Suggested devices include:
Laptops/Netbooks/Chromebooks
Tablets (iPad, Android, etc.)
Smart Phones
E-reader (Kindle, Nook, etc.)
iPod touch
In short, devices capable of accessing the internet using a WiFi connection, with the exception of gaming devices (Nintendo DS/PSP), are acceptable.
It is not mandatory for students to bring devices, even if they do own one. When a classroom teacher integrates devices into their instruction to enhance learning and requires their use, district-provided devices will also be available. Even if only one student is using a device in a collaborative group, team products can be greatly enhanced.
Students using their personal devices are required to connect to SHEN-BYOD, a district provided WiFi network that contains filtered internet access as per the federal Children's Internet Protection Act (CIPA) . Student use of Cellular (3G/4G) data plans is a violation of District Policy. Students must only use SHEN-BYOD to access the Internet while on school grounds. (How to connect to SHEN-BYOD)
As an important component of BYOD, students will receive instruction in appropriate and safe online behavior. In addition, access to the internet and its use shall be in accordance with school guidelines, the student Acceptable Use Policy (AUP), the District Code of Conduct, and the Dignity for all Students Act.
No. It is the responsibility of each student to care for his/her device, keep it in good working order including charging it outside of school.
Any web-based district subscriptions and databases will be available via the guest network. Printing from personal devices while at school will not be available. Shen will not provide nor require apps or software for personal devices.
Whenever possible, classroom lessons will be tailored for software/websites that are freely available on the internet. A small sample of those types of web-based tools are available under the device neutral sites column on the left.
Shenendedowa recommends all families:
Record serial and model numbers of any device brought to school.
Install virus protection
Install tracking software
Set PIN lock code or password where possible.
Talk about responsibility, internet safety and device safety with your child(ren)
Above all, Shen strives to maintain safe and productive learning environments. Students are therefore expected to adhere to the policies, procedures, and guidelines established for safety and productivity at all school sites. Students that choose to ignore, circumvent, or violate those efforts will face consequences. These consequences may include, but are not limited to, revocation of BYOD privileges, confiscation of devices (to be returned to parents or guardians), or other discipline as outlined in the Code of Conduct.
Students who elect to BYOD must comply with the following requirements:
The student only accesses the internet using the district's wireless network (SHEN-BYOD)
The student takes full responsibility for his or her technology device. The school is not responsible for the security or loss of student-owned technology. Students are strongly encouraged to lock up or securely store devices when not in use.
The technology must be in silent mode while on school campuses and while riding school buses.
The technology may not be used for academic dishonesty or non-instructional purposes.
The student may only access files or programs on the device or internet sites which are relevant to the classroom curriculum.
The student complies with teachers' requests to shut down the device or close the screen.
The student understands that bringing on premises or infecting the network with a virus, Trojan, or program designed to damage, alter, destroy or provide access to unauthorized data or information is in violation of the AUP and will result in disciplinary actions.
The student acknowledges that processing or accessing information on school property related "hacking," altering, or bypassing network security policies is in violation of the AUP and will result in disciplinary actions.
The District has the right to collect and examine any device that is suspected of causing problems or was the source of an attack or virus infection.