SSIS Link Handbook Compendium GA Student Services GD ICT Handbook

GD ICT Handbook

    ICT TEAM

    David Perkin
    Director of ICT
    Wk: +84 (8) 5413 0901, 13170
    Mb: +84 122 5189332
    ictdirector@ssis.edu.vn
    Appointed 2008
    101747.JPG Khiem Ha Trong Tran
    ICT Team Leader
    Wk: +84 (8) 5413 0901,13170
    khtran@ssis.edu.vn
    Appointed 2007
    200130.JPG Trinh Nguyen
    ICT System Administrator
    Wk: +84 (8) 5413 0901,13173
    trnguyen@ssis.edu.vn
    Appointed 2012
    102495.JPG Nghi Chau
    Database Administrator
    Wk: +84 (8) 5413 0901,13172
    powerschool@ssis.edu.vn
    Appointed 2010
    100860.JPG Nguyen Nguyen Vo Le
    ICT Technician
    Wk: +84 (8) 5413 0901,34000
    ngnguyen@ssis.edu.vn
    Appointed 2010
    102496.JPG Vu Le Thanh
    ICT Technician
    Wk: +84 (8) 5413 0901,34000
    tvu@ssis.edu.vn
    Appointed 2010

    Vinh Vong Hoang
    Programmer
    Wk: +84 (8) 5413 0901,13174
    vvong@ssis.edu.vn
    Appointed 2016
       
     

    THE ICT MISSION STATEMENT

    To support the School’s mission we will capitalize on the power of technology to expand learning opportunities, to increase student achievement, and to increase efficiency and productivity. This will be achieved by advancing communication throughout the learning community, improving the teachers’ ability to utilize technology tools to deliver instruction effectively, and managing electronic information efficiently.

    GUIDING PRINCIPLES

    At SSIS, we believe that technology should:

    • be used to facilitate students in becoming life-long learners and enable them to become productive members of a society, digitally and ethically, and to become producers of the new media, not simply consumers of it.

    • transform instruction.

    • be a powerful and essential tool in the education process for students, faculty and staff. • be used to support student learning and high academic expectations.

    • be integrated throughout the curriculum.

    • strengthen the home/school/community relationship.

    • provide real-world experiences at all grade levels that assist the transition from school to career.

    • be used to model learning that has previously been considered theoretical.

    SSIS IS AN APPLE SCHOOL

    SSIS is an Apple platform school. This means:

    • All grade 4-12 students are required to bring an Apple Macintosh MacBook computer to school each day.

    • All full time teachers are provided with an Apple MacBook computer. Teachers who prefer to use their own Apple laptop may do on the SSIS network.

    • All new purchases of computer equipment, software, and peripherals must offer interoperability with Mac iOS and Mac OS.

    School funds may not be used for the purchase of equipment using other operating systems except with special permission from the Director of ICT. 

    WHY APPLE?

    • Apple is an innovative and proven leader in K-12 education - they have achieved an outstanding reputation in educational com- puting and have invested heavily in both research and collaboration to continually develop new approaches to student learning

    Apple’s seamless integration of applications, cross-platform compatibility, and a secure operating system allow for maximum educational use which allows educators to focus their students on the learning objectives.

    Apple hardware is robust and durable, and the software has been designed speci cally for the hardware, leading to smooth inte- gration of software and hardware making it easier for users to create digital content.

    • While Apple offers a range of hardware options, all use the identical operating system, ensuring that the experience is truly “plug and play.” Apple’s track record of supporting older hardware on the newest operating system allows individuals to retain their machines longer than the average in a Windows environment.

    Apple computers are excellent for content creation. The computers come pre-loaded with creativity apps and a built-in camera, which offers intuitive tools that schools need to make lessons more creative and relevant with video, audio and photos. The creativ- ity apps includes GarageBand (for recording and mixing music, iMovie (for editing video), iPhoto (for editing photos) and Keynote (for creating presentations). 

    GENERAL GUIDELINES FOR THE USE OF TECHNOLOGY

    All students and staff at are expected to use technology resources and services in a manner appropriate to a school setting and in keeping with the SSIS IT Responsible Use Policy. At all times, SSIS students and staff are expected to conduct themselves in a manner which is cognizant of the rights, feelings and freedoms of others as well as themselves. Whether using technology at home or at school, students are expected to give consideration to the effects their actions may have on other members of our community and the global society in general.

    SSIS technology and internet access is provided to enrich the learning experience. Recreational use of school technological resources and of school internet access is permissible only at times outside of instructional hours. Parents (guardians) and students are required to read the IT Acceptable Use contract and related network policies (below) carefully before signing the parental document of agreement in the back of this handbook. 

    EDUCATIONAL USE OF TECHNOLOGY AT SSIS

    SSIS teachers are expected to engage students using online resources through an effective blended learning pedagogy. By assigning tasks, outlining grading criteria and due dates, accepting digital submissions, and posting grades to a real-time grade book, students and parents will receive effective feedback and will always have access to real time grades.

    Technology is an integral part of teaching and learning at SSIS. Mobile devices are regularly used within and outside of the classroom environment to enhance student learning experiences by allowing students to demonstrate their understanding in new and creative ways, as well as to connect, collaborate and create with other learners around the world. 

    Given the extensive resources available at SSIS, students will use technology to demonstrate their learning in a variety of ways, including: 

    Collaborating and creating documents, spreadsheets, presentations and websites
    • Developing an electronic portfolio
    Creating unique and dynamic multimedia projects
    • Connecting and collaborating with other students within and outside of SSIS through the use of educational social networking.
    • Developing applications, programs or educational games.
    • Sharing, collaborating, and presenting their learning.
    • Publishing their creative works on our online photo and video galleries.
    • Students are encouraged to share finished works in a variety of online spaces in order to build a positive online presence and to present their learning to both a local and a global audience. 

    To ensure the success of this process, it is necessary that teachers adhere to certain basic expectations. These expectations are outlined in the context of existing systems and may change with the development of new online tools, teacher competencies, and school expectations. 

    REQUIRED SOFTWARE AND LOGINS

    One of the reasons for the move by SSIS to the Apple platform was the wide array of excellent software which comes preloaded on all Apple computers. Most of the software necessary for students at SSIS is either preloaded or available in free, downloadable versions on the internet or is web-based. 

    In keeping with this goal, all faculty at SSIS are expected to be versed in the software which is available to students. Except were absolutely necessary from the standpoint of pedagogy, which tool a student chooses to use should not be dictated by the teacher. If an essay is required to be submitted electronically, for example, a student should be free to use Apple Pages, Microsoft Office, or Google Pages. A slide presentation might be completed in Apple Keynote, Microsoft PowerPoint, or Google Slides. 

    In some cases, such as a planned collaborative activity in class, it may be necessary to required the use of a particular tool (e.g. Google Docs), but generally the choice should remain with the student. 

    Faculty should bear in mind that some parents may desire to limit the digital footprint of their child, especially when that child is young. While Google has given assurances that it does not collect data on students using Google apps for education (Classroom, Gmail, Drive, Calendar, Vault, Docs, Sheets, Slides, Sites, Hangouts, and Sites), it is crucial to note that this does not include any use of the Google Chrome web browser. Any use of Chrome by any user with a login creates a digital record which is tied to that particular individual, potentially for the rest of his or her life. 

    This would apply as well to the uploading of pictures or video to the internet. Faculty should bear in mind that parents may not wish to see images uploaded to areas over which the School has no control nor any ability to delete permanently from view.

    Therefore, while faculty may certainly share their own choices for software and services with students, they should avoid requiring students to use any particular software or service unless absolutely necessary. 

    LOGINS TO INTERNET SERVICES 

    While the practices above are guidelines, faculty and students should be mindful that a more stringent set of expectations is applied to any service which requires registration, i.e. the creation of a user name and password, even if this service or account is “free.”

    If a teacher wishes students to use a particular service (e.g. Dropbox, EverNote, etc.) which requires the creation of an account, he or she must seek permission from the divisional principal in advance. In most cases this is discouraged and will only be permitted in particular cases. If approval is granted, parents must be informed in advance and an explanation provided as to the essential pedagogical function of the service.

    In no case will students be encouraged or permitted to register for a service if they do not meet the prerequisites established by the hosting company (e.g. must be over the age of 13). SSIS will not approve any requests to require the use of the following services or those of a similar nature: Facebook, Flickr, Instagram, Twitter, Tumblr, WhatsApp, etc. 

    SSIS RESPONSIBLE USE POLICY FOR DEVICES

    STATEMENT OF PURPOSE

    Saigon South International School (SSIS) provides students with access to the school network and the Internet, and supports the use of personal devices, in order to deliver an innovative, relevant instructional program, enhance student learning, and improve communication. A key aspect of the educational program at SSIS is to teach, promote, and reinforce responsible use of technology.

    TERM OF AGREEMENT

    SSIS regards access to technology as a privilege that carries with it responsibilities on the part of the students, teachers, and parents. All parties are expected to manage technology responsibly, respectfully, and safely in accordance with the school mission, and core values. 

    As a responsible user, I agree to: 

    Respect and protect the privacy of self and others.

    • I will keep my passwords and login information private and will only use my own accounts
    • I will protect my contact information and that of others, such as full name, home address, phone number, or any other personal information.
    • I acknowledge that all contributions to the Internet leave a digital footprint and can be public and permanen
    • I will report security risks or violations to a teacher, parent or administrator.

    Respect and protect the integrity, availability, and security of all technology resources. 

    • I will be a responsible user and understand that access to the school’s devices, networks and the Internet is a privilege, not a right
    • I will be responsible for the safekeeping and care of all the devices (both mine and school-owned).
    • I will conserve, protect, and appropriately share these resources with other students and network users.
    • I will not tamper with data, networks, or any other resources.
    • I will immediately report to a teacher, parent or administrator any damage or problems with any device I use.

    Respect and protect the intellectual property of others. 

    • I will honor the private property of creators’ content and not plagiarize.
    • I will treat information created by others as the private property of the creator.
    • I will respect copyright and cite or attribute appropriately.
    • I will obey copyright laws and not participate in the making or distribution of illegal copies of music, games, movies, or written work belonging to others. 

    Respect and protect the principles of community.

    • I will communicate and use technology only in ways that are kind and respectful in school as well as outside.
    • I will notify a teacher, parent or administrator if I see any information or communication that is threatening or discomforting.
    • I understand that cyber bullying will not be tolerated and the school reserves the right to take action against anyone who posts or sends material, on or off campus, that adversely affects the safety or well-being of another SSIS community member. 
    CONSEQUENCES FOR MISUE 

    In accordance with divisional policy, violations of these agreements may result in disciplinary action, including but not limited to:

    • the confiscation of the device
    • the loss of a user’s privileges to use the school’s technology resources
    • the loss of the privilege to bring the device to school
    • Further consequences may be imposed in accordance with school policy. 

    Note that in extreme circumstances loss of access to school network would make it impossible for a student to continue his or her education at SSIS or for an employee to retain his or her position with the School. 

    PARTICULAR REFERENCE TO PORTABLE DEVICES AND MESSAGING 

    The School recognizes both the usefulness and the potential threats of electronic devices as they have evolved over the years as communication devices and social networking tools. Electronic devises of a non-academic, non-essential nature are permitted on campus but their use is governed by School policies.

    Cell phones, iPods and other devices are permitted but their use may not interfere with the mission of the School. The use of any non-essential device during class time, in the lunch line, or during meetings is strictly forbidden. Students are permitted to listen to music while studying, provided that they do not disturb others or interfere with the academic environment.

    Texting has become one of the most efficient ways of communicating with others, useful in ways that email, voicemail and phone calls sometimes are not. However, known cases involving texting require the School to set forth the following: Texting is the modern equivalent of passing a note in school. Messages may be innocuous or they may violate the Core Values or expectations of civility. Students who are found texting during a class or meeting, or who are suspected of violating the academic honesty via texts, will have their cell phone confiscated. In order to protect the privacy of a student who has violated these rules, a school counselor or the division head will check the device. If an infraction is suspected and it is not possible to check a cell phone, the School may require that the party responsible for the cell phone provide a printout of text messages sent or received during the specific period under investigation. 

    The faculty at SSIS follow one of two practices for dealing with communication devices in the classroom:

    Classroom teachers may require all students to surrender personal cell phones at the start of class. These cell phones will be kept in plain sight at the front of the room and returned at the end of the period.

    Classroom teachers may offer the students the option to surrender their phone at the start of class or keep their cell phone turned off and out of sight during the entire class period. 

    Regardless of which option the classroom teacher uses, any disturbances in the classroom caused by devices (e.g. ringtones, vibration alerts, etc.), any use of the cell phone during class time, or use while on break during class (e.g. visits to the bathroom), is considered a breach of civility. Phones that are confiscated for inappropriate use in class or elsewhere on campus will be turned over to the divisional office and will be returned only to a parent or guardian.

    Twittering and blogging, while not practiced by all, are common activities for students and adults alike. All members of the community are reminded of the public nature of any electronic postings and the expectations for honor and civility that apply even if the client and server machines lie outside of the School. Any reference to test or quiz information on a public site may be a violation of academic honesty. Any mention of a School employee or student, or of the School itself, which does not conform to community expectations of honesty, courtesy, and decorum may be grounds for discipline. 

    RECORDING OF AUDIO, IMAGES AND VIDEO

    The School recognizes that the capturing of audio and images of life at school, and of friends and acquaintances, is a valuable part of building memories for a lifetime. It is not the intention of the School to ban all audio recording, photography, or videography from campus but to protect, in line with our Core Values of “Respect for All,” the dignity and privacy of each member of the community individual. No individual will face discipline for the capturing of incidental images on campus as long as these images are appropriate, consensual, and in good taste. However, the recording, transmitting, or possession of any audio, image, or video clip that violates the law or community standards will be cause for disciplinary action up to, and including, dismissal from school or termination of employment. 

    NETWORK RESPONSIBILITY USE POLICY

    All students and staff at SSIS are expected to use technology resources and services in a manner appropriate to a school setting and in keeping with the SSIS Responsible Use Policy. At all times, SSIS students and staff are expected to conduct themselves in a manner which is cognizant of the rights, feelings, and freedoms of others as well as themselves. As a member of the SSIS community, when using technology both at home and at school, due consideration must be given at all times to the effects one’s actions have on other members of our community and the global society in general. 

    SSIS technology and internet access is provided to enrich the learning experience. Recreational use of school technological resources and of school internet access is permissible only at times outside of instructional hours. Students may access emails during lunch hour, however use of chat lines or websites similar to Myspace is forbidden.

    Parents (guardians) and students are required to read and sign a contract agreeing to these understanding before a student is given access to the SSIS technology network. 

    The following activities are not permitted and will result in loss of Network privileges and appropriate disciplinary action: 

    Visiting inappropriate websites, including, but not limited to, those containing obscenity, pornography, sexist or racist material.

    Harassment, threats or posting of material which denigrates or demeans others. Use of Inappropriate language including obscene, profane, rude, disrespectful, threatening or in ammatory language is strictly forbidden as is harassment or prejudicial or discriminatory attacks on others or the publishing of false or defamatory information about a person or organization.

    Violating the privacy or personal safety of others by revealing personal contact information about self and others. Visiting websites that promote hacking or illegal activities. Hacking is a serious offense and any incident of hacking will be subject to serious disciplinary action including possible suspension.

    Abuse of resources – chain letters, spamming and other such activities. Spamming is sending an annoying or unnecessary message to a large number of people.

    Plagiarism and other infringements of copyright laws.

    Accessing files and network folders created by others without their express permission is an invasion of privacy and is not permitted by school policy. 

    INTERNET PAGE EXPECTATIONS 

    Web pages posted on, or linked to, the SSIS learning portal may reflect positively or negatively on the School and the person or persons posting the page. When material is posted on the World Wide Web, anyone in the world can read it. People outside the community (including students applying to SSIS, their parents, SSIS alumni, current SSIS parents and the general community) will connect these materials with the School. It is expected that all who post to the SSIS Learning Portal will keep this fact in mind and maintain their pages accordingly. 

    Specific regulations for SSIS affiliated public pages include:

    Photos of students maybe included, if students are only identified by first name.

    No personal information, such as email addresses, phone numbers, or home address of a student, is allowed. 

    Prohibited items include:

    Locations, dates and times of school events.

    Student personal contact information of any kind.

    Links to staff, volunteers’ or students’ personal home pages. “Guest books”, “chat areas”, “message boards”, or the like.

    Material that violates copyright laws and licenses. 

    PAGE CONTENT

    The content of public pages must be consistent with the educational mission, goals, and objectives of Saigon South International School and with the letter and spirit of Saigon South International School policies. Material placed on web pages is expected to meet academic standards for proper spelling, grammar and accuracy of information.

    You may not include illegal content, as judged by local, state and national laws. Such content includes obscenity, copyright infringement, and sound or software piracy (among other violations). If there is any doubt about material or any conceivable violation of these guidelines, the author of the web page is responsible to check with the Director of ICT for clarification. 

    SOFTWARE AND LICENSING

    Computer software, whether purchased, developed, or modified by the School, may not be downloaded, copied, reproduced, altered, deleted, or appropriated by employees or students without the prior authorization of the technology department. Any such computer software is the property of the School and may not be copied or appropriated by employees or students for personal use during employment with, or attendance at, the School or upon separation. Employees and students should be aware that the illegal duplication of computer software may result in the ling of criminal copyright charges by the owners of the copyrights; copyright infringement is punishable by nes and/or imprisonment.

    The School does not condone the use of pirated software or any commercial media on its network or computers. The use of such copy- righted digital media is grounds for discipline, up to and including immediate termination or expulsion. Any employee or student who becomes aware of the presence of any “bootleg” or “pirate” software or media on the School’s network should notify a divisional principal, the Director of ICT, or the Head of School immediately. 

    LEARNING COMMUNITY CONTEXT 

    At SSIS, we actively promote and encourage the role of parents as critical and supportive partners in the learning path of their child. As well as for administrative purposes, ICT systems are used to extend and enhance students learning opportunities, to engage and inform parents about school programs and events, to highlight current curriculum activities and provide records of student learning progress. Systems link together in a logical sequence from static to dynamic to interactive - depending on purpose.

    GOOGLE APPS FOR EDUCATION

    SSIS uses an online workspace to support collaborative learning, digital work ow and communications. Communication between teachers and students should be through the SSIS managed systems.

    All teachers are encouraged to use the Google Apps collaborative workspace for document sharing and to support collaboration. Students have SSIS managed Google accounts. The use of systems other than the school managed system is not encouraged or supported at SSIS. 

    All teachers are expected to use Google Apps for Education in the following ways:

    • All email communication with students is conducted from the staff SSIS account

    • Online collaboration, le sharing and storage should be facilitated through the existing student account. 

    LEARNING MANAGEMENT SYSTEM- MOODLE (MS/HS)

    SSIS supports blended and integrated learning through the use of a learning management system. The SSIS LMS perform serves three important educational functions: 

    • Facilitates the consistent delivery of course content

    • Provides a structure for course management

    • Provides the teachers with powerful tools for curriculum development, communication, collaboration, and calendaring 

    A school-wide learning management system means that online course resources are maintained in a module that protects the on-going development of a bank of contextually relevant resources. 

     

    Files, links, course notes, examples, assessments, moderation samples, strategies and daily resources are maintained as a document repository for the course enabling sharing between faculty members as well as transfer of institutional knowledge. 

    All teachers are expected to understand and/or comply with the following:

    • SSIS supports the use of a single learning management system- Moodle. 
    • Some features of the LMS overlap with the feature sets of other core systems and may be disabled to avoid confusion (e.g. Gradebook and Attendance is a priority feature of PowerSchool)
    • Administrators will have "observer" access/ guest to all LMS classes. 
    • Parents may have "observer" access/ guest to LMS classes. 
    RUBUCON ATLAS CURRICULUM MAPPING

    SSIS records curriculum through the use of the Rubicon Atlas Curriculum Mapping software. It is expected that all SSIS teachers are familiar with the Atlas curriculum maps and follow guided instructions for adding notes and resources to update curriculum outlines. 

    All teachers are expected to understand and/or comply with the following: 

    • All resources and curriculum outlines stored on the SSIS Rubicon Atlas system become the property of SSIS. 
    • All programs of study, resources and lesson plans created by teachers specifically for use at SSIS become the intellectual property of SSIS regardless of whether they are stored on Atlas or not. 
    • Cirriculum Maps should not be edited without the expressed guidance of the division level Principal and/or the Curriculum Director. 
    MEASURE OF ACADEMIC PERFORMANCE (MAP)

    SSIS uses the NWEA Measure of Academic Performance, an adaptive testing platform, to determine ongoing individual student achievement. MAPs tests are performed twice a year to gauge annual progress. 

    All teachers are expected to understand and/or comply with the following:

    • The MAP testing window is shared on the school calendar and is not flexible. The testing window is our official MAP test time. 
    • MAP test require teachers to proctor. A timetable of proctor times is created and shared by the MAPs coordinator. 
    • It is the duty of all proctors to comply with the MAP test protocols. Students should be coached during tests. 
    POWERTEACHER GRADEBOOK (MS/HS)

    In the secondary, SSIS uses intergrated gradebook, attendance, scheduling and parent portal system. It is the responsibility of each teacher to maintain accurate and up-to-date academic records of each student. 

    All secondary teachers are expected to use PowerTeacher Gradebook for the following:

    • Record student attendance for each period during the school day. Attendance should be submitted within 10 minutes of the start of the lesson. 
    • Enter information for each assessment piece that contributes to the overall class grade (i.e. grades, narratives, and assessment criteria)

    Enter the following assessment information at the introduction of the assessment: 

     

    • Description of the context for the assessment.

    • Description of what is to be done to complete the assessment.

    • Description of how the assessment will be graded.

    • Assessment due date.

    • Record and publish assessment results/grades in a timely manner. Published grades are available to students and parents via the parent portal. Grades should be available online as soon as they are communicated to students in class. 

    ANTI-PLAGIARISM DETECTION- TURiNiN (HS)

    Turnitin is used as a means of ensuring academic integrity for courses at SSIS. 

    All teachers are expected to understand and/or comply with the following: 

    • Academic honesty is actively promoted in all assigned tasks, tests and class work - regardless of the use of Turnitin.com
    • Students and teachers are required to adhere to the SSIS Academic Honesty policy. Division level principals will be notified of trangressions or infringements. 

    SOCIAL MEDIA USE GUIDELINES 

    SSIS encourages all members of the community to maintain high ethical standards in their use of social networking. Since social media reaches audiences far beyond the community, all must use social sites responsibly and be accountable for their actions. 

    • In the online environment, all members of the SSIS community are expected to follow the SSIS Responsible Use Policy and con- duct themselves online as in School. Students and faculty are expected to use technology during class in a way that is conducive to the learning environment. Checking social media sites is not a class time activity.
    • Social media venues are public and information can be shared beyond the user’s control. All members of the community are expected to be conscious of what they post online and the long-lasting impression on many different audiences.
    • Nothing(photos,videos,webpages,audio files, forums, groups, fanpages, etc.) should be posted or linked to a social networking sites that you wouldn’t want friends, peers, parents, teachers, college admissions officers, or present or future employers to access. What you present on social networking forums represents you forever.
    • Responses to anyone, especially in disagreement, should be respectful. Criticism should be constructive and not hurtful. Donot use profane, obscene, or threatening language.
    • All should understand the use of privacy settings to control access to networks, webpages, pro files, posts, blogs, wikis, podcasts, digital media, forums, groups, fan pages, etc.
    • Online stalkers and identity thieves are a real threat. Never share personal information, including, but not limited to, social security numbers, phone numbers, addresses, exact birth dates, and pictures with people you don't know or on unsecure sites. 
    • Users are responsible for keeping passwords secure and never sharing passwords with others. If someone tampers with your blog, email, or social networking account without you knowing about it, you may still be held accountable if you failed to maintain reasonable security.
    • No member of the community should ever misrepresent themselves by using someone else’s identity.
    • Cyberbullying is considered an act of harassment
    • Use of SSIS logos or images on personal social networking sites is prohibited. Promotion of a specific SSIS activity or event may be done only by means of a link to the of cial SSIS Facebook account. 

    Please also refer to the SSIS Responsible Use Policy for further guidance. 

    NETWORK DEVICE POLICY 

    Network devices include any networkable device someone brings to the SSIS campus. This may include a laptop, tablet PC, or smart phone. Personal network devices can be used on the network; however, a few expectations must be met. These expectations are not listed solely for the purpose of controlling how personal property is used but instead are intended primarilly to protect the SSIS’s network.

    All devices on the network must be con gured in such a way as to prevent problems. One incorrectly con gured device can disrupt the entire network. 

    EXPECTATIONS
    • The owner of the device is also solely responsible for the network configuration of the device.
    • The owner of the device is solely responsible for how the device is used regardless as to whether the owner or a borrower of the device is performing actions on it.
    • The device is fit to be on the network. In other words, if the device has a poor quality network interface card or a corrupt operating system it could cause problems for other devices on the network.
    • The owner of the device understands how to set up the device for use on the network and owns all necessary equipment for setting up the device. Cables, network cards, dongles, and antennas cannot be borrowed from Saigon South International School.
    • No workstation will be disconnected from the network in order to provide a free port for a personal device without prior permission. Individuals doing academic work will have priority.
    • The owner of the device is responsible for the physical security of the device. The return of any device is solely that of the person who checked it out from SSIS. Individuals will be expected to compensate the school nancially for lost devices.
    • The device must be running the latest virus protection software (if appropriate), including the latest updates to the virus definition files.
    • The device is running the latest security patches for its operating system.
    • The device is free of spyware, adware, worms, viruses, trojan horses, and peer to peer software that could disrupt the network.
    • The device is not to be used for any illegal activity, peer to peer file sharing (including Kazaa, Limewire, Gnutella, BitTorrent, etc...), hacking or cracking this network or any other, downloading large files, or viewing (or listening) to streaming media.
    • The device is not running any internet sharing or web hosting services and does not have internet connection sharing services turned on. 
    GENERAL STEPS TO PUTTING A DEVICE ON THE NETWORK
    • Your device must have the TCP/IP protocol installed. It must be set to obtain an IP address automatically from a DHCP server.
    • The computer name or host name for the device must be the user’s SSIS network login name.
    • The user must sign and complete a network device form and return it to ICT Department before connecting a device to the network. If the user do not understand how to obtain this address, he or she should refer to “How to Locate Your Network Adapter Address” on the SSIS Link site. 

    EXPECTED EMAIL ETIQUETTE 

    When communicating via electronic mail, individuals do not have the advantages of body language or voice inflection. Therefore, all should be sensitive to the way in which things are said. Capitalizing an entire word that otherwise would not be, for example, is akin to screaming. Putting asterisks on either side of a word, on the other hand, represents emphasis. 

    All members of the SSIS community are expected to abide by the generally accepted rules of email etiquette. These include (but are not limited to) the following: 

    • Be polite. Do not be abusive in messages to others.
    • Use appropriate language. Do not swear, use vulgarities or any other inappropriate language.
    • Illegal activities, or the promotion and encouragement of these, are strictly forbidden.
    • Do not reveal your personal address or phone numbers, or those of students or colleagues, when sending email.
    • Note that electronic mail (e-mail) is not guaranteed to be private. The School will, when presented with reasonable cause, access emails or other les stored on, or transmitted through, our network. Messages relating to, or in support of, illegal activities may be reported to the authorities.
    • Do not use the network in such a way as to disrupt the use of the network by others.
    • All communications and information received via the network should be assumed to be private and should not be shared without the express permission of the sender. 

    A few pointers specific to email communication:

    • Don’t be too wordy.
    • Keep line lengths to less than 65 characters.
    • Write with proper spelling, grammar, punctuation.
    • Always include your name and e-mail address at the end of the message when writing to people who don’t know you.
    • Review what you have written before you send it off. 

    Network access is offered to members of the SSIS community as an educational tool; please use it that way. Keep in mind that children are using the network and act accordingly. Thank you for helping us make the Saigon South International School email program a success! 

    CONFIDENTIALITY AND ACCEPTABLE SYSTEMS USAGE 

    The School’s hardware and network bandwidth are intended for School business only. Use of the School’s systems for accessing or acquiring information and materials inappropriate to a school environment is against school policy and is prohibited. All information transmitted or stored on the School network drives and databases (e.g., employee lists, student lists, documents relating to policies and procedures) is the sole and exclusive property of Saigon South International School and should be treated as confidential. Such information may not be disclosed to any person outside of the School nor may any such information be removed from School premises without the express permission of the Head of School.

    Employees are strictly prohibited from accessing, reading and copying data or information stored on the school network and within School databases which is not part of their employment responsibilities and may not access, read or copy and communications not directed to them without prior authorization.

    All School business is to be conducted, in so far as possible, with School provided tools and systems. All systems messages are School records. The contents of our systems may be disclosed to the School administration without the sender or receivers permission. If required by law, the School may need to turn over copies of messages, files, or video to law enforcement authorities. Therefore, no one should assume that messages and communications are confidential.

    If the privacy and confidentiality of any message is important, a private email address, message system, or phone should be used. 

    PASSWORD SECURITY AND FILE INTEGRITY 

    All organizations establish systems by which shared network drives are subdivided and permissions established for access to certain folders or files. Should anyone discover an error in these privileges which grants him or her access to files that should be private, he or she must immediately inform the Director of ICT of this irregularity. The ability to access a folder or file does not constitute the right to access that same folder or file. The accessing of private and confidential information, even through “accidental” privileges, is a violation of the professional expectations of all employees and the code of conduct of students and may result in discipline, up to and including dismissal for the employee or expulsion for the student. This is true even if no alternation is made to the records or no copies are made. 

    Employees and students are prohibited from the unauthorized use of passwords and encryption keys belonging to others in order to gain access to that individual’s messages or les. 

    ICT SUPPORT FOR SECURITY SYSTEMS AT SSIS 

    The ICT Department assist the School and the security personnel at SSIS in providing technology support to 

    ACCESS CARDS

    Vietnam in general, and District 7 in particular, is an extremely safe place with very few incidents of the types of crimes that so often plague major urban areas. SSIS has a responsibility, however, to take proactive steps to safeguard our community and property. This begins with controlling access to campus. SSIS uses a key card system and turnstiles at the front of campus.

    Cards are issued through the ITC offices to members of the community with a legitimate need for easy access to campus. This includes students, teachers, administrators, staff, parents, caregivers, and a limited number of regular visitors. Cards are not issued to delivery personal or vendors with the exception of employees of The Caterers who are contracted to provide food services on campus.

    The original issue of the card is free. Should a card be lost or stolen it must be reported immediately to the school and a replacement card will be issued at a cost to the individual. 

    SECURITY CAMERAS AT SSIS

    For the safety and security of our campus, our community, and property, CCTV cameras are installed throughout SSIS. All students, staff and visitors. 

    Live Viewing of CCTV Footage

    The SSIS security officers have live feeds of CCTV cameras and have software to watch the footage recorded by the CCTV cameras. The ICT Department has software to watch live footage and recording made by the CCTV.

    Review of CCTV Recording

    The CCTV recordings can be viewed by ICT Department following a request made by the School administration. The CCTV recordings are not available to the public (student, parents or other parties) for reasons of confidentiality and respect of privacy. When appropriate (e.g accident on campus, loss of property, behavior issue), parents may be invited to view content, but no copies will be made or given.

    Image Retention policy

    The CCTV recordings are stored on a server with rotating cycle. When the server has no more space, older recording are erased. This means that the timely reporting of any loss, theft or vandalism of property on campus, or of incidents involving teachers, staff, students, parents, or outsiders is critical to the School’s ability to adequately investigate the same. 

    SUPERVISION AND MONITORING OF TECHNOLOGY ON CAMPUS

    The use of technology resources at SSIS is not private. The school reserves the right to examine, use and disclose any data found on the school’s information networks in order to further the health, safety, discipline or security of any student or other person or to protect property. They may also use this information in disciplinary actions. The school reserves the right to determine what constitutes responsible use and to limit access to resources.

    SSIS will not be held responsible for individual property if it is lost, damaged, or stolen on campus, though the School will make every effort to assist in identifying and, in the case of community members, imposing consequences for behavior which results in the loss, damage or theft of equipment on campus, whether School-owned or private. 

     

     

    Approved Technology Systems at SSIS 
      Early Childhood/ Elementary Middle School/ High School 
    Cirriculum Mapping Rubicon Atlas Rubicon Atlas 
    Calendars Google Calendar Google Calendar
    Email Google Mail Google Mail
    Attendance PowerTeacher PowerTeacher
    GradeBook

    Current: various

    Future: PowerTeacher Gradebook

    PowerTeacher Gradebook
    College Readiness   Naviance
    Scheduling PowerSchool PowerSchool
    Parent Portal PowerSchool PowerSchool
    Learning Management System    Moodle
    Blog WordPress WordPress
    Online file storage

    Network Storage - srvr-file

    Google Apps for Education

    SSIS Youtube channel 

    Flickr

    Network Storage - srvr-file

    Google Apps for Education

    SSIS Youtube channel 

    Flickr

    Document collaboration Google Apps for Education Google Apps for Education
    Standardised Student Tests

    Web-based MAP (G3-5)

    WRAP

    Web-based MAP

    WRAP

    Academic Honesty No current technology solution Turnitin - High school
     
    Approved Device Use at SSIS 
    Division Grades Laptop

    Other Personal Electronic Devices (e.g. phones, smartwatches, iPads, etc.) 

    Elementary School      
      EC-Gr 2

    A personal laptop is not permitted on campus 

    A personal laptop is not permitted on campus 

     

    Gr 3 

    A personal laptop is not permitted on cam- pus. 

    An school-provided iPad is available for in-class use as needed within the curriculum. Other presonal devices are discouraged and may not be used at any time during the academic day. 

     

    Gr 4-5 

    Required; Macintosh laptop capable of running the latest OS 

    Personal devices are permitted, but may not be used in the classroom without the express permission of the teacher. 

    Middle School 

    Gr 6 

    Required; Macintosh laptop capable of running the latest OS 

    Permitted, but may not be used in the classroom without the express permission of the teacher. Use outside the classroom for academic pur- poses is encouraged. Students are expected not to use devices for game playing or social media during the acdemic day. 

     

    Gr 7-8 

    Required; Macintosh laptop capable of running the latest OS 

    Permitted, but may not be used in the classroom without the express permission of the teacher. Use outside the classroom for academic pur- poses is encouraged. Students are expected not to use devices for game playing or social media during the acdemic day. 

    High School 

    Gr 9-10 

    Required; Macintosh laptop capable of running the latest OS 

    Permitted, but may not be used in the classroom without the express permission of the teacher. Use outside the classroom for academic pur- poses is encouraged. Students are expected not to use devices for game playing or social media during the acdemic day. 

     

    Special Notes:

    1. Streaming music or videos over the School network which are not being used as instructional material in class takes up an unacceptable amount of bandwidth and is prohibited. Faculty or students found to violate this understanding may have their network priviledges curtailed or revoked. 

    2. SSIS maintains a licensing agreement with Microsofor its current Oce Suite of applications. All students and faculty have the right to download and install the latesIt Office Suite (Word, Excel, PowerPoint, Outlook, Access) for up to five Macintosh OS or Windows devices. Registration is accomplished with the student or stamembers email and network password and the license remains in effect for the duration of the individual’s association with SSIS.

    3. A list of recommended soware for all students, dierenciated by grade level and subjects, is maintained on the SSIS Link here. 

     

    Page last modified 10:09, 27 Oct 2016 by trho?

    Comments0

    Files7