Director of Technology
Chromebook Care and Use Guide
- Students are responsible for the general care of the Chromebook they are using.
- Always be on the alert for suspicious emails or websites that contain links or ask for personal information such as name, date of birth or passwords.
- Take care of the Chromebook by protecting it from extreme hot and cold temperatures.
- Keep food and beverages away from the device.
- Transport the device safely from place to place(never carry the Chromebook while the screen is open).
- Cords, cables and removable devices should be inserted carefully into the Chromebook.
- Do not loan the device to other individuals.
- Do not leave the device unattended or in an unsecure location.
- Do not place decorations(such as stickers, markers, etc.) on the device or protective case.
- The device and usage is subject to inspection upon return.
- Do not lean on the top of the Chromebook when it is closed.
- Do not place anything on the keyboard before closing the lid (e.g. pens or pencils, flash drives, etc.)
- Clean the screen with a soft dry cloth (do not use cleaner).
- Store your files in Google Drive using your school gmail account.
- Do not use or install any software or operating systems on the device other than what is currently on there.
- Do not remove any school identification labels on the device.
Approved by Medford School Committee March 6, 2019
- Internet, shared network resources and external file storage devices
- Desktop, mobile computers, tablets and handheld devices including mobile phones/cameras
- Videoconferencing, televisions, projection systems and telephones
- Online collaboration, social media, and email
- Copiers, printers and peripheral equipment
- Additional technologies as developed
This policy outlines the guidelines and behaviors that all users are expected to follow when using technology. It is the responsibility of both Medford Public Schools and parents to help prepare students to be responsible members of a digital society and digital citizens that:
- Understands human, cultural, and societal issues related to technology and practice legal and ethical behavior.
- Advocates and practice safe, legal, and responsible use of information and technology.
- Exhibits a positive attitude toward using technology that supports collaboration, learning, and productivity.
- Demonstrates personal responsibility for lifelong learning.
- Exhibits leadership for digital citizenship.
Policies, guidelines and rules refer to all computing devices including but not limited to computers, mobile web enabled devices, iPads, MP3 players, portable memory storage devices, calculators with interfacing capability, cell phones or electronic communication devices, digital cameras, etc., as well as technology infrastructure, associated peripheral devices and/or software that access the Medford Public Schools internet/computer network; and all computers and devices owned by the Medford Public Schools.
Unacceptable uses of school electronic resources include, but are not limited to:
- Accessing or Communicating Inappropriate Materials–Users may not access, submit, post, publish, forward, download, scan or display defamatory, abusive, obscene, vulgar, sexually explicit, sexually suggestive, threatening, discriminatory, harassing, bullying and/or illegal materials or messages.
- Illegal Activities– Users may not use the school district’s computers, electronic devices, networks, or Internet services for any illegal activity or in violation of any school district policy/procedure or rules. Medford Public Schools and its employees and agents assume no responsibility for illegal activities of users while using school computers or school-issued electronic resources.
- Violating Copyrights or Software Licenses– Downloading, copying, duplicating and distributing software, music, sound files, movies, images or other copyrighted materials without the specific written permission of the copyright owner is prohibited, except when the use falls within the Fair Use Doctrine of the United States Copyright Law (Title 17, USC) and content is cited appropriately.
- Plagiarism– Users may not represent as their own work any materials obtained on the Internet (such as term papers, articles, music, etc.). When using other sources, credit must be given to the copyright holder. Users should not take credit for things they didn’t create themselves, or misrepresent themselves as an author or creator of something found online. Research conducted via the Internet should be appropriately cited, giving credit to the original author.
- Cyberbullying– Cyberbullying will not be tolerated. Harassing, denigrating, impersonating, and cyberstalking are all examples of cyberbullying. Do not send emails or post comments with the intent of scaring, hurting, or intimidating others. Engaging in these behaviors, or any online activities intended to harm (physically or emotionally) another person, will result in severe disciplinary action and loss of privileges. In some cases, cyberbullying can be a crime.
- Misuse of Passwords/Unauthorized Access– Users may not share passwords; use any user account/password that is not assigned to them; or attempt to circumvent network security systems.
- Malicious Use/Vandalism– Users may not engage in any malicious use, disruption or harm to the school district’s computers, electronic devices, network and Internet services, including but not limited to hacking activities and creation/uploading of computer viruses.
- Avoiding School Filters– Users may not attempt to use any software, utilities or other means to access Internet sites or content blocked by the school filters.
- Unauthorized Access to Blogs/Social Networking Sites, Etc.– Users may not access blogs, social networking sites, etc. prohibited by school administration or the Technology Department. Teachers and students using authorized social networking sites for educational projects or activities shall follow the age requirements and legal requirements that govern the use of social networking sites in addition to the guidelines established in this policy.
- Degrade System Resources– Users shall not use the network in such a way that would degrade the performance system resources or disrupt the use of the network by others. This includes but is not limited to excessive printing, file storage, online games, and video/audio streaming not directly related to educational projects, as determined by the supervising instructor or school administrator.
- Unauthorized Equipment– Users may not attach unauthorized equipment, including personal laptops, tablets, and handheld devices, to the district network without permission from the school administration or the Technology Department.
All computers, telephone systems, voice mail systems, electronic mail, and electronic communication systems are the district’s property. The district retains the right to access and review all electronic and voice mail, computer files, databases, and any other electronic transmissions contained in or used in conjunction with district’s computer, telephone, electronic mail, and voice mail. Students and staff should have no expectation that any information contained on such systems is confidential or private.
- All users are given accounts upon entry into Medford Public Schools. Any user account given is intended for the sole use of that user only. Each user is responsible for the security of the system. Passwords should not be shared. If a user shares a password with another, that user will be held accountable.
- Users may not reveal personal information, including a home address and phone number, about themselves or another individual on any unsecured electronic medium, such as web sites, blogs, podcasts, videos, wikis, or social networking sites. If users encounter dangerous or inappropriate information or messages, they shall notify the school administration immediately.
- Using electronic devices to make video/sound recordings or digital images of others without the consent of those being recorded is strictly prohibited. Restrictions against inappropriate language apply to all communication throughout the district network, including but not limited to public messages, private messages, and material posted on web pages. The use of cameras in any type of electronic device is strictly prohibited in locker rooms and restrooms.
- School staff must maintain the confidentiality of student data in accordance with the Family Education Rights and Privacy Act (FERPA).
- Students may be issued a school email address to improve student communication and collaboration on school projects. Email shall be used only for educational purposes that directly relates to a school project or assignment.
Users may be responsible for compensating the school district for any losses, costs or damages incurred for violations of Board policies/procedures and school rules, including the cost of investigating such violations. The school district assumes no responsibility for any unauthorized charges or costs incurred by users while using school district computers, devices, or the school network.
Medford Public Schools reserves the right to deny, revoke or suspend specific user privileges and/or take other disciplinary action, including suspensions or expulsion from school, for violations of this policy. District and technology administration reserves the right to examine, use and disclose any data found the district network and or equipment in order to further the health, safety, discipline or security of the school community. Additionally, all handbook regulations apply to the use of the district network, Internet, and electronic resources.
Medford Public Schools, its employees and agents, make no warranties of any kind, neither expressed nor implied, concerning the network, Internet access, and electronic resources it is providing. Furthermore, the district is not responsible for:
- The accuracy, nature, quality, or privacy of information stored on local servers or devices or information gathered through Internet access.
- Any damages suffered by a user (whether the cause is accidental or not) including but not limited to, loss of data, delays or interruptions in service, and the infection of viruses or other malware on personal computers or other devices.
- Unauthorized financial obligations resulting from the use of MPS electronic resources.
Acceptance and Compliance of the Responsible Use Policy
Examples of Responsible Use
- Use school technologies for school-related activities.
- Follow the same guidelines for respectful, responsible behavior online that I am expected to follow offline. Be courteous and respectful.
- Not post any information that I would not want students, parents, teachers, or future colleges or employers to see (once something is online, it is available to the world).
- Treat school resources carefully, and alert staff if there is any problem with their operation.
- Encourage positive, constructive discussion if allowed to use communicative or collaborative technologies.
- Alert a teacher or other staff member if I see threatening, inappropriate, or harmful content (images, messages, and posts) online.
- Use school technologies at appropriate times and in approved places, for educational pursuits.
- Cite sources when using online sites and resources for research.
- Recognize that use of school technologies is a privilege and treat it as such.
- Be cautious to protect the safety of others and myself.
- Help to protect the security of school resources.
Examples of Unacceptable Use
I will not:
- Use school technologies in a way that could be personally or physically harmful.
- Attempt to find inappropriate images or content; intent to seek inappropriate images or content is a violation of this Responsible Use Policy.
- Create a personal mobile “hot-spot” or utilize a “proxy site” for the purpose of circumventing network safety measures and filtering tools.
- Create, distribute or deploy multi-user servers or gaming software on or within the MPS network.
- Engage in cyberbullying, harassment, or disrespectful conduct toward others.
- Try to find ways to circumvent the school’s safety measures and filtering tools; intent to circumvent safety measures and filtering tools is a violation of this Responsible Use Policy.
- Use school technologies to send spam or chain mail.
- Plagiarize content I find online.
- Post or otherwise disclose personally identifying information, about others or myself.
- Agree to meet someone I meet online in real life.
- Use language online that would be unacceptable in the classroom.
- Use school technologies for illegal activities or to pursue information on such activities.
- Attempt to hack or access sites, servers, or content that isn’t intended for my use. This is not intended to be an exhaustive list. Users should use their own good judgment when using school technologies.
Medford Public Schools is in compliance with the Children’s Internet Protection Act (CIPA) and has installed technology protection measures for all computers in the school corporation. A technology protection measure is in place that blocks or filters Internet access. This filter protects against access by adults and minors to visual depictions that are obscene, child pornography, or — with respect to use of computers with Internet access by minors — harmful to minors. The content filter does monitor the online activities of minors and may be reviewed when deemed necessary.
The district has the right to place reasonable restrictions on the material you access or post through the system. Students who violate the RUP will be subject to student disciplinary code outlined in the Medford Student/Parent handbooks.
The Responsible Use Policy (RUP) applies to:
- School-owned technology on the district Internet/network, on non-school networks and offline
- Privately owned technology that is connected to the district internet/network and on privately owned networks while on school property
I have read, understand and agree to abide by the terms and conditions of the Medford Public Schools Responsible Use Policy. School administration and the technology department reserves the right to examine, use and disclose any data found on the school’s information networks in order to further the health, safety, discipline or security of any student or other person or to protect property.
Payment should not be made until authorized to do so by library or technology support staff. This will allow for warranty review prior to payment. Lost/Stolen devices should be reported to Assistant Principal or Library Staff as soon as possible. A police report should be filed if a device has been stolen.