell, advertise, or otherwise conduct business, unless

approved as a school project.

Students may, if in accordance with the policy above1. Design and post web pages and other material from school resources.

2. Use direct communications such as IRC, online chat, and/or instant

messaging with a teacher's permission.3. Install or download software, if also in conformity with laws and licenses,

and under the supervision of a teacher.4. Use the resources for any educational purpose.

Violations of these rules may result in disciplinary action, including the loss of student's privilege to use any technology devices and resources inside the

school.

School and network administrators, and teachers monitor the use of information

technology resources to help ensure that users are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any

data found on the school's information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect

property. They may also use this information in disciplinary actions, and will

furnish evidence of crime to law enforcement.

10

Page 12: Student Technology Handbook

I ACKNOWLEDGE AND UNDERSTAND MY OBLIGATIONS:

PARENTS/GUARDIANS, PLEASE DISCUSS THESE RULES WITH YOUR

CHILD TO ENSURE HE /SHE UNDERSTANDS THEM. THESE RULES ALSO PROVIDE A GOOD FRAMEWORK FOR YOUR STUDENT'S USE OF

COMPUTERS AT HOME, AT LIBRARIES, OR ANYWHERE.

This policy agreement is from the Model Acceptable Use Policy for schools

published by the Computer Crime & Intellectual Property Section of the United States Department of Justice

11

Student  Signature  over  printed  name Parent/Guardian  Signature  over  printed  name

Page 13: Student Technology Handbook

Elementary School - iPad Use Expectations

Student is responsible for:• Staying on task.

◦ not playing unassigned games

• Taking photos and videos on the iPad for project use.• Keeping account secure.

◦ knowing personal passwords

◦ not sharing passwords◦ logging out of personal accounts

• Not taking advantage of others accounts.• Respecting the feelings and rights of other students in class & school.

• Not sharing personal information about myself without discussing it with a

teacher or parent first.• Turning off, returning to the cart and plug-in the iPad at the end of class.

• Not applying labels or stickers on the iPad.• Not eating or drinking around the iPad.

• Reporting to an adult when something is wrong or the iPad is damaged.

• For all damage or loss caused by his/her actions.• Respecting others creative work by giving credit to the creators.

Students that choose to bring their own iPads to school:• Will have the appropriate apps installed on my iPad.

• Should come to school with my iPad fully charged or bring my charger to school.

• Should bring ear buds or headphones to school along with my iPad• Must allow a teacher to inspect my iPad at anytime.

• Must be responsible for the care and safety of my ipad.

◦ I will not lend it out to anyone I do not fully trust.◦ I will keep it safely locked up when not in use.

12

Page 14: Student Technology Handbook

Consequences (Mr. DeFilippo, please check if the following should be published

in this handbook or just as internal document) If students do not use iPad responsibly:

1. Will receive a warning from a teacher and parents will be notified.

2. Will lose the use of the iPad for one class period and parents will be notified.

3. Will lose the use of the iPad for an extended period of time decided by the

teacher, principal and parents.

13

Page 15: Student Technology Handbook

The Use of iPads in School

Teachers Are Responsible For:• Keeping a record of student infractions• Checking the cart to make sure all iPads are replaced after use

• Locking the cart after use

School is Responsible for:• Providing internet and email access• Apps and software needed for lessons & projects

• Providing a functional iPad and ear buds/headphones• Providing areas where students can use technology and be monitored

outside of class time (i.e. recess)

• A secure locked cabinet for students to store their personal technology.

(Mr. DeFilippo, please check if the following should be published in this handbook or just as internal document)

ConsequencesBased on the situation teachers may choose how many warnings are given to a student.

1. Official warning and notify parents2. Loss of use for one class period and notifying parent.

3. Loss for a period decided upon by the teacher, administration and

parents.

14

Page 16: Student Technology Handbook

Middle | High School Technology Use Expectations

Being Prepared to Learn

• The student will make sure that all required and permitted technology devices

they own are fully operational and ready for use to meet daily educational needs. (This includes charging, allocating disc space for file storage,

updating software/programs, organizing & managing files, backups of relevant digital contents, and any other related responsibilities that would

help meet educational needs.)

• The student understands and agrees to comply with the SIS email and naming protocols.

(See SIS Email & Naming Protocols)

Responsibilities of Ownership

• Student will take responsibility for keeping all permitted devices I own safe and secure when not in use.

• Student will at all times practice safety and security in using any device around the school.

• Student will use laptops and other devices only in the designated areas.

(Areas not appropriate for laptop use: Eating spaces, Swimming pool, Cafeteria)

• Student is responsible for repairs and/or replacement of any broken or damaged device .

Being a Responsible and Respectful User

• The student fully understands and agrees to comply with the SIS Responsible Use Agreement, the Technology Use Expectations and

policies written in this technology handbook.

15

Page 17: Student Technology Handbook

• The student will at ALL times follow the technology use procedures in the

classroom as set by my teachers.

• The is aware that ALL technology-use rules and guidelines apply to ANY device used at SIS.

• The student will at ALL times respect the rights of others when using any technology device in the classroom and around the school.

Distractive Technologies

It is well-accepted that excessive time spent on a computer can have a

detrimental effect on physical well-being, so you should ensure that you make use of your free time in a healthy manner. Recreational endeavors such as

playing games, using social networking sites, and accessing other non-educational technologies can be very appealing, however, they occupy time that

might be better spent preparing assignments for class, studying, working

collaboratively, or reviewing classwork. Playing digital games or using social networking sites recreationally should be kept to a minimum.

Ethical and Respectful Use

Good digital citizenship means maintaining good ethical behavior, even if no one is watching you. Students are constantly encouraged to model good digital

citizenship, minimizing disruptions to the learning environment for yourself or others. This includes: not viewing or installing pornography, not bypassing network

guidelines with proxies or Internet access devices, not hacking or modifying

other students’ accounts or official school files, and not engaging in any illegal activities (including possessing or sharing pirated software or applications).

Students are expected to obey all intellectual property rules and copyright laws, and the SIS Student Email Protocols. Do not engage in conversation or activities

(such as sending pictures) intended to inflame, agitate, or offend others.

16

Page 18: Student Technology Handbook

Protecting Your Identity & Personal Information

Once your information is on the Internet, there is nothing to stop it from being

replicated, shared and distributed widely without your control, both now and into the future. Therefore safeguarding your personal information is extremely

important.

Personal information extends beyond names, phone numbers, student ID

numbers and addresses, to things such as user names, passwords and physical location. As such, it is important that students treat their own and others’

personal details with great care. Students should never share user accounts or

passwords even with their friends. Personal information should always be kept private.

17

Page 19: Student Technology Handbook

SIS EMAIL Protocol

SEOUL INTERNATIONAL SCHOOL STUDENTS

All holders of SIS email accounts using stu.siskorea.org domain are expected to follow these guidelines:

• Use only school provided email accounts when communicating with teachers

and other students on school related matters.• Follow the SIS email protocol when sending emails to teachers.

• Send polite and appropriate email when communicating with teachers and other students.

• Only send email to recipients who need to know the information in the email.

Forwarding emails to recipients who were not included in the original email (unless the original sender approves) is not polite.

• Check your email regularly. “I didn’t check my email” is not a valid excuse for missing an important message.

• Create a password that is a combination of numbers and letters. Make it

something you WILL remember.• School email accounts should not, under any circumstances, be used to

promote the interests of external organizations.• Representation: When you send a letter from your school email address you

are representing the school. Sending an email to an outside party is in some

circumstances similar to sending a paper message with the school letterhead. It is strongly recommended that you use a non-SIS email account

for personal email.

18

Page 20: Student Technology Handbook

Sending Assignments and Classwork to Teachers

SIS students are expected to use their school provided email accounts when sending/submitting assignments to teachers. Students should follow the email

protocol when sending any work to their teachers.

SUBJECT LINE for EMAIL: Title of Assignment - Type of Assignment - Name of Student Example: Pollution-Homework-PaulKim

SIGNATURE for EMAIL: Name of Student - Name of School ‘ Grade level

Example: Paul Kim Seoul International School ’12

FILE NAME for EMAIL ATTACHMENTS: GradeLevel -Title of Assignment - Type of Assignment -

Name Example: 7A-Pollution-HomeWork-Alex Kim

19

Page 21: Student Technology Handbook

File and Data Backup

First and Concurrent Backup

Backup

Your laptop is going to be utilized for a great deal of your school work. It will

contain important files and data that will be necessary for your academic success. Keeping these files safe and accessible is your responsibility as is the

functionality of the laptop itself. Additionally, there may be times when your

computer is to be re-imaged, and if you wish to retain certain files not included in the image, then backup is essential. When you backup your files, you are storing

your files separately from your computer, ensuring their longevity.

Setting up Time Machine Backup Using External Drive

The first time you connect your external drive to your Mac, Time Machine asks if

you would like to use it as a Backup Disk.

Click "Use as Backup Disk" to confirm you want to use the drive for Time Machine backups. Time Machine preferences will then open with this drive

selected as your backup.

20

Page 22: Student Technology Handbook

Or manually setup Time Machine by following these steps:

21

1

2

Open  System  

Preferences

Open  Time  Machine

3 Select  Set  Up  Time  

Machine

Click  the  Lock  buGon  

to  unlock  and  make  

changes

4

Page 23: Student Technology Handbook

22

5

Enter  administrator  

username  and  password  

when  prompted  to  unlock  

and  make  changes

Click  Select  Disk  buGon

6

Page 24: Student Technology Handbook

23

Select  the  disk  drive  to  

use  for  backup

Backup  should  be  

starOng...  

7

8

Page 25: Student Technology Handbook

About the first backup to an external drive

The first backup may take a while. You may want to set up Time Machine in the

evening so that the initial backup can be done overnight. You should not interrupt the initial backup. You can continue to use your Mac while Time Machine backs

up.

Once the initial backup is completed, Time Machine performs subsequent hourly backups of only the files that have changed on your Mac since the last backup

(as long as your Mac is awake and the backup drive is connected).

Tip: You can manually initiate a Time Machine backup cycle by selecting "Back

up Now" from the Time Machine menu, even if you have Time Machine

preferences set to off.

Then you will the Time Machine Backup Status prompt like this sheet

24

Page 26: Student Technology Handbook

Selecting Items to include for Backup

Tip: If you regularly modify a very large file (greater than 1 GB, for example), you might want to add the file to the "Exclude these items from backups" list. Time

Machine backs up modified files, regardless of how much or how little the file changed from the previous backup.

25

In   Time   Machine   preferences  you  can  click  the  OpOons  buGon  to  adjust  seUngs.

This  sheet  allows  you  to  exclude  files,   folders,   or   enOre  volumes  from   being   backed   up.   You  might   want   to   do   this  to  avoid  filling  up  your  backup  drive.

Page 27: Student Technology Handbook

Restoring Data From Time Machine

FOR OS X LION

With Time Machine you can go "back in time" to restore files, versions of files, or

your entire system. Make sure your backup drive is connected and mounted (if not, Time Machine will alert you that "Your Time Machine backup disk can't be

found."

If prompted, enter an administrator name and password to proceed with the

restore.

Restoring specific files or folders

Choose Enter Time Machine from the Time Machine menu and the restore

interface appears. You can literally see your windows as they appeared "back in time."

26

Page 28: Student Technology Handbook

You can use the timeline on the right side of the window to reach a certain point

back in time (the timeline shows the times of all backups on your backup drive).

If you don’t know exactly when you deleted or changed a file, you can use the back arrow to let Time Machine automatically travel through time to show you

when that folder last changed.(See Mac 101 support for more information on restoring)

Note: Dates in pink indicate the data resides on your Time Machine backup device. Dates in white indicate the data resides on your Mac. In OS X Lion,

portable Macs have the feature of local snapshots. See this article for details.

You can also perform a Spotlight search in the Time Machine Finder Window

search field to find a file. Simply type the Spotlight search field and use the back

arrow to have Time Machine search through your backups to find what you are looking for.

Before you restore a file, you can also use Quick Look to preview a file to make sure its the one you want. Highlight the file and press the Space Bar to bring up

a quick look.

To restore, select the file/folder and click the "Restore" button. The file will

automatically be copied to the desktop or appropriate folder. If the file you are restoring has another file in the same location with the same name, you will be

prompted to choose which file to keep or keep both.

27

Page 29: Student Technology Handbook

Parental Controls

About Parental Controls and Internet Content Filter

If parents remain the holders of the MacBook admin password, they can choose

to useparental controls. Before deciding to use parental controls, parents are strongly

encouraged to carefully gauge whether their limitations could interfere with their child’s education, as the laptop is a primary tool that allows access to vast

positive educational information and opportunities.

Follow the simple steps on How to Setup parental Controls on your Mac below:

28

Page 30: Student Technology Handbook

29

Open System Preferences1

Select Parental Control2

• Make sure to log-in with an Administratorʼs account• Make sure that your child is using a Standard account NOT Administratorʼs, for you to set parental control.

a. Select your childʼs user account

b. Click Enable Parental Control

3Click the lock icon to unlock. Enter an Administratorʼs Password

Page 31: Student Technology Handbook

30

Select your childʼs Account Name to set parental control on

Select Web Tab: To control your childʼs access to different websites on the Internet

Add specific websites you ALWAYS allow your child to access

Add specific websites you NEVER allow your child to access

5

6

a. Select Apps Tab: To limit programs to use

b. Use Simple Finder: Provide simple view of the computer desktop

c. Limit Applications: Allows your child to open only the applications you specify on the list in the:

Allowed Apps box. You can click on the arrow to show the detailed list of programs in each category.

d. Allow user to modify the dock

4

Page 32: Student Technology Handbook

31

7 On the Web Tab: To Control your childʼs access to different websites on the Internet

a. Allow Access ONLY to Specific Websites

b. List of websites that can be accessed by your child

c. Click the + sign to add more websites

8 On People Tab: To limit the number of people your child can contact

a. Limit Mail and Limit Chat: You can add a list of people that your child can contact

b. Specify the contact information to add

c. Add the information to your address book

d. Click the + sign to add another contact

e. Send permission request to your email whenever your child attempts to contact a person not in the list your specified

Page 33: Student Technology Handbook

32

9 On Time Limits Tab: To limit the number of hours your child can use the the computer.

a. Controlling weekday time limits

b. Controlling weekend time limits

c. To set bedtime and prevent access to the computer during the specified time:

On Other Tab: Specific Controls on:

a. Hide profanity in Dictionary and etc.

b. Limit Printer Administration

c. Limit Burning CD/DVD

d. Disable Changing the Passwords

10

See  more  informaOon  on  Parental  Controls  and  Internet  Content  filter  here:  hGp://support.apple.com/kb/HT2900

Page 34: Student Technology Handbook

Acknowledgement and Acceptance

Seoul International School

Student and Parents:

By providing my personal information I am certifying that I have read, understood

and reviewed with my parent/guardian the policies, responsible use agreement, acceptable use policies and guidelines written in this handbook, and agree to

comply with them. I further understand that violation of these policies and/or rules may result in the revocation of my technology privileges and may put me to

further disciplinary and/or legal action.

Please provide your personal information here:

SIS Learning with Technology Acknowledgement and Acceptance

33