At Upper School, a technology device is a necessary school supply item. We ask that students in grades 6 - 12 acquire a device to use both at school and home.
What kind of device can my student bring?
The requirements to consider when choosing a device for your student are:
Wi-Fi capabilities - Our educational resources are web-based (Google, Infinite Campus, and textbooks), so a device with the ability to connect to a wireless network and a web browser is mandatory.
Types of devices that best meet the student’s needs:
Laptop (Mac/PC) with good battery life (6+ hours) or
Chromebook
Note: Phones are not acceptable, as they are not allowed during the school day, nor are they conducive to long writing assignments.
Here is the link to request to borrow a LILA Device. If you intend to borrow device(s) for your student(s) please fill out this form, so we can have enough devices on hand at checkout time.
Note: When you check out the device in person, you will also need to complete this form to note any existing wear and verify the device is in good working order. We will have forms on hand at checkout.
Responsibility for Devices
Families will need to do one of the following two things in order for their child to borrow a device from LILA:
Options:
Keep a credit card on file on LILA’s online payment system, LILAPay. Your card will not be charged unless the borrowed device is damaged or not returned at the end of the school year. If you need assistance with LILAPay account setup, please contact Melissa Bent, our online payments manager, at mbent@mylila.org or 651-334-4896.
Purchase insurance for the borrowed device. The one-time insurance cost is $47 for the school year for each student’s borrowed device. The insurance covers damage, and (with a copy of a police report), also covers loss or theft. To purchase insurance from SchoolDeviceCoverage.com, start by viewing this 2-minute video: Get Covered by School Device Coverage
All members of the community are responsible for good behavior on the school’s networks and websites, as well as external ones. Students and parents should be knowledgeable of LILA’s INTERNET ACCEPTABLE USE AND SAFETY Policy 316.
Protect your IDs and password. Never share your password with another, and never use the password of another. Users of LILA’s network and computer resources have a responsibility to properly use and protect those information resources and to respect the rights of others.
Students have a limited right to privacy when using LILA’s electronic communications resources, which includes LILA-provided electronic devices such as computers and internet resources.
LILA has the right to monitor all communications on its server and electronic equipment. Students have no expectation of privacy when utilizing LILA’s internet resources, including when using a personal electronic device on the School’s internet or wireless network, or when communicating on a LILA social media account, or that of a LILA team, club, group, or activity, or any account that might reasonably be believed to belong to LILA.
Do not use obscene, profane, lewd, vulgar, rude, threatening, hostile, bullying, or disrespectful language. These actions not only violate the school’s policy, but may also violate laws in the United States and elsewhere.
Never say anything via email or online that you would mind the entire world seeing.
Use common sense at all times; if an action seems questionable, then it probably is.
Abide by the terms and conditions of all websites and online services you access.
Do not violate any intellectual property rights of others, including, for example, copyrights and trademarks.
Never transmit or publish any information, software, or content that violates or infringes on the rights of others.
Always give credit to others whose work you use. Do not copy or plagiarize internet content. Always appropriately acknowledge the source of materials and obtain appropriate consent.
Do not capture or distribute the contact information, image, or likeness of any LILA student or staff member without explicit permission of the person whose information, image, or likeness is to be shared.
Security on any computer system is a high priority. If you feel you can identify a security problem in the School’s computers, network, websites, etc. notify the administration immediately.
Never access files or information that you do not have permission to access.
Social media is any form of online publication or presence that allows interactive communication, including social networks, blogs, photo sharing platforms, Internet websites, Internet forums, and wikis. Examples of social media include, but are not limited to, Facebook, Twitter, Instagram, YouTube, Google+, and Snapchat.
Students should understand the following principles in order to create the kind of digital footprint and record with which they can feel comfortable. Many colleges and employers will search social media before making hiring and admissions decisions, and it is important to remember that online actions leave a permanent record.
Be your best self online – post accurate information and be accountable for what you say.
Get your parents’ input about what information they feel should remain private and what is fine to post publicly. Your parents may provide guidance and supervision of your online activities by having access to your passwords and usernames.
When you use social media for academic purposes, such as for a school assignment, treat the platform as a digital extension of your classroom – the same rules apply online as they do at school.
Take a few extra minutes to think about whether a post will be hurtful or embarrassing to you or others or whether it could negatively affect a future opportunity.
While at times, it is easy to tell whether a social media use is school-related or personal, at other times, it may be difficult to distinguish fully between different uses. Sometimes, personal social media use, including off-hours use, may result in disruption at school and the school may need to get involved. This could include disciplinary action such as a parent conference or suspension. It is important to remember that LILA rules prohibiting certain types of communication, like bullying and harassment, also apply to electronic communication.
Privacy settings are automatically set by social media providers governing who can see your posts, how information is linked, and what data is available to the public. Each social media platform has different privacy setting defaults and some change those settings without making it obvious to you. As a user of social media, you should determine whether to change the default settings to make access to postings more or less private.
Protect yourself online. Try not to post too much identifying information that could risk your safety or increase the chance of identity theft.
Take cyberbullying seriously. If you are being cyber-bullied or hear about/observe someone else being cyber-bullied, report the behavior and get help. You can tell a parent, school staff, another adult family member, or a trusted adult. If no adult is available and you or someone else is in immediate danger, call 911. It is important not to respond to, retaliate, or forward any harassing, intimidating, or bullying content. “Unfriend,” block, or remove people who send inappropriate content. It may also be a good idea to save screenshots of harassing messages, as this evidence could be important to show an adult if the behavior continues.