The mission of the school’s technology program is to support
student learning and facilitate teaching. This includes the school network and
all technology equipment used by students, teachers, and support staff. Goals
of the BES technology program are to:
technology across the curriculum
all students the opportunity to develop the technological skills necessary
to be effective participants in 21st century society and
students from inappropriate information
hardware, software, and data (documents, files, etc.) from damage or
respectful, responsible, and ethical use of information technology
staff and student access to technology and the information it can provide
community access to school technology for educational purposes when it
doesn’t interfere with students and school staff (lower priority)
The procedures that follow clarify the BES Information
Technology Acceptable Use Policy approved by the BES School Board and provide
more specifics. If a conflict arises between these procedures and the approved
AUP, the Acceptable Use Policy takes precedence.
Hardware Selection and Use
hardware requests will be made through the Request Tracker system and
approved by the BES Technology Committee. Hardware includes all digital
equipment such as computers, printers, digital cameras, scanners, memory
sticks, external hard drives, Smart Boards, etc.
certain brands of equipment will be authorized for purchase to ensure
ongoing warranty assistance, ease of maintenance, and control of total
cost of ownership. Computers and printers will adhere to specifications
determined by the BES Technology Committee and approved as hardware
- Use of
equipment not listed on the hardware standard for purchase requires
approval the BES Technology Committee. Hardware standards will be updated
School computers should be used for educational or job-related purposes.
b. Priority will
always be given to school-related projects and activities.
c. School computers will not be
treated as personal property and modified without
modifications to school computers will be reported to
the administration. This includes
instant messaging programs.
that go home must only be used by the person to whom the computer is
assigned, and not by other friends or family members.
computers or digital devices will not be connected to the network
without prior approval of the BES Technology Coordinator. All personally
owned devices brought to school must be scanned for viruses before being
connected to the school network.
will not be moved or relocated without informing technology personnel and
soliciting their assistance.
equipment will not be accepted unless it meets minimum hardware standards
as determined by the BES Technology Committee.
equipment should not be more than three years old and should be compatible
with existing equipment in regard to operating system.
Any donated equipment will be approved by the BES Technology
Committee prior to use in the school.
Software Selection and Use
approved software will be installed on school computers. The BES
Technology Committee will review all software requests and maintain an
approved software list.
for additional software and/or software installation will be made through
the Request Tracker system with approval required before use. Only
technology personnel will perform installations.
unauthorized software will be installed from disk/CD or downloaded from
the Internet on school computers. This includes instant messenger
will only be installed on more than one computer when proper licensing is
available or acquired. No programs will be loaded on the server unless a
network license has been purchased.
technology services do not support any personally owned software or
software that is not properly licensed. BES technology support services
reserve the right to remove any unauthorized software from school
computers (e.g., instant messenger applications).
Network Procedures and Use
(Access, privileges, acceptable use)
staff member will have a personal network account which is password
protected. Accounts will be made available after the staff member signs an
AUP agreement. Privileges for opening attachments to e-mails will only be
available in these personal logins. The student logins will not have
staff members are required to read the BES Acceptable Use Policy and sign
a form stating their compliance with this policy. A signature is
required before any new accounts are activated on the network.
members will sign an AUP agreement before using school technology.
should only be accessing their own files or shared files. Accessing
another user’s files is a violation of privacy rights unless they have
given you permission.
Files should only be deleted by the owner.
b. Large files should be backed up
on removable media to conserve space on the server. Old files may be moved to
backup storage by technology personnel as required.
c. If you believe a file or folder
is missing, contact technology support for assistance.
d. At the end of the year, staff
members are responsible for deleting or organizing files in their accounts
(password-protected and classroom or students).
security reasons, no one is permitted to connect a non-school-owned
computer, laptop, or personal digital assistant to the school’s network
without prior approval from the Network Administrator.
media (disks, memory sticks, CDs, etc.) should be scanned for viruses
prior to opening any files they contain. Right click on media icon and
scan for viruses as a precaution with all portable media.
- It is
critical that passwords not be shared or divulged. Do not have the
computer save any password if prompted. Click on “No” if the computer
prompts you to save password.
If you feel your password has been compromised, you should
request a password change (new password) from the Technology Coordinator or
Technology Support Specialist.
Internet Procedures and Use
is a great deal of inappropriate material online. Deliberately accessing
or attempting to access inappropriate material on school computers is not
is in place to protect students and many sites may not be available at
school for a variety of reasons (e.g., inappropriate materials or
- Have a
clear purpose in mind when browsing. BES School Rights and
Responsibilities apply to Internet use. You have a right to be safe and a
right to learn. You have a responsibility to treat others with respect.
acknowledging pop-ups. Acknowledging pop-ups can allow Spyware and Adware
to be loaded onto your computer without you being aware of the activity.
Avoid pop-up offers and anything that says you’re a winner.
- If you
register, purchase, or order anything online, make sure you know whom you
are giving the information to and what it will be used for.
The school network (via the Internet) may not be used for
personal or financial gain.
E-mail Accounts and Use
(School accounts, privacy, confidentiality)
staff member will have a school e-mail account.
e-mail is not private and can be monitored. No confidential
information or inappropriate content should be transmitted
via school e-mail.
weekly staff bulletin will be distributed via school e-mail.
should know their user logon and password. Passwords are personal and
should not be shared with anyone.
of school e-mail accounts are expected to abide by the generally accepted
rules of network etiquette. These include:
often come attached to e-mail. Do not open any attachments from an unknown source or that look suspicious.
Viruses commonly send e-mails in the name of a user whose computer is infected. Do
not open attachments unless you are expecting them. Even if an e-mail is from
someone you know, it could have a virus attached. When in doubt, get help or
delete the message without opening the attachment.
revealing personal information about students or colleagues (photos or
spreading rumors of false information
you have a spam message with an unsubscribe link, do not use it.
Attempting to unsubscribe generally lets the spam
organization know your address is valid and makes you vulnerable to additional spam.
Always delete spam messages without responding or opening.
virus warnings are hoaxes. Do not forward virus warnings to other users unless the threat can be verified.
are not allowed to access personal e-mail accounts from school computers.
(Requests, limitations, tracking)
requests for technology support will be entered into the Request Tracker
system. This includes multimedia projects (photos, PowerPoints, brochures,
support will be provided for all school technology and acceptable donated
equipment. Support will not be provided for personal items or unauthorized
requests will be tracked and prioritized. An attempt will be made to
address all requests in a timely manner. Technology requests will be
addressed based on priority and availability of parts and materials.
that require a large expenditure of time and money may need to be
addressed through the budgeting process and will require technology
committee approval. An effort will be made to honor all reasonable requests.
Staff members who feel comfortable using technology, or who
have specific areas of expertise, should act as mentors for staff members who
need assistance. This can be done on a formal or informal basis.
Computer Lab Rules (for Students)
food or drink allowed.
your hand for help.
permission before printing.
CDs and headphones away when you log out.
your chair in when you leave.
out what you bring in.
will always be an adult in charge. If there is not an adult in charge, you
must leave the computer lab.
will have a clear educational purpose when using lab computers.
school webpages must be curriculum or school related.
personal homepages will be linked to the BES School Webpage.
student work or photos will be published on the BES School Webpage without
written parental approval.
links on the BES School Webpage will be screened by technology personnel
to make sure they are relevant and appropriate for student use.
Copyright laws must be adhered to when publishing materials
on the school’s website.
in these procedures will override the AUP if a conflict exists. The AUP
always takes precedence.
staff members must adhere to copyright laws. This includes the use of
school technology. Proper software licensing and source citations are
required for all school projects and activities.
safety while online is critical. Students should be made aware of online
dangers and how to avoid being victimized.
following is a list of unacceptable uses of school technology:
use for private financial gain
fraudulent, harassing, abusive, or offensive information, pictures, or
software from the Internet without prior approval
inappropriate sites or e-mail (e.g., pornography)
with or disrupting network services or equipment
unlicensed or unapproved software
use that is illegal, such as gambling or chain letters
Technology Planning for Integration (Collaboration)
in the computer lab will be planned collaboratively with classroom
teachers to ensure integration with the existing curriculum.
projects involving technology will be carefully planned ahead of time with
technology support personnel to ensure adequate time and resources are
classroom teacher is required to stay with his or her class during
computer lab sessions. The teacher is responsible for planning
standards-based technology lessons with support from available technology
One technology support person will be available in
the computer lab during regularly scheduled lab times. Technology
support personnel may not be available during extra lab times that
teachers sign up for.