Bring Your Own Device (BYOD)

Responsible Use Guidelines

The guidelines below apply to any and all digital devices students may be using in school, including but not limited to laptops, smartphones, mp3 players, etc. and extend to the school’s classroom computers.


I.  Technology Maintenance

Each user is responsible for his/her own use, and should treat and use technology responsibly and appropriately, computers and computer accessories are sophisticated devices that require care and gentle treatment to function properly; if you mistreat your device it will likely run poorly or malfunction.

A. Externally

  • Users are responsible for taking care of their devices and related accessories and are cautioned never to leave them unsupervised but to secure them in lockers when not in use.
  • Users are responsible for taking care of audio/visual equipment when in their possession.
  • Users are cautioned about how they utilize their equipment during daily activities like eating, drinking, walking and traveling.
  • The Systems Administrator or designate would not be responsible for installing software on a user’s device unless approved by ISPS


B. Internally

  • All attempts should be made for keeping an organized desktop and file management system.
  • Students should make regular backups of their school work.

C. Damage

  • In the case of damage caused by negligence, the user of the device is responsible for repairs or a replacement.
  • Each technology user must be responsible for keeping their device in working order.
  • The Systems Administrator or designate would not be responsible for repairing damaged devices unless approved by ISPS


II. Ethical use of Technology

Students may use digital devices in supervised areas including classrooms, the cafeteria, and the library.

A. Software

  • Users must not download any software to the ISPS network and school devices except where it has been approved and authorized by the Systems Administrator or designate.

B. Internet

  • As a mission driven school, the internet should be used to promote the instructional mission of ISPS.
  • All sites and downloads may be monitored and/or blocked by ISPS if they are deemed to be harmful and/or not productive to business, education and learning.


The following activities show responsible use of the internet:

  • Researching.
  • Communicating responsibly.
  • Web-based learning applications.
  • Responsible social networking.
  • Educational learning networks.

The following activities demonstrate responsible use if part of an assigned activity:

  • Listening to music.
  • Watching movies or videos, instant-messaging, chatting, or social networking with ISPS students or staff.
  • Educational use of online games.
  • Downloading music/videos/images from the internet for assignments.

The following activities show unacceptable use:

  • Online gaming and downloading music/videos/software from the internet without permission and un-related to academic work.
  • Intentionally denying access to or interfering with any network resources.
  • The internet provides access to information (e.g. pornographic materials, vulgarity, gambling, militant/extremist material, hate speech, etc.) that is inconsistent with ISPS' mission. Users may not access, store, share, or display such information.
  • Conducting commercial activity that is not authorized/approved in writing by ISPS
  • Any malicious attempt to harm or destroy school technology equipment or materials, the data of another user, or any of the institutions, or other networks that are connected to the internet is prohibited.
  • Introducing malicious software such as viruses, worms, Trojan horses and other attacks on ISPS networks and/or jeopardizing the security of the organization's electronic communications systems.
  • Intentionally circumventing or compromising the security controls or integrity of the school’s ICT resources.
  • Conflicts with the aims and objectives of ISPS.
  • Could result in legal action being taken against ISPS.
  • Violates national laws.

C. Communication Tools

  • Individual teachers may have specific policies regarding the use of technology devices in their classrooms. These policies should be respected at all times.
  • The primary purpose of ISPS Gmail accounts is for school related communication that serves the teaching and learning at ISPS. Students should not use their Gmail for personal messages during class time unless related to assignments.
  • Students may not send an email to (or "spam") a whole class, an entire grade level, or any group within the school. Such communications should be processed through a faculty member and/or posted in school announcements.
  • Students may use age-appropriate social networks to communicate responsibly with peers.

D. Monitored Use

  • E-mail and other uses of electronic communication systems (such as Wi-Fi) by students shall not be considered confidential and may be monitored at any time by designated staff to ensure appropriate use of educational or administrative purposes.


Being a Good Digital Citizen

The way we use technology tools to communicate information has a powerful effect on our learning community. Responsible use will lead to better, more effective learning while irresponsible use will diminish it. A strong respect for the principles of digital citizenship is essential for us to live our mission at ISPS.

A. Digital Rights and Responsibilities

  • Forgery or attempted forgery of email messages or other electronic documents is prohibited.
  • Reading, deleting, copying, downloading or modifying any electronic documents of other users is prohibited.
  • All research used in an academic work, must be properly cited, including information from the internet.
  • There should be no copyright law violations with regard to software or internet-based information. Copyright information is available in the library.

B. Privacy & Security

  • In order to respect the privacy of community members, technology users may not steal or/and use another person's ID or password without authorization.
  • Accessing other people's accounts in any form, is not allowed.
  • Sharing confidential material or proprietary information outside of the organization is strictly prohibited.

C. Digital Etiquette

  • Any online communication should be something you could say in person: this includes emails, instant messages, digital images/videos, or web postings.
  • Use school Wi-Fi networks on the ISPS campus and turn off personal data plans during school hours: 7:30 a.m.- 2:15 p.m.
  • Be aware that anything posted on the internet is permanent.

D. Communication

  • Derogatory, obscene, or otherwise inappropriate e-mail exchanges, instant messages, digital images, or web postings are considered cyber-bullying and are prohibited.
  • Any form of cyber-bullying will be dealt with swiftly and may carry severe consequences.
  • Posting images or videos of others, without their permission, may lead to unforeseen consequences.
  • In no instance should photos, audio, or videos of ISPS staff members be posted online without their permission.


Enforcement of Policy

Any student, who is found to have engaged in conduct that may be prohibited by this policy document, may receive education, training, counseling, warnings, discipline, and/or other measures designed to prevent future violations including loss of access privileges.

  • Deliberate attempts to violate the ISPS Technology Acceptable Use Policy or to compromise, degrade, or disrupt system performance may result in restricted use of technology at school or other appropriate consequences, such as limiting, suspending or revoking a student's access to the school's technology systems or the network.
  • The student is further subject to the Disciplinary Code of Conduct and Consequences as published annually in the Parent-Student Handbook.


Course Work

ISPS has fully adopted PowerSchool Unified Classroom as its main resource for saving and sharing documents. Students bringing their own device will NOT have access to server storage on the ISPS network. ISPS is in the process of moving most digital content to the cloud-based platforms. In addition to PowerSchool Unified Classroom, teachers and students can share documents using Google Drive.

Students on BYOD are required to use and be signed in to the Google Chrome browser while on the ISPS Network and during class unless otherwise instructed by their teachers or approved by the IT Department. Google Chrome works best with school-supported platforms and classroom management tools.

We expect students to bring their laptop and charger to school every day. If you forget your laptop at home, you must do without the laptop for the school day. A laptop will not be loaned for this purpose.


Student Device Expectations

  • Students should bring their preferred earbuds or earphones to use with their devices.
  • Devices must arrive at school with a full charge. Cords and connectors should be brought, just in case.
  • Often students use different devices to perform different tasks. However, students will be limited to a maximum of TWO (2) devices, so as not to overload our network. This could include a phone OR iPod OR tablet, etc. That is, one device in addition to the required laptop.
  • ALL families will be asked, to agree to the Student Acceptable Use Policy the first week of school.
  • Grade 5 students may bring a laptop for school as an option, but they must also meet all the same criteria as the grade 6-­12 students.
  • Lower grades are asked NOT to bring digital devices to school at this time. Pre-K-Grade 2 students have access to classroom sets of iPads and Students in Grades 3-5 have access to classroom sets of Chromebooks.




Who is responsible for purchasing education specific software on student owned devices?

Student accounts to cloud based instructional services (Google Apps for Education) are provided by the school. If a student is bringing in a laptop that meets the minimum technical requirements, then the student will have access to all schools provided services. iPads and Android based devices do not meet the minimum requirements for a student or staff owned device at this time although a student may bring in an iPad or an Android tablet to supplement their main laptop.

Who is responsible for the maintenance and updates of these devices?

All maintenance for the hardware device, operating system, software and/or apps purchased by the family. Families should ensure a quick maintenance turnaround for student or staff devices. However loaner laptops will be available in the tech office for emergency situations.

How do students store and share their digital work?

Students have access to PowerSchool Unified Classroom in addition to Google Drive for saving and sharing documents. These services are available from any device with an Internet connection and have dedicated apps for Android and Apple iOS devices in addition to Mac and PC application software.

Do I need to purchase Insurance for my BYOD device?

When purchasing your laptop, please make sure you purchase Damage Protection for your PC laptops. For Apple products, please purchase Apple Care. You will also need to take additional insurance for damage protection as it is not covered under Apple Care. This ensures that your laptop is protected against accidental damage to your child’s device on and off the school campus. Fire, theft and acts of God are usually not covered under these programs and we request you to include it in your personal or home insurance. In the case of a laptop being insured as part of a home or personal insurance, the laptop should be insured for accidental damage and loss by fire and theft when outside the home. The insurance can be purchased with your computer vendor or any insurance company. All insurance claims must be settled between you and the insurance company.

How do we ensure students remain “cybersafe” in and out of the classroom?

Digital citizenship instruction integrated with classroom learning is an essential component of any 1 ­to­1 technology program. The digital citizenship curriculum we currently have in place supports the use of personal devices in and out of the classroom.

How do we ensure access to the same applications for students?

Most applications that students use are Internet (cloud) based, thus ensuring access to all students with laptops that meet the minimum requirements.

In addition, there are circumstances in which it is preferable for students to select their own application to complete a task. Computers are powerful means of differentiating and personalizing a child’s education, and student­ owned devices facilitate student choice over which application best suits their learning and communication style. Teachers work with students to ensure everyone can access and view student’s final work in appropriate formats as necessary.

What are the guidelines for responsible use of these devices?

ISPS has an Acceptable Use Policy for use of computers and other networked devices both internally and externally. The guidelines, rules, and recommendations shared in this document are adhered to in the classroom and should also be reinforced at home.

Which laptops are acceptable/approved?

The laptops that make the minimum specification list mentioned in the BYOD guide are acceptable for use in the classroom. Both Mac and PC are acceptable.

What Operating System must be installed? Can I use a Mac?

For a PC, the operating system must be Windows 7 Professional or Higher. If you are using a Mac, the operating system must be Mac OSX 10.8 or Higher. (Please refer to the laptop purchase guide)

What if I forget my laptop at home?

There have been only a few instances when students forget their laptops at home. In this unusual circumstance, the tech department has loaner laptops available. Students are still responsible for accessing their work through Internet (cloud) based solutions like Google Apps.

How many devices can I bring?

Students can bring two devices to school to be used on the school Internet. This means that they could bring, for example, a laptop computer and an iPad or a laptop computer and an Android phone. If students routinely bring three devices to school, they will only be allowed to connect two of them to the network.

What are the rules about surveillance (monitoring student laptops)?

We do not monitor students laptops. We do however keep a log of internet traffic on the ISPS Network. All technology use guidelines will apply to misuse of the Internet or the ISPS network.

How can I use my laptop during my free times?

Specific guidelines for laptop use during breaks, lunch, and other free time can be found in the divisional student handbooks.

What are the rules about games?

Please refer to your child’s student handbook for their division’s specific rules. Educational games may be used by individual teachers in their classes. Downloading and playing of other games, particularly online, takes up too much bandwidth and could negatively affect other students' use of internet connections. Save those for home and specific home rules about them.