SlideShare a Scribd company logo
1 of 8
Bring Your Own
Technology
BYOT
Grades 8-12
Device Use
   A device is defined as a small to medium sized
    portable computer, tablet, smart phone, iPod, etc.
    designed for mobile or portable computing.
   At all times, students’ use of personal technology is
    at the discretion of their classroom teacher or
    supervisor.
   Devices should be muted at all times to minimize
    disruption to the learning environment.
   During school peak hours (7:30AM – 3:30PM),
    students should avoid streaming or downloading
    of video or web content (over 250MB) unless
    required by a teacher’s lesson. This will be
    monitored.
Device Use
   Audio and/or video recording, as well as
    image capturing, is expressly forbidden unless
    approved by the classroom teacher. Any
    capture of audio, video, or image that
    violates an individual’s privacy is considered a
    violation of this agreement.
   A firewall with appropriate content filtration is
    in place to prevent access to certain social
    networking and “time-wasting” web content.
   Students are expected to adhere to the
    existing policy on tardiness and have devices
    put away per their next classroom teacher’s
    instructions.
Device Security, Power, and
Network Issues
   The student bears sole responsibility for the device while on
    campus or in transit to/from campus, including the loss of or
    damage to devices .
   School staff cannot be requested to assist with problems
    concerning personal devices.
   When not being used, devices must be stored in a secure
    location. Parents are responsible for ensuring that their
    household insurance policy offers adequate protection for
    the loss of or damage to the device since such claims
    cannot be made against school insurance, nor can the
    school be held liable for such claims.
   In the case of accidental damage caused by one student
    to the device of another student, the matter will not be
    investigated or mediated by the school and the families
    concerned will be asked to discuss the matter directly.
Device Security, Power, and
Network Issues
   Students will not attempt to connect to any school
    printers via their device.
   Each student is responsible for ensuring their
    device is adequately charged before coming to
    school each day.
   The student will not use the school’s resources to
    charge his/her computer’s battery except during
    study hall/homeroom time or in a computer lab.
   Students may connect to the Internet via Wi-Fi on
    the school’s guest network, STMAURXT. This
    network is for Internet access only, and WILL NOT
    allow devices to access networked school printers
    or data from the school’s network storage.
Conditions of Enrollment
in the BYOT
   Any student may be removed from personal device use at any
    time should he/she be considered to be in breach of the
    agreement or Parent/Student Handbook.
   Additional consequences up to and including expulsion may also
    be issued for violation of the contract in ways which negatively
    impact on the learning environment of others and/or which
    threaten to compromise the security of the school’s IT infrastructure.
   The Saint Maur Technology Department continuously monitors the
    school’s network traffic. Any device that is considered to be
    downloading an unreasonable amount of content, therefore using
    excessive amounts of network bandwidth, will be banned from the
    STMAURXT network for 24 hours. Repeat offenses may result in a
    permanent block of the device’s MAC address.
   NO HACKING! In the case that a student violates the contract by
    logging onto the protected school network, the family will be
    required to refund to the school costs of reasonable parts/labor
    concerned with the investigation into and repair of any
    compromise to the security of the school’s IT infrastructure. It is
    therefore absolutely essential that students do not attempt to
    connect to the protected school network under any circumstances.
Sign and Return BYOT

 Complete,  sign, and return the BYOT
 Agreement to your homeroom teachers
 prior to accessing the network.
How do I access the network?

 Network:   STMAURXT

 Password:   3ducation1#

More Related Content

What's hot

Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issuesqueenp1980
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Educationmwolfrey
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect
 
SLATE presentation by Jim Bouché Ed.S. Lakeland Union High School
SLATE presentation by Jim Bouché Ed.S. Lakeland Union High SchoolSLATE presentation by Jim Bouché Ed.S. Lakeland Union High School
SLATE presentation by Jim Bouché Ed.S. Lakeland Union High SchoolLakeland Union High School
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroommiarmenta
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issueslisadevine21
 
Aup presentation tomes
Aup presentation tomesAup presentation tomes
Aup presentation tomesrtomes
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreementPaula Naugle
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Paula Naugle
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 pptjenice
 

What's hot (19)

AUP
AUPAUP
AUP
 
AUP
AUPAUP
AUP
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issues
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Education
 
Aup
AupAup
Aup
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
SLATE presentation by Jim Bouché Ed.S. Lakeland Union High School
SLATE presentation by Jim Bouché Ed.S. Lakeland Union High SchoolSLATE presentation by Jim Bouché Ed.S. Lakeland Union High School
SLATE presentation by Jim Bouché Ed.S. Lakeland Union High School
 
Technology in the classroom
Technology in the classroomTechnology in the classroom
Technology in the classroom
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issues
 
Aup presentation tomes
Aup presentation tomesAup presentation tomes
Aup presentation tomes
 
AUP Student Edition 2011
AUP Student Edition 2011AUP Student Edition 2011
AUP Student Edition 2011
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement11.21.10 inventedemployeeuseagreement
11.21.10 inventedemployeeuseagreement
 
Invented jppss staffaupforetec630
Invented jppss staffaupforetec630Invented jppss staffaupforetec630
Invented jppss staffaupforetec630
 
Week 15 ppt eme2040
Week 15 ppt eme2040Week 15 ppt eme2040
Week 15 ppt eme2040
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Cooking up a storm paul haigh
Cooking up a storm paul haighCooking up a storm paul haigh
Cooking up a storm paul haigh
 
Major project 1 ppt
Major project 1 pptMajor project 1 ppt
Major project 1 ppt
 

Viewers also liked

Control kardiovaskular selama latihan imo
Control kardiovaskular selama latihan imoControl kardiovaskular selama latihan imo
Control kardiovaskular selama latihan imoImo Priyanto
 
Realizing Robust and Scalable Evolutionary Algorithms toward Exascale Era
Realizing Robust and Scalable Evolutionary Algorithms toward Exascale EraRealizing Robust and Scalable Evolutionary Algorithms toward Exascale Era
Realizing Robust and Scalable Evolutionary Algorithms toward Exascale EraMasaharu Munetomo
 
インタークラウドシステムの実用化に向けて
インタークラウドシステムの実用化に向けてインタークラウドシステムの実用化に向けて
インタークラウドシステムの実用化に向けてMasaharu Munetomo
 
研究者のためのアカデミックインタークラウド
研究者のためのアカデミックインタークラウド研究者のためのアカデミックインタークラウド
研究者のためのアカデミックインタークラウドMasaharu Munetomo
 
20110824弱小クラウド連合は大規模クラウドに勝てるか
20110824弱小クラウド連合は大規模クラウドに勝てるか20110824弱小クラウド連合は大規模クラウドに勝てるか
20110824弱小クラウド連合は大規模クラウドに勝てるかMasaharu Munetomo
 
研究支援に係るアカデミッククラウド システムの調査検討
研究支援に係るアカデミッククラウド システムの調査検討研究支援に係るアカデミッククラウド システムの調査検討
研究支援に係るアカデミッククラウド システムの調査検討Masaharu Munetomo
 
遺伝的アルゴリズムにおけるリンケージ同定
遺伝的アルゴリズムにおけるリンケージ同定遺伝的アルゴリズムにおけるリンケージ同定
遺伝的アルゴリズムにおけるリンケージ同定Masaharu Munetomo
 
Earth day ppt with sound for upload
Earth day ppt with sound for uploadEarth day ppt with sound for upload
Earth day ppt with sound for uploadSapthagiri R D
 
Komunikasi efektif (mkdu 2012)
Komunikasi efektif (mkdu 2012)Komunikasi efektif (mkdu 2012)
Komunikasi efektif (mkdu 2012)Imo Priyanto
 
Administrasi, manajemen dan orgnsai imo
Administrasi, manajemen dan orgnsai imoAdministrasi, manajemen dan orgnsai imo
Administrasi, manajemen dan orgnsai imoImo Priyanto
 
進化計算シンポジウム200712
進化計算シンポジウム200712進化計算シンポジウム200712
進化計算シンポジウム200712Masaharu Munetomo
 
Kalimat efektif (mkdu b.indo pertanian)
Kalimat efektif (mkdu b.indo pertanian)Kalimat efektif (mkdu b.indo pertanian)
Kalimat efektif (mkdu b.indo pertanian)Imo Priyanto
 
Bab6 kesetimbangan kimia
Bab6 kesetimbangan kimiaBab6 kesetimbangan kimia
Bab6 kesetimbangan kimiaImo Priyanto
 
Pengantar ekonomi makro
Pengantar ekonomi makroPengantar ekonomi makro
Pengantar ekonomi makroImo Priyanto
 
24.04.12 leitura-acessibilidade
24.04.12 leitura-acessibilidade24.04.12 leitura-acessibilidade
24.04.12 leitura-acessibilidadeEdilany Aguiar
 
ビッグデータ時代のアカデミッククラウド
ビッグデータ時代のアカデミッククラウドビッグデータ時代のアカデミッククラウド
ビッグデータ時代のアカデミッククラウドMasaharu Munetomo
 

Viewers also liked (19)

Mix
MixMix
Mix
 
Mix
MixMix
Mix
 
Control kardiovaskular selama latihan imo
Control kardiovaskular selama latihan imoControl kardiovaskular selama latihan imo
Control kardiovaskular selama latihan imo
 
Realizing Robust and Scalable Evolutionary Algorithms toward Exascale Era
Realizing Robust and Scalable Evolutionary Algorithms toward Exascale EraRealizing Robust and Scalable Evolutionary Algorithms toward Exascale Era
Realizing Robust and Scalable Evolutionary Algorithms toward Exascale Era
 
インタークラウドシステムの実用化に向けて
インタークラウドシステムの実用化に向けてインタークラウドシステムの実用化に向けて
インタークラウドシステムの実用化に向けて
 
研究者のためのアカデミックインタークラウド
研究者のためのアカデミックインタークラウド研究者のためのアカデミックインタークラウド
研究者のためのアカデミックインタークラウド
 
20110824弱小クラウド連合は大規模クラウドに勝てるか
20110824弱小クラウド連合は大規模クラウドに勝てるか20110824弱小クラウド連合は大規模クラウドに勝てるか
20110824弱小クラウド連合は大規模クラウドに勝てるか
 
研究支援に係るアカデミッククラウド システムの調査検討
研究支援に係るアカデミッククラウド システムの調査検討研究支援に係るアカデミッククラウド システムの調査検討
研究支援に係るアカデミッククラウド システムの調査検討
 
遺伝的アルゴリズムにおけるリンケージ同定
遺伝的アルゴリズムにおけるリンケージ同定遺伝的アルゴリズムにおけるリンケージ同定
遺伝的アルゴリズムにおけるリンケージ同定
 
Earth day ppt with sound for upload
Earth day ppt with sound for uploadEarth day ppt with sound for upload
Earth day ppt with sound for upload
 
Komunikasi efektif (mkdu 2012)
Komunikasi efektif (mkdu 2012)Komunikasi efektif (mkdu 2012)
Komunikasi efektif (mkdu 2012)
 
Administrasi, manajemen dan orgnsai imo
Administrasi, manajemen dan orgnsai imoAdministrasi, manajemen dan orgnsai imo
Administrasi, manajemen dan orgnsai imo
 
Bab8 elektrokimia
Bab8 elektrokimiaBab8 elektrokimia
Bab8 elektrokimia
 
進化計算シンポジウム200712
進化計算シンポジウム200712進化計算シンポジウム200712
進化計算シンポジウム200712
 
Kalimat efektif (mkdu b.indo pertanian)
Kalimat efektif (mkdu b.indo pertanian)Kalimat efektif (mkdu b.indo pertanian)
Kalimat efektif (mkdu b.indo pertanian)
 
Bab6 kesetimbangan kimia
Bab6 kesetimbangan kimiaBab6 kesetimbangan kimia
Bab6 kesetimbangan kimia
 
Pengantar ekonomi makro
Pengantar ekonomi makroPengantar ekonomi makro
Pengantar ekonomi makro
 
24.04.12 leitura-acessibilidade
24.04.12 leitura-acessibilidade24.04.12 leitura-acessibilidade
24.04.12 leitura-acessibilidade
 
ビッグデータ時代のアカデミッククラウド
ビッグデータ時代のアカデミッククラウドビッグデータ時代のアカデミッククラウド
ビッグデータ時代のアカデミッククラウド
 

Similar to Saint Maur Gr. 8-12 Bring Your Own Technology

BYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade ReadingBYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade ReadingTuPham99
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013Carlos Fernandez
 
Security
SecuritySecurity
SecurityNabatah
 
Fcpsbyodaup
FcpsbyodaupFcpsbyodaup
Fcpsbyodaupmclardy
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptarhodes
 
Safety Presentation
Safety PresentationSafety Presentation
Safety PresentationSarah Sutter
 
Social media policy
Social media policySocial media policy
Social media policyHar1982
 
Parent der 2013_handout
Parent der 2013_handoutParent der 2013_handout
Parent der 2013_handoutdcooper2234
 
Safety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxSafety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxZaideMangondato1
 
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJovenLopez1
 
Training for students byod fall 2014
Training for students byod fall 2014Training for students byod fall 2014
Training for students byod fall 2014lmalm86
 
Sally Gazaway- B.Y.O.D
Sally Gazaway- B.Y.O.DSally Gazaway- B.Y.O.D
Sally Gazaway- B.Y.O.DSally Gazaway
 
Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008JulieRen141
 

Similar to Saint Maur Gr. 8-12 Bring Your Own Technology (20)

BYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade ReadingBYOD/BYOT Implementation Plan for 3rd Grade Reading
BYOD/BYOT Implementation Plan for 3rd Grade Reading
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Security
SecuritySecurity
Security
 
Laptop Training Revised
Laptop Training RevisedLaptop Training Revised
Laptop Training Revised
 
Fcpsbyodaup
FcpsbyodaupFcpsbyodaup
Fcpsbyodaup
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
AUP
AUPAUP
AUP
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting ppt
 
2015 parent presentation yr 7 12 slideshare
2015 parent presentation yr 7   12 slideshare2015 parent presentation yr 7   12 slideshare
2015 parent presentation yr 7 12 slideshare
 
Parent and student acceptance form 2
Parent and student acceptance form  2 Parent and student acceptance form  2
Parent and student acceptance form 2
 
Safety Presentation
Safety PresentationSafety Presentation
Safety Presentation
 
Social media policy
Social media policySocial media policy
Social media policy
 
Responsible Use Presentation
Responsible Use PresentationResponsible Use Presentation
Responsible Use Presentation
 
TUA Overview
TUA OverviewTUA Overview
TUA Overview
 
Parent der 2013_handout
Parent der 2013_handoutParent der 2013_handout
Parent der 2013_handout
 
Safety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxSafety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptx
 
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
 
Training for students byod fall 2014
Training for students byod fall 2014Training for students byod fall 2014
Training for students byod fall 2014
 
Sally Gazaway- B.Y.O.D
Sally Gazaway- B.Y.O.DSally Gazaway- B.Y.O.D
Sally Gazaway- B.Y.O.D
 
Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008Computer use slideshow 3 5 final 2008
Computer use slideshow 3 5 final 2008
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Saint Maur Gr. 8-12 Bring Your Own Technology

  • 2. Device Use  A device is defined as a small to medium sized portable computer, tablet, smart phone, iPod, etc. designed for mobile or portable computing.  At all times, students’ use of personal technology is at the discretion of their classroom teacher or supervisor.  Devices should be muted at all times to minimize disruption to the learning environment.  During school peak hours (7:30AM – 3:30PM), students should avoid streaming or downloading of video or web content (over 250MB) unless required by a teacher’s lesson. This will be monitored.
  • 3. Device Use  Audio and/or video recording, as well as image capturing, is expressly forbidden unless approved by the classroom teacher. Any capture of audio, video, or image that violates an individual’s privacy is considered a violation of this agreement.  A firewall with appropriate content filtration is in place to prevent access to certain social networking and “time-wasting” web content.  Students are expected to adhere to the existing policy on tardiness and have devices put away per their next classroom teacher’s instructions.
  • 4. Device Security, Power, and Network Issues  The student bears sole responsibility for the device while on campus or in transit to/from campus, including the loss of or damage to devices .  School staff cannot be requested to assist with problems concerning personal devices.  When not being used, devices must be stored in a secure location. Parents are responsible for ensuring that their household insurance policy offers adequate protection for the loss of or damage to the device since such claims cannot be made against school insurance, nor can the school be held liable for such claims.  In the case of accidental damage caused by one student to the device of another student, the matter will not be investigated or mediated by the school and the families concerned will be asked to discuss the matter directly.
  • 5. Device Security, Power, and Network Issues  Students will not attempt to connect to any school printers via their device.  Each student is responsible for ensuring their device is adequately charged before coming to school each day.  The student will not use the school’s resources to charge his/her computer’s battery except during study hall/homeroom time or in a computer lab.  Students may connect to the Internet via Wi-Fi on the school’s guest network, STMAURXT. This network is for Internet access only, and WILL NOT allow devices to access networked school printers or data from the school’s network storage.
  • 6. Conditions of Enrollment in the BYOT  Any student may be removed from personal device use at any time should he/she be considered to be in breach of the agreement or Parent/Student Handbook.  Additional consequences up to and including expulsion may also be issued for violation of the contract in ways which negatively impact on the learning environment of others and/or which threaten to compromise the security of the school’s IT infrastructure.  The Saint Maur Technology Department continuously monitors the school’s network traffic. Any device that is considered to be downloading an unreasonable amount of content, therefore using excessive amounts of network bandwidth, will be banned from the STMAURXT network for 24 hours. Repeat offenses may result in a permanent block of the device’s MAC address.  NO HACKING! In the case that a student violates the contract by logging onto the protected school network, the family will be required to refund to the school costs of reasonable parts/labor concerned with the investigation into and repair of any compromise to the security of the school’s IT infrastructure. It is therefore absolutely essential that students do not attempt to connect to the protected school network under any circumstances.
  • 7. Sign and Return BYOT  Complete, sign, and return the BYOT Agreement to your homeroom teachers prior to accessing the network.
  • 8. How do I access the network?  Network: STMAURXT  Password: 3ducation1#