<<

MISS PORTER’S SCHOOL Technology Information

2012-2013 Chapter 1 - Technology @ Porter’s, includes two sections: Cam- Welcome pus Technology and Technology Policies. These sections con- tain general information regarding technology at Porter’s and expectations of use. This includes information regarding whom to contact if you are having technical problems while on campus.

Freshman and sophomore New Girls will want to pay particu- lar attention to Chapter 2 - @ Porter’s. This chapter in- cludes sections containing information regarding the iPad pol- icy and requirement for incoming 9th and 10th grade girls. Ad- ditionally, it includes a section on Apps and eBooks that are recommended and required for your various classes.

The year ahead will be filled with new experiences and chal- lenges for you. Please know that the Information Technology Every year, Miss Porter’s School welcomes a new class and (IT) department is ready for your arrival and ready to help group of New Girls anxious to begin their Porter’s experience. wherever we can. There is a lot to absorb the first few days that will be impor- tant to your experience and well-being. In an effort to make On behalf of the IT department, it is my pleasure to welcome the transition a little easier, I have created this book to help you to the community. you navigate all of the technology at Porter’s. Sincerely, Porter’s integrates technology in almost all aspects of school life: academic, artistic, athletic, and residential. It is impor- tant for you to not only understand what the school has avail- able for you but also what you will need to be successful in Director of Information Technology this environment. Each chapter of this book will serve as a re- Academic Technology Chair source for you throughout your time at Porter’s. It will be up- Crisp Chair for Information Technology dated as technologies change and as we prepare to welcome future students.

i CHAPTER 1 Technology @ Porter’s

In order for our students to be able to fulfill the expecta- tion set by our mission statement for “our graduates to shape a changing world,” Miss Porter’s School must prepare them for the future by providing the appropri- ate tools and an abundance of opportunities. Technol- ogy provides an exceptional educational opportunity that is both relevant and essential to our students’ edu- cational experience—at Porter’s and beyond.

By integrating technology into our liberal arts curricu- lum, Porter’s affirms our promise to educate young women “to become informed, bold, resourceful and ethical global citizens.” SECTION 1 General Information Campus Technology All of our academic activities are fully supported by technol- ogy. Porter's has five computer laboratories, including the digi- tal art lab, the language lab, two classroom labs, and the li- brary lab. Computers are placed in classrooms based on the requirements of the department and teacher, with each class- room having at least one computer. Although most students bring their own computers for use in the dorms, the school maintains one computer in each dorm and day student room for student use. HIGHLIGHTS Porter's has a wireless and wired Ethernet network that sup- 1. General plies telephone and data services to every classroom, office, Information and dormitory room. Access to the Internet is via a high capac- 2. Support Services ity, broadband connection. File servers and email services are maintained for communication and the sharing of informa- 3. Department Members tion. All students are given a Porter's email account. A fire- wall and content filtering protect the network. Decisions re- garding filtered content are made through faculty and adminis- trative discussions.

3 Support Services Department Members

Miss Porter’s School is pleased to offer support services to our The IT department is comprised of three members to meet the students. Located in the Hamilton building, the Information needs of the entire Porter’s community. The best way to con- Technology (IT) department is available to all student techno- tact the IT department from off campus is to call the main logical issues. school number: 860-409-3600.

Porter's School offers on-campus repair services for student’ computers at a rate that is approximately half of what most Director of Information Technology / Academic vendors charge. This means that your computer, whether PC Technology Chair or Macintosh, can be repaired for less and you do not have to take it off campus. If the computer is still covered under war- Karen McKenzie ranty, you can receive help contacting the manufacturer and [email protected] arranging repair. Students must bring the original documenta- Appointed 2003 tion and any disks that come with the computer when pur- chased. Some manufacturers and Microsoft restrict reinstalla- Network Administrator tion of the computer’s software unless you have the original materials. Ken Banks [email protected] On campus, students need only to email or call FLIP (x3547) Appointed 2009 for assistance. Students may also visit the IT department dur- ing the academic day or right after classes. Desktop Support Technician

Matt Graham [email protected] Appointed 2011

4 SECTION 2 Computer Network – Acceptable Use Policy Technology Policies Regulations and Guidelines for Email, the First Class Bulletin Board System and Internet Access

The Internet is a collection of thousands of interconnected net- HIGHLIGHTS works all over the world. The reliable operation of the Internet and 1. Computer Network Acceptable Use Policy the responsible use of its resources are of common interest and con- cern for its users, operators, and sponsors. The U.S. government a. Privileges provides many of the Internet resources. Furthermore, certain fed- b. Authority of System Administrators eral regulations concern the use of the Internet. Thus, abuse of the c. Regulations & Requirements system becomes a Federal matter.

d. Copying of Materials The Internet offers access to vast, diverse, and unique educational e. Privacy resources.With this access also comes the availability of material

f. Network Etiquette that may not be considered to be of educational value in the context of the school setting. The school firmly believes that the Internet’s g. Prohibited Activities value far outweighs the possibility that users may procure material h. Computer Viruses that is not consistent with the educational goals of Porter’s. i. Security Privileges j. Vandalism Users of the Internet-based electronic mail (email), First Class Bul- k. Violations letin Board System (BBS) and other network/Internet resources l. Indemnification (the “Porter’s Network”) must realize that they are using a service provided by Miss Porter’s School as part of the educational process. m. Disclaimer This service is a privilege, not a right, and places a responsibility on 2. Inappropriate Computer Use all users of the network.The system administrator, student council, 3. Use of Social Networking Websites or school administrators at their discretion may revoke this privi- lege temporarily or permanently.

5 Authority Of System Administrators the system administrator(s) on any school-owned computer System administrators may read and intercept any electronic is prohibited. mail passing through the system and verify the contents of a • The unauthorized reproduction, modification, or distribu- user’s directory. Email or may be read by administrators tion of copyrighted material may constitute copyright in- who may revoke accounts and modify a user’s access at their fringement under 17 U.S.C. § 107 of the United States Code discretion. if such use is not for the nonprofit purposes of teaching, re- Regulations & Requirements search, or scholarship. The use of a Porter’s Network account must be solely for edu- • Copying and using software without a license is forbidden. cational and research purposes. Use of another organization’s The use and transferal of stolen software is a Federal of- network or computing resources must comply with the rules fense. of that organization. The Porter’s Network must not be used for purposes that are prohibited in any medium. Email ac- Privacy counts can be used for normal communications as you would • Email is not private. People who operate the system have ac- use a telephone. cess to all email. relating to or in support of illegal activities may be reported to the authorities. Messages relat- Copying Of Materials ing to or in support of illegal activities or language stating or Copyright laws must be carefully observed. This applies to soft- suggesting violent intent may be monitored by government ware, papers or reports, images, and all written messages. agencies and could result in arrest and prosecution.

• Plagiarism - representing another’s work as one’s own - is • Passwords must be kept secret. Only the person to whom it forbidden. Stealing other people’s work is forbidden. All pho- is assigned may use a user name and password, and that in- tos, video, or text used for educational purposes must be ac- dividual is responsible for maintaining the confidentiality of curately credited. the password. Only the system administrator may grant ex- ceptions to this rule. • Pirating of software may result in the loss of the user’s ac- count. • Users may not attempt to gain access to other users’ ac- counts. • Commercial software may not be stored or transferred on the system. Loading any software without the approval of

6 • Users must properly log off the computer system when they • On the Internet, using all capital letters indicates shouting have finished sending or checking mail. Taking advantage of and should only be used to highlight an important point or a student or faculty member who inadvertently leaves a com- to distinguish a title or heading. puter without logging out is no different from entering an un- Sarcasm and humor should be used with care. Without face- locked room and stealing, or reading a private letter. • to-face communications, jokes may be viewed as harass- Network Etiquette ment. Users must abide by the generally accepted rules of Network etiquette. These include, but are not limited to, the following: Prohibited Activities The following is a non-exclusive list of prohibited activities in • Be polite. Do not send insensitive or abusive messages. Re- which users must not engage: spect the rights and cultural differences of others. • Illegal activities are strictly forbidden. • Do not use foul, abusive or offensive language, or descriptive Modem access to modem-based services are not allowed. situations that would not be heard or seen in G-rated mov- • Full email and Internet services are offered through the ies. school’s ethernet network. • Never give a home address, home phone number, school ad- Sending chain letters or lists through email is forbidden. dress, or school phone number to public bulletin boards or • to strangers. • Use of the Internet email and news resources for commer- cial purposes, product advertisement, or political lobbying is • Do not use the network in a way that would disrupt the use prohibited. of the network by others. • Posting credit card information anywhere on the Internet is • Check email daily. Delete all incoming mail after it is read against the law. and all outgoing mail after it is sent. Accounts that have mail backlogged by 21 days will have that mail deleted by the com- • Posting account passwords for this or any other email sys- puter system. tem is not allowed.

• It is unlawful to represent oneself as another user in any form of computing activity, including all forms of electronic

7 communications. Such activity is dishonest and will be Computer Viruses treated accordingly. When files are downloaded, viruses are sometimes attached. All student-owned computers must have excellent virus protec- • In the spirit of the Communications Decency Act, users are tion systems installed, and updates must be performed regu- prohibited from accessing, downloading or making available larly. Porter’s will not be held responsible for any damages any obscene or sexually explicit materials. from viruses which infect student disks or computers. Comput- • Students are not allowed to install any program or change ers without virus programs will not be connected to the net- any settings on a school-owned computer without the con- work. sent of the system administrators. Security • Do not subscribe to News Groups or List Servers because Security on any computer system is a high priority, especially these services generate an abundance of mail and fill too when the system involves many users. If a user identifies a se- much space on the school’s disk storage. curity problem on the Internet or the Porter’s computer sys- tem, she must notify a system administrator without demon- • Do not utilize the school email system for transferring audio, strating the problem to other users. Attempts to log onto the video or other large files except upon the request of a Internet as a system administrator will result in disciplinary teacher. action. Any user identified as a security risk or having a his- • Do not meet someone met online in person. Certain prac- tory of problems with other computer systems may be denied tices are necessary to ensure a user’s personal safety. A access to the Internet. user’s name is automatically attached to every message sent. Vandalism • Do not send email to a person who has indicated that she Vandalism will result in cancellation of privileges. Vandalism does not wish to receive email. This is considered harass- is defined as any malicious attempt to harm or destroy data of ment and is prohibited. Do not forward personal email to another user, school, or company. This includes, but is not lim- public electronic bulletin boards without the original ited to, the uploading or creation of computer viruses. author’s permission.

• Chat rooms are not to be visited unless instructed to do so for academic/classroom purposes.

8 Violations Inappropriate Computer Use Violations of these rules will be considered a violation of school rules and may result in the termination of a student’s account and other consequences. Violations may be referred The dean of students, in consultation with the computer sys- to the Student Council for disciplinary action. tems administrator, will investigate violations of the Accept- able Use Policy (AUP). Users agree to know, understand and Indemnification follow all legal and ethical rules regarding computer use. Stu- Parents or guardians of students agree to defend, indemnify dents agree to use their computers in accordance with all and hold harmless Miss Porter’s School and its directors, offi- school rules and expectations. Misuse of the computer will re- cers, employees, agents, and representatives from and against sult in restricted use and disciplinary consequences. any and all losses, expenses (including reasonable legal costs and fees), damages, injuries, liabilities, and claims resulting • Computers are to be used for homework purposes only and from the user’s violation of any of the terms of this policy or of not for entertainment (either games or social interaction) any other applicable law, including but not limited to Title 17 during the academic day and study hours. of the U.S. Code (The Copyright Act). • Excessive use of the computer for non-academic purposes that interferes with meeting school responsibilities and com- Disclaimer mitments is forbidden. Miss Porter’s School has no control over information transmit- ted over the Internet, including items sent into or stored • Computer use that harasses others or places students and/ within this network. The school makes no warranties of any or the school in potential danger is expressly forbidden. This kind for this service, nor will it be held responsible for any includes the sharing of passwords as well as not properly log- loss of data, non-deliveries, mis-deliveries or service interrup- ging off after use. Students are not allowed to download soft- tion, errors or hardware/software breakdown. The school ware onto school computers and may not misuse the does not take responsibility for the accuracy or quality of infor- school’s computer system in any way. mation obtained through its services. • Downloading or movies must be done through legal means. Visiting pornographic websites is expressly forbid- den.

9 Use of Social Networking Websites • personal contact information. Information may not be posted that allows outsiders to infiltrate either our net- work or our campus. Each student has the responsibility to use Internet services • derogatory comments about other people or about the carefully and safely. At no time may an individual post private school. Students may not present information that is information on a public website; all students must understand damaging to their own reputation, to the reputation of that no website is private space. This policy is in place to pro- other members of the Porter’s community, or to that of tect both individual students and the school community as a the school. whole. • inappropriate artwork or photographs. • Students must exercise caution when using any social net- working sites, keeping in mind that these sites are public • personal ads. viewing spaces and that posting personal private informa- tion is not safe. Students must remember that once informa- • Students may not advertise themselves or present a tion is posted to a website, it is on a public site, and control sexualized version of themselves on any website. over the material has been relinquished. Any infraction of the expectations regarding use of social web- • Students may not post any information that would allow un- sites is a major school rule violation and will result in discipli- known persons to contact or locate a student, or place a stu- nary action. dent or the school in danger.

• Students are not allowed to use any social networking site that is determined to be unsafe. Students may not use Por- ter’s email addresses to gain access to a site not determined to be safe and secure for student use.

• All information posted must be in accordance with school rules. Students may not post on a website:

• any references to rule-breaking behavior.

10 CHAPTER 2 iPads @ Porter’s

To continue to excel in teaching our students what it means to be literate, participatory, and fluent in the tools of the 21st century, Miss Porter’s School commits to the following recommendations for the 2012-2013 academic year. SECTION 1 Hardware Requirements & New Girl Information Recommendations • We require each ninth and tenth grade student to own an Ap- ple iPad 2 (or later) and AppleCare Protection Plan for their iPad.

• We recommend that every student own a cover or neoprene sleeve to protect the iPad.

• We recommend that every student own a stylus of their own personal preference.

• We strongly recommend that every student own a laptop for access to full versions of word processing and content crea- tion software.

• We recommend that every student own a cover or neoprene HIGHLIGHTS sleeve to protect their laptop. 1. Technology Requirements • Specific models of PCs and Macs are required if support 2. Software Requirements from the school is expected. The approved laptops include any Mac or U.S. purchased PC. 3. Expectations of Use • We will recommend that students consider purchasing an additional external drive for their laptop for the storage of personal files. (Limited server storage space assigned to every student for the purpose of backing up school-related items.)

12 Software Requirements & • Students are expected to be able to update and purchase apps Recommendations as needed.*** • Students will be expected to maintain their computer or iPad • All student computers, PC’s and Mac’s, must have up-to-date in good working order for class use. virus protection. The school will provide virus protection for any machine that is found without.*

• All students will have a need for productivity software such as Microsoft Office, iWorks, or Google Docs.

• The school will provide the Adobe Design Suite to students who are taking a class that requires it. (This includes: Pho- toshop, Illustrator, InDesign, Flash, and DreamWeaver.)**

• Students will be required to have their own Apple ID for download and updating iPad apps. (This can be created with no association to a credit card.)

• The First Class email software will provided by the school. * Any existing anti-virus software will be removed from the ma- Expectations of Use chine and the school’s anti-virus software will be installed for their remaining tenure at Porter’s. • Ninth and tenth grade students are required to have digital versions of their course books for all required books. * *At the close of the students tenure at Porter’s, the software will be removed. • Ninth and tenth grade students are expected to use their iPad ** *For best practices and creating a credit card free iTunes ac- everyday inside and outside the classroom. count, please visit the FAQs section.

• Students should expect that individual teachers will have their own policies and procedures as to technology use in their classrooms.

13 SECTION 2 Apple ID’s

Apps Students should have their own Apple ID. Individuals can choose whether or not this ID is connected to a credit card. Some individuals choose to not connect this ID to a credit card and use iTunes Gift Cards for app purchases. Required Apps Porter’s requires various apps for all ninth and tenth graders. Individual teachers may have additional apps that are re- quired for specific classes. Free Apps

First Class (email client): http://itunes.apple.com/us/app/firstclass-mobile/id3106077 05?mt=8

HIGHLIGHTS iPhone: http://itunes.apple.com/us/app/find-my-iphone/id37610164 1. Apple ID’s 8?mt=8 2. Required iBooks: 1. Free Apps http://itunes.apple.com/us/app/ibooks/id364709193?mt=8

2. Paid Apps DropBox: 3. Strongly Recommended Apps http://itunes.apple.com/us/app/dropbox/id327630330?mt= 8 4. Maintenance 5. Add-ons

14 Evernote: NotesPlus: http://itunes.apple.com/us/app/evernote/id2811796108?mt http://itunes.apple.com/us/app/notes-plus/id374211477?mt =8 =8

Google Earth: http://itunes.apple.com/us/app/google-earth/id293622097? mt=8 Strongly Recommended iPad Apps

CalculatorBox: Pocket Informant HD: http://itunes.apple.com/us/app/calculatorbox-hd/id3994394 http://itunes.apple.com/us/app/pocket-informant-hd-calend 55?mt=8 ar/id380732176?mt=8

Diigo: KeyNote: http://itunes.apple.com/us/app/diigo/id417202559?mt=8 http://itunes.apple.com/us/app/keynote/id361285480?mt=8

Google: : http://itunes.apple.com/us/app/google-mobile-app/id28481 http://itunes.apple.com/us/app/pages/id361309726?mt=8 5942?mt=8 : Kindle: http://itunes.apple.com/us/app/numbers/id361304891?mt= 8 http://itunes.apple.com/us/app/kindle-read-books-magazine s/id302584613?mt=8 Multi-touch Whiteboard: http://itunes.apple.com/us/app/pocket-informant-hd-calend Paid Apps ar/id380732176?mt=8 iAnnotate: Dictionary: http://itunes.apple.com/us/app.iannotate-pdf-good-dynamic http://itunes.apple.com/us/app/dictionary-com-dictionary/i s/id512730156?mt=8 d364740856?mt=8

15 Maintenance

Developers often make changes to individual apps on a regu- lar basis. The changes add features or fix known issues that di- rectly affect how the app works. Students are expected to up- date their apps when new updates become available. This is done through the AppStore on the iPad. Students will need to know their Apple ID and password.

Add-ons

Some apps have other features that are considered “add-ons” to the basic app functions. Many of these are not considered part of the regular maintenance update, instead they are avail- able for purchase through the app itself.

16 SECTION 3 General Technology Questions FAQs What Are The Technology Require- ments? • Each ninth and tenth grade student is required to purchase an Apple iPad. The Apple iPad does not replace the need for personal computer access.

• All students are required to have access to a personal com- puter, whether laptop or desktop. It is strongly recom- HIGHLIGHTS mended that ninth and tenth grade students have a laptop in 1. General Technology Questions addition to the iPad for access to full versions of content creation software. (This software is also available to students 1. Technology Requirements in on-campus computer labs.)

2. Computer / iPad Recommendations • It is also recommended that students consider purchasing 3. Software Requirements an additional external drive for their laptop for the storage of personal files. (Server storage space is assigned to every 2. iPad & e-Book Requirements student for the purpose of backing up school-related items.)

1. iPad Setup The school provides basic support services for students who 2. Apple iD have approved computers. These models include any Mac, Thinkpad, Dell Inspiron or Latitude, or HP/Compaq com- 3. Apps puter. The servicing of equipment is also available; however, the machine will need to be viewable in English and the user 4. e-Books must show proof of extended warranty ownership. All student computers must have up-to-date virus protection. Is A Specific Computer Recommended?

17 While Porter’s does not require a particular make or model of Student have access to the Porter’s wireless network in all aca- laptop, we recommend an Apple MacBook for ease of use and demic buildings and in their dorms. service. We recommend that the machine be equipped with a Are students required to have Microsoft minimum of 4GB of memory and a minimum of 260GB hard drive. Students have access to the school’s purchasing guide Office or iWork on their computers? as well as Porter’s Apple store which offers discounted pricing on MacBooks and iPad/MacBook bundles. Not necessarily. Given technology today, our students are free to use any productivity software they choose: Microsoft Office, The school has created a personalized online Apple store for Apple iWorks, Google Docs, or OpenOffice. It is recom- your convenience: Miss Porter's School Apple Store mended that you select the program with which you are most (www.apple.com/edu/porters). This online store offers recom- comfortable. mended systems that have been configured for the ninth grade technology requirement. These are located on the right iPad & e-Book Requirements & Recom- side of the webpage. Purchases will receive Apple's education mendations discount automatically where applicable. (Currently, there is no discount for the iPad.) Please note: all products that are purchased from this store will be viewed by Apple as Miss Por- How do I set up my iPad? ter's School equipment. This is to ensure that the Porter's IT After you purchase your iPad, you will set it up by connecting department is able to call for support on your behalf. it to a computer installed with iTunes. For full instructions on how complete the initial setup of your iPad, please visit We understand that purchasing a laptop can be a confusing en- http://www.apple.com/support/ipad/. Eventually, you will be deavor; please contact Karen McKenzie at required to create an Apple ID (if you do not already have [email protected] if you have specific ques- one) in order to be able to begin purchasing various apps. tions you would like to ask. Am I required to purchase a cover for My Is A Specific iPad Recommended? iPad? It is strongly recommended that you purchase a cover for your It is recommended that students purchase an iPad 2 (or later) with 32GB of memory and wifi. iPad. Covers come in a wide variety of styles, designs, and price points. They are available through Apple and other dis- tributors.

18 Can I Create An Apple ID Without Using vided an electronic copy of the book or a link to where you can A Credit Card? purchase the book. Yes. Instructions can be found at How do I purchase an e-Book and http://support.apple.com/kb/HT2534age.apple.com. This will allow you to purchase free apps and use a gift card for any download it to my iPad? Purchasing an e-Book and reading it on an iPad are two differ- paid apps. ent steps, and the iPad allows you a variety of eReader op- Are There Apps That Are Required? Are tions. Our bookstore provider, Classbook, will provide you with information regarding both purchasing and downloading There Other Apps That You Recom- your purchased e-Books. mend? In order to help you make the most of your iPad, Porter’s has developed a list of apps that are required, strongly recom- mended, and useful. This list appears later in this document. Additionally, individual classes may require other specific apps throughout the year based on curriculum and content. What is the requirement regarding e- Books? Ninth and tenth graders are required to purchase the e-Book of a required text whenever possible. All other students are welcomed and encouraged to utilize the e-Book option if they choose. How do I know if there is an available e- Book? Porter’s has partnered with Classbook (our virtual bookstore) in order to provide you with course information and course text requirements. Whenever possible, Classbook has pro-

19