• No results found

Bring Your Own Apple Device Policy. Guidelines for Parents and Students


Academic year: 2021

Share "Bring Your Own Apple Device Policy. Guidelines for Parents and Students"

Show more ( Page)

Full text


Bring Your Own Apple Device Policy

Guidelines for Parents and Students



The integration of ‘Bring Your Own Apple Device’ (BYOAD) into the classroom represents an exciting era at Rockingham Beach Primary School. The BYOAD project provides a wealth of rich educational resources and tools, that when used effectively, can deliver very positive teaching and learning outcomes. However, if the implementation of this new technology is not properly controlled there are certain pitfalls that students may encounter. Rockingham Beach Primary School supports students in the appropriate and safe use of their BYOADs. By alerting parents and students to potential dangers, developing guidelines and providing advice and support, the exposure of students to potential problems can be minimised. This document is specifically aimed at parents and students who are involved in the “Rockingham Beach Primary School Bring Your Own Apple Device Project” and details the policy, guidelines and support strategies to ensure that students are able to make effective use of their BYOAD and avoid any problems.

In the Beginning

Rockingham Beach Primary School has recognised the benefits of using technology in enhancing learning over many years and now would like to move to a model which enables every child to have access to a computer at any time when needed.

Rockingham Beach Primary School purchased 16 iPads for the early learning centre and 32 iPads for the primary school as a technology tool to enhance the learning experience of students engaged in learning programs. The program has been so successful and the demand so great from classrooms wanting to use the iPads in the classroom that we have decided that it is time to further expand the opportunities for students and implement a BYOAD program in years 4 - 6.

Rockingham Beach Primary School has already implemented a BYOAD device program in room 9 during 2014 on a voluntary basis as a trial. The use of the devices is tightly controlled within the classroom. Students cannot take them from the class and use out in the playground. They are used under teacher supervision in the same way computer use is supervised. Also because students connect to the internet they can be managed and tracked through the school proxy server. 2. Description and Purpose of a BYOAD program

A Bring Your Own Apple Device Program is exactly as the name suggests. Students bring an apple device they already have and use and are familiar with to school. They connect to the schools wireless network to give them access to the internet.

There are many advantages to a BYOAD program.

1. Schools can't afford to fund the rapidly changing needs of technology in education. The only practical way for every student to get access to a device for their own personal use is a BYOAD program.

2. Students owning their own device means they will have a sense of ownership and thus hopefully care for the device.

3. Managing apps on the devices is far easier. It is very difficult to manage the licencing and purchase of apps. Students can download apps at home and pay the few dollars if required.

4. BYOAD provides the opportunity for personalised education. Teachers can use media to meet different learning needs. Then all students can learn and excel at their own pace.

5. BYOAD changes the entire teaching model. With the technology they are using for BYOAD, students can have more authority over their own learning.


with students from other schools. Collaboration is key to engagement in today’s classrooms.

7. BYOAD helps free up resources for students who might not be able to afford a device. Rockingham Beach primary school has 32 iPads available for use.

8. Students are familiar with using their own device and will be able to troubleshoot their own problems meaning staff won’t be burdened with technical issues.

We request parents supply a device that complies with the following specifications:

All iPad 2, 3, 4 iPad mini and iPad air. Anything with a 3g or 4g connection will not be allowed as the use of the internet cannot be controlled.

Software/Apps installed – BYOAD devices must have these software/apps installed for the teaching and learning program at Rockingham Beach Primary School:

Word processing – e.g. Pages Spreadsheet – e.g. Numbers Presentation – e.g. Keynote Image editing – e.g. iPhoto Video editing – e.g. iMovie Web browser – e.g. Safari Brainstorming – e.g. Popplet

Information collecting- e.g. Corkulous Book writing – e.g. Book Creator Map / photo editing – e.g. Skitch

Split screen with web browser, notes and calculator – e.g. Sling Note Recording/ audio, visual and slides e.g.- Explain Everything

Online communication e.g.- Edmodo

• BYO Device agreement signed and returned.

3 RESPONSIBILITIES 3.1 The Role of Students

Students must use their BYOAD and the school computer network responsibly. Communications on information networks are often public and general school rules for student behaviour, conduct and standards will apply. When using their BYOAD and accessing school information resources students must follow the policy and guidelines detailed in this document. Students who fail to honour this Code of Conduct may forfeit use of their BYOAD and access to the Internet and/or school network.


3.2 The Role of Parents or Guardians

Parents or guardians are required to take responsibility for conveying the importance of the policy guidelines in this document and other school policies to their children. They are also required to monitor their child’s use of the BYOAD, especially at home, including access to media and information sources. Parents are responsible for the insurance of their own child’s device. If it is damaged, lost or stolen it is the parent’s responsibility to amend this.

3.3 The Role of Teaching Staff

School teaching staff will monitor appropriate care of the BYOAD and its use in accessing curriculum information. They will also provide guidance and instruction to students in the appropriate use of such resources. This includes staff facilitating student access to information on their BYOAD in support of and to enrich the curriculum while taking into account the varied instructional needs, learning styles, abilities and developmental levels of students.

3.4 The Role of the School

The school commits to upholding the Usage Policy Guidelines and providing physical and financial resources to enable safe, educationally relevant access to the BYOAD and relevant curriculum facilities for staff and students. The school also has a responsibility to ratify information published on the internet by students or the school, under the school’s name, meets legal requirements and community standards in relation to copyright and safety.


Students will be expected to bring their BYOAD to school to use in class. This will be subject to approval by Parents/Guardians as indicated on the School Usage Permission Letter and also by student compliance with the usage conditions outlined in this document.

School usage will be granted subject to adherence to the following rules: 1. Students must bring their BYOAD to school each day. It must be fully charged.

2. The Students must have their BYOAD inside their protective cover and inside their school bag when travelling to and from school.

3. Students are responsible for the safe storage and care of their BYOAD AT ALL TIMES. For example BYOADs should not be left outside classrooms or the library. When not in use during the day, they are to be locked inside the classroom teacher’s cupboard.

4. When the BYOD is at school the school Network Agreement applies at all times.

Since school use brings with it a risk of accidental damage or theft of the BYOAD we expect parents to arrange insurance. If an insurance claim is partially or wholly rejected by the insurer due to non-compliance with the guidelines the school will not cover the cost associated with the loss or damage.

5. Occupational Health and Safety Guidelines

The basic health and safety guidelines for desktop computers also apply to BYODs use: • Keep the upper arms relaxed at the side of the body

• Bend the elbows to around 90 degrees • Keep the wrists straight

• Change position every 15-20 minutes and take a complete break to get up and move your body every 30-60 minutes.


Students with special needs will be catered for according to Department of Education guidelines. 5.1 General Care of the BYOAD

It is the student’s responsibility to maintain the BYOAD in good condition.


Saving or back-up of data is the student’s responsibility. To backup work it is recommend that students use cloud storage.


Any Acceptable Use Policy is a written agreement that formally sets out the rules of use of software, networks, printers and the Internet. All staff and students are accessing the Department of

Education System and are bound by Department of Education rules of use. Computer operating systems and other software have been set up to maximise the effectiveness of the BYOAD. Students are prohibited from:

• Bringing or downloading unauthorised programs, including games, to the school or running them on school computers.

• Online internet games are banned.

• Accessing social media sites eg. Facebook at school is banned. • Deleting, adding or altering any configuration files.

• Breaking software copyright. Copyright is to be observed at all times. It is illegal to copy or distribute school software. Illegal software from other sources is not to be copied to or installed on the school equipment.

• Deliberately introducing any virus or program that reduces system security or effectiveness. • Attempting to log into the network with any user name or password that is not their own, or change any other person’s password.

8 Access Security

It is a condition of entry to the BYOAD that students agree to the monitoring of all activities including their files, e-mail and Internet accesses.

Monitoring and Logging

A log of all access to the internet including e-mail will be maintained and periodically scanned to ensure that undesirable internet sites have not been accessed and that the content of e-mail remains within the guidelines described in this document.

9 Internet usage

Internet access is expensive and has been provided to assist students' education. Students must use it only with permission, and not in any unauthorised way. As the Internet is an unsupervised

environment, the school has a responsibility to ensure that, as far as possible, material obtained from the Internet is not offensive or inappropriate. To this end, filtering software has been placed on the Internet links. Ultimately, it is the responsibility of individual students to ensure their behaviour does not contravene school rules or rules imposed by parents/guardians. The school is aware that definitions of "offensive" and "inappropriate" will vary considerably between cultures and

individuals. The school is also aware that no security system is perfect and that there is always the possibility of inappropriate material, intentionally and unintentionally, being obtained and displayed. It is the responsibility of the school to:

• provide training on the use of the Internet and make that training available to everyone authorised to use the school’s internet link

• take action to block the further display of offensive or inappropriate material that has appeared on the internet links.


Students must not deliberately enter or remain in any site that has any of the following content: • Nudity or obscene language

• Violence

• Information about committing any crime

• Information about making or using weapons, booby traps, dangerous practical jokes or "revenge" activities.

Students must:

• Follow school guidelines and procedures when preparing materials for publication on the web • Not use material from other websites unless they have permission from the person who created the material. If unsure, they should check with their teacher

• Not access any other material that their parents or guardians have forbidden them to see.

If students encounter any such site, they must immediately turn off the BYOAD and notify a teacher. They should not show the site to their friends first.

10 Cyber safety

Parents will be aware of many incidents reported in the media regarding safety online. Personal information is easily tracked and harvested by those who know how, so it is important to keep as safe as possible while online. Parents are encouraged to check the following sites online for further useful information:


User Agreement


Connection and Use of Student Owned Apple Device on the Rockingham Beach Primary School Network.


Student’s Full Name :________________________ Parent’s Full Name :______________________ Device Make/Model: ______________________


This memorandum relates to the connection and use of a student owned apple device at Rockingham Beach Primary School. This memorandum describes the terms of the provisions including level of service and scope of services agreed to by Rockingham Beach Primary School, the student and the student’s parent(s).


The solution is supplied by Rockingham Beach Primary School to the student, based upon the following Agreement:

1. The student must take all reasonable care to prevent against any form of damage and loss of the student owned apple device.

2. The student will abide by all conditions outlined in the Students Online – Acceptable Usage Policy. 3. The student and their parent will be solely responsible and legally accountable for any data stored or installed on the student owned device.

4. The student owned device and any software installed will be provided by the Parent and or Student.

5. Student owned devices can only be connected to the school’s wireless network. 6. The Department strongly recommends that:

a. Student owned devices are installed with Anti-Virus protection which is either current or the version immediately prior to the current version.

b. Student owned devices are installed with the recent release of the anti-virus definitions files (one of the most recent four (4) released definitions).

c. Student owned devices have Operating System patches which are within seven (7) days of the vendor’s release date.

d. Student owned devices are enabled to receive auto-updates from the software vendor. Signed:__________________________ Date: ___________

Student’s Full Name: ____________________________________________________ Signed:__________________________ Date:___________

Parent Full Name: ______________________________________________________ Signed: Date:

Jacqui O’Donnell Principal


Related documents

The objective of this course is to give an overview of the main aspects of vaccination issues in public health and strengthen participant knowledge and skills related

For Years 10 & 11 our expectation is that the number of students bringing devices into school will increase from September 2015 to a point sometime in 2016 where most or all

This model allows students to bring an IT device to Brisbane South State Secondary College that best supports their learning needs (within specifications)?.

Employees remain subject to organisational policy and procedure in respect of personal conduct, data and information security, and physical security, including but not limited to

2011, physical layer security methods are classified into five major approaches: multiple-input-multiple-output MIMO channel, theoretical secrecy capacity, coding schemes channel

The synergies of Lean Management (Wincel and Krull, 2013), Appreciative Inquiry (Cooperrider and Srivastva 1987), and Participatory Action Research (Greenwood et al, 1993)

CNSS’s implementation of the Bring Your Own Device strategy outlines that parents and students must conform to certain guidelines identified in this document to ensure a

Therefore the Buninyong Primary School BYOD Program allows students to use an Apple tablet device that can utilise the latest operation system (iOS) and support the installation

When using their BYOD and accessing school information resources students must follow the policy and guidelines detailed in this document.. Students who fail to honour this Code

BYOD – Bring Your Own Device refers to Users using their own device (which is not owned or provided to you by the University) to access and store University information, whether at

Relatamos o caso de um paciente adulto jovem diagnosticado aos 18 anos com Doença de Hirschsprung com sintomas de constipação e perda fecal involuntária desde os 5

We will work with Partner Schools to ensure students have access to suitable technology for Aurora College classes.. The BYOD policy will outline the rights and responsibilities

Students are not permitted to use their device to broadcast their own SSID or use it as a hotspot so that it can allow others to access the internet by by-passing the Foundation’s

As part of this commitment and following on from the installation of a wireless network around the Foundation during the summer of 2013, we are now in a position to enable staff

Northern College Information Technology Services (ITS) staff are under no obligation to provide support on either hardware or software on personal devices.. Support will be

• It is important to ensure that students are aware of and agree to their obligations under the Student Bring Your Own Device (BYOD) Policy and relevant policies, prior to using

The  Department  of  Education  supports  students  in  the  appropriate  and  safe  use  of  their  iPad. 

Perfect matchings, Hamilton cycles, degree distribution and local clustering in Hyperbolic Random Graphs..

Support will/will not be offered for the devices that form part of this scheme. The company [COMPANY NAME] will provide a forum for BYOD device issues. This will not be

Requirements of icici bank coral application status: information after paying late payment gateway and air india website in the credit cards and to advance cash or atm?. Various

Efforts over the last 10 to 15 years from organisations including the National Biodiversity Network (NBN), the Marine Life Information Network (MarLIN),The Archive for Marine


The theory that sex is controlled by a particular type of metabolismwhether this be produced by bio-physico-chemical events set in motion by X and Y chromosomes, or by the imposition