What is the most common device used in the classroom?
Computer
Online behavior expectations
• Access only approved websites and applications
• Protect personal information and privacy
• Communicate respectfully in digital environments
• Report any inappropriate content or behavior
Do administrators think that digital content in school increases student engagement
yes
Legal Consequences for making threats
•Student Arrests
•Criminal Record
•Court Hearings
•Legal Fees
S
Stop & Think
What program do we use in CSA?
CODE HS
guidelines for using technology
• Minimize device damage and loss
When you come to class, your computer should?
be updated and charged
Life Consequences
•Limited Career/Educational Opportunities
•Stress or strain on family members
•Loss of friendships/relationships
A
A- Ask for Help
In the classroom, students should come...
Come prepared with charged devices
How do you update your computer? 2 ways!
auto update and leave computer in sleep mode
My HR teacher
How Does a School Threat Impact Others?
•Disrupts learning environment for students & staff
•Impacts campus, regional and national leaders to address threat
•Impacts trust that families have in school safety procedures
F
Find a Quiet
Place
What emerging technologies do teachers think will be the most important to education in the next decade
3D printing
Failure to follow expectations may result in:
• Loss of device privileges
• Parent/guardian notification
• Restitution for repairs or replacement
• Disciplinary action per school policy
how many students prefer digital school work compared to pen and paper?
44%
Educational Consequences
•Verbal/Written Statement Threats
•Consequence: Detention; ISS/OSS; classroom placement change; withdrawal of privileges (e.g., extracurricular activities); device confiscation (loss of technology privileges
E
E- Educate Yourself & Others
To protect school devices, students must:
- Handle devices gently and keep them on desks
- Close laptops properly and shut down correctly
- Keep food and drinks away from devices
Teachers should create a system to:
• Log device assignments by student name and date
• Record daily usage times and activities
• Inspect devices regularly for damage
• Document and report any damages or losses
What personal info should I keep private on a computer?
passwords, home address, and phone number.
Why do you think students make threats?
What could they do instead?
Many such threats are the child's way of talking big or tough, or trying to get attention. Sometimes these threats are a reaction to a perceived hurt, disappointment, or rejection.
Talk to Adult
T and Y
T- Tell Your Parent or Family
Y- You & Your Help Matters