Privacy, Policies and Tools

Acceptable Use Policy


The school cannot be held responsible for any damages, injuries or claims resulting from student violations of responsible use of technology as outlined herein. At Montclair Kimberley Academy (MKA), students are expected to act in ways that reflect the eight Character Standards and uphold the Code of Conduct and the Honor Code. Many of the rules and regulations at MKA are created toward that end and are necessary to maintain an atmosphere that is pleasant, orderly and conducive to learning. When in doubt about what is the right thing to do, there are two basic rules that students should keep in mind:

  • Have respect and concern for the rights, feelings, property and personal spaces of others.
  • Behave in a manner that demonstrates respect for yourself, your family and your school.

MKA recognizes how valuable the appropriate use of technology is to improving teaching and learning. Accordingly, MKA has made a significant commitment to integrating technological advances into the school program to enhance students’ learning experiences. MKA provides access to the school’s file servers, printers and Internet services from every computer connected to the MKA network. Understanding and following MKA’s Acceptable Use Policy allows us to maintain a respectful, effective and safe learning environment.

MKA recognizes that issues such as fairness and network capacity limitations require a policy concerning the appropriate use of all technology. MKA network resources are considered the property of MKA. Laptop access to MKA’s network services will be provided throughout the school via a wireless network. MKA blocks websites and web-based services that the administration deem to pose a threat to the safety, security and well-being of its community members, facilities, network and resources. Categories that are blocked include: pornography and sexually explicit material, criminal and illegal activities, weapons and extreme violence, computer hacking, spyware and malicious software, and certain video streaming sites. MKA will continue to take precautions for this type of material on all equipment that is part of the school’s network.

Any actions performed or initiated through the network must reflect the integrity and honesty expected of an MKA student, as described in MKA’s Honor Code, and be compliant with MKA’s Code of Conduct, as set forth in the MKA Handbook & Family Directory. All network traffic will be logged by MKA, and those logs will be monitored for inappropriate use. MKA also monitors laptops for the installation of applications that are in violation of this AUP. Students may be held responsible for actions initiated on their laptops, regardless of whether they were using their computer at the time of the infraction. Therefore, students may only use the laptop they have been issued or one provided in the event of repair.

Students are provided with an MKA-issued email account, which is the primary email account used by MKA faculty, staff and coaches. This account is to be used for educational purposes; however, school email may be used for incidental or occasional personal use so long as it does not violate any terms defined in this AUP. Email is not to be used for group solicitations not directly related to school purposes.

As a rule, MKA will protect students’ privacy and will treat students’ electronic information as it treats any other student property. However, the school reserves the right to randomly search students’ personal belongings, laptops (personal and school–issued) and school-issued accounts in accordance with policies stated in the MKA Handbook & Family Directory and posted on MKA’s website.

Violations of the Acceptable Use Policy fall into two broad categories: "Minor Offenses" and "Major Offenses." A Major Offense of the AUP is also a Major Code of Conduct Violation.

Minor Offenses

A minor offense is an action or behavior that violates a rule that has been put in place to maintain the strength, integrity and sustainability of our technology program. Students who demonstrate a pattern of minor offenses will be referred to the Middle or Upper School Dean of Students. Minor offenses include, but are not limited to, the following:

Laptop Usage

  • Forgetting to bring the laptop to school.
  • Using software and services whose use may be deemed inappropriate for the teaching and learning approach of a specific course or subject (e.g., language translation services, literature summary sites, calculators and equation solvers).
  • Sharing or soliciting username, PIN and/or password information with or from other students.

Laptop Maintenance

  • Transporting or using the laptop without a hard protective case similar to the one originally issued with the laptop.
  • Placing stickers directly on the laptop or putting paper or other objects beneath the bottom protective case
  • Not addressing needed repairs (e.g., cracked screen, cracked trackpad, missing keys, bent corners).
  • Creating secondary accounts for the laptop (e.g., for a friend or parent or to enable parental controls)
  • Installing operating systems other than those installed by the MKA Tech Department (e.g., Boot Camp, Virtual Machines)
  • Upgrading the Mac Operating System beyond MKA’s currently supported version (e.g., upgrading to 10.12 Sierra)
  • Changing the following settings in the System Preferences:
    • Sharing → Changing the Computer Name
    • Sharing → Disabling or changing settings for Remote Login
    • Sharing → Disabling or changing settings for Remote Management
    • Security → Turning on FileVault
    • Security → Enabling the Firewall
    • Parental Controls → Converting this account to a parental controls account
    • Profiles → Modifying or removing any MKA-related profiles
    • NTWare MacClientConfig → Do not modify or delete any settings

Power Management

  • Practicing poor power management techniques (e.g., coming to school with laptop not fully charged).
  • Charging computer in non-designated outlets. Designated charging areas include:
    • Middle School: Library, Dining Hall and Tech Center Charging Carts
    • Upper School: Commons, Academic Center and Dining Hall

Network Access (Minor)

  • Installing or using unauthorized 3rd party multi-node file-sharing software (e.g., Torch, BitTorrent, Transmission) on school laptops. Messages, Dropbox, Evernote and AirDrop do not fall under this category.
  • Using personal laptops or tablets instead of the school-issued laptop.
  • Sending chain emails, inappropriate broadcast messages or any other information that may cause undue network congestion.
  • Using the network for commercial purposes. The school will not be responsible for any financial obligations resulting from school-provided laptops, technology or access to the Internet (including BitCoin related sites/services).
  • Installation of third party firewalls, anonymizers or proxies.
  • Accessing non-MKA wireless networks with the laptop while on campus (this includes personal hotspots).
  • Attempting to connect to the MKA wired or wireless network with non-authorized devices including personal laptops, phones or tablets.

Major Offenses

A major offense is a serious violation of the standards of the community and poses a threat to the safety and security of the school’s network, infrastructure, students, faculty and greater community. Major Offenses to the AUP also count as Major Offenses to the Code of Conduct. Major Offenses include, but are not limited to, the following:

Privacy, Property, & Community

  • Accessing or deleting the MKA administrative account.
  • Vandalizing the laptop or other network resources. This includes defacing, engraving, coloring, painting, etching, stickers, skins and using marker on the laptop itself. It also includes deliberately removing keys or deforming the original shape of the laptop and its components.
  • Accessing laptops, accounts and files of others without permission. This includes going on to someone else’s computer and accessing any web page, social network or application without the owner’s knowledge or permission or impersonating someone online.
  • Recording, filming or photographing teachers or other students without express permission to do so. If teachers or other students have given permission to record, the student who receives permission is expected to respectfully and responsibly use and manage the recorded material. Sharing or publicly posting captured material without permission is also prohibited.
  • Using the laptop and its applications or the school network either in or out of school to harass, disparage or intimidate another person or the school itself.
  • Sending or posting messages that are detrimental to the reputation of MKA by virtue of the sender’s address or other means of identification.

Illegal Activity

  • Installing or distributing unlicensed or illegal software.
  • Using the network in support of illegal activities or businesses or for gambling. The school will not be responsible for any financial obligations resulting from school-provided technology or Internet access.

Network Access (Major)

  • Placing, creating or accessing sexually explicit, violent, obscene or unlawful material.
  • Attempting to get around MKA’s network security or to impair functionality of the network including the use of VPNs or remote login tools (e.g., GoToMyPC, LogMeIn) as a means for circumventing MKA network protocol.
  • Attempting to bypass restrictions set by the network administrators.
  • Using a computer for distribution of inappropriate or illegal material including text, audio, images or video.
  • Providing billable services to others for the use of your laptop or MKA network resources.


Technology Privacy Statement

MKA has a strict policy against the inappropriate use of computers which is set forth in detail in the Student/Parent Handbook. Cyber-bullying (the use of electronic or wireless devices to harass, intimidate or bully) will not be tolerated. While on the MKA network, the school has the ability to access a computer remotely to view the content saved on a student’s computer. MKA reserves the right to search a student’s computer files/accounts when necessary to determine whether the student has violated the law or MKA rules. All network traffic is logged by MKA and can be monitored and reviewed for appropriate use. Remote access to student computers will be used if necessary to determine whether a student has violated the law or MKA rules. Remote access does not include the use of microphones or web camera to view the area in front of a computer, or to hear sounds in the area of a computer.

MKA laptops come equipped with a built in microphone and web camera that are used by students and teachers for a variety of educational activities. These devices cannot be deactivated or removed from the computer. MKA restricts the use of web cameras and microphones to educational and/or troubleshooting purposes only. MKA does not use these devices to view, or listen, to students on or off campus under any circumstances.

MKA cannot and will not access a web camera or microphone when the computer is not on the MKA network. Since a computer may be logged onto the MKA network only when it is on campus, MKA has no ability to access the computer remotely when it is with the student at home, on vacation or anywhere outside the MKA campus.

MKA utilizes two software applications to troubleshoot faulty computers, Apple Remote Desktop (ARD) and JAMF Casper suite:

ARD permits the MKA Technology Department to remotely access a student’s computer and to carry out the appropriate steps to repair and/or restore the computer while the student is on campus. It allows the Technology Department to see what is on the computer screen; it does not employ a microphone or web camera, which would allow the Technology Department to view the area around the computer or to hear sounds or conversation in the area of the computer. When a computer is accessed remotely using ARD, a menu bar icon will let the computer user know that the program is being used for remote access to their computer. As a general rule, the Technology Department will notify a student before using ARD to access the student’s laptop; exceptions to the rule are limited to emergency situations where a malfunctioning computer must be dealt with immediately.

The JAMF Casper suite is used to report on a variety of activities including application installations, updates, system specifications,hardware configuration changes, application usage (number of hours used), system
restarts and significant changes in the file system. This “audit” information, including the IP address of the individual computer, is sent to a Casper data server on a timed schedule (approximately once an hour). At no time is personal or private information sent to the Casper management server. The JAMF Casper suite cannot be used by the school to listen to sounds in the area of a computer or to view the area around the computer. Its sole purpose is to provide MKA with needed information about the computer network.

Third Party Tools and Services

Below is a list of 3rd party computer applications and web-based services that are currently planned to be used in the classroom and that require student information in order to have functional access.

Custom Typing is a web-based resource for learning, practicing, and mastering touch typing. Privacy policy - Terms of Service
Descubre is the online textbook used in 4th and 5th grade Spanish language classes. Privacy Policy - Terms of Service
Edmodo is a collaborative platform for classroom discussions, projects, and units. Privacy Policy - Terms of Service
Evernote is a tool for organization of notes that can contain text, images, and audio. Notes and notebooks can be shared with teachers and classmates for collaboration and feedback. Privacy Policy - Terms of Service - Direct Notice
Fitnessgram is used in Physical Education classes to save and review fitness testing activity and data.
IXL Math is a site with a rich set of math practice activities and resources. Privacy Policy - Terms of Service
NoodleTools allows students to save bibliographical information and reference citations during research projects. Privacy Policy - Terms of Service
TurnItIn is a paper submission tool that helps students and teachers organize work and give feedback on producing original ideas. Privacy Policy - Terms of Service
Voicethread hosts multimedia discussion forums where users can share images, audio, text, and written notes. Privacy Policy - Terms of Service
Weebly is a website creation tool where many of the Primary School class websites are hosted. Privacy Policy - Terms of Service allows students to share multimedia and visual projects made with the Pixie program. Privacy Policy - Terms of Service
Hypothesis to discuss, collaborate, organize your research, or take personal notes. Privacy Policy - Terms of Service
Quizlet is flashcards, tests, and study games make learning fun and engaging for students of all ages. - Privacy Policy - Terms of Service
PearDeck lets teachers hear from and directly engage every student every day - Privacy Policy - Terms of Service

Prezi is the presentation software that uses motion, zoom, and spatial relationships to bring your ideas to life and make you a great presenter - Privacy Policy - Terms of Service

Socrative allows teachers to quickly assess students with prepared activities or on-the-fly questions to get immediate insight into student understanding - Privacy Policy - Terms of Service

1:1 Policies & Requirements


All students in grades 4-12 are issued a laptop, required protective case, power adapter, external hard drive and available software (e.g., Microsoft Office, Adobe Creative Suite, G-Suite for Education, and Evernote Occasionally, in highly specialized courses, students may be required to purchase course-specific software available through the MKA Bookstore or other retailers. Students keep their MKA laptop year-round.


Any damage, malfunction or loss of the laptop needs to be reported to the Technology Department as soon as possible. In the case of a burglary or theft, a police report must be filed in order to process any insurance claim.

MKA will provide repair, protection and insurance of the laptops in multiple forms, including:

Tech Centers at each campus, staffed by MKA’s Apple-certified technicians who will be able to make repairs to the laptops.

  • AppleCare warranty, which will cover all manufacturer’s defects and related issues and will also allow students to go to any Apple Store for repair and assistance during times when school is closed.
  • Insurance, which will cover all other issues related to loss or damage, not to include any intentional damage or mysterious loss (as defined below in the Insurance section).
  • The insurance will cover all non-warranty-related issues, with the exception of intentional damage/neglect or mysterious disappearance. In these cases, the student/family will be responsible for the full replacement value of the laptop.

Intentional damage/neglect is defined as: "Any loss arising out of any act, or willful neglect by the user to commit or conspire to commit with the intent to cause a loss, including imposition of any abnormal conditions to the laptop."

Mysterious disappearance is defined as: "The disappearance of property without the knowledge as to the place, time or manner of its loss."

In the event of a needed repair, students will be issued a loaner laptop. Lost or stolen laptops will be replaced with a comparable laptop.


Parents/guardians will be liable for up to a $250 deductible per incident or the payment of all costs not covered by insurance in the event of damage to, loss of or destruction of the computer or peripheral(s), whichever is greater. These charges will be the responsibility of the family and charged to the student's MKA account at the time the device is repaired.

The cost of any visible damage to the inside and/or outside of the computer that may not impact the overall function of the device will be charged when the student leaves the school or the device is returned.

Distribution for New MKA Students

Students new to MKA in grades 5-12 are issued a laptop, power adapter, backup drive and required protective case prior to the start of school or, in certain cases, via appointment with a member of the Educational Technology Department. Students in 4th grade receive their laptops during the opening weeks of school but do not begin taking them home until after Winter Recess.

Driver’s Manual, Driver’s Test and Administrative Rights

MKA’s 1:1 Driver’s Manual contains information and videos about MKA’s 1:1 Learning Program, including MKA’s Technology Acceptable Use Policy (AUP - included above), software updates, backing up, security, good habits, maintenance and how to resolve some common problems.

Taking and passing the Driver’s Test — which assesses their computer management skills and understanding of the AUP — is the first step to becoming a laptop ‘administrator.’ An administrator has increased access to the laptop and its settings, eliminating the need to visit the Tech Center in order to install new applications, perform updates or customize the computer operating system in advanced ways.

Once students pass the Driver’s Test, they must also answer an in-person question given by a member of the Tech Department. Middle School students are also given a form that must be read and signed by a parent/guardian and returned to the Tech Center in order to be granted administrative rights.

While becoming a laptop administrator is not mandatory, MKA does encourage doing so, especially as students move into the upper grades.