• Rogers Middle School BYOD Agreement & Technology Violation Policy

     

    Parent Agreement

    • Students are not required to participate.

    • Device should be clearly labeled (Full Name).

    • Device should be charged prior to bringing to school.

    • Student is responsible for personal property.

    • School cannot be responsible for lost/stolen/damaged personal property. 

    • Students may not physically share devices.

    Student Agreement

    • Students are responsible for following the guidelines for appropriate and

    acceptable use of BYOD.

    • Devices may only be visible in an approved instructional setting with a teacher present.
    • Students must bring devices to school charged. No charging at school.
    • Students must adhere to the Student Code of Conduct, as well as Board policies, specifically the Acceptable Use Policy. • Students must log in and use the Pearland ISD filtered wireless network during the school day. • Students are aware that inappropriate use may result in disciplinary consequences.

          * Students may not access or post on any form of social media during the school day!

     

    TECHNOLOGY VIOLATIONS

    Students engaging in unauthorized computer use shall be subject to disciplinary penalties and possible loss of technology privileges in accordance with the student code of conduct. Students may not use technology resources in any way that contradicts the educational mission.

    General technology violations include:

    • Operating software, programs, or internet when not directed
    • Surfing the internet outside the parameters of the classroom assignment
    • Playing games, streaming/listening to music, or viewing videos when not directed
    • Participating in any activities/media not specifically assigned by the teacherSevere technology violations include:

     Severe technology violations include:

    • Viewing, retrieving, creating, or downloading inappropriate material encountered on the internet or brought to school from other sources
      • Inappropriate materials include, but are not limited to: nudity, sexually explicit material, drug paraphernalia, alcohol related topics, images of vulgar or violent content, and vulgar language, including lyrics to songs with vulgar language
    • Changing or modifying software configurations or settings
    • Downloading or installing any software such as browser plug-ins, shareware or freeware, executable programs, or viruses/trojans
    • Seeking to gain unauthorized access to instructional materials or software, obtaining copies of or modifying files or other data, or obtaining or communicating passwords belonging to others that could result in the damage, alteration, or deletion of files created by others
    • Posting, sending, or storing information via instructional websites that endangers, threatens, or intimidates others
    • Including, but not limited to: cyber bullying, hate speech, defamation, harassment of any kind, or discriminatory jokes or remarks

    The determination that a student has engaged in a technology violation shall be based on the judgment of the classroom teacher or another supervising professional taking into consideration technological output, observation, or information from students. Consequences for technology violations are serious.

    1st General Technology Violation:

    • Lunch detention
    • Parent contacted by Teacher

    2nd General Technology Violation:

    • 1 hour detention
    • 1 week loss of network use
    • Parent contacted by Teacher

    3rd General Technology Violation:

    • 2 hour detention
    • 2 week loss of network use
    • Parent contacted by Teacher

    4th General Technology Violation:

    • Office referral
    • 1 day ISS
    • Loss of network use for remainder of school year
    • Parent contacted by Assistant Principal

    *Students who lose network privileges will do an alternate assignment in class or at a location specified by the teacher while the rest of the class is in the computer lab or using technology in the classroom.

    1st Severe Technology Violation:

    • Office referral
    • 1 day ISS
    • 2 week loss of network use
    • Parent contacted by Assistant Principal

    2nd Severe Technology Violation:

    • Office referral
    • 3 days ISS
    • 4 week loss of network use
    • Parent contacted by Assistant Principal

    3rd Severe Technology Violation:

    • Office referral
    • 5 days ISS
    • Loss of network use for remainder of school year
    • Parent contacted by Assistant Principal

    *Students who lose network privileges will do an alternate assignment in class or at a location specified by the teacher while the rest of the class is in the computer lab or using technology in the classroom.