At CISH we strive to provide our students with the opportunity to utilize the latest in information technology and hardware as they engage in the learning process.
EY and PYP Devices
Students in EY and PYP have the opportunity to use iPads or laptops provided by the school as a regular learning tool. IPads and laptops which are owned by the school are not to be taken home and should be kept in the homeroom where a locked storage cabinet with charging capabilities is available. Devices should always be accounted for and locked up in the correct storage cabinet in the homeroom at the end of each day. It is the student’s responsibility to make sure his or her device is put away properly.
Students are responsible for safeguarding devices such as iPads and laptops while using them. Students (or their parents) will be charged for repairs or replacement if they damage a device that is owned by CISH, whether the damage is caused intentionally, by negligence or by accident. If a device that is assigned to a specific student goes missing, the student to whom the device is assigned will be held responsible unless it can be proven that another individual is guilty of theft. The teacher and principal will conduct an investigation to determine the cause of any damage or loss before determining who is to be held responsible. All classrooms are equipped with CCTV to which the principals have access.
Laptop Use in MYP and DP
MYP and DP students need to bring their own laptop for use daily. Laptops are required for all students and may be used for academic purposes in the classrooms, library, and study spaces, but not the cafeteria, hallways, stairwells, or gymnasium. Teachers may set regulations for use in their own classrooms; however, it is expected that the teacher will designate appropriate use times - it should not be the “default” for students to open their laptops for free time use until directed otherwise.
Teachers will provide access to cutting edge applications and software that are designed to support each specific subject area.
Acceptable Use Policy (AUP) for Technology
All students are expected to make appropriate choices regarding technology use. Students will be educated on the responsible use of technology in their lives, including topics such as: developing an understanding of and evaluating online resources, online safety, appropriate online behavior, effectively managing time spent on devices, plagiarism and respecting privacy.
This Acceptable Use Policy (“AUP”) is in place to protect students. It is our goal to prevent students from becoming victims of online misconduct, to prevent inappropriate or unlawful activities by students online, and to prevent unauthorized disclosure of or access to sensitive information and inappropriate materials. These policies, guidelines and rules refer to all devices including but not limited to computers, laptops, iPads, portable memory storage devices, calculators with interfacing capability, cell phones, smart watches, digital cameras, etc., as well as the CISH technology infrastructure and software.
Responsible Digital Citizenship
Student use of technology should be informed by the ideals of the IB Learner Profile and be in line with expectations set by teachers and the school.
Respect academic rules regarding proper documentation and plagiarism. Use only legally obtained software. When in doubt, consult a teacher or librarian.
Malfunctioning technology should not be used as an excuse for not meeting the expectations of a course.
Students and parents should read all school and course communications (emails, Teams, Toddle, ManageBac) on a daily basis.
MYP and DP students must come to class with their laptop prepared: necessary files and software backed up and accessible, anti-virus software up-to-date, and a charged battery. Students must plan their day so that they have adequate battery power for all academic requirements.
Students should learn and develop the technological skills required for participation in each of their courses.
Students should use the school’s network, computer systems and communication tools in constructive ways, for academic purposes only.
Students should not let technology be disruptive to learning in any way. Online entertainment activities such as video game playing, video and audio streaming and instant messaging compete with academic work and are discouraged throughout the school day.
Students should not bring electronic devices on to play areas as they may become damaged.
While in class, students should have open only the programs, windows, and tabs that are relevant to the class as permitted by the teacher.
Students should use the same discretion in online communication as with in any other form of communication.
Students should not use electronic devices in the cafeteria.
A Protected Network
CISH will use technology protection measures to block or filter, to the extent practicable, access to visual depictions that are obscene, pornographic, and harmful to minors. Only current CISH students, teachers, staff and approved guests are authorized to use the CISH network and devices.
CISH reserves the right to, and will, monitor all technology use on campus, as well as any technology use that enters the school community (both physically and through online spaces and means). This includes, but is not limited to, personal devices such as mobile phones, tablets and personal computers. The leadership team, faculty and technology staff have the right to examine any student files or devices without warning. Computers may be remotely accessed and observed by CISH staff without student or parent knowledge and consent. Computers may have restrictions placed upon them by the IT Office. It is considered a severe offense to remove and or block in any way the ability of school personnel to monitor technology use.
CISH reserves the right to access, review, copy, store or delete any electronic communication or files that are generated through the school network, platforms and devices. CISH may also disclose those electronic communications or files to the authorities or others as it deems necessary. Users should have no expectation of privacy regarding their use of school devices, the school internet and communication tools managed by the school, including email and Teams messages.
Acceptable Uses of the CISH Computer Network or the Internet
Access to the CISH internet network is provided for educational purposes and school business only. Technology is a powerful tool for learning and can enhance the learning experience greatly. At CISH we want all students to become experienced users of technology in order to prepare them for future careers and life. If a user is uncertain about whether a particular use is acceptable or appropriate, he or she should consult a teacher or other appropriate CISH personnel.
Unacceptable Uses of the CISH Network and Inappropriate Online Behaviors
Below are examples of inappropriate activities when using the CISH network or devices:
Any activity that creates security or safety issues for the school, students, teachers or staff.
Any activity that lacks legitimate educational value or purpose.
Any activity that violates the law or encourages others to violate the law.
Accessing, transmitting or downloading pornography, obscene depictions or other harmful or offensive materials.
Plagiarism or stealing copyrighted materials.
Selling or purchasing illegal items or substances.
Gambling.
Gaming (unless educational in purpose).
Spamming or advertising.
Downloading or spreading computer viruses or harmful programs that could damage the network or devices.
Downloading large content which is not necessary for learning.
Distributing political or religious materials.
Using profane, inappropriate or impolite language.
Threatening, harassing, abusive behavior or cyber-bullying.
Deleting, copying, modifying, or forging other users' names, emails, photographs, files, or data.
Disguising one's identity, impersonating other users, using anonymous social media or email accounts, or using another’s account information.
Hacking into protected sites or attempting to access information protected by privacy laws.
Interfering with other users' ability to access their account(s).
Sharing confidential information.
Disclosing someone else’s password to others.
Other activities as determined by CISH as inappropriate.
Consequences for Improper Use
The use of devices at CISH and the CISH network is a privilege, not a right, and misuse will result in consequences. Those consequences can include:
A device will be taken away or restricted access permitted for a specified time frame.
The student may be asked to give a presentation to other students about internet safety or good digital citizenship.
Severe misuse may also lead to disciplinary and/or legal action, including suspension, expulsion, or criminal prosecution by government authorities.
CISH will attempt to tailor any disciplinary action to the specific issues related to each violation.
Student Internet Safety
Students should not reveal personal information about themselves, their friends or their family on the internet. For example, students should not reveal their name, home address, telephone number, or post photographs that could lead to harm.
Students should not reveal information or post photographs that could be disreputable to themselves later. Universities often do an online background check of students before accepting them.
Students should not meet in person anyone they have met only on the Internet.
Students must tell a teacher or parent if anyone on the Internet asks personal questions about them or makes them feel uncomfortable.
Students should keep their passwords and account information secure and never share this information with others, even a close friend.
Electronic Communications
The contents of any electronic communications, including email, instant messaging, blogs, wikis, and social networking sites should be composed with the utmost care. Information sent out through the internet can become permanent since recipients may forward information to locations where there is no control over future dissemination. The potential to bring harm to oneself, to others, and to CISH is real and must be considered each time one communicates online.
The CISH logo, school name, and branding tagline cannot be used in any electronic media or communication or otherwise without the prior written permission of the CISH marketing team.
User Responsibility
CISH is not responsible for any losses, damages, costs, or other obligations arising from use of the CISH network, accounts or devices. Each user must discern the accuracy, authenticity and quality of the information obtained through use of the internet. Any statement accessible on the computer network or the internet is understood to be the author's individual point of view and not that of CISH its affiliates, or employees.
Students using the CISH computer network, internet access and devices agree to the terms of this policy. All users will be held accountable to this policy by the school. By using the CISH network and or CISH devices, users have agreed to this policy.
Cell Phone Use
Cellphones may only be used by students with express permission from the classroom/supervising teacher for academic purposes. Teachers will use their professional judgement with regards to cellphone use in their classroom (ex. Taking a photo of a textbook is fine, but chatting, gaming or taking selfies is not.). Cellphones are not to be used in the hallways, cafeteria or anywhere without teacher supervision during school hours. Students will be encouraged to go to the office to call home if necessary, so the office staff is fully informed about the reason for the call, such as illness or an emotional issue. If a student asks permission to contact a parent or guardian using their cell phone, teachers will use their best judgement about allowing this.
If a student misuses their cellphone, they may receive one warning before the phone is confiscated. Confiscated phones will be given to the division principal for the student to pick up at the end of the day. For repeated misuse, the principal will contact the parents of the student to set up a meeting. Teachers will especially keep an eye out regarding the use of cellphones for taking unsolicited photos or cyber bullying. Any use of a cellphone for cyber bullying will be taken very seriously.
Photos & Social Media
Teachers will not post any pictures on social media of or with students unless they have parent or guardian permission. Teachers will never post any confidential information about students on social media. Photos of students will only be posted through official CISH marketing channels.