SlideShare a Scribd company logo
1 of 12
BYOD/BYOT
IMPLEMENTATION PLAN FOR
3RD GRADE READING
Tu Pham
Candler County BYOT Policy
For purposes of BYOT, “technology” means a privately owned wireless
and/or portable electronic hand held equipment that includes, but is not
limited to, existing and emerging mobile communication systems and
smart technologies, laptops, netbooks, portable Internet devices, hand
held entertainment systems or portable information technology systems
that can be used for word processing, wireless Internet access, image
capture/recording, sound recording and information
transmitting/receiving/storing, etc.
Candler County BYOT Policy
Internet
Only the Internet gateway provided by the school may be accessed while on campus. Personal
Internet connective devices, such as, but not limited to, cell phones /cell network adapters are not
permitted to be used to access outside Internet sources at any time while a student is using
technology at school.
Security and Damages
Responsibility to keep the device secure rests with the individual owner. CCSD is not liable for any
device stolen or damages to it on campus. If a device is stolen or damaged, it will be handled
through the administrative office similar to other personal artifacts that are impacted in similar
situations. It is recommended that skins(decals) and other custom touches are used to physically
identify your device from others. Additionally, protective cases for technology are encouraged.
If you bring it, you are responsible.
Candler County BYOT Policy
Student Agreement
The use of technology to provide educational material is not a necessity but a privilege. A student does not have the
right to use his or her laptop, cell phone or other electronic device while at school during unapproved times. When
abused, privileges will be taken away. When respected, they will benefit the learning environment as a whole.
Students and parents/guardians participating in BYOT must adhere to the Student Code of Conduct, as well as all
Board policies, particularly Internet Acceptable Use (Policy IFBG) and Internet Safety (Policy IFBGE). Furthermore, the
student must agree to the following conditions:
● The student takes full responsibility for his or her technology device. The school is not responsible for the security
of student-owned technology.
● The technology must be in silent mode or used with earphones/earbuds while on school campuses and while
riding school buses.
● The technology may not be used to cheat on assignments or tests or for non-instructional purposes unless
approved by the classroom teacher during their class only.
● The student accesses only files on the computer or Internet sites which are relevant to the classroom curriculum.
● The student complies with a teacher’s request to shut down the technology or close the screen.
Candler County BYOT Policy
Student Agreement continued
● The student acknowledges that the school’s network filters will be applied to one’s connection to the Internet and
will not attempt to bypass them.
● The student understands that bringing on the school premises or infecting the network with a Virus, Trojan, or
program designed to damage, alter, destroy, or provide access to unauthorized data or information is in violation of
the AUP and will result in disciplinary actions.
● The student realizes that processing or accessing information on school property related to ”hacking”, altering, or
bypassing network security policies is in violation of the AUP and will result in disciplinary actions.
● The school district has the right to collect and examine any device that is suspected of causing problems or was the
source of an attack or virus infection.
● The student realizes that printing from personal technology devices will not be possible at school.
● The student understands that at no time may they record audio or video unless they are instructed to do so nor are
they allowed to upload any unauthorized audio/video to the internet.
● The student understands that any personal technology brought to school is prohibited from having inappropriate
material on the technology. This inappropriate material may include, but is not limited to, pictures/games/videos, etc.
including sexual content, nudity, illegal drugs/drug paraphernalia, or inappropriate language.
Candler County BYOT Policy
Consequences
Failure to comply with this policy will be viewed as insubordination and will result in appropriate
disciplinary action.
● 1st offense: Device confiscated - Parent/Guardian retrieves that afternoon
● 2nd offense and ensuing infractions: Device confiscated for 1 week and must be retrieved by
Parent/Guardian
The School Administrator will have full discretion on the disciplinary actions for all offenses.
https://drive.google.com/file/d/0B2aC3tRjdITVUC1PalA1MkVBcnNwU1htOTN6Yy04SGpLa1ln/vie
w
Platform
◦ Our school has a network configuration that is suitable for multiple
platforms.
◦ All of our desktop computers are Windows.
◦ Each teacher has a personal Apple iPad, and our school has an iPad cart
that students can use to check out iPads for the day.
◦ Each grade level has a Chromebook Cart that we can sign up for when
needed.
◦ So our network is compatible with Windows, Apple, and Google
devices.
Students without Devices
◦ There are many resources in my school that support students
who are unable to bring their own devices.
◦ Each classroom has six desktop computers for the students to
use.
◦ We have Chromebook and iPad carts for students to use.
◦ The students could also share technology with other
students.
Grouping Students
◦ I will group students together based on the activity we are doing.
◦ The students will most likely be using their devices individually, with a
partner, or at most with three other students.
◦ The majority of the time, I will allow the students to use their devices
individually.
◦ However, the devices will most likely be a part of center rotations within
the classroom.
◦ This will allow me to monitor only a small group of devices at a time.
Apps for 3rd Grade Reading
◦ Complete Fairytale Play Theatre – allows students to narrate their
own versions of classic tales
◦ Learn with Homer – phonics program
◦ Meegenius – ebook library
◦ Pixie – allows students to create their own digital stories
◦ Bookworm – helps students create words with certain letters
◦ Caster: Mobile Studio – students can create podcasts to share their
knowledge
◦ Idioms – gives examples of English idioms and explains what they
mean
◦ Shake-a-Phrase – builds vocabulary, teaches parts of speech, and
has creative story starters
References
American Association of Schools Librarians. (2018). Best Apps for Teaching & Learning 2018.
Retrieved from https://standards.aasl.org/project/ba18/
Instructional Technology Integration Partnership of Ohio. (n.d.). Curriculum app reviews–
Language arts (K-6).Retreived from
https://sites.google.com/a/itipohio.org/itip/resources/curriculum-app-
reviews/language-arts-k-6
iPad Educators (n.d.) Apps for Reading. Retrieved from
http://www.ipadeducators.com/reading
Metter Elementary School. (2017). Student Handbook [PDF document]. Retrieved from
https://drive.google.com/file/d/0B2aC3tRjdITVUC1PalA1MkVBcnNwU1htOTN6Yy
04SGpLa1ln/view

More Related Content

What's hot

Lori's ETEC 442 Tech Timeline
Lori's ETEC 442 Tech TimelineLori's ETEC 442 Tech Timeline
Lori's ETEC 442 Tech Timelinelorinaka555
 
Fcpsbyodaup
FcpsbyodaupFcpsbyodaup
Fcpsbyodaupmclardy
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawChristina Gagnier
 
Timeline from wonguk
Timeline from wongukTimeline from wonguk
Timeline from wongukWonguk Cho
 
Osamupresentation
OsamupresentationOsamupresentation
OsamupresentationOsaOno
 
ChrisMTimeline
ChrisMTimelineChrisMTimeline
ChrisMTimelinelostboi118
 
Etec442 Michelle Lai
Etec442 Michelle LaiEtec442 Michelle Lai
Etec442 Michelle LaiMichelle Lai
 
/Volumes/Brittney/Etec 442/Brittney K Tech&Me
/Volumes/Brittney/Etec 442/Brittney K Tech&Me/Volumes/Brittney/Etec 442/Brittney K Tech&Me
/Volumes/Brittney/Etec 442/Brittney K Tech&Mebrittk
 
Tech. ppt new
Tech. ppt newTech. ppt new
Tech. ppt newjenice
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 pptboone1
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 pptjenice
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 pptjenice
 
Major project 1 ppt new
Major project 1 ppt newMajor project 1 ppt new
Major project 1 ppt newjenice
 
ETEC 442 class
ETEC 442 classETEC 442 class
ETEC 442 classchungang
 
Mobile Technology, Mobile Learning
Mobile Technology, Mobile LearningMobile Technology, Mobile Learning
Mobile Technology, Mobile LearningMark Marshall
 
2012 2013 laptop parent night presentation
2012 2013 laptop parent night presentation2012 2013 laptop parent night presentation
2012 2013 laptop parent night presentationSabrina Norman
 

What's hot (20)

Lori's ETEC 442 Tech Timeline
Lori's ETEC 442 Tech TimelineLori's ETEC 442 Tech Timeline
Lori's ETEC 442 Tech Timeline
 
Fcpsbyodaup
FcpsbyodaupFcpsbyodaup
Fcpsbyodaup
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
 
Timeline from wonguk
Timeline from wongukTimeline from wonguk
Timeline from wonguk
 
Osamupresentation
OsamupresentationOsamupresentation
Osamupresentation
 
ChrisMTimeline
ChrisMTimelineChrisMTimeline
ChrisMTimeline
 
Etec442 Michelle Lai
Etec442 Michelle LaiEtec442 Michelle Lai
Etec442 Michelle Lai
 
Renee technology
Renee technologyRenee technology
Renee technology
 
Info i practice aq
Info i practice aqInfo i practice aq
Info i practice aq
 
/Volumes/Brittney/Etec 442/Brittney K Tech&Me
/Volumes/Brittney/Etec 442/Brittney K Tech&Me/Volumes/Brittney/Etec 442/Brittney K Tech&Me
/Volumes/Brittney/Etec 442/Brittney K Tech&Me
 
Tech. ppt new
Tech. ppt newTech. ppt new
Tech. ppt new
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 
Major project 1 ppt new
Major project 1 ppt newMajor project 1 ppt new
Major project 1 ppt new
 
Renee's Timeline
Renee's TimelineRenee's Timeline
Renee's Timeline
 
ETEC 442 class
ETEC 442 classETEC 442 class
ETEC 442 class
 
Mobile Technology, Mobile Learning
Mobile Technology, Mobile LearningMobile Technology, Mobile Learning
Mobile Technology, Mobile Learning
 
Lalala
LalalaLalala
Lalala
 
2012 2013 laptop parent night presentation
2012 2013 laptop parent night presentation2012 2013 laptop parent night presentation
2012 2013 laptop parent night presentation
 

Similar to BYOD/BYOT Implementation Plan for 3rd Grade Reading

Saint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own TechnologySaint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own Technologytcitrano
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbookJG4191
 
Cooking up a storm paul haigh
Cooking up a storm paul haighCooking up a storm paul haigh
Cooking up a storm paul haighTheresa Beattie
 
Training for students byod fall 2014
Training for students byod fall 2014Training for students byod fall 2014
Training for students byod fall 2014lmalm86
 
Training for Students: BYOD fall 2014
Training for Students: BYOD fall 2014Training for Students: BYOD fall 2014
Training for Students: BYOD fall 2014lmalm86
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2guest594ea
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 
Back to school night 2016 slideshare
Back to school night 2016 slideshareBack to school night 2016 slideshare
Back to school night 2016 slideshareccantlie
 
BYOD Implementation Plan
BYOD Implementation Plan BYOD Implementation Plan
BYOD Implementation Plan mleanne93
 
AAL and BYOD in Mid Calder Primary
AAL and BYOD in Mid Calder PrimaryAAL and BYOD in Mid Calder Primary
AAL and BYOD in Mid Calder PrimaryMiss Sherlow
 
AAL and BYOD parent information
AAL and BYOD parent informationAAL and BYOD parent information
AAL and BYOD parent informationmidcps
 
Parent der 2013_handout
Parent der 2013_handoutParent der 2013_handout
Parent der 2013_handoutdcooper2234
 
Fairmont Focus 16: 21 May 2015
Fairmont Focus 16: 21 May 2015Fairmont Focus 16: 21 May 2015
Fairmont Focus 16: 21 May 2015Elize Crouse
 

Similar to BYOD/BYOT Implementation Plan for 3rd Grade Reading (20)

CES BYOT Agreement
CES BYOT AgreementCES BYOT Agreement
CES BYOT Agreement
 
Saint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own TechnologySaint Maur Gr. 8-12 Bring Your Own Technology
Saint Maur Gr. 8-12 Bring Your Own Technology
 
Aup
AupAup
Aup
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbook
 
BYOD/BYOT
BYOD/BYOTBYOD/BYOT
BYOD/BYOT
 
Cooking up a storm paul haigh
Cooking up a storm paul haighCooking up a storm paul haigh
Cooking up a storm paul haigh
 
Cooking up a storm paul haigh
Cooking up a storm paul haighCooking up a storm paul haigh
Cooking up a storm paul haigh
 
Training for students byod fall 2014
Training for students byod fall 2014Training for students byod fall 2014
Training for students byod fall 2014
 
Training for Students: BYOD fall 2014
Training for Students: BYOD fall 2014Training for Students: BYOD fall 2014
Training for Students: BYOD fall 2014
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2
 
2015 parent presentation yr 7 12 slideshare
2015 parent presentation yr 7   12 slideshare2015 parent presentation yr 7   12 slideshare
2015 parent presentation yr 7 12 slideshare
 
2014 15 byod
2014 15 byod2014 15 byod
2014 15 byod
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
Back to school night 2016 slideshare
Back to school night 2016 slideshareBack to school night 2016 slideshare
Back to school night 2016 slideshare
 
BYOD Implementation Plan
BYOD Implementation Plan BYOD Implementation Plan
BYOD Implementation Plan
 
AAL and BYOD in Mid Calder Primary
AAL and BYOD in Mid Calder PrimaryAAL and BYOD in Mid Calder Primary
AAL and BYOD in Mid Calder Primary
 
AAL and BYOD parent information
AAL and BYOD parent informationAAL and BYOD parent information
AAL and BYOD parent information
 
Parent der 2013_handout
Parent der 2013_handoutParent der 2013_handout
Parent der 2013_handout
 
Fairmont Focus 16: 21 May 2015
Fairmont Focus 16: 21 May 2015Fairmont Focus 16: 21 May 2015
Fairmont Focus 16: 21 May 2015
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

BYOD/BYOT Implementation Plan for 3rd Grade Reading

  • 2.
  • 3. Candler County BYOT Policy For purposes of BYOT, “technology” means a privately owned wireless and/or portable electronic hand held equipment that includes, but is not limited to, existing and emerging mobile communication systems and smart technologies, laptops, netbooks, portable Internet devices, hand held entertainment systems or portable information technology systems that can be used for word processing, wireless Internet access, image capture/recording, sound recording and information transmitting/receiving/storing, etc.
  • 4. Candler County BYOT Policy Internet Only the Internet gateway provided by the school may be accessed while on campus. Personal Internet connective devices, such as, but not limited to, cell phones /cell network adapters are not permitted to be used to access outside Internet sources at any time while a student is using technology at school. Security and Damages Responsibility to keep the device secure rests with the individual owner. CCSD is not liable for any device stolen or damages to it on campus. If a device is stolen or damaged, it will be handled through the administrative office similar to other personal artifacts that are impacted in similar situations. It is recommended that skins(decals) and other custom touches are used to physically identify your device from others. Additionally, protective cases for technology are encouraged. If you bring it, you are responsible.
  • 5. Candler County BYOT Policy Student Agreement The use of technology to provide educational material is not a necessity but a privilege. A student does not have the right to use his or her laptop, cell phone or other electronic device while at school during unapproved times. When abused, privileges will be taken away. When respected, they will benefit the learning environment as a whole. Students and parents/guardians participating in BYOT must adhere to the Student Code of Conduct, as well as all Board policies, particularly Internet Acceptable Use (Policy IFBG) and Internet Safety (Policy IFBGE). Furthermore, the student must agree to the following conditions: ● The student takes full responsibility for his or her technology device. The school is not responsible for the security of student-owned technology. ● The technology must be in silent mode or used with earphones/earbuds while on school campuses and while riding school buses. ● The technology may not be used to cheat on assignments or tests or for non-instructional purposes unless approved by the classroom teacher during their class only. ● The student accesses only files on the computer or Internet sites which are relevant to the classroom curriculum. ● The student complies with a teacher’s request to shut down the technology or close the screen.
  • 6. Candler County BYOT Policy Student Agreement continued ● The student acknowledges that the school’s network filters will be applied to one’s connection to the Internet and will not attempt to bypass them. ● The student understands that bringing on the school premises or infecting the network with a Virus, Trojan, or program designed to damage, alter, destroy, or provide access to unauthorized data or information is in violation of the AUP and will result in disciplinary actions. ● The student realizes that processing or accessing information on school property related to ”hacking”, altering, or bypassing network security policies is in violation of the AUP and will result in disciplinary actions. ● The school district has the right to collect and examine any device that is suspected of causing problems or was the source of an attack or virus infection. ● The student realizes that printing from personal technology devices will not be possible at school. ● The student understands that at no time may they record audio or video unless they are instructed to do so nor are they allowed to upload any unauthorized audio/video to the internet. ● The student understands that any personal technology brought to school is prohibited from having inappropriate material on the technology. This inappropriate material may include, but is not limited to, pictures/games/videos, etc. including sexual content, nudity, illegal drugs/drug paraphernalia, or inappropriate language.
  • 7. Candler County BYOT Policy Consequences Failure to comply with this policy will be viewed as insubordination and will result in appropriate disciplinary action. ● 1st offense: Device confiscated - Parent/Guardian retrieves that afternoon ● 2nd offense and ensuing infractions: Device confiscated for 1 week and must be retrieved by Parent/Guardian The School Administrator will have full discretion on the disciplinary actions for all offenses. https://drive.google.com/file/d/0B2aC3tRjdITVUC1PalA1MkVBcnNwU1htOTN6Yy04SGpLa1ln/vie w
  • 8. Platform ◦ Our school has a network configuration that is suitable for multiple platforms. ◦ All of our desktop computers are Windows. ◦ Each teacher has a personal Apple iPad, and our school has an iPad cart that students can use to check out iPads for the day. ◦ Each grade level has a Chromebook Cart that we can sign up for when needed. ◦ So our network is compatible with Windows, Apple, and Google devices.
  • 9. Students without Devices ◦ There are many resources in my school that support students who are unable to bring their own devices. ◦ Each classroom has six desktop computers for the students to use. ◦ We have Chromebook and iPad carts for students to use. ◦ The students could also share technology with other students.
  • 10. Grouping Students ◦ I will group students together based on the activity we are doing. ◦ The students will most likely be using their devices individually, with a partner, or at most with three other students. ◦ The majority of the time, I will allow the students to use their devices individually. ◦ However, the devices will most likely be a part of center rotations within the classroom. ◦ This will allow me to monitor only a small group of devices at a time.
  • 11. Apps for 3rd Grade Reading ◦ Complete Fairytale Play Theatre – allows students to narrate their own versions of classic tales ◦ Learn with Homer – phonics program ◦ Meegenius – ebook library ◦ Pixie – allows students to create their own digital stories ◦ Bookworm – helps students create words with certain letters ◦ Caster: Mobile Studio – students can create podcasts to share their knowledge ◦ Idioms – gives examples of English idioms and explains what they mean ◦ Shake-a-Phrase – builds vocabulary, teaches parts of speech, and has creative story starters
  • 12. References American Association of Schools Librarians. (2018). Best Apps for Teaching & Learning 2018. Retrieved from https://standards.aasl.org/project/ba18/ Instructional Technology Integration Partnership of Ohio. (n.d.). Curriculum app reviews– Language arts (K-6).Retreived from https://sites.google.com/a/itipohio.org/itip/resources/curriculum-app- reviews/language-arts-k-6 iPad Educators (n.d.) Apps for Reading. Retrieved from http://www.ipadeducators.com/reading Metter Elementary School. (2017). Student Handbook [PDF document]. Retrieved from https://drive.google.com/file/d/0B2aC3tRjdITVUC1PalA1MkVBcnNwU1htOTN6Yy 04SGpLa1ln/view