student technology handbook
DESCRIPTION
Seoul International School Technology HandbookTRANSCRIPT
1
Learning with TechnologyAugust 13, 2012
Seoul International SchoolWe develop curious minds, creative spirits and compassionate hearts
A Tradition of Excellence Since 1973
Table of Contents
1
This Handbook 2
The SIS Learning with Technology Program: Introduction 3
SIS 1:1 Technology Program Policy 4
Laptop Purchase
Service and Repair
Lost Laptop
Backup and Software Updates
Responsible Use Agreement & Technology Use Expectations 8
GENERAL Expectations
Responsible Use Agreement 9
SIS Student Technology Use Expectations
Elementary School - iPad Use Expectations 12
The Use of iPads in School 14
Middle & High School Technology Use Expectations 15
SIS Email Protocols
SIS Student Email Protocol 18
SIS Students Email Naming Protocol 19
File and Data Backup
Backup 20
Setting up Time Machine Backup Using External Drive
Manually setup Time Machine for backup
About the first backup to an external drive
Selecting Items to Backup
Restoring Files
Restoring specific files or folders 26
Parental Controls
Setting up Parental Controls on your Mac 28
Acknowledgment and Acceptance 33
This Handbook
SEOUL INTERNATIONAL SCHOOL
This technology handbook aims to provide SIS students and parents with
comprehensive information about the SIS Learning with Technology program, focusing on policies, guidelines and practical information on using laptops and
school-provided iPads.
We would like to acknowledge all educators and technology professionals who
generously contributed their time and insights in implementing this program. In particular, we acknowledge Hong Kong International School and Yokohama
International School for inspiring the preparation of this handbook.
2
The SIS Learning with Technology Program
INTRODUCTION: A Message from the Director of Schools
Welcome to SIS Learning with Technology Program!
Six years ago our school embarked on an ambitious goal – not to be the first or
the flashiest international school in Korea to use mobile technology to support learning – but to be smartest.
Those six years have taken us from a couple of labs used for art design,
yearbook and computer science to now where every student grade 6-12 in our school will be using a laptop to enhance their learning and improve their
academic achievement.
Over the next two years our technology initiative will extend to the elementary
school where students will be introduced to iPods, iPads and Macbooks from
kindergarten through to Grade 5.
Our goal is the seamless integration of technology to promote creativity and
problem solving and support authentic learning, assessment and individualized instruction.
This work is a partnership between our teachers, parents and students. We
invite you to browse through our Learning with Technology Handbook and contact us if you have any questions or suggestions.
Sincerely yours,
Mr. Corcoran
Director of SchoolSeoul International School
3
SIS 1:1 Technology Program Policy
COMPULSORY FOR ALL STUDENTS IN GRADE 6-12
Laptop Purchase
Students may purchase their computers either through the school or directly from other off-site vendors. Students who purchase computers through the
school will get a model of laptop specified in the order form/letter sent to
parents during the laptop purchasing month of the previous school year. -- see copy of letter to parent for laptop purchase
Purchasing Laptops through SIS
1. School-purchased laptops are bundled with standard and course-specific software. Other software not included in the bundle may be purchased and
paid for separately by the students either through the school or from any other off-site vendors.
2. School-purchased laptops are provided with technical/software support if
reasonably needed.
3. The school, through its partner-vendor, is able to offer SIS students laptops at
a lower price than the standard education price offered by some off-site vendors.
4
Service and Repair
Middle and High SchoolStudents are expected to have an operational laptop at all times. If repairs are
necessary and the service does not fall in any category covered by the Apple Care Protection Plan, students are expected to have their laptop repaired by any
private off-site service centers and/or through the school. Students whose
laptops are being repaired have access to a loaner unit. Due to the limited number of loaner units available, it is important that students get their computer
repaired as quickly as possible.
Elementary SchoolElementary students are expected to follow procedures set by their classroom teachers on safety and responsible use of iPads provided by SIS. In case of
damage due to failure to follow operating procedures, parents of students will be contacted and be required to pay the cost of damage.
Lost Laptop
If student loses his/her laptop, they are expected to immediately report the loss
to the IT Office. The student’s family will be informed and must purchase and replace the lost laptop as soon as possible (see laptop purchase). While a
replacement laptop is being purchased, a loaner will be provided by the IT office. The loaner pool is not unlimited; therefore, it is important that students find a
replacement to avoid missing school work. If a new laptop is purchased, the
student is required to bring the laptop to the IT office for re-imaging (see re-imaging).
5
Backup and Software Updates
Students are responsible for backing up personal information and for running
software updates on their laptops. Data/files management is the sole responsibility of the student. SIS recommends that students should have their own portable
hard drive with at least 250 GB of memory for backup and storage. Students are also recommended to regularly schedule backups and software updates (weekly
or every 2 weeks) using any of the following methods:
Backup:1. Using a portable hard drive with Apple Time machine. 2. Copying school-appropriate files onto their personal network location or
portable device;
(See Backup Section for specific information)
Internet and Network Use
Access to the internet and other network services at school is provided for
educational purposes only. To manage bandwidth use, students are required to
register their laptops with the IT Department. Unregistered laptops will not be given access to the internet and/or any network services. It is recommended
that students use only school provided user-accounts and the SIS_Student Wifi Protected Access at all times to connect to the internet and the school
network. Downloading games, programs, movies, and files not related to school
6
use are strictly prohibited. See Technology Use Policy and Responsible Use
Agreement
7
Responsible Use Agreement & Expectations
SEOUL INTERNATIONAL SCHOOL STUDENTS
GENERAL Expectations:
SIS students should:
• Understand, agree, and follow the Responsible Use Agreement and the
Technology Use Expectations when using any electronic/technology
devices.• Follow these guidelines, classroom agreements, as well as the student use
expectations around use of all electronic devices.• Understand that failure to follow the SIS Responsible Use Agreement,
the Student Use Expectations, and other classroom rules and procedures
related to technology use will be addressed through SIS disciplinary procedures.
8
RESPONSIBLE USE AGREEMENT
SIS students must:
I. Respect and protect the privacy of others.◦ Use only valid and clearly identified accounts.◦ Not view, use, or copy passwords, data, or networks to which they
are not authorized.◦ Not distribute private information about others or themselves.
II. Respect and protect the integrity, availability, and security of all electronic resources.
◦ Observe all network security practices, as posted.◦ Report security risks or violations to a teacher or network
administrator.◦ Not destroy or damage data, networks, or other resources that do
not belong to them, without clear permission of the owner.◦ Conserve, protect, and share these resources with other students
and Internet users.
III. Respect and protect the intellectual property of others.◦ Not infringe copyrights (no making illegal copies of music, games,
or movies!).◦ Not plagiarize.
IV. Respect and practice the principles of community.◦ Communicate only in ways that are kind and respectful.◦ Report threatening or discomforting materials to a teacher.◦ Not intentionally access, transmit, copy, or create material that
violates the school's code of conduct (such as messages that are
pornographic, threatening, rude, discriminatory, or meant to
harass).
9
◦ Not intentionally access, transmit, copy, or create material that is
illegal (such as obscenity, stolen materials, or illegal copies of
copyrighted works).◦ Not use the resources to further other acts that are criminal or
violate the school's code of conduct.◦ Not send spam, chain letters, or other mass unsolicited mailings.◦ Not buy, sell, advertise, or otherwise conduct business, unless
approved as a school project.
Students may, if in accordance with the policy above1. Design and post web pages and other material from school resources.
2. Use direct communications such as IRC, online chat, and/or instant
messaging with a teacher's permission.3. Install or download software, if also in conformity with laws and licenses,
and under the supervision of a teacher.4. Use the resources for any educational purpose.
Violations of these rules may result in disciplinary action, including the loss of student's privilege to use any technology devices and resources inside the
school.
School and network administrators, and teachers monitor the use of information
technology resources to help ensure that users are secure and in conformity with this policy. Administrators reserve the right to examine, use, and disclose any
data found on the school's information networks in order to further the health, safety, discipline, or security of any student or other person, or to protect
property. They may also use this information in disciplinary actions, and will
furnish evidence of crime to law enforcement.
10
I ACKNOWLEDGE AND UNDERSTAND MY OBLIGATIONS:
PARENTS/GUARDIANS, PLEASE DISCUSS THESE RULES WITH YOUR
CHILD TO ENSURE HE /SHE UNDERSTANDS THEM. THESE RULES ALSO PROVIDE A GOOD FRAMEWORK FOR YOUR STUDENT'S USE OF
COMPUTERS AT HOME, AT LIBRARIES, OR ANYWHERE.
This policy agreement is from the Model Acceptable Use Policy for schools
published by the Computer Crime & Intellectual Property Section of the United States Department of Justice
11
Student Signature over printed name Parent/Guardian Signature over printed name
Elementary School - iPad Use Expectations
Student is responsible for:• Staying on task.
◦ not playing unassigned games
• Taking photos and videos on the iPad for project use.• Keeping account secure.
◦ knowing personal passwords
◦ not sharing passwords◦ logging out of personal accounts
• Not taking advantage of others accounts.• Respecting the feelings and rights of other students in class & school.
• Not sharing personal information about myself without discussing it with a
teacher or parent first.• Turning off, returning to the cart and plug-in the iPad at the end of class.
• Not applying labels or stickers on the iPad.• Not eating or drinking around the iPad.
• Reporting to an adult when something is wrong or the iPad is damaged.
• For all damage or loss caused by his/her actions.• Respecting others creative work by giving credit to the creators.
Students that choose to bring their own iPads to school:• Will have the appropriate apps installed on my iPad.
• Should come to school with my iPad fully charged or bring my charger to school.
• Should bring ear buds or headphones to school along with my iPad• Must allow a teacher to inspect my iPad at anytime.
• Must be responsible for the care and safety of my ipad.
◦ I will not lend it out to anyone I do not fully trust.◦ I will keep it safely locked up when not in use.
12
Consequences (Mr. DeFilippo, please check if the following should be published
in this handbook or just as internal document) If students do not use iPad responsibly:
1. Will receive a warning from a teacher and parents will be notified.
2. Will lose the use of the iPad for one class period and parents will be notified.
3. Will lose the use of the iPad for an extended period of time decided by the
teacher, principal and parents.
13
The Use of iPads in School
Teachers Are Responsible For:• Keeping a record of student infractions• Checking the cart to make sure all iPads are replaced after use
• Locking the cart after use
School is Responsible for:• Providing internet and email access• Apps and software needed for lessons & projects
• Providing a functional iPad and ear buds/headphones• Providing areas where students can use technology and be monitored
outside of class time (i.e. recess)
• A secure locked cabinet for students to store their personal technology.
(Mr. DeFilippo, please check if the following should be published in this handbook or just as internal document)
ConsequencesBased on the situation teachers may choose how many warnings are given to a student.
1. Official warning and notify parents2. Loss of use for one class period and notifying parent.
3. Loss for a period decided upon by the teacher, administration and
parents.
14
Middle | High School Technology Use Expectations
Being Prepared to Learn
• The student will make sure that all required and permitted technology devices
they own are fully operational and ready for use to meet daily educational needs. (This includes charging, allocating disc space for file storage,
updating software/programs, organizing & managing files, backups of relevant digital contents, and any other related responsibilities that would
help meet educational needs.)
• The student understands and agrees to comply with the SIS email and naming protocols.
(See SIS Email & Naming Protocols)
Responsibilities of Ownership
• Student will take responsibility for keeping all permitted devices I own safe and secure when not in use.
• Student will at all times practice safety and security in using any device around the school.
• Student will use laptops and other devices only in the designated areas.
(Areas not appropriate for laptop use: Eating spaces, Swimming pool, Cafeteria)
• Student is responsible for repairs and/or replacement of any broken or damaged device .
Being a Responsible and Respectful User
• The student fully understands and agrees to comply with the SIS Responsible Use Agreement, the Technology Use Expectations and
policies written in this technology handbook.
15
• The student will at ALL times follow the technology use procedures in the
classroom as set by my teachers.
• The is aware that ALL technology-use rules and guidelines apply to ANY device used at SIS.
• The student will at ALL times respect the rights of others when using any technology device in the classroom and around the school.
Distractive Technologies
It is well-accepted that excessive time spent on a computer can have a
detrimental effect on physical well-being, so you should ensure that you make use of your free time in a healthy manner. Recreational endeavors such as
playing games, using social networking sites, and accessing other non-educational technologies can be very appealing, however, they occupy time that
might be better spent preparing assignments for class, studying, working
collaboratively, or reviewing classwork. Playing digital games or using social networking sites recreationally should be kept to a minimum.
Ethical and Respectful Use
Good digital citizenship means maintaining good ethical behavior, even if no one is watching you. Students are constantly encouraged to model good digital
citizenship, minimizing disruptions to the learning environment for yourself or others. This includes: not viewing or installing pornography, not bypassing network
guidelines with proxies or Internet access devices, not hacking or modifying
other students’ accounts or official school files, and not engaging in any illegal activities (including possessing or sharing pirated software or applications).
Students are expected to obey all intellectual property rules and copyright laws, and the SIS Student Email Protocols. Do not engage in conversation or activities
(such as sending pictures) intended to inflame, agitate, or offend others.
16
Protecting Your Identity & Personal Information
Once your information is on the Internet, there is nothing to stop it from being
replicated, shared and distributed widely without your control, both now and into the future. Therefore safeguarding your personal information is extremely
important.
Personal information extends beyond names, phone numbers, student ID
numbers and addresses, to things such as user names, passwords and physical location. As such, it is important that students treat their own and others’
personal details with great care. Students should never share user accounts or
passwords even with their friends. Personal information should always be kept private.
17
SIS EMAIL Protocol
SEOUL INTERNATIONAL SCHOOL STUDENTS
All holders of SIS email accounts using stu.siskorea.org domain are expected to follow these guidelines:
• Use only school provided email accounts when communicating with teachers
and other students on school related matters.• Follow the SIS email protocol when sending emails to teachers.
• Send polite and appropriate email when communicating with teachers and other students.
• Only send email to recipients who need to know the information in the email.
Forwarding emails to recipients who were not included in the original email (unless the original sender approves) is not polite.
• Check your email regularly. “I didn’t check my email” is not a valid excuse for missing an important message.
• Create a password that is a combination of numbers and letters. Make it
something you WILL remember.• School email accounts should not, under any circumstances, be used to
promote the interests of external organizations.• Representation: When you send a letter from your school email address you
are representing the school. Sending an email to an outside party is in some
circumstances similar to sending a paper message with the school letterhead. It is strongly recommended that you use a non-SIS email account
for personal email.
18
Sending Assignments and Classwork to Teachers
SIS students are expected to use their school provided email accounts when sending/submitting assignments to teachers. Students should follow the email
protocol when sending any work to their teachers.
SUBJECT LINE for EMAIL: Title of Assignment - Type of Assignment - Name of Student Example: Pollution-Homework-PaulKim
SIGNATURE for EMAIL: Name of Student - Name of School ‘ Grade level
Example: Paul Kim Seoul International School ’12
FILE NAME for EMAIL ATTACHMENTS: GradeLevel -Title of Assignment - Type of Assignment -
Name Example: 7A-Pollution-HomeWork-Alex Kim
19
File and Data Backup
First and Concurrent Backup
Backup
Your laptop is going to be utilized for a great deal of your school work. It will
contain important files and data that will be necessary for your academic success. Keeping these files safe and accessible is your responsibility as is the
functionality of the laptop itself. Additionally, there may be times when your
computer is to be re-imaged, and if you wish to retain certain files not included in the image, then backup is essential. When you backup your files, you are storing
your files separately from your computer, ensuring their longevity.
Setting up Time Machine Backup Using External Drive
The first time you connect your external drive to your Mac, Time Machine asks if
you would like to use it as a Backup Disk.
Click "Use as Backup Disk" to confirm you want to use the drive for Time Machine backups. Time Machine preferences will then open with this drive
selected as your backup.
20
Or manually setup Time Machine by following these steps:
21
1
2
Open System
Preferences
Open Time Machine
3 Select Set Up Time
Machine
Click the Lock buGon
to unlock and make
changes
4
22
5
Enter administrator
username and password
when prompted to unlock
and make changes
Click Select Disk buGon
6
23
Select the disk drive to
use for backup
Backup should be
starOng...
7
8
About the first backup to an external drive
The first backup may take a while. You may want to set up Time Machine in the
evening so that the initial backup can be done overnight. You should not interrupt the initial backup. You can continue to use your Mac while Time Machine backs
up.
Once the initial backup is completed, Time Machine performs subsequent hourly backups of only the files that have changed on your Mac since the last backup
(as long as your Mac is awake and the backup drive is connected).
Tip: You can manually initiate a Time Machine backup cycle by selecting "Back
up Now" from the Time Machine menu, even if you have Time Machine
preferences set to off.
Then you will the Time Machine Backup Status prompt like this sheet
24
Selecting Items to include for Backup
Tip: If you regularly modify a very large file (greater than 1 GB, for example), you might want to add the file to the "Exclude these items from backups" list. Time
Machine backs up modified files, regardless of how much or how little the file changed from the previous backup.
25
In Time Machine preferences you can click the OpOons buGon to adjust seUngs.
This sheet allows you to exclude files, folders, or enOre volumes from being backed up. You might want to do this to avoid filling up your backup drive.
Restoring Data From Time Machine
FOR OS X LION
With Time Machine you can go "back in time" to restore files, versions of files, or
your entire system. Make sure your backup drive is connected and mounted (if not, Time Machine will alert you that "Your Time Machine backup disk can't be
found."
If prompted, enter an administrator name and password to proceed with the
restore.
Restoring specific files or folders
Choose Enter Time Machine from the Time Machine menu and the restore
interface appears. You can literally see your windows as they appeared "back in time."
26
You can use the timeline on the right side of the window to reach a certain point
back in time (the timeline shows the times of all backups on your backup drive).
If you don’t know exactly when you deleted or changed a file, you can use the back arrow to let Time Machine automatically travel through time to show you
when that folder last changed.(See Mac 101 support for more information on restoring)
Note: Dates in pink indicate the data resides on your Time Machine backup device. Dates in white indicate the data resides on your Mac. In OS X Lion,
portable Macs have the feature of local snapshots. See this article for details.
You can also perform a Spotlight search in the Time Machine Finder Window
search field to find a file. Simply type the Spotlight search field and use the back
arrow to have Time Machine search through your backups to find what you are looking for.
Before you restore a file, you can also use Quick Look to preview a file to make sure its the one you want. Highlight the file and press the Space Bar to bring up
a quick look.
To restore, select the file/folder and click the "Restore" button. The file will
automatically be copied to the desktop or appropriate folder. If the file you are restoring has another file in the same location with the same name, you will be
prompted to choose which file to keep or keep both.
27
Parental Controls
About Parental Controls and Internet Content Filter
If parents remain the holders of the MacBook admin password, they can choose
to useparental controls. Before deciding to use parental controls, parents are strongly
encouraged to carefully gauge whether their limitations could interfere with their child’s education, as the laptop is a primary tool that allows access to vast
positive educational information and opportunities.
Follow the simple steps on How to Setup parental Controls on your Mac below:
28
29
Open System Preferences1
Select Parental Control2
• Make sure to log-in with an Administratorʼs account• Make sure that your child is using a Standard account NOT Administratorʼs, for you to set parental control.
a. Select your childʼs user account
b. Click Enable Parental Control
3Click the lock icon to unlock. Enter an Administratorʼs Password
30
Select your childʼs Account Name to set parental control on
Select Web Tab: To control your childʼs access to different websites on the Internet
Add specific websites you ALWAYS allow your child to access
Add specific websites you NEVER allow your child to access
5
6
a. Select Apps Tab: To limit programs to use
b. Use Simple Finder: Provide simple view of the computer desktop
c. Limit Applications: Allows your child to open only the applications you specify on the list in the:
Allowed Apps box. You can click on the arrow to show the detailed list of programs in each category.
d. Allow user to modify the dock
4
31
7 On the Web Tab: To Control your childʼs access to different websites on the Internet
a. Allow Access ONLY to Specific Websites
b. List of websites that can be accessed by your child
c. Click the + sign to add more websites
8 On People Tab: To limit the number of people your child can contact
a. Limit Mail and Limit Chat: You can add a list of people that your child can contact
b. Specify the contact information to add
c. Add the information to your address book
d. Click the + sign to add another contact
e. Send permission request to your email whenever your child attempts to contact a person not in the list your specified
32
9 On Time Limits Tab: To limit the number of hours your child can use the the computer.
a. Controlling weekday time limits
b. Controlling weekend time limits
c. To set bedtime and prevent access to the computer during the specified time:
On Other Tab: Specific Controls on:
a. Hide profanity in Dictionary and etc.
b. Limit Printer Administration
c. Limit Burning CD/DVD
d. Disable Changing the Passwords
10
See more informaOon on Parental Controls and Internet Content filter here: hGp://support.apple.com/kb/HT2900
Acknowledgement and Acceptance
Seoul International School
Student and Parents:
By providing my personal information I am certifying that I have read, understood
and reviewed with my parent/guardian the policies, responsible use agreement, acceptable use policies and guidelines written in this handbook, and agree to
comply with them. I further understand that violation of these policies and/or rules may result in the revocation of my technology privileges and may put me to
further disciplinary and/or legal action.
Please provide your personal information here:
SIS Learning with Technology Acknowledgement and Acceptance
33