TECHNOLOGY PLAN 2013-2014
Description of district/school's technology policies:
The Greater Clark County School District implemented a 1:1 Digital Learning Initiative at the beginning of the 2013-2014 school year. All faculty and every student in grades 3-12 received a Samsung Chromebook as part of a comprehensive plan to expand technology and digital learning throughout the district. The goal of the initiative is to improve student engagement, personalize student learning, and provide access to equitable technology for all students.
RESPONSIBLE USE/INTERNET SAFETY POLICY TELECOMMUNICATIONS SERVICES (STUDENT)
STATEMENT
The Greater Clark County School (GCCS) Corporation believes that information available through the Internet and other telecommunications services will provide valuable resources for our faculty and staff, resources that are simply not available through more traditional means of obtaining information. By offering this service, the goal is to promote learning through curriculum-based projects that take advantage of the unique resources available through Internet and other services.
The unprecedented access to computers and people from around the world provided through the Internet means that total control of student access to resources is not possible. While every effort will be made to restrict student access to inappropriate materials, a user intent on locating such materials may find them. Students will have access to telecommunications services only upon receipt of a Telecommunications Network Use Agreement, signed by the student and parent or guardian. Teachers will instruct their students in responsible use of telecommunications and the Internet, and in proper network etiquette.
The use of a school-sponsored account to any telecommunications network requires responsible, ethical, and legal use of the network resources. If a user of a school-sponsored account violates any of these guidelines, his or her access to an account will be terminated and future access denied. Additional penalties may be incurred as well, commensurate with the seriousness of the violation. Employees must sign a Telecommunications Network Use Agreement before receiving a user name and password and accessing Internet and email accounts. The signatures on the Telecommunications Network Use Agreement are legally binding and indicate that the signatories have read the terms and conditions carefully and understand their significance.
RULES
INTERNET USE: TERMS AND CONDITIONS
1. RESPONSIBLE USE
Internet network resources are provided for a limited educational purpose, which is to allow students to conduct research and to facilitate intracorporation communication. The use of a GCCS Internet account must be in support of curriculum-related activities and consistent with the educational objectives of Greater Clark County Schools. Transmission of any material in violation of any U.S., state, and/or local regulation is prohibited. This includes, but is not limited to: copyrighted, threatening, obscene, and/or trade-protected materials.
This education account may not be used for commercial activities. Any use for product advertisement or political lobbying is also prohibited.
2. PRIVILEGES
The use of GCCS telecommunications services is a privilege, not a right, and inappropriate use will result in a cancellation of all Internet privileges for a specified period of time. Greater Clark administrators and the network administrators will deem what is inappropriate use and their decision is final. Faculty or staff may request that further account privileges be denied, revoked, or suspended for any violation of this agreement. Although Internet privileges may be suspended, students may be able to access their accounts to complete academic assignments and/or remediation activities which do not require Internet access. Parents may request that alternative assignments replace activities requiring Internet access.
3. NETWORK RULES
All users of telecommunications on GCCS-sponsored accounts are expected to abide by these rules. These rules include, but are not limited to, the following:
A. Be polite. Do not be abusive in your messages to others. Students have no expectation of privacy in the use of school-owned equipment.
B. Use appropriate language. Do not swear, use vulgarities, or any inappropriate language. Illegal activities are strictly forbidden.
C. No person using GCCS technology will utilize this equipment to engage in bullying of another. Bullying is defined as overt, repeated acts or gestures, including verbal or written communications transmitted; physical act committed; or any other behaviors committed by student or group of students against another student with the intent to harass, ridicule, humiliate, intimidate, or harm the other student. This rule applies when a student is on school grounds immediately before or during school hours, immediately after school hours or at any other time when the school is being used by a school group; off school grounds at a school activity, function or event; traveling to or from school or a school activity, function or event; or using property or equipment provided by the school.
D. Do not reveal your personal address or phone number, or those of other students or colleagues.
E. Do not use the network to solicit face-to-face meetings with other users, and do not respond to such solicitations.
F. Electronic mail is not guaranteed to be private.
G. Do not use the network in a way that would disrupt the use of the network by other users. Excessive log-on time and large-scale postings shall be considered as disruptions. The administration of the network reserves the right to determine what constitutes excessive mailings and excessive time on-line.
H. All communications and information accessible via the network should be assumed to be the private property of Greater Clark County Schools. All copyrights and intellectual property rights should be observed.
I. Accessing, uploading, downloading, and/or distributing pornographic, obscene or sexually explicit materials is prohibited.
J. Students may not use the school’s resources to access the Internet without the permission and supervision of a faculty member.
K. Schools may be permitted to establish a Web page that presents information about the school and its activities. Students may be permitted to assist in the development of those pages under the direct supervision of a GCCS staff member. Web pages with inappropriate content will be removed from the Web server immediately upon discovery, and those individuals responsible for the placement of the inappropriate content will be subject to disciplinary action. No extracurricular organization may establish a Web page on the GCCS network or with a GCCS account without permission from the school’s principal.
L. Any person using GCCS technology or equipment recognizes that any transaction conducted on or via GCCS hardware, software and/or network is subject to random monitoring by GCCS Technology Department.
4. INTERNET SAFETY
A. General Warning - Individual Responsibility of Parents and Users. All users and their parents/guardians are advised that access to the electronic network may include the potential for access to materials inappropriate for school-aged pupils. Every user must take responsibility for his or her use of the computer network and Internet and stay away from these sites. Parents of minors are the best guides to materials to shun. If a student finds that other users are visiting offensive or harmful sites, he or she should report such use to the teacher or supervisor in charge.
B. Personal Safety – In using the computer network and Internet, students should not reveal personal information such as home address or telephone number. Students should not use their last name or any other information which might allow a person to locate the student without first obtaining the permission of a supervising teacher. Students should not arrange a face-to-face meeting with someone met on the computer network or Internet without parent’s permission. Regardless of the student’s age, no meetings should be arranged with someone with whom they have only communicated on the Internet.
C. “Hacking” and Other Illegal Activities – It is a violation of this Policy to use the school’s computer network or the Internet to gain unauthorized access to computers or computer systems, or to attempt to gain such unauthorized access. Any use which violates state or federal law relating to copyright, trade secrets, the distribution of obscene or pornographic materials, or which violates any other applicable law or municipal ordinance, is strictly prohibited.
D. Confidentiality of Student Information – Personally identifiable information concerning students may not be disclosed or used in any way on the Internet without the permission of a parent or guardian, or if the student is 18 or over, the permission of the student himself/herself. Users should never give out private or confidential information about themselves or others on the Internet, particularly credit card numbers and Social Security numbers. A supervising teacher or administrator may authorize the release of directory information, as defined by Indiana law, for internal administrative purposes or approved educational projects and activities.
E. Active Restriction Measures – The school corporation will utilize filtering software or other technologies to prevent students from accessing visual depictions that are obscene, child pornography, or harmful to minors. The school corporation will also monitor the online activities of students, through direct observation and/or technological means, to ensure that students are not accessing such depictions or any other material that is inappropriate for minors.
Internet filtering software or other technology-based protection systems may be disabled by a supervising teacher or school administrator, as necessary, for purposes of bona fide research or other educational projects being conducted by students age 17 and older. The term “harmful to minors” is defined by the Communications Act of 1934 (47 USC Section 254 (h)(7), as meaning any picture, image, graphic image file, or other visual depiction that:
• taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion;
• depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals;
• taken as a whole, lacks serious literacy, artistic, political, or scientific value as to minors.
5. WARRANTIES
GCCS makes no warranties of any kind, whether expressed or implied, for the service it is providing. GCCS will attempt to provide error-free, dependable access to the computing resources associated with Internet use. However, this school corporation is not responsible for any damages suffered due to loss of data resulting from delays, non-delivery, misdeliveries, or service interruptions. Use of any information obtained via telecommunications is at the user’s own risk. GCCS specifically denies any responsibility for the accuracy or quality of information obtained through these or any network services.
GCCS is not responsible for unauthorized financial obligations resulting from use of school corporation resources and accounts to access the Internet or other telecommunications services. GCCS assumes no responsibility for the content of information stored on school corporation diskettes, hard drives, or servers.
Each GCCS building with Internet access will keep on file a copy of the school corporation’s Internet policies and procedures. These will be available for all parents, guardians, staff members, and members of the community to review.
6. SECURITY
Any user identified as a security risk or having a history of security breaches on this system or other computer systems will be denied access to this network. Security software will be installed on all computers that are both connected to the network and installed in areas where student access is possible. An act of intentionally circumventing the security software may be viewed as grounds for disciplinary action.
Users are expected to make all reasonable efforts to prevent others from using their accounts. Under no condition should a user provide his/her password to another person. Attempts to log onto the network as a system administrator will result in cancellation of user privileges.
Any user who has located or believes he/she can identify a security problem on the network must notify a teacher or system administrator immediately.
7. VANDALISM
Vandalism is defined as any malicious attempt to harm or destroy data of another user or on other networks connected to this network system. This includes, but is not limited to, the uploading, creation, or distribution of computer viruses. Using accounts, modifying passwords, or accessing or modifying data belonging to other users without their express written permission will be considered vandalism. “Hacking,” or attempting illegally to gain entry into computer systems, within or outside the GCCS network, will be considered vandalism. Vandalism will result in cancellation of privileges.
Reference: IC 20-30-5.5-1
Attachments: A – Telecommunications Network Usage Agreement (1 page)
B – Telecommunications Network Usage Denial (1 page)
Adopted: December 12, 1995
Revised: November 9, 2010
Last Revision: July 9, 2013
Analysis of Classroom:
- Student Populations and SOE factors
The school staff consists of 1 administrator, 29 certified teachers, and 6 non-certified staff in grades K-5. This total includes the special education department which has 3 full time certified teachers with 6 special needs assistants; 1 certified speech therapist; and 1 certified teacher for a self-contained classroom with 3 assistants. Utica currently has 4 full day kindergarten classrooms, each staffed with a certified teacher. Reading intervention is provided by various staff members. Utica shares the advanced program teacher with other buildings. Utica has full time music, art, library, and physical education teachers. There is one School Administrative Manager, 1 administrative assistant, 1 office assistant, and 1 registered nurse. The lunchroom staff consists of a manager and 3 assistants. There are 3 full time custodians that complete the staff. The current population of Utica Elementary School is 508 students. This is a rapid increase in the number of students enrolled at Utica over the past few years. Our current population is 7% African American, 2% Hispanic, 86% White/Non-Hispanic, 4% Multiracial, and 1% Asian/Pacific. About 23% of the students are free and reduced lunch.
In accordance with the district and state, Utica Elementary School has adopted the Indiana Academic Standards and the Core Content Standards as its curriculum. Over the past few years, GCCS has utilized the teaching and administrative staff to develop, review, and adapt a standards based curriculum, goal clarity windows, and a performance assessment process. The curriculum binders are located in Utica Elementary School library and available on line. As a focus of curriculum and instruction, Utica Elementary School continues to include the 5 components of reading; phonemic awareness; phonics; vocabulary; reading comprehension; and fluency as the primary means of teaching reading/language arts. We have a rigorous, standards based curriculum which includes the balanced math framework, technology, science and social studies. Other areas of the curriculum include art, music and physical education. Special needs students receive services through the practice of inclusion for all curricular areas.
- Pros and cons of technology resources
Pros:
All students have equitable access to technology and are excited and engaged to learn. Teachers are able to supplement material that enables students to work at their own pace and provide tutoring. Chromebooks help students to focus for longer periods of time and develop better learning through exploration and research. Technology allows another platform for students to communicate and collaborate with teachers and peer students. Prepares students for skills needed for the 21st century.
Cons:
Some students abuse internet privileges or get off task during assignments by attempting to play games. Valuable learning time is lost when students cannot log on properly or have trouble getting to the correct website or activity. There are risks that students may be exposed to inappropriate material, child predators, or cyber bullying.
Adaptive/assistive hardware and software that assist students with special need
Hardware:
1. Promethean interactive whiteboards in every classroom.
2. Chromebooks for all faculty and every student in grades 3-12.
3. Dell desktop computers for a faculty.
4. Document cameras in every classroom.
4. Multiple touch screens computers, screens magnifiers, headphones, microphones, clickers, and adaptive keyboards and mice.
5. iPads for each special needs student.
5. TAP-it interactive display screen - It is specifically designed to minimize barriers and maximize flexibility for students with special needs. The large screen is durable with shatter resistant glass and is counter balanced to support the weight of leaning students.
6. 4, 8 and 16 picture communication devices that encourage social interaction and foster independence.
7. BIGmack - device which allows a single message to be recorded and played back by pressing a large activation surface. This allows students with visual and physical disabilities to communicate and connect with teachers and classmates.
8. DynaVox - portable speech generating device that resembles a tablet PC. It provides a range of tools for students with communication challenges such as text to speech and special software to provide students with options for message creation and delivery.
9. Eye Gaze System - allows students with severe physical disabilities to access a computer. The system has an inbuilt camera which tracks where a student's eyes are looking, enabling students to move the mouse pointer around. A student may "click" the mouse by blinking, staring at the screen for a certain period of time, or using a switch.
Software:
1. Boardmaker software - allows teachers to create printed materials like communication boards, sequences, and schedules. Also allows teachers to create their own materials with words, topics, labels, and symbols supported in 44 languages.
2. Discrete Trial Trainer software - allows independent learning for students with mild to severe cognitive and developmental disabilities.
3. Judy Lind software - access for students with special needs.
4. Scholastic Read 180 - reading intervention software and program for students in grades 4-12 who read at least two years below grade level.
5. Scholastic System 44 - foundational reading software and program designed for the most challenged struggling readers in
grades 3-12.
6. McGraw Hill – offers numerous resources with ebooks, adaptive learning, online benchmark assessments, etc.
7. My Big Campus – a learning management system that allows social networking for students and content management for students and parents in a safe environment.
- Technology resources that affirm diversity and address cultural and language differences
- School or classroom management strategies
- Wide area networks (WAN) for school districts
- Analysis of Needs
sandra_jones__technology_plan_2013-2014.pdf | |
File Size: | 173 kb |
File Type: |
utica_technology_planning_form_.pdf | |
File Size: | 260 kb |
File Type: |
gccs_facilities_and_technology_strategic_plan_framework_2013-2018.pdf | |
File Size: | 37 kb |
File Type: |
responsible_use_internet_safety_policy_telecommunications_students.pdf | |
File Size: | 36 kb |
File Type: |
Computer Based Teaching Methods by Sandra Jones is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at http://sansajonesw540.weebly.com/.