SlideShare a Scribd company logo
"CHILDREN TODAY ARE TYRANTS. THEY
CONTRADICT THEIR PARENTS, GOBBLE THEIR
 FOOD, AND TYRANNIZE THEIR TEACHERS."
              SOCRATES
KEEPING YOUR DEVICE
                SECURE

• Find   my IPad

• Uses   your apple ID

• Laptops
        and androids use
 passwords and security log
 ins
•   Double click the 'on' button
    to check their activity.
•   Go into Safari
    History( open book
    icon).This shows the recent
    Internet activity.
THE SETTINGS BUTTON
• Settings   is the key
 button

• Putit on the application
 tray

• Holdthe icon with your
 finger until they wobble

• Drag   down to tray
Most used apps
SETTING RESTRICTIONS

• Settings

• >general

• >Restrictions

• >Enable     restrictions

• Enter   a code
•   Restrictions

•   Choose restrictions
•   Parents choose the password

•   It might be an idea to let Mark or Linda
    know the password
YOU CAN NOW SWITCH
ON AND OFF SOME OF THE 
DEVICE'S FUNCTIONALITY
Back up work to the iCloud
BACK UP TO CLOUD




    Switch on the 
   Things you want
     To back up
          
  ESP DOCUMENTS 
     AND DATA
LAPTOPS,NETBOOKS AND
      ANDROID
You can use a thumb drive,
an external hard drive or cloud based
technology like drop box
RESTRICTING THE USE OF THE
INTERNET OR MONITORING IT'S USE
• Down     load MOBICIP from the app
    store or the internet( for laptops)

• You    will have to join the mobicip site(the
    basic level is free but the advanced
    features cost about $10 per year

• Try  the browser on the laptop
    make sure it works

• Disable  Safari on the iPad or Internet
    explorer on laptops

•   Or uninstall the program
Discipline policy for all devices


•   This has been explained to all students:

1. In form class verbally and with a visual presentation
2. At numerous form assemblies
3. Teachable moments in subject classes
4. They all signed an IT agreement when they were enrolled
into year 9.
The policy:

•   All students should be fully engaged in every lesson. If they are off
    task with things like games, social networks like Facebook, Twitter or
    Tumblr, on Trade Me or any activity which is deemed to impinge
    negatively on their learning, the student will be banned from the
    Internet for one week.

•   This is documented on Kamar.

•   If this type of distraction is noted again, Mark or Linda will contact
    parents and an agreement is reached regarding the confiscation of
    the device. The time period is again a week.

•   The student is called in and the procedure is explained. All work
    missed at school must be caught up for homework.
Why the week's confiscation?

•   It is more serious than a phone/ iPod.

•   It is not like a phone which is simply a distraction. 

•   The device is integral to learning. Students need to learn
    to manage time and manage self.

•   The loss of the device affects not only work but also their
    social life.

•   Second offenses have included using someone else's login
    when the student has been excluded from the net.
Facebook

•   It is a life skill that students need to learn: time and place.
    The time and place for Facebook is not in class.

•   It is a good idea to have your child as a 'friend' on your
    account. In this way you can monitor some of the activity
    AND the time posts and comments are made.

•   We have reminded students that anything sent to Facebook
    can be used as evidence, so they should post wisely.

•   They have also been reminded that they are leaving a
    traceable digital trail, not confined to FB.
QUESTIONS?

More Related Content

What's hot

Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
Ian Krieger
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
Jason Weaver
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
Rajesh Soundararajan
 
Digital Footprints - NDP
Digital Footprints - NDPDigital Footprints - NDP
Digital Footprints - NDP
miawalsh
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
Ollie Bray
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
Technology and Business Growth! - What Companies Need To Know
Technology and Business Growth! -  What Companies Need To KnowTechnology and Business Growth! -  What Companies Need To Know
Technology and Business Growth! - What Companies Need To Know
Brian Bluff
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
Ollie Bray
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
wwihead
 
BYOD-Bring Your Own Device
BYOD-Bring Your Own DeviceBYOD-Bring Your Own Device
BYOD-Bring Your Own Device
Michael M Grant
 
Internet and youth in albania today
Internet and youth in albania todayInternet and youth in albania today
Internet and youth in albania today
Boni Tufa
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14
Bex Lewis
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parenting
hornerl
 
Daniele work home
Daniele work   homeDaniele work   home
Daniele work home
Fatima Khan
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
ISTE
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
International School Manila Elementary
 

What's hot (18)

Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Digital Footprints - NDP
Digital Footprints - NDPDigital Footprints - NDP
Digital Footprints - NDP
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Technology and Business Growth! - What Companies Need To Know
Technology and Business Growth! -  What Companies Need To KnowTechnology and Business Growth! -  What Companies Need To Know
Technology and Business Growth! - What Companies Need To Know
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
 
BYOD-Bring Your Own Device
BYOD-Bring Your Own DeviceBYOD-Bring Your Own Device
BYOD-Bring Your Own Device
 
Internet and youth in albania today
Internet and youth in albania todayInternet and youth in albania today
Internet and youth in albania today
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14
 
Tech Savvy Parenting
Tech Savvy ParentingTech Savvy Parenting
Tech Savvy Parenting
 
Daniele work home
Daniele work   homeDaniele work   home
Daniele work home
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 

Viewers also liked

2011formalwriting
2011formalwriting2011formalwriting
2011formalwriting
Linda Rubens
 
Behavior, part 1
Behavior, part 1Behavior, part 1
Behavior, part 1
Albert
 
Essays for short stories
Essays for short storiesEssays for short stories
Essays for short stories
Linda Rubens
 
End of term task 2013
End of term task 2013End of term task 2013
End of term task 2013
Linda Rubens
 
Year13 writing
Year13 writingYear13 writing
Year13 writing
Linda Rubens
 
The future 2012
The future 2012The future 2012
The future 2012
Albert
 
Year 10 the veldt updated
Year 10 the veldt updatedYear 10 the veldt updated
Year 10 the veldt updated
Linda Rubens
 

Viewers also liked (7)

2011formalwriting
2011formalwriting2011formalwriting
2011formalwriting
 
Behavior, part 1
Behavior, part 1Behavior, part 1
Behavior, part 1
 
Essays for short stories
Essays for short storiesEssays for short stories
Essays for short stories
 
End of term task 2013
End of term task 2013End of term task 2013
End of term task 2013
 
Year13 writing
Year13 writingYear13 writing
Year13 writing
 
The future 2012
The future 2012The future 2012
The future 2012
 
Year 10 the veldt updated
Year 10 the veldt updatedYear 10 the veldt updated
Year 10 the veldt updated
 

Similar to Advice for parents: BYOD

Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Lori Lee Mickelson
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary
Scott Burnett
 
Byod castle rock
Byod castle rockByod castle rock
Byod castle rock
stantons
 
Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking
Scott Burnett
 
The mlearning meeting and workshop teachers handout
The mlearning meeting and workshop teachers handoutThe mlearning meeting and workshop teachers handout
The mlearning meeting and workshop teachers handout
Mr Bounab Samir
 
Mobile devices @kfs presentation
Mobile devices @kfs presentationMobile devices @kfs presentation
Mobile devices @kfs presentation
Cameron Lockie
 
BYOD iPads at PLC Sydney
BYOD iPads at PLC SydneyBYOD iPads at PLC Sydney
BYOD iPads at PLC Sydney
Chris Betcher
 
Ipad in the Classroom 1
Ipad in the Classroom 1Ipad in the Classroom 1
Ipad in the Classroom 1
mikedionne
 
Byod implementation plan
Byod implementation planByod implementation plan
Byod implementation plan
dwalke17
 
iPad Parent Training
iPad Parent TrainingiPad Parent Training
iPad Parent Training
gorneaun
 
Ipad official
Ipad officialIpad official
Ipad official
ruthbm08
 
2014 15 byod
2014 15 byod2014 15 byod
2014 15 byod
brianebaron77
 
iPad App Suggestions for the 1 iPad Classroom
iPad App Suggestions for the 1 iPad ClassroomiPad App Suggestions for the 1 iPad Classroom
iPad App Suggestions for the 1 iPad Classroom
stantons
 
New teacher academy secondary- 2014-2015
New teacher academy secondary- 2014-2015New teacher academy secondary- 2014-2015
New teacher academy secondary- 2014-2015
shthornt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
MICDS
 
Internet Safety Parent Presentation
Internet Safety Parent PresentationInternet Safety Parent Presentation
Internet Safety Parent Presentation
MICDS
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2
MGSD
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
SunnyhillsSchool
 
Grade 4/5 Parent iPad Presentation
Grade 4/5 Parent iPad PresentationGrade 4/5 Parent iPad Presentation
Grade 4/5 Parent iPad Presentation
matthewlipstein
 
St. Gabriel's Catholic School - iPad Primer Fall 2013
St. Gabriel's Catholic School - iPad Primer Fall 2013St. Gabriel's Catholic School - iPad Primer Fall 2013
St. Gabriel's Catholic School - iPad Primer Fall 2013
matthewlipstein
 

Similar to Advice for parents: BYOD (20)

Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary
 
Byod castle rock
Byod castle rockByod castle rock
Byod castle rock
 
Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking
 
The mlearning meeting and workshop teachers handout
The mlearning meeting and workshop teachers handoutThe mlearning meeting and workshop teachers handout
The mlearning meeting and workshop teachers handout
 
Mobile devices @kfs presentation
Mobile devices @kfs presentationMobile devices @kfs presentation
Mobile devices @kfs presentation
 
BYOD iPads at PLC Sydney
BYOD iPads at PLC SydneyBYOD iPads at PLC Sydney
BYOD iPads at PLC Sydney
 
Ipad in the Classroom 1
Ipad in the Classroom 1Ipad in the Classroom 1
Ipad in the Classroom 1
 
Byod implementation plan
Byod implementation planByod implementation plan
Byod implementation plan
 
iPad Parent Training
iPad Parent TrainingiPad Parent Training
iPad Parent Training
 
Ipad official
Ipad officialIpad official
Ipad official
 
2014 15 byod
2014 15 byod2014 15 byod
2014 15 byod
 
iPad App Suggestions for the 1 iPad Classroom
iPad App Suggestions for the 1 iPad ClassroomiPad App Suggestions for the 1 iPad Classroom
iPad App Suggestions for the 1 iPad Classroom
 
New teacher academy secondary- 2014-2015
New teacher academy secondary- 2014-2015New teacher academy secondary- 2014-2015
New teacher academy secondary- 2014-2015
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Parent Presentation
Internet Safety Parent PresentationInternet Safety Parent Presentation
Internet Safety Parent Presentation
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
Grade 4/5 Parent iPad Presentation
Grade 4/5 Parent iPad PresentationGrade 4/5 Parent iPad Presentation
Grade 4/5 Parent iPad Presentation
 
St. Gabriel's Catholic School - iPad Primer Fall 2013
St. Gabriel's Catholic School - iPad Primer Fall 2013St. Gabriel's Catholic School - iPad Primer Fall 2013
St. Gabriel's Catholic School - iPad Primer Fall 2013
 

More from Linda Rubens

Witness Intro
Witness Intro Witness Intro
Witness Intro
Linda Rubens
 
Othello essay help
Othello essay helpOthello essay help
Othello essay help
Linda Rubens
 
Shakespeare's Othello: essay help
Shakespeare's Othello: essay helpShakespeare's Othello: essay help
Shakespeare's Othello: essay help
Linda Rubens
 
Tell Tale Heart
Tell Tale HeartTell Tale Heart
Tell Tale Heart
Linda Rubens
 
Writing for year 13
Writing for year 13Writing for year 13
Writing for year 13
Linda Rubens
 
53.staticimage(3.6) 3
53.staticimage(3.6) 353.staticimage(3.6) 3
53.staticimage(3.6) 3
Linda Rubens
 
Explain everything pd[1]
Explain everything pd[1]Explain everything pd[1]
Explain everything pd[1]
Linda Rubens
 
Billy Elliot Film Study
Billy Elliot Film StudyBilly Elliot Film Study
Billy Elliot Film Study
Linda Rubens
 
V for vendetta
V for vendetta V for vendetta
V for vendetta
Linda Rubens
 
Blogging checklist
Blogging checklist Blogging checklist
Blogging checklist
Linda Rubens
 
Blogging ppt 2014
Blogging ppt 2014Blogging ppt 2014
Blogging ppt 2014
Linda Rubens
 
The other foot updated
The other foot updatedThe other foot updated
The other foot updated
Linda Rubens
 
In the name of the father
In the name of the fatherIn the name of the father
In the name of the father
Linda Rubens
 
Creative writing rich task 2013
Creative writing rich task 2013Creative writing rich task 2013
Creative writing rich task 2013
Linda Rubens
 
Shakespeare intro 2013
Shakespeare intro 2013Shakespeare intro 2013
Shakespeare intro 2013
Linda Rubens
 
Othello PBL for year 11 students
Othello PBL for year 11 studentsOthello PBL for year 11 students
Othello PBL for year 11 students
Linda Rubens
 
BYOD: How my teaching has changed!
BYOD: How my teaching has changed!BYOD: How my teaching has changed!
BYOD: How my teaching has changed!
Linda Rubens
 
Cyclone presentation 2012
Cyclone presentation 2012Cyclone presentation 2012
Cyclone presentation 2012
Linda Rubens
 
End of term task
End of term taskEnd of term task
End of term task
Linda Rubens
 
The veldt by Ray Bradbury 2012
The veldt by Ray Bradbury 2012The veldt by Ray Bradbury 2012
The veldt by Ray Bradbury 2012
Linda Rubens
 

More from Linda Rubens (20)

Witness Intro
Witness Intro Witness Intro
Witness Intro
 
Othello essay help
Othello essay helpOthello essay help
Othello essay help
 
Shakespeare's Othello: essay help
Shakespeare's Othello: essay helpShakespeare's Othello: essay help
Shakespeare's Othello: essay help
 
Tell Tale Heart
Tell Tale HeartTell Tale Heart
Tell Tale Heart
 
Writing for year 13
Writing for year 13Writing for year 13
Writing for year 13
 
53.staticimage(3.6) 3
53.staticimage(3.6) 353.staticimage(3.6) 3
53.staticimage(3.6) 3
 
Explain everything pd[1]
Explain everything pd[1]Explain everything pd[1]
Explain everything pd[1]
 
Billy Elliot Film Study
Billy Elliot Film StudyBilly Elliot Film Study
Billy Elliot Film Study
 
V for vendetta
V for vendetta V for vendetta
V for vendetta
 
Blogging checklist
Blogging checklist Blogging checklist
Blogging checklist
 
Blogging ppt 2014
Blogging ppt 2014Blogging ppt 2014
Blogging ppt 2014
 
The other foot updated
The other foot updatedThe other foot updated
The other foot updated
 
In the name of the father
In the name of the fatherIn the name of the father
In the name of the father
 
Creative writing rich task 2013
Creative writing rich task 2013Creative writing rich task 2013
Creative writing rich task 2013
 
Shakespeare intro 2013
Shakespeare intro 2013Shakespeare intro 2013
Shakespeare intro 2013
 
Othello PBL for year 11 students
Othello PBL for year 11 studentsOthello PBL for year 11 students
Othello PBL for year 11 students
 
BYOD: How my teaching has changed!
BYOD: How my teaching has changed!BYOD: How my teaching has changed!
BYOD: How my teaching has changed!
 
Cyclone presentation 2012
Cyclone presentation 2012Cyclone presentation 2012
Cyclone presentation 2012
 
End of term task
End of term taskEnd of term task
End of term task
 
The veldt by Ray Bradbury 2012
The veldt by Ray Bradbury 2012The veldt by Ray Bradbury 2012
The veldt by Ray Bradbury 2012
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Advice for parents: BYOD

  • 1. "CHILDREN TODAY ARE TYRANTS. THEY CONTRADICT THEIR PARENTS, GOBBLE THEIR FOOD, AND TYRANNIZE THEIR TEACHERS." SOCRATES
  • 2. KEEPING YOUR DEVICE SECURE • Find my IPad • Uses your apple ID • Laptops and androids use passwords and security log ins
  • 3.
  • 4. Double click the 'on' button to check their activity.
  • 5. Go into Safari History( open book icon).This shows the recent Internet activity.
  • 6. THE SETTINGS BUTTON • Settings is the key button • Putit on the application tray • Holdthe icon with your finger until they wobble • Drag down to tray
  • 8. SETTING RESTRICTIONS • Settings • >general • >Restrictions • >Enable restrictions • Enter a code
  • 9. Restrictions • Choose restrictions
  • 10. Parents choose the password • It might be an idea to let Mark or Linda know the password
  • 11. YOU CAN NOW SWITCH ON AND OFF SOME OF THE DEVICE'S FUNCTIONALITY
  • 12. Back up work to the iCloud
  • 13. BACK UP TO CLOUD Switch on the Things you want To back up ESP DOCUMENTS AND DATA
  • 14. LAPTOPS,NETBOOKS AND ANDROID You can use a thumb drive, an external hard drive or cloud based technology like drop box
  • 15. RESTRICTING THE USE OF THE INTERNET OR MONITORING IT'S USE • Down load MOBICIP from the app store or the internet( for laptops) • You will have to join the mobicip site(the basic level is free but the advanced features cost about $10 per year • Try the browser on the laptop make sure it works • Disable Safari on the iPad or Internet explorer on laptops • Or uninstall the program
  • 16.
  • 17.
  • 18.
  • 19. Discipline policy for all devices • This has been explained to all students: 1. In form class verbally and with a visual presentation 2. At numerous form assemblies 3. Teachable moments in subject classes 4. They all signed an IT agreement when they were enrolled into year 9.
  • 20. The policy: • All students should be fully engaged in every lesson. If they are off task with things like games, social networks like Facebook, Twitter or Tumblr, on Trade Me or any activity which is deemed to impinge negatively on their learning, the student will be banned from the Internet for one week. • This is documented on Kamar. • If this type of distraction is noted again, Mark or Linda will contact parents and an agreement is reached regarding the confiscation of the device. The time period is again a week. • The student is called in and the procedure is explained. All work missed at school must be caught up for homework.
  • 21. Why the week's confiscation? • It is more serious than a phone/ iPod. • It is not like a phone which is simply a distraction. • The device is integral to learning. Students need to learn to manage time and manage self. • The loss of the device affects not only work but also their social life. • Second offenses have included using someone else's login when the student has been excluded from the net.
  • 22. Facebook • It is a life skill that students need to learn: time and place. The time and place for Facebook is not in class. • It is a good idea to have your child as a 'friend' on your account. In this way you can monitor some of the activity AND the time posts and comments are made. • We have reminded students that anything sent to Facebook can be used as evidence, so they should post wisely. • They have also been reminded that they are leaving a traceable digital trail, not confined to FB.