LEAH Schools 1 to 1 Technology Handbook
All students will be prepared and motivated to meet the challenges of a dynamic global society in which they collaborate, contribute, and flourish through universal access to people, information, and ideas.
The LEAH Schools includes Lutheran South Academy, Lutheran High North, and Westlake Preparatory Lutheran Academy. In this document, you will see the LEAH Schools, which encompasses all three campuses.
Technology Program Policy
- Understand and follow LEAH Schools Acceptable Use Policy and the Technology Handbook when using the laptop.
- Follow these guidelines, specific school or classroom agreements, as well as the student use expectations about the utilization of the laptop.
All students will receive an assigned MacBook Air & Power Adapter to support their educational process. This MacBook will remain the property of LEAH Schools & students will be responsible for the proper care and use of the device while it is in their possession.
Students will be required to return their assigned MacBook & Power Adapter at the end of the year to LEAH Schools Technology. We recommend students back up any user data prior to returning.
Students are responsible for their data backup. LEAH Schools recommends the following backup methods:
Copying school-appropriate files onto a personal thumb drive.
OneDrive Cloud Service for all School-related data.
Installation of Additional Software
All software provided on issued laptops is a license for use by LEAH Schools. If a class requires specific supplemental software, students will have access to the Self Service Application that will allow access to install additional approved software.
During regular repairs, software upgrades and installation, and condition audits, the LEAH Schools Technology Department will remove any detected unauthorized or illegal software installed on the computer by reimaging the MacBook before returning it to the student. Reimaging will result in the loss of files, data, personal settings, and any other data not backed up by the student beforehand.
The classroom and laptop computers used by students will be accessible through a computer login. The username will be the student’s firstname.lastname. The default personal network password is handed out during check out, and each student should personalize their password immediately. Students are NOT to share their account or password with any other student.
Students are not to create any accounts with administrator rights on any LEAH Schools device. Doing so will result in disciplinary action.
If new software is required, the technology department may use Self Service or push remotely. At any time, a particular driver that is not available via Self Service, students can submit a ticket to the Help Desk by email@example.com.
The technology department will manage software and driver updates on all LEAH Schools equipment.
LEAH Schools Email Protocols
Email has become a vital communication tool used by staff and students to carry out academic and administrative functions. It is important to ensure the security and responsible use of email at LEAH Schools.
All holders of email accounts are expected to abide by the guidelines set out in this agreement.
- As a rule, one should never say something through email that he or she would not say in person. Email should be reserved for the exchange of information and not for emotional correspondence.
- No inappropriate e-mail is allowed including derogatory, obscene, or harassing messages. E-mail messages of an abusive or harassing nature will be subject to a disciplinary response according to the harassment policy in the student handbook.
- Representation: When you send a letter from your school email address you are representing the school. Sending an email to an outside party is in some circumstances similar to sending a paper message with the school letterhead. It is strongly recommended using a non-LEAH Schools email account for personal email. Students shall not send out any mass emails unless they relate directly to LEAH Schools and then only with permission from their Principal.
- School email accounts should not be used to send out bulk email. Including chain letters, advertisements, or used to promote the interests of external organizations.
- Chain letters of any kind and spam are prohibited. Chain letters are defined as an email message asking you to pass information or messages on to other individuals or groups via e-mail.
- LEAH Schools Office365 Mail is the only approved mail service that may be used for student mail.
- The school reserves the right to search and read email as deemed necessary.
- E-mail during class is prohibited unless authorized by faculty or administration.
- E-mail services provided by the school are to be used only for the exchange of appropriate information. Students accessing anyone else’s email account is prohibited.
- School email addresses are not for use on ANY websites, companies, or other third parties without the explicit permission of a teacher or administrator.
- School email accounts will be deleted six months after graduation or immediately after withdrawal
Repair to MacBook
Students are expected to have an operational laptop at all times. If the computer is not functioning properly, they need to have their device inspected by the technology department. If repairs are necessary on the laptop, the technology department will facilitate the process. Do not take the computer to an outside repair facility for repairs. While computers are undergoing service, a loaner will be assign.
MacBooks are covered by an insurance policy that covers:
Accidental Damage: Drops, Liquid Spills, and Liquid Submersion
Theft, Burglary, and Robbery (Must provide Police Report)
Standard Perils: Fire, Flood, Vandalism, Natural Disaster and Power Surge due to lightning.
Losses Not Covered: Corrosion & Rust, Cosmetic Damage, Dishonest Acts, Intentional Acts, Nuclear Hazard, Power Surge (Except lighting), Theft From An Unattended Vehicle, Unexplained Loss or Mysterious Disappearance, War- Government Seizure and Wear and Tear.
GLOSSARY OF TERMS
CORROSION & RUST: Insurance will not cover loss or damage caused by or resulting from corrosion, rust or changes in humidity or temperature.
COSMETIC DAMAGE: Insurance will not cover loss for Cosmetic damage. Cosmetic damage means damage or changes to the physical appearance of the covered property that does not impede or hinder the normal operational function of the scheduled property such as scratches, abrasions, change in color, texture, or finish.
DISHONEST ACTS: Insurance will not cover loss or damage caused by your dishonesty or anyone acting for you. Nor do we cover any loss or damage arising from your illegal acts whether committed alone or in collusion with others. However, if the loss is caused by an act arising out of a pattern of criminal domestic violence and the perpetrator of the loss is criminally prosecuted for the act causing the loss, this exclusion does not apply to an otherwise covered loss suffered by another insured who did not cooperate in or contribute to the act that caused the loss.
ELECTRICAL BREAKDOWN: Insurance will not cover loss or damage to electrical equipment caused by electricity other than lightning. If a fire results, we will pay for the loss or damage caused by the fire.
INTENTIONAL ACTS: Insurance will not cover loss or damage caused by your intentional damage or destruction of property covered under this policy. breakdown or system failure if not caused by accidental damage. If a fire or explosion ensues, we will pay for that loss or damage.
NUCLEAR HAZARD: Insurance will not cover loss or damage caused directly or indirectly by nuclear reaction, nuclear radiation, or radioactive contamination. Loss caused by nuclear hazard is not considered loss caused by fire, explosion, smoke or any other insured peril. Direct loss by fire resulting from the nuclear hazard is covered.
THEFT FROM AN UNATTENDED VEHICLE: Insurance will not cover loss or damage that is caused by or resulting from theft from an unattended vehicle except when it is securely locked, its windows are fully closed, and there is visible evidence that entry into the vehicle was forced.
UNEXPLAINED LOSS OR MYSTERIOUS DISAPPEARANCE: Insurance will not cover loss or damage where the only proof of loss is unexplained or is caused by the disappearance of property without the knowledge as to place, time or manner of its loss. If your property was stolen, you are required to notify the local police immediately upon discovery. This policy does not provide coverage if you fail to notify the police.
WAR-GOVERNMENT SEIZURE: Insurance will not cover loss or damage caused directly or indirectly by: War (including undeclared war or civil war); or a warlike action by a military
force; or invasion, insurrection, rebellion, revolution, or unlawful seizure of power including action taken by governmental authority to prevent or defend against any of these. We will not cover your property if it is seized or destroyed under quarantine or Customs regulations, or confiscated by any government or public authority.
WEAR & TEAR: Insurance will not cover loss or damage caused by or resulting from wear and tear, gradual deterioration, insect or vermin. Wear and Tear means the reduction in value to the Insured Product stemming from routine use and exposure.
Repairs and insurance claims will be taken care of by the LEAH Schools Technology Department. Do not take your MacBook to Apple or another service provider.
YOUR DUTIES IN THE EVENT OF LOSS OR DAMAGE
If you have a Loss of property, you must:
- Report the loss or damage to LEAH Technology within ninety (90) days of the loss or damage.
- Notify the local police immediately upon discovery of the loss if the loss is a theft, fire, or vandalism; Do everything possible to protect the property from further loss;
- Separate the damaged property from the undamaged property.
- If requested, allow us to question you under oath, at such times as may be reasonably required about any matter relating to your claim including your records. In such event, your answers to our questions must be signed.
Minor or moderate damage to the device is a covered repair, and there is no cost to the family. We know that accidents happen, so LEAH Schools will also cover the first incident of damage at no cost to the household. The second event of damage to the device will incur $100 charge and billed to the student’s tuition account.
The incident count will last for 3 years.
In the event the device is not covered under our insurance plan we will bill the full replacement value to the student’s tuition account.
You should select secure passwords for all of your accounts.
A secure password is 8-10 characters long and includes at least one capital letter and number among lowercase letters.
Care of Your MacBook
To keep your MacBook in the best working condition, you need to ensure that it is protected. Even small dents in the casing can render certain essential components of your device unusable. You should make sure that your MacBook is kept in a proper place (i.e., in a locked locker, or with you), is transported in an appropriate case, and kept away from harmful materials (i.e., magnets, liquids, etc.).
You are responsible for protecting the MacBook from threats. Never leave your MacBook unattended or take your device into environments that may prove harmful.
Appropriate Storage (Bag Required)
Keeping your laptop in the carrying case will protect it against most minor bumps and jolts. It is important there is no adverse pressure applied to your laptop when your laptop is in the computer bag. Computers do not function well after having been bumped around a great deal; screens will break if enough pressure is applied.
You should also minimize the number of other objects in your computer bag alongside your laptop. Small, loose objects (such as paper clips or coins) could accidentally get stuck in openings in your MacBook if carried alongside it inside the backpack.
The bag must be separate from your book bag and must include handles and a padded location for the computer. It is highly Recommended to purchase a sleeve or protective case in addition to the bag. All protective equipment must accommodate a 13” MacBook Air and will help keep the MacBook looking like new. A sleeve or protective cover is not a substitute for having a computer bag.
Keeping the computer clean is a minimal job if you are caring for the device. If the need arises, remember to shut down the computer and unplug the power adapter before doing so. Second, use only a soft, lint-free cloth to clean the computer. Avoid abrasive cloths, towels, paper towels, and similar items that might cause damage. Keep liquids away from the computer. Avoid getting moisture in any openings. Do not spray cleaners directly on the computer. Don't use aerosol sprays, solvents, abrasives, or cleaners containing hydrogen peroxide that might damage the finish.
To clean the screen on your MacBook Air, first shut down the computer and unplug the power adapter. Then use a soft, lint-free cloth.
DO NOT PUT ANY STICKERS OR TAPE ON THE MacBook. If you do, you may be subject to $30 - $100 cleaning fee.
Proper Working Condition
You are expected to have your laptop charged, and in full-functioning order for every class every day you come to school.
There are several ways to maximize the usefulness of your computer:
Shut down or restart your computer every other week.
Ensure that the airflow vents below the display are unobstructed during use
Keep your laptop away from water or other liquids.
Don’t eat or drink while using the computer.
Don’t insert objects into any openings in your Mac.
Keep your laptop away from excessive heat or cold as well as high levels of humidity.
Don’t use your computer as a folder to store papers, pencils, or any other small objects
Close the lid and keep in a protective bag when carrying the laptop.
Don’t try to squeeze it into small spaces, such as an overcrowded locker or book bag.
Finally, be patient. The computer may take a few seconds to “think,” and in that time, pounding on the keys or repeatedly entering the same operation is only going to slow the process and damage the long-term functionality of the computer. Be patient with your laptop. It is a tool that can offer you access to a variety of information, but it will only cooperate if you treat it well.
Your MacBook should be fully charged when you arrive at school each day. Remember to plug your computer in each night as it will take 50-90 minutes to charge your battery to 100%.
MacBook Battery Life Tips
Close the lid when not in use
Power the computer completely off if you’re not going to use it for an hour or more
Adjust the screen brightness level
Quit unused applications
LEAH Schools Electronic Community
LEAH Schools Technology provides a series of resources to all students, staff, and families of the LEAH Schools community. At the beginning of the year, students will need to be sure they are able to access each of the following resources: their computer login, Office365, and RenWeb.
Internet Access at School
Access to the Internet is available at any time of the day. The classroom network is password protected so that access is limited to school-provided devices. The password is preset; if a student loses access, try restarting the computer or iPad and attempting to connect again.
Content Filtering and Monitoring
LEAH Schools will monitor the online activities and operate a technology protection measure (“filtering/blocking device”) on the network and all computers with Internet access, as required by law. The filtering/blocking device will be used to protect against access to visual depictions that are obscene, harmful to minors and child pornography. Our technology is a shared resource, the filtering/blocking device will apply to all devices with Internet access. Filtering/Blocking devices are not foolproof, and LEAH Schools cannot guarantee that users will never be able to access offensive materials using LEAH School’s equipment. Evasion or disabling or attempting to evade or disable, a filtering/blocking device installed by the LEAH Schools is prohibited.
LEAH Technology staff with the approval of a school administrator may disable the LEAH School’s filtering/blocking device to enable an adult user access for bona fide research or other lawful purposes. In making decisions to turn off the filtering/blocking device, the school administrator shall consider whether the use will serve a legitimate educational purpose or otherwise benefit the LEAH Schools.
LEAH Schools utilizes Cisco’s Umbrella product to provide devices with web filtering and security while on campus and at home.
All students receive access to an email account when they enroll. It is important to note:
- Faculty and staff will only use school-provided email accounts for communications with students. Students are expected only to use school email accounts when communicating with school faculty and staff; personal accounts at Yahoo!/Hotmail, etc. are not acceptable for school purposes.
- Students are expected to check their school email accounts regularly.
- Students can access their email from home using Office 365 at mail.office365.com
RenWeb is an online personalized learning environment for students and teachers. For LEAH Schools students, RenWeb is used mainly to access official grades, but also as a class information tool where teachers may post assignments, resources, lesson plans, and links to Internet sites.
Edmodo is a free and secure learning network for teachers, students, and Schools. It provides a safe way for teachers and students to connect, share content, access homework, participate in discussions, manage due dates, and receive class information.
At LEAH Schools, your teachers may post assignments, notes, and quizzes to Edmodo and you will be able to take quizzes, store files, participate in discussions and submit homework on the site.
LEAH Technology utilizes ZenDesk resource to track all incidents, repairs, and technology request. If you have an issue you can submit an email to support@leahSchools.org.
Other Network Access
LEAH Schools provides network access in a controlled educational environment. Students are prohibited from making attempts to bypass our network access with cellular technology or other methods while on campus.