Privacy, Policies and Tools

Acceptable Use Policy

TECHNOLOGY ACCEPTABLE USE POLICY (AUP)

The school cannot be held responsible for any damages, injuries or claims resulting from student violations of responsible use of technology as outlined herein. At Montclair Kimberley Academy (MKA), students are expected to act in ways that reflect the eight Character Standards and uphold the Code of Conduct and the Honor Code. Many of the rules and regulations at MKA are created toward that end and are necessary to maintain an atmosphere that is pleasant, orderly and conducive to learning. When in doubt about what is the right thing to do, there are two basic rules that students should keep in mind:

  • Have respect and concern for the rights, feelings, property and personal spaces of others.
  • Behave in a manner that demonstrates respect for yourself, your family and your school.

MKA recognizes how valuable the appropriate use of technology is to improving teaching and learning. Accordingly, MKA has made a significant commitment to integrating technological advances into the school program to enhance students’ learning experiences. MKA provides access to the school’s file servers, printers and Internet services from every computer connected to the MKA network. Understanding and following MKA’s Acceptable Use Policy allows us to maintain a respectful, effective and safe learning environment.

MKA recognizes that issues such as fairness and network capacity limitations require a policy concerning the appropriate use of all technology. MKA network resources are considered the property of MKA. Laptop access to MKA’s network services will be provided throughout the school via a wireless network. MKA blocks websites and web-based services that the administration deem to pose a threat to the safety, security and well-being of its community members, facilities, network and resources. Categories that are blocked include: pornography and sexually explicit material, criminal and illegal activities, weapons and extreme violence, computer hacking, spyware and malicious software, and certain video streaming sites. MKA will continue to take precautions for this type of material on all equipment that is part of the school’s network.

Any actions performed or initiated through the network must reflect the integrity and honesty expected of an MKA student, as described in MKA’s Honor Code, and be compliant with MKA’s Code of Conduct, as set forth in the MKA Handbook & Family Directory. All network traffic will be logged by MKA, and those logs will be monitored for inappropriate use. MKA also monitors laptops for the installation of applications that are in violation of this AUP. Students may be held responsible for actions initiated on their laptops, regardless of whether they were using their computer at the time of the infraction. Therefore, students may only use the laptop they have been issued or one provided in the event of repair.

Students are provided with an MKA-issued email account, which is the primary email account used by MKA faculty, staff and coaches. This account is to be used for educational purposes; however, school email may be used for incidental or occasional personal use so long as it does not violate any terms defined in this AUP. Email is not to be used for group solicitations not directly related to school purposes.

As a rule, MKA will protect students’ privacy and will treat students’ electronic information as it treats any other student property. However, the school reserves the right to randomly search students’ personal belongings, laptops (personal and school–issued) and school-issued accounts in accordance with policies stated in the MKA Handbook & Family Directory and posted on MKA’s website.

Violations of the Acceptable Use Policy fall into two broad categories: "Minor Offenses" and "Major Offenses." A Major Offense of the AUP is also a Major Code of Conduct Violation.

Minor Offenses

A minor offense is an action or behavior that violates a rule that has been put in place to maintain the strength, integrity and sustainability of our technology program. Students who demonstrate a pattern of minor offenses will be referred to the Middle or Upper School Dean of Students. Minor offenses include, but are not limited to, the following:

Laptop Usage

  • Forgetting to bring the laptop to school.
  • Using software and services whose use may be deemed inappropriate for the teaching and learning approach of a specific course or subject (e.g., language translation services, literature summary sites, calculators and equation solvers).
  • Sharing or soliciting username, PIN and/or password information with or from other students.

Laptop Maintenance

  • Transporting or using the laptop without a hard protective case similar to the one originally issued with the laptop.
  • Placing stickers directly on the laptop or putting paper or other objects beneath the bottom protective case
  • Not addressing needed repairs (e.g., cracked screen, cracked trackpad, missing keys, bent corners).
  • Creating secondary accounts for the laptop (e.g., for a friend or parent or to enable parental controls)
  • Installing operating systems other than those installed by the MKA Tech Department (e.g., Boot Camp, Virtual Machines)
  • Upgrading the Mac Operating System beyond MKA’s currently supported version (e.g., upgrading to 10.12 Sierra)
  • Changing the following settings in the System Preferences:
    • Sharing → Changing the Computer Name
    • Sharing → Disabling or changing settings for Remote Login
    • Sharing → Disabling or changing settings for Remote Management
    • Security → Turning on FileVault
    • Security → Enabling the Firewall
    • Parental Controls → Converting this account to a parental controls account
    • Profiles → Modifying or removing any MKA-related profiles
    • NTWare MacClientConfig → Do not modify or delete any settings

Power Management

  • Practicing poor power management techniques (e.g., coming to school with laptop not fully charged).
  • Charging computer in non-designated outlets. Designated charging areas include:
    • Middle School: Library, Dining Hall and Tech Center Charging Carts
    • Upper School: Commons, Academic Center and Dining Hall

Network Access (Minor)

  • Installing or using unauthorized 3rd party multi-node file-sharing software (e.g., Torch, BitTorrent, Transmission) on school laptops. Messages, Dropbox, Evernote and AirDrop do not fall under this category.
  • Using personal laptops or tablets instead of the school-issued laptop.
  • Sending chain emails, inappropriate broadcast messages or any other information that may cause undue network congestion.
  • Using the network for commercial purposes. The school will not be responsible for any financial obligations resulting from school-provided laptops, technology or access to the Internet (including BitCoin related sites/services).
  • Installation of third party firewalls, anonymizers or proxies.
  • Accessing non-MKA wireless networks with the laptop while on campus (this includes personal hotspots).
  • Attempting to connect to the MKA wired or wireless network with non-authorized devices including personal laptops, phones or tablets.

Major Offenses

A major offense is a serious violation of the standards of the community and poses a threat to the safety and security of the school’s network, infrastructure, students, faculty and greater community. Major Offenses to the AUP also count as Major Offenses to the Code of Conduct. Major Offenses include, but are not limited to, the following:

Privacy, Property, & Community

  • Accessing or deleting the MKA administrative account.
  • Vandalizing the laptop or other network resources. This includes defacing, engraving, coloring, painting, etching, stickers, skins and using marker on the laptop itself. It also includes deliberately removing keys or deforming the original shape of the laptop and its components.
  • Accessing laptops, accounts and files of others without permission. This includes going on to someone else’s computer and accessing any web page, social network or application without the owner’s knowledge or permission or impersonating someone online.
  • Recording, filming or photographing teachers or other students without express permission to do so. If teachers or other students have given permission to record, the student who receives permission is expected to respectfully and responsibly use and manage the recorded material. Sharing or publicly posting captured material without permission is also prohibited.
  • Using the laptop and its applications or the school network either in or out of school to harass, disparage or intimidate another person or the school itself.
  • Sending or posting messages that are detrimental to the reputation of MKA by virtue of the sender’s address or other means of identification.

Illegal Activity

  • Installing or distributing unlicensed or illegal software.
  • Using the network in support of illegal activities or businesses or for gambling. The school will not be responsible for any financial obligations resulting from school-provided technology or Internet access.

Network Access (Major)

  • Placing, creating or accessing sexually explicit, violent, obscene or unlawful material.
  • Attempting to get around MKA’s network security or to impair functionality of the network including the use of VPNs or remote login tools (e.g., GoToMyPC, LogMeIn) as a means for circumventing MKA network protocol.
  • Attempting to bypass restrictions set by the network administrators.
  • Using a computer for distribution of inappropriate or illegal material including text, audio, images or video.
  • Providing billable services to others for the use of your laptop or MKA network resources.

(9/21/2016)

Technology Privacy Statement

MKA has a strict policy against the inappropriate use of computers which is set forth in detail in the Student/Parent Handbook. Cyber-bullying (the use of electronic or wireless devices to harass, intimidate or bully) will not be tolerated. While on the MKA network, the school has the ability to access a computer remotely to view the content saved on a student’s computer. MKA reserves the right to search a student’s computer files/accounts when necessary to determine whether the student has violated the law or MKA rules. All network traffic is logged by MKA and can be monitored and reviewed for appropriate use. Remote access to student computers will be used if necessary to determine whether a student has violated the law or MKA rules. Remote access does not include the use of microphones or web camera to view the area in front of a computer, or to hear sounds in the area of a computer.

MKA laptops come equipped with a built in microphone and web camera that are used by students and teachers for a variety of educational activities. These devices cannot be deactivated or removed from the computer. MKA restricts the use of web cameras and microphones to educational and/or troubleshooting purposes only. MKA does not use these devices to view, or listen, to students on or off campus under any circumstances.

MKA cannot and will not access a web camera or microphone when the computer is not on the MKA network. Since a computer may be logged onto the MKA network only when it is on campus, MKA has no ability to access the computer remotely when it is with the student at home, on vacation or anywhere outside the MKA campus.

MKA utilizes two software applications to troubleshoot faulty computers, Apple Remote Desktop (ARD) and JAMF Casper suite:

ARD permits the MKA Technology Department to remotely access a student’s computer and to carry out the appropriate steps to repair and/or restore the computer while the student is on campus. It allows the Technology Department to see what is on the computer screen; it does not employ a microphone or web camera, which would allow the Technology Department to view the area around the computer or to hear sounds or conversation in the area of the computer. When a computer is accessed remotely using ARD, a menu bar icon will let the computer user know that the program is being used for remote access to their computer. As a general rule, the Technology Department will notify a student before using ARD to access the student’s laptop; exceptions to the rule are limited to emergency situations where a malfunctioning computer must be dealt with immediately.

The JAMF Casper suite is used to report on a variety of activities including application installations, updates, system specifications,hardware configuration changes, application usage (number of hours used), system
restarts and significant changes in the file system. This “audit” information, including the IP address of the individual computer, is sent to a Casper data server on a timed schedule (approximately once an hour). At no time is personal or private information sent to the Casper management server. The JAMF Casper suite cannot be used by the school to listen to sounds in the area of a computer or to view the area around the computer. Its sole purpose is to provide MKA with needed information about the computer network.

Third Party Tools and Services

Below is a list of 3rd party applications and web-based services that are currently used in the classroom and require a student login, use a generic login, and/or store student information.

Adobe Creative Cloud is a set of applications and services from Adobe Systems that gives subscribers access to a collection of software used for graphic design, video editing, web development, photography, along with a set of mobile applications and also some optional cloud services.  
Privacy Policy - Terms of Service - Additional Terms (K12)
BrainPop is an animated Educational Site for Kids - Science, Social Studies, English, Math, Arts & Music, Health, and Technology. 
Privacy Policy - Terms of Service
Connected ED is part of the McGraw Hill suite tools for online texts. Privacy Policy - Terms of Service

Descubre is the online textbook used in 4th and 5th grade Spanish language classes. Privacy Policy - Terms of Service
Desmos is an online graphing calculator. Privacy Policy - Terms of Service
Digital Theatre + increases student engagement and passion for performance with over 400 first-class productions and all-star casts... Privacy Policy - Terms of Service

Edmodo is a collaborative platform for classroom discussions, projects, and units. Privacy Policy - Terms of Service
Epic is a leading digital library for kids offering unlimited access to 35000 of the best children's books of all time. Privacy Policy - Terms of Service

Evernote is a tool for organization of notes that can contain text, images, and audio. Notes and notebooks can be shared with teachers and classmates for collaboration and feedback. Privacy Policy - Terms of Service - Direct Notice

Fitnessgram is used in Physical Education classes to save and review fitness testing activity and data. Privacy Policy - Terms of Service
Flip Grid video for student engagement and formative assessment - Privacy Policy - Terms of Service
Glogster -  is a cloud-based platform for creating presentations and interactive learning. Privacy Policy - Terms of Service
Goosechase is an online tool for developing scavenger hunts. Privacy Policy - Terms of Service
GSuite for Education  is a brand of cloud computing, productivity and collaboration tools, software and products. Privacy Policy - Terms of Service
Hypothesis to discuss, collaborate, organize your research, or take personal notes. Privacy Policy - Terms of Service
IXL Math is a site with a rich set of math practice activities and resources. Privacy Policy - Terms of Service
McGraw Hill is an online textbook company. Privacy Policy - Terms of Service
Moodle is an open source online classroom management tool managed by MKA. Privacy and Terms of Service fall under the MKA Handbook.
NoodleTools allows students to save bibliographical information and reference citations during research projects. Privacy Policy - Terms of Service
PearDeck lets teachers hear from and directly engage every student every day - Privacy Policy - Terms of Service

 

Pearson is an online textbook company. Privacy Policy - Terms of Service
Pivot Interactive is a powerful supplement to hands on experimentation, allowing students to vary experimental parameters one at a time to view results from a set of many recordings of the same experiment. Privacy Policy - Terms of Service
Prezi is the presentation software that uses motion, zoom, and spatial relationships to bring your ideas to life and make you a great presenter - Privacy Policy - Terms of Service

 

Quizlet is flashcards, tests, and study games make learning fun and engaging for students of all ages. - Privacy Policy - Terms of Service
Seesaw provides student driven digital portfolios and simple parent communication. Privacy Policy - Terms of Service
Spelling City is designed to expand knowledge of vocabulary words and reading comprehension. Privacy Policy - Terms of Service

Socrative allows teachers to quickly assess students with prepared activities or on-the-fly questions to get immediate insight into student understanding - Privacy Policy - Terms of Service
TurnItIn is a paper submission tool that helps students and teachers organize work and give feedback on producing original ideas. Privacy Policy - Terms of Service

Typing Training is a web-based resource for learning, practicing, and mastering touch typing. Privacy policy - Terms of Service
WebAssign provides online homework application for faculty and students. Privacy Policy - Terms of Service
Wixie.com allows students to share multimedia and visual projects made with the Pixie program. Privacy Policy - Terms of Service
ZipGrade is a mobile device app that turns your iPhone, iPad, or Android device into an optical scanner for grading paper multiple-choice assessments. Privacy Policy - Terms of Service
LIBRARY RESOURCES
ABC-Clio is a publishing company for academic reference works and periodicals primarily on topics such as history and social sciences for educational and public library settings. Privacy Policy - Terms of Service
Capstone PebbleGo is an emergent reader research solution. Privacy Policy - Terms of Service
Ebsco is the leading provider of research databases, e-journals, magazine subscriptions, ebooks and discovery service for academic libraries. Privacy Policy - Terms of Service
Follett Destiny is for library management. Privacy Policy - Terms of Service
Gale Virtual Reference Library, Kids InfoBits provides authoritative, curriculum-aligned, for users to explore content in the product and gain comfort with database searching. Privacy Policy - Terms of Service
Gilder Lehrman is the leading nonprofit organization dedicated to K–12 history (American History 1493-1945) education while also serving the general public.  Privacy Policy - Terms of Service
Infobase/Facts on File is a convenient collections of thousands of acclaimed eBooks in a range of core subjects. Privacy Policy - Terms of Service
JSTOR is a digital library originally containing digitized back issues of academic journals, it now also includes books and other primary sources, and current issues of journals. It provides full-text searches of almost 2,000 journals. Privacy Policy - Terms of Service
Libguides is use it to curate knowledge and share information, organize class and subject specific resources, and to create and manage websites. Privacy Policy - Terms of Service
OverDrive is a service that allows student to borrow eBooks, audiobooks and videos from thousands of public libraries worldwide. Privacy Policy - Terms of Service
ProQuest resources and tools support research and learning, publishing and dissemination, and the acquisition, management and discovery of library collections. Privacy Policy - Terms of Service
Rosen(Gale) is a comprehensive curricular support and self-help tools on topics including diseases, drugs, alcohol, nutrition, mental health and much more, with an instant, online support network secondary students can always turn to. Privacy Policy - Terms of Service
Scholastic Go provides credible, accurate, reliable content on almost every core-curricula subject, and offers endless resources for research in a multitude of media. Privacy Policy - Terms of Service
World Book is an encyclopedia and its mission is to "enhance learning and reading for children around the world by developing trustworthy, engaging content to create products that will engage children of all ages at home, on the go, in the classroom or in libraries worldwide. Privacy Policy - Terms of Service
TumbleBooks is a curated database of children’s e-books, available by subscription to Elementary Schools and Public Libraries around the world. Privacy Policy - Terms of Service

1:1 Policies & Requirements

Hardware/Software

All students in grades 4-12 are issued a laptop, required protective case, power adapter, external hard drive and available software (e.g., Microsoft Office, Adobe Suite, G-Suite for Education, and Evernote).

Occasionally, in highly specialized courses, students may be required to purchase course-specific software available through the MKA Bookstore or other retailers. Students keep their MKA laptop year-round.

Insurance/Protection

Any damage, malfunction or loss of the laptop needs to be reported to the Technology Department as soon as possible. In the case of a burglary or theft, a police report must be filed in order to process any insurance claim.

MKA will provide repair, protection and insurance of the laptops in multiple forms, including:

  • Tech Centers at each campus, staffed by MKA’s Apple-certified technicians who will be able to make repairs to the laptops.
  • AppleCare warranty, which will cover all manufacturer’s defects and related issues.
  • Insurance, which will cover all other issues related to loss or damage, not to include any intentional damage/neglect or mysterious disappearance. In these cases, the student/family will be responsible for the full replacement value of the laptop. (as defined below).

Intentional damage/neglect is defined as: "Any loss arising out of any act, or willful neglect by the user to commit or conspire to commit with the intent to cause a loss, including imposition of any abnormal conditions to the laptop."

Mysterious disappearance is defined as: "The disappearance of property without the knowledge as to the place, time or manner of its loss."

In the event of a needed repair, students will be issued a loaner laptop. Lost or stolen laptops will be replaced with a comparable laptop.

Liability/Charges

Parents/guardians will be liable for up to a $250 deductible per incident or the payment of all costs not covered by insurance in the event of damage to, loss of or destruction of the computer or peripheral(s), whichever is greater. These charges will be the responsibility of the family and charged to the student's MKA account at the time the device is repaired.

The cost of any visible damage to the inside and/or outside of the computer that may not impact the overall function of the device will be charged when the student leaves the school or the device is returned.

Distribution for New MKA Students

Students new to MKA in grades 5-12 are issued a laptop, power adapter, backup drive and required protective case prior to the start of school or, in certain cases, via appointment with a member of the Educational Technology Department.

Students in 4th grade receive their laptops during the opening weeks of school but do not begin taking them home until after Winter Recess.

Driver’s Manual, Driver’s Test and Administrative Rights

MKA’s 1:1 Driver’s Manual contains information and videos about MKA’s 1:1 Learning Program, including MKA’s Technology Acceptable Use Policy (AUP - included above), software updates, backing up, security, good habits, maintenance and how to resolve some common problems.

Taking and passing the Driver’s Test — which assesses students' computer management skills and understanding of the AUP — is the first step to becoming a laptop ‘administrator.’ An administrator has increased access to the laptop and its settings, eliminating the need to visit the Tech Center in order to install new applications, perform updates or customize the computer operating system in advanced ways.

Once students pass the Driver’s Test, they must also answer an in-person question given by a member of the Tech Department. Middle School students are also given a form that must be read and signed by a parent/guardian and returned to the Tech Center in order to be granted administrative rights.

While becoming a laptop administrator is not mandatory, MKA does encourage doing so, especially as students move into the upper grades.

Return to Service Policy

This policy outlines expectations for faculty, staff, and students related to data accessibility while a laptop is being repaired by the Tech Department and a loaner laptop is issued.

  • Users must regularly backup via Google Backup & Sync and Time Machine (faculty only) .
  • When provided with a loaner laptop, users will be able to access their data online via Google Drive (Computers).
  • Data will NOT be transferred to loaner laptops. If a damaged laptop is sent to Apple for repair, a backup of the laptop will be made first (if possible).
  • Users who have not installed Backup & Sync cannot expect to access data that was stored on their laptop while it is being repaired.
  • MKA will make or expedite the repair; most repairs will take at minimum of 48 hours.