itd handbook 2010-11
TRANSCRIPT
-
8/13/2019 ITD Handbook 2010-11
1/59
2010-11
Arlington Independent School District
Instructional Technology Handbook
-
8/13/2019 ITD Handbook 2010-11
2/59
Cover Credits: www.clipart.comused with permission
The Arlington Independent School District shall comply fully with the nondiscrimination of all
federal and state laws, rules, and regulations by assuring that no person shall be excluded fromconsideration for recruitment, selection, appointment, training, promotion, retention, or any otherpersonnel action, or be denied any benefits or participation in any educational programs oractivities which it operates on the grounds of race, religion, color, national origin, sex, disability,age, or veteran status (except where age, sex, or disability constitutes a bonafide occupationalqualification necessary to proper and efficient administration).
-
8/13/2019 ITD Handbook 2010-11
3/59
2010-11 Instructional Technology Handbook 3
TABLE OF CONTENTS TEKS: Technology Applications ...................................................................................4
SBEC Educator Standards and Exams ...........................................................................5
Internet Safety and Acceptable Use Guidelines
Students ..............................................................................................................6
Employees ........................................................................................................10
Substitutes ........................................................................................................16
Copyright and the Internet
Fair Use ............................................................................................................19
Email ................................................................................................................20
Newsgroup and Discussion Lists .....................................................................20
Web Pages ........................................................................................................20
Portion Limitations ..........................................................................................20
Citing Online Resources ..................................................................................21
Keyboarding: District Guidelines ...............................................................................23
Computer Labs .............................................................................................................26
Video Conferences .......................................................................................................27
Software and Online Resources: Selecting and Installing ...........................................28
Campus Technology Trainers ......................................................................................30
Staff Development Opportunities and Registration .....................................................33
Technology Department Personnel ..............................................................................34
Appendix ......................................................................................................................36
TEKS Checklists for Grades K-8
-
8/13/2019 ITD Handbook 2010-11
4/59
2010-11 Instructional Technology Handbook 4
TEKSTECHNOLOGY APPLICATIONS
Texas has a comprehensive K-12 curriculum that focuses on the teaching and learning oftechnology skills. The Technology Applications curriculum is specified as a required enrichment
curriculum in Texas Education Code, Section 28.002 and is not part of the Career and
Technology Education curriculum. However, together the Career and Technology Educationcourses, Technology Applications secondary courses, and K-8 integrated curricular opportunities
provide multiple options for students to obtain technology knowledge and skills.
Technology Applications TEKS are divided into grade clusters: K-2, 3-5, 6-8, and 9-12. There
are benchmark years at grades 2, 5, and 8 and specific course requirements at grades 9-12.
Students should be able to demonstrate applicable technology proficiencies before exiting
targeted grades (2, 5, and 8). Although these grades are identified as benchmark points, all grade
levels share the responsibility of preparing students to master the defined technology skills.
TA TEKS for grades K-2require that students have an opportunity to use computers and gainbasic technology skills such as inputting information, beginning touch keyboarding and
becoming familiar with the computer. Students acquire information including text, audio, video
and graphics; solve problems; and express ideas using word processing and multimedia tools. At
grades 3-5 students learn proper keyboarding techniques; acquire information by selecting the
most appropriate search strategies; use software programs with audio, video and graphics; solve
problems using word processing, graphics, databases, spreadsheets, simulations, multimedia andtelecommunications; and use technology to communicate information to a variety of audiences.
Computer Literacy is the only state-identified Technology Applications course at thejunior high
level. In Arlington ISD either of two models is used on junior high campuses. The first model
includes a one-semester computer literacy class. Students learn, demonstrate, and are evaluated
on defined technology proficiencies. Class projects include content from subject-area curriculaso that technology is used to accomplish academic tasks. Because of the number of students that
need to be served, each junior high should have two computer literacy teachers. In the second
AISD model, students are not enrolled in a specific computer literacy course. Instead, computerliteracy teachers (preferably two per campus) are assigned the responsibility of monitoring and
documenting mastery of defined proficiencies. Teachers in any subject area work with a
computer literacy teacher to implement curriculum-related student projects that involve subject-area and TA TEKS.
Arlington ISD offers several Technology Applications courses at the high schoollevel: Pre-APComputer Science, Computer Science A, Advanced Computer Science III, Multimedia, Web
Mastering I and Web Mastering II. Successful completion of any of these courses provides a
Technology Applications graduation credit.
The K-12 Technology Applications TEKS are available at www.tea.state.tx.us/teks/126toc.htm.Resources to assist educators in implementing the Technology Applications curriculum are
available from www.techappsnetwork.org.
-
8/13/2019 ITD Handbook 2010-11
5/59
2010-11 Instructional Technology Handbook 5
SBECEDUCATOR STANDARDS AND EXAMS
All beginning teachers are expected to master Technology Applications Standards I-V.Assessment items based on standards I-V were incorporated into TExES exams at every
certification field and level beginning in the fall of 2002. New exams for Computer Science(Grades 8-12) and Technology Applications (Grades 8-12 and EC-12) became available in the
fall of 2004. Certificates awarded after successful completion of the new exams replaceComputer Information Systems (CIS) and Information Processing Technologies (IPT)
endorsements. Texas Examinations of Educator Standards (TExES) tests replaced ExCET
exams.
Candidates for initial teacher certification are required to pass the appropriate grade level of thePedagogy and Professional Responsibilities (PPR) portion of the TExES test. Candidates must
also ensure that the proper grade level of pedagogy test passed corresponds to the grade levels ofthe content-area certificate sought.
The 77th Texas legislature passed House Bill 1475 which mandates a Master TechnologyTeacher certification and grant program. This program is similar to the Master Reading Teacher
and Master Mathematics Teacher. Both the Texas Education Agency and SBEC are involved in
the implementation of the legislation to ensure that there are teachers prepared to work with
other teachers and with students to increase the use of technology in classrooms.
More detailed information regarding standards, certificates and examinations is available from:
Standards for Technology Applications (EC-12 and 8-12) and Computer Science (8-12):http://www.sbec.state.tx.us/SBECOnline/certinfo/certreq.asp
-
8/13/2019 ITD Handbook 2010-11
6/59
2010-11 Instructional Technology Handbook 6
INTERNET SAFETYAND ACCEPTABLE USE GUIDELINES FOR STUDENTS
The following information is provided so that students, parents and staff are aware ofresponsibilities involved in the efficient, ethical and legal use of technology resources.
Each student will be required to adhere to all District policies and toInternet Safety and
Acceptable Use Guidelinesin order to be granted access to District technology resources.
Access to the Districts electronic communications system is a privilege, not a right. All usersshall be required to acknowledge receipt and understanding of administrative regulations
governing use of the system and shall agree in writing to allow monitoring of their use and
compliance with such regulations and guidelines.
Access to the District electronic communications systems, including the Internet, shall be madeavailable to students for instructional and administrative purposes and in accordance withadministrative regulations.
Noncompliance may result in suspension of access or termination of privileges and otherdisciplinary action consistent with District policies.
Electronic mail transmissions and other use of the electronic communications system by students
are not private and may be monitored at any time by designated District staff to ensureappropriate use.
CONSENT REQUIREMENTSCopyrighted software or data may not be placed on any system connected to the District's system
without permission from the holder of the copyright. Only the copyright owner, or an individual
the owner specifically authorizes, may upload copyrighted material to the system.
No original work created by any District student will be posted on a Web page under theDistrict's control unless the District has received written consent from the student (and the
student's parent if the student is a minor) who created the work.
No personally identifiable information about a District student will be posted on a Web pageunder the District's control unless the District has received written consent from the student's
parent. An exception may be made for "directory information" as allowed by the FamilyEducational Rights and Privacy Act and District policy.
FILTERINGAll Internet access will be filtered for minors and adults on computers with Internet accessprovided by the school. The categories of material considered inappropriate and to which access
will be blocked will include, but not be limited to: nudity/pornography; images or descriptions of
sexual acts; promotion of violence, illegal use of weapons, drug use, discrimination, or
-
8/13/2019 ITD Handbook 2010-11
7/59
2010-11 Instructional Technology Handbook 7
INTERNET SAFETY
AND ACCEPTABLE USE FOR STUDENTS
participation in hate groups; instructions for performing criminal acts (e.g., bomb making); and
online gambling.
SYSTEM ACCESS
Access to the District's electronic communications system will be governed as follows:
1. Students in all grades will be granted access to the District's system as appropriate.Students may be assigned individual accounts.
2. Any system user identified as a security risk or as having violated District and/orcampus computer use guidelines may be denied access to the District's system.
3. All users will be required to sign a user agreement annually.INDIVIDUAL USER RESPONSIBILITIES
The following standards will apply to all users of the District's electronic information/communications systems:
1. The individual in whose name a system account is issued will be responsible at alltimes for its proper use.
2. The system may not be used for illegal purposes, in support of illegal activities, or forany other activity prohibited by District policy or guidelines.
3. System users may not disable, or attempt to disable, a filtering device on the District'selectronic communications system.
4. Communications may not be encrypted so as to avoid security review by systemadministrators.
5.
System users may not use another person's system account without written permissionfrom the campus or district administrator as appropriate.6. Students may not distribute personal information about themselves or others by
means of the electronic communications system unless instructed to do so by an
administrator, counselor, librarian or teacher for instructional purposes. This includes,but is not limited to, personal addresses and telephone numbers.
7. Students should never make appointments to meet people whom they meet online andshould report to a teacher or administrator if they receive any request for such ameeting.
8. Users may not use the network for financial or commercial gain, advertising orpolitical lobbying.
9. System users must purge electronic mail in accordance with established retentionguidelines.
10.System users may not redistribute copyrighted programs or data except with thewritten permission of the copyright holder or designee. Such permission must bespecified in the document or must be obtained directly from the copyright holder or
designee in accordance with applicable copyright laws, District policy, and
administrative regulations.
-
8/13/2019 ITD Handbook 2010-11
8/59
2010-11 Instructional Technology Handbook 8
INTERNET SAFETY AND ACCEPTABLE USE FOR STUDENTS
11.System users should avoid actions that are likely to increase the risk of introducingviruses to the system, such as opening email messages from unknown senders and
loading data from unprotected computers.
12.System users may not send or post messages that are abusive, obscene, pornographic,sexually oriented, threatening, harassing, damaging to another's reputation, or illegal.
13.System users may not purposefully access materials that are abusive, obscene,pornographic, sexually oriented, threatening, harassing, damaging to another's
reputation, or illegal.
14.System users should be mindful that use of school-related electronic mail addressesmight cause some recipients or other readers of that mail to assume they represent the
District or school, whether or not that was the user's intention.
15.System users may not waste District resources related to the electroniccommunications system.
16.System users may not gain unauthorized access to resources or information.17.Students who identify or know about a security problem are expected to convey the
details to a teacher without revealing the information to other students.
VANDALISM
Any malicious attempt to harm or destroy District equipment or data or the data of another userof the District's system or of any of the agencies or other networks that are connected to the
Internet is prohibited. Deliberate attempts to degrade or disrupt system performance are
violations of District policy and administrative regulations and may constitute criminal activity
under applicable state and federal laws. Such prohibited activity includes, but is not limited to,the uploading or creating of computer viruses.
Vandalism as defined above will result in the cancellation of system use privileges and willrequire restitution for costs associated with system restoration, as well as other appropriate
consequences.
FORGERY PROHIBITED
Forgery or attempted forgery of electronic mail messages is prohibited. Attempts to read, delete,copy, or modify the electronic mail of other system users, deliberate interference with the ability
of other system users to send/receive electronic mail, or the use of another person's user ID
and/or password is prohibited.
INFORMATION CONTENT / THIRD-PARTY SUPPLIED INFORMATION
System users and parents of students with access to the District's system should be aware that,despite the District's use of technology protection measures as required by law, use of the system
may provide access to other electronic communications systems in the global electronic network
that may contain inaccurate and/or objectionable material.
-
8/13/2019 ITD Handbook 2010-11
9/59
2010-11 Instructional Technology Handbook 9
INTERNET SAFETY
AND ACCEPTABLE USE FOR STUDENTS
A student who gains access to such material is expected to discontinue the access as quickly as
possible and to report the incident to the supervising teacher.
A student knowingly bringing prohibited materials into the school's electronic environment willbe subject to suspension of access and/or revocation of privileges on the District's system and
will be subject to disciplinary action in accordance with the Student Code of Conduct.
NETWORK ETIQUETTE
System users are expected to observe the following network etiquette:
1. Be polite; messages typed in capital letters are the computer equivalent of shoutingand are considered rude.
2. Use appropriate language; swearing, vulgarity, ethnic or racial slurs, and any otherinflammatory language are prohibited.3. Pretending to be someone else when sending/receiving messages is prohibited.
4. Transmitting obscene messages or pictures is prohibited.5. Be considerate when sending attachments with e-mail by considering whether a file
may be too large to be accommodated by the recipient's system or may be in a format
unreadable by the recipient.
6. Using the network in such a way that would disrupt the use of the network by otherusers is prohibited.
TERMINATION / REVOCATION OF SYSTEM USER ACCOUNT
Termination of a student's access for violation of District policies or regulations will be effective
on the date the principal or District administrator receives notice of student withdrawal or ofrevocation of system privileges, or on a future date if so specified in the notice.
DISCLAIMER
The District's system is provided on an "as is, as available" basis. The District does not make any
warranties, whether express or implied, including, without limitation, those of merchantability
and fitness for a particular purpose with respect to any services provided by the system and anyinformation or software contained therein. The District does not warrant that the functions or
services performed by, or that the information or software contained on the system will meet the
system user's requirements, or that the system will be uninterrupted or error free, or that defects
will be corrected.
Opinions, advice, services, and all other information expressed by system users, informationproviders, service providers, or other third-party individuals in the system are those of the
providers and not the District.
The District will cooperate fully with local, state, or federal officials in any investigation
concerning or relating to misuse of the District's electronic communications system.
-
8/13/2019 ITD Handbook 2010-11
10/59
2010-11 Instructional Technology Handbook 10
INTERNET SAFETYAND ACCEPTABLE USE GUIDELINES FOR EMPLOYEES
The following information is provided so that students, parents and staff are aware ofresponsibilities involved in the efficient, ethical and legal use of technology resources.
Anyone using a District computer will be required to adhere to all District policies and to
Internet Safety and Acceptable Use Guidelinesin order to be granted access to District
technology resources.
Access to the Districts electronic communications system is a privilege, not a right. All users
shall be required to acknowledge receipt and understanding of administrative regulations
governing use of the system and shall agree in writing to allow monitoring of their use andcompliance with such regulations and guidelines.
Access to the District electronic communications systems, including the Internet, shall be madeavailable to students and employees for instructional and administrative purposes and in
accordance with administrative regulations.
Noncompliance may result in suspension of access or termination of privileges and other
disciplinary action consistent with District policies.
Electronic mail transmissions and other use of the electronic communications system are notprivate and may be monitored at any time by designated District staff to ensure appropriate use.
CONSENT REQUIREMENTSCopyrighted software or data may not be placed on any system connected to the District's system
without permission from the holder of the copyright. Only the copyright owner, or an individual
the owner specifically authorizes, may upload copyrighted material to the system.
No original work created by any District student or employee will be posted on a Web pageunder the District's control unless the District has received written consent from the student (and
the student's parent if the student is a minor) or employee who created the work.
No personally identifiable information about a District student will be posted on a Web pageunder the District's control unless the District has received written consent from the student's
parent. An exception may be made for "directory information" as allowed by the FamilyEducational Rights and Privacy Act and District policy.
FILTERINGThe Superintendent will appoint a committee, to be chaired by the Assistant Superintendent ofTechnology, to select, implement, and maintain appropriate technology for filtering Internet sites
-
8/13/2019 ITD Handbook 2010-11
11/59
2010-11 Instructional Technology Handbook 11
INTERNET SAFETY
AND ACCEPTABLE USE FOR EMPLOYEES
containing material considered inappropriate or harmful to minors. All Internet access will be
filtered for minors and adults on computers with Internet access provided by the school.
The categories of material considered inappropriate and to which access will be blocked will
include, but not be limited to: nudity/pornography; images or descriptions of sexual acts;
promotion of violence, illegal use of weapons, drug use, discrimination, or participation in hategroups; instructions for performing criminal acts (e.g., bomb making); and online gambling.
REQUESTS TO ACCESS A BLOCKED SITE
The committee will consider requests from users who wish to use a blocked site for bona fide
research or other lawful purposes. The committee will make recommendation to the
Superintendent regarding approval or disapproval for the requested use.
SYSTEM ACCESSAccess to the District's electronic communications system will be governed as follows:
1. Students in all grades will be granted access to the District's system as appropriate.Students may be assigned individual accounts.
2. As appropriate and with the approval of the immediate supervisor, District employeeswill be granted access to the District's system.
3. A teacher may apply for a class account and in doing so will be ultimately responsible foruse of the account.
4. Any system user identified as a security risk or as having violated District and/or campuscomputer use guidelines may be denied access to the District's system.
5.
All users will be required to sign a user agreement annually.
ASSISTANT SUPERINTENDENT FOR TECHNOLOGY RESPONSIBILITIES
The Assistant Superintendent for Technology will:1. Be responsible for disseminating and enforcing applicable District policies and
acceptable use guidelines for the District's system.
2. Ensure that all users of the District's system complete and sign annually an agreement toabide by District policies and administrative regulations regarding such use. All such
agreements will be maintained on file in the principal's or supervisor's office.
3. Ensure that employees supervising students who use the District's system provide trainingemphasizing the appropriate use of this resource.
4. Ensure that all software loaded on computers in the District is consistent with Districtstandards and is properly licensed.
5. Be authorized to monitor or examine all system activities, including electronic mailtransmissions, as deemed appropriate to ensure student safety on-line and proper use of
the system.
6. Be authorized to disable a filtering device on the system for bona fide research or anotherlawful purpose, with approval from the Superintendent.
-
8/13/2019 ITD Handbook 2010-11
12/59
2010-11 Instructional Technology Handbook 12
INTERNET SAFETY AND ACCEPTABLE USE FOR EMPLOYEES
7. Be authorized to establish a retention schedule for messages on any electronic bulletinboard and to remove messages posted locally that are deemed to be inappropriate.8. Set limits for data storage within the District's system, as needed.
INDIVIDUAL USER RESPONSIBILITIES
The following standards will apply to all users of the District's electronic information/
communications systems:
1. The individual in whose name a system account is issued will be responsible at all timesfor its proper use.
2. The system may not be used for illegal purposes, in support of illegal activities, or for anyother activity prohibited by District policy or guidelines.
3.
System users may not disable, or attempt to disable, a filtering device on the District'selectronic communications system.
4. Communications may not be encrypted so as to avoid security review by systemadministrators.
5. System users may not use another person's system account without written permissionfrom the campus or district administrator as appropriate.
6. Students may not distribute personal information about themselves or others by means ofthe electronic communications system unless instructed to do so by an administrator,
counselor, librarian or teacher for instructional purposes. This includes, but is not limited
to, personal addresses and telephone numbers.7. Students should never make appointments to meet people whom they meet online and
should report to a teacher or administrator if they receive any request for such a meeting.
8. System users may not use the network for financial or commercial gain, advertising orpolitical lobbying.
9. System users must purge electronic mail in accordance with established retentionguidelines.
10.System users may not redistribute copyrighted programs or data except with the writtenpermission of the copyright holder or designee. Such permission must be specified in the
document or must be obtained directly from the copyright holder or designee in
accordance with applicable copyright laws, District policy, and administrativeregulations.
11.System users should avoid actions that are likely to increase the risk of introducingviruses to the system, such as opening email messages from unknown senders and
loading data from unprotected computers.12.System users may not send or post messages that are abusive, obscene, pornographic,
sexually oriented, threatening, harassing, damaging to another's reputation, or illegal.
13.System users may not purposefully access materials that are abusive, obscene,pornographic, sexually oriented, threatening, harassing, damaging to another's reputation,
or illegal.
-
8/13/2019 ITD Handbook 2010-11
13/59
2010-11 Instructional Technology Handbook 13
INTERNET SAFETY AND ACCEPTABLE USE FOR EMPLOYEES
14.System users should be mindful that use of school-related electronic mail addresses mightcause some recipients or other readers of that mail to assume they represent the District
or school, whether or not that was the user's intention.
15.System users may not waste District resources related to the electronic communicationssystem.
16.System users may not gain unauthorized access to resources or information.17.Students who identify or know about a security problem are expected to convey the
details to a teacher without revealing the information to other students.
VANDALISM
Any malicious attempt to harm or destroy District equipment or data or the data of another user
of the District's system or of any of the agencies or other networks that are connected to theInternet is prohibited. Deliberate attempts to degrade or disrupt system performance are
violations of District policy and administrative regulations and may constitute criminal activity
under applicable state and federal laws. Such prohibited activity includes, but is not limited to,the uploading or creating of computer viruses.
Vandalism as defined above will result in the cancellation of system use privileges and willrequire restitution for costs associated with system restoration, as well as other appropriate
consequences.
FORGERY PROHIBITED
Forgery or attempted forgery of electronic mail messages is prohibited. Attempts to read, delete,copy, or modify the electronic mail of other system users, deliberate interference with the abilityof other system users to send/receive electronic mail, or the use of another person's user ID
and/or password is prohibited.
INFORMATION CONTENT / THIRD-PARTY SUPPLIED INFORMATION
System users and parents of students with access to the District's system should be aware that,
despite the District's use of technology protection measures as required by law, use of the system
may provide access to other electronic communications systems in the global electronic networkthat may contain inaccurate and/or objectionable material.
A student who gains access to such material is expected to discontinue the access as quickly aspossible and to report the incident to the supervising teacher.
A student knowingly bringing prohibited materials into the school's electronic environment will
be subject to suspension of access and/or revocation of privileges on the District's system and
will be subject to disciplinary action in accordance with the Student Code of Conduct.
-
8/13/2019 ITD Handbook 2010-11
14/59
2010-11 Instructional Technology Handbook 14
INTERNET SAFETY
AND ACCEPTABLE USE FOR EMPLOYEES
An employee knowingly bringing prohibited materials into the school's electronic environment
will be subject to disciplinary action in accordance with District policies. [See DH]
DISTRICT WEB SITE
The District will maintain a District Web site for the purpose of informing employees, students,
parents, and members of the community of District programs, policies, and practices. Requestsfor publication of information on the District Web site must be directed to the designated
Webmaster. The District Webmaster will establish guidelines for the development and format of
Web pages controlled by the District. No personally identifiable information regarding a studentwill be published on a Web site controlled by the District without written permission from the
student's parent. No commercial advertising will be permitted on a Web site controlled by the
District.
SCHOOL OR CLASS WEB PAGESSchools or classes may publish and link to the District's site Web pages that present information
about the school or class activities, subject to approval from the Webmaster. The campusprincipal will designate the staff member responsible for managing the campus's Web page under
the supervision of the District's Webmaster. Teachers will be responsible for compliance with
District guidelines in maintaining their class Web pages. Any links from a school or class Webpage to sites outside the District's computer system must receive approval from the District
Webmaster.
EXTRA-CURRICULAR ORGANIZATION WEB PAGES
With the approval of the District Webmaster, extracurricular organizations may establish Webpages linked to a campus or District Web site; however, all material presented on the Web page
must relate specifically to organization activities and include only student-produced material.
The sponsor of the organization will be responsible for compliance with District guidelines for
maintaining the Web page. Web pages of extracurricular organizations must include thefollowing notice: "This is a student extracurricular organization Web page. Opinions expressed
on this page shall not be attributed to the District." Any links from the Web page of an
extracurricular organization to sites outside the District's computer system must receive approvalfrom the District Webmaster.
NETWORK ETIQUETTE
System users are expected to observe the following network etiquette:
1. Be polite; messages typed in capital letters are the computer equivalent of shoutingand are considered rude.
2. Use appropriate language; swearing, vulgarity, ethnic or racial slurs, and any otherinflammatory language are prohibited.
3. Pretending to be someone else when sending/receiving messages is prohibited.4. Transmitting obscene messages or pictures is prohibited.
-
8/13/2019 ITD Handbook 2010-11
15/59
2010-11 Instructional Technology Handbook 15
INTERNET SAFETY
AND ACCEPTABLE USE FOR EMPLOYEES
5. Be considerate when sending attachments with e-mail by considering whether a filemay be too large to be accommodated by the recipient's system or may be in a format
unreadable by the recipient.6. Using the network in such a way that would disrupt the use of the network by otherusers is prohibited.
TERMINATION / REVOCATION OF SYSTEM USER ACCOUNT
Termination of an employees or a student's access for violation of District policies orregulations will be effective on the date the principal or District administrator receives notice of
student withdrawal or of revocation of system privileges, or on a future date if so specified in the
notice.
DISCLAIMER
The District's system is provided on an "as is, as available" basis. The District does not make anywarranties, whether express or implied, including, without limitation, those of merchantabilityand fitness for a particular purpose with respect to any services provided by the system and any
information or software contained therein. The District does not warrant that the functions or
services performed by, or that the information or software contained on the system will meet thesystem user's requirements, or that the system will be uninterrupted or error free, or that defects
will be corrected.
Opinions, advice, services, and all other information expressed by system users, information
providers, service providers, or other third-party individuals in the system are those of the
providers and not the District.
The District will cooperate fully with local, state, or federal officials in any investigation
concerning or relating to misuse of the District's electronic communications system.
Blocking Internet Content
When a teacher needs a specific web resource for a valid instructional purpose, but the content isblocked by the AISD filter, the teacher should work with the CTM to submit a help ticket. If
students or teachers encounter content that is inappropriate, a help ticket should be submitted to
identify the resource to personnel in the Networking Department.
-
8/13/2019 ITD Handbook 2010-11
16/59
2010-11 Instructional Technology Handbook 16
INTERNET SAFETY AND ACCEPTABLE USE GUIDELINES FOR SUBSTITUTES
Access to the Districts electronic communications systems, including the Internet, shall only beavailable to substitutes with the building principals permission and strictly for instructional and
administrative purposes and in accordance with administrative regulations and approval.
Anyone using a District computer will be required to adhere to all District policies and to
Internet Safety and Acceptable Use Guidelinesin order to be granted access to Districttechnology resources.
Access to the Districts electronic communications system is a privilege, not a right. All usersshall be required to acknowledge receipt and understanding of administrative regulations
governing use of the system and shall agree in writing to allow monitoring of their use and
compliance with such regulations and guidelines.
Noncompliance may result in suspension of access or termination of privileges and other
disciplinary action consistent with District policies.
Electronic mail transmissions and other use of the electronic communications system are not
private and may be monitored at any time by designated District staff to ensure appropriate use.
The categories of material considered inappropriate and to which access will be blocked will
include, but not be limited to: nudity/pornography; images or descriptions of sexual acts;
promotion of violence, illegal use of weapons, drug use, discrimination, or participation in hate
groups; instructions for performing criminal acts (e.g., bomb making); and online gambling.
INDIVIDUAL USER RESPONSIBILITIES
The following standards will apply to all users of the District's electronic information/communications systems:
1. The system may not be used for illegal purposes, in support of illegal activities, or for anyother activity prohibited by District policy or guidelines.
2. System users may not disable, or attempt to disable, a filtering device on the District'selectronic communications system.
3. Communications may not be encrypted so as to avoid security review by systemadministrators.
4. System users may not use another person's system account without written permissionfrom the campus or district administrator as appropriate.
5. System users may not use the network for financial or commercial gain, advertising orpolitical lobbying.
6. System users may not redistribute copyrighted programs or data except with the writtenpermission of the copyright holder or designee. Such permission must be specified in the
document or must be obtained directly from the copyright holder or designee in
-
8/13/2019 ITD Handbook 2010-11
17/59
2010-11 Instructional Technology Handbook 17
INTERNET SAFETY
AND ACCEPTABLE USE FOR SUBSTITUTES
accordance with applicable copyright laws, District policy, and administrative
regulations.
7.
System users should avoid actions that are likely to increase the risk of introducingviruses to the system, such as opening email messages from unknown senders and
loading data from unprotected computers.
8. System users may not send or post messages that are abusive, obscene, pornographic,sexually oriented, threatening, harassing, damaging to another's reputation, or illegal.
9. System users may not purposefully access materials that are abusive, obscene,pornographic, sexually oriented, threatening, harassing, damaging to another's reputation,or illegal.
10.System users should be mindful that use of school-related electronic mail addresses mightcause some recipients or other readers of that mail to assume they represent the District
or school, whether or not that was the user's intention.
11.System users may not waste District resources related to the electronic communicationssystem.
12.System users may not gain unauthorized access to resources or information.VANDALISM
Any malicious attempt to harm or destroy District equipment or data or the data of another user
of the District's system or of any of the agencies or other networks that are connected to theInternet is prohibited. Deliberate attempts to degrade or disrupt system performance are
violations of District policy and administrative regulations and may constitute criminal activity
under applicable state and federal laws. Such prohibited activity includes, but is not limited to,the uploading or creating of computer viruses.
Vandalism as defined above will result in the cancellation of system use privileges and willrequire restitution for costs associated with system restoration, as well as other appropriate
consequences.
FORGERY PROHIBITED
Forgery or attempted forgery of electronic mail messages is prohibited. Attempts to read, delete,
copy, or modify the electronic mail of other system users, deliberate interference with the abilityof other system users to send/receive electronic mail, or the use of another person's user ID
and/or password is prohibited.
NETWORK ETIQUETTE
System users are expected to observe the following network etiquette:
1. Be polite; messages typed in capital letters are the computer equivalent of shoutingand are considered rude.
2. Use appropriate language; swearing, vulgarity, ethnic or racial slurs, and any otherinflammatory language are prohibited.
-
8/13/2019 ITD Handbook 2010-11
18/59
2010-11 Instructional Technology Handbook 18
INTERNET SAFETY
AND ACCEPTABLE USE FOR SUBSTITUTES
3. Pretending to be someone else when sending/receiving messagesis prohibited.4. Transmitting obscene messages or pictures is prohibited.5.
Be considerate when sending attachments with e-mail by considering whether a filemay be too large to be accommodated by the recipient's system or may be in a formatunreadable by the recipient.
6. Using the network in such a way that would disrupt the use of the network by otherusers is prohibited.
DISCLAIMER
The District's system is provided on an "as is, as available" basis. The District does not make any
warranties, whether express or implied, including, without limitation, those of merchantabilityand fitness for a particular purpose with respect to any services provided by the system and any
information or software contained therein. The District does not warrant that the functions or
services performed by, or that the information or software contained on the system will meet thesystem user's requirements, or that the system will be uninterrupted or error free, or that defectswill be corrected.
Opinions, advice, services, and all other information expressed by system users, information
providers, service providers, or other third-party individuals in the system are those of the
providers and not the District.
The District will cooperate fully with local, state, or federal officials in any investigationconcerning or relating to misuse of the District's electronic communications system.
-
8/13/2019 ITD Handbook 2010-11
19/59
2010-11 Instructional Technology Handbook 19
COPYRIGHT AND THE INTERNET The Internet is a powerful tool for research but requires thoughtful attention to the issues of
copyright and ethics. Anyone who creates and publishes information (text, graphics, icons,photographs, sounds, video, email messages, postings to newsgroups) owns the copyright to
that material. The copyright owner possesses the rights to copy, distribute, adapt, perform,
display, transfer ownership, rent or lend the creative work. No visible notice of copyright isrequired for an item to be protected.
By publishing information on the Internet, a copyright owner allows others to viewthe material.
Publishing on the Internet does not permit others to copy, download, distribute, edit, display,
transfer, rent or lend the material. A copyright holder may, of course, contribute items to the
public domain or intentionally permit their use.
Fair UseThe Copyright Act of 1976 includes an exemption to copyright law calledfair use. In an effort topromote free speech, learning, scholarly research and open discussion, the exemption limits the
exclusive rights of the copyright holder. Under the Act, educators may use portions of
copyrighted material if the purpose and character of the use is educational in nature, previouslypublished, not a substantial part of the entire work and if marketability is not impaired. Before a
claim of fair use can be considered valid, the following four conditions must be analyzed. The
fourth condition is considered especially important.
1. The purpose of the useIs the use for non-profit educational purposes? Displaying a web page or making a
transparency for the purposes of teaching a lesson at a public school would be looked uponfavorably, but the remaining fair use conditions must also be considered.
2. The nature of the useWhat type of material is going to be used? Factual material has little protection of copyright.
Highly creative material (artwork, videos, web pages) is much more protected.
3. The amount of material copiedHow much of the materials are you going to use? (See the section of this document related to
portion limitations.)
4.
The effect of the use on the market for the workWhat effect would your type of use have if everyone made similar use of the material? If
everyone were to download the entire web page, for example, the advertisements would notbe seen and the sites sponsor might be deprived of revenue. If revenue is based on the
number of visits or hits to a website, downloading or copying items might reduce revenue.
-
8/13/2019 ITD Handbook 2010-11
20/59
2010-11 Instructional Technology Handbook 20
COPYRIGHT AND THE INTERNET
EmailThe author of an email message owns the content of that message. The recipient should not copy,forward or distribute the message without consent of the original author. One of the critical
questions asked in determining if a copyrighted work qualifies for fair use is, Has the work been
published? Typically, private email has not been published so is not considered fair use.
Newsgroup and Discussion List InformationOnce a work has been published, there is more latitude to use portions within the fair use
exemption. You can probably copy a few sentences or paragraphs of a newsgroup or discussion
list posting since it was published, as long as you arent going to use it to generate income. Youcan probably repost an article or message to another newsgroup unless the original author forbids
it. It is always best to ask permission to repost.
Web PagesMaterial published on the web and located shortly before it is needed (perhaps a week before
since most webmasters can be reached via email) can be used for a single lesson. Repeat usealways requires permission, whether in the same semester or in subsequent semesters. Teachers
may not keep copies or originals of works created by students when those works incorporate
materials from the Internet. The copies made from the Internet must reside with the students.
Portion Limitations for Educational Multimedia ProjectsPortion limitations mean the amount of a copyrighted work that can reasonably be used ineducational multimedia projects regardless of the original medium from which the copyrighted
works are taken. These limits apply cumulatively to each educator's or student's multimedia
project(s) for the same academic semester, cycle or term. All students should be instructed aboutthe reasons for copyright protection and the need to follow these guidelines. Each project should
comply with the portion limitations listed below. These limitations were prepared by the
Educational Multimedia Fair Use Guidelines Development Committeeand are available fromwww.utsystem.edu/OGC/IntellectualProperty/ccmcguid.htm.
Motion Media(film, video, television). Up to 10% or 3 minutes, whichever is less.
Text Material(plays, poetry, prose, etc.). Up to 10% or 1000 words, whichever is less,of a copyrighted work consisting of text material may be reproduced or otherwise
incorporated as part of a multimedia project. An entire poem of less than 250 words maybe used, but no more than three poems by one poet, or five poems by different poets from
any anthology may be used. For poems of greater length, 250 words may be used but nomore than three excerpts by a poet, or five excerpts by different poets from a single
anthology may be used.
-
8/13/2019 ITD Handbook 2010-11
21/59
2010-11 Instructional Technology Handbook 21
COPYRIGHT AND THE INTERNET
Music, Lyrics, and Music Video. Up to 10%, but in no event more than 30 seconds, of
the music and lyrics from an individual musical work (or combined from separate
extracts from an individual work), whether the musical work is embodied in copies, oraudio or audiovisual works, may be reproduced or otherwise incorporated as a part of a
multimedia project. Any alterations to a musical work shall not change the basic melody
or the fundamental character of the work.
Illustrations and Photographs(including cartoons). The reproduction or incorporation
of photographs and illustrations is more difficult to define with regard to fair use becausefair use usually precludes the use of an entire work. Under these guidelines a photograph
or illustration may be used in its entirety but no more than 5 images by an artist or
photographer may be reproduced or otherwise incorporated as part of an educational
multimedia project. When using photographs and illustrations from a published collective
work, not more than 10% or 15 images, whichever is less, may be reproduced orotherwise incorporated as part of an educational multimedia project.
Numerical Data Sets (computer spreadsheets or databases).Up to 10% or 2500 fields or
cell entries, whichever is less, from a copyrighted database or data table may be
reproduced or otherwise incorporated as part of an educational multimedia project.
Citing Internet ResourcesBelow are examples of formats that students might use to cite electronic resources.
Email
FormatAuthor of email message. Subject line of the message. [Online] Available email:
[email protected] from [email protected], date of document or download.
Example
Simmons, Brent. How Copyright Laws Apply to Student Fair Use. [Online] Available
Email: [email protected] from [email protected], May 3, 2001.
Web Sites
FormatAuthor. Title of Item. [Online] Available http://address/filename, date of document or
download.
ExampleUnknown. Health and Safety Tips. [Online] Available
http://www.redcross.org/tips/july/julytip98.html, November 1, 1998.
-
8/13/2019 ITD Handbook 2010-11
22/59
2010-11 Instructional Technology Handbook 22
COPYRIGHT AND THE INTERNET
Images
FormatDescription or title of image. [Online Image] Available http://address/filename, date of
document or download.
ExampleThe Eyes of Mona Lisa. [Online Image] Availablehttp://mistral.culture.fr/louvre/anglais/musee/collec/peinture.htm, July 18, 1998.
Online Sounds
FormatDescription or title of sound. [Online Sound] Available http://address/filename, date of
document or download.
ExampleDr. Bob Ballard Talks about the Purpose of the Jason Project. [Online Sound] Availablehttp://www.jason.org/jason.html, October 2, 1998.
Online Video Clips
FormatDescription or title of video clip. [Online Video Clip] Available http://address/filename,
date of document or download.
ExampleOld Faithful Erupting. [Online Video Clip] Available
http://fp2.in-tch.com/www.yellowstone.org/summer.htm, October 2, 1998.
More information about copyright law and fair use guidelines is available from:http://www.loc.gov/copyright
http://fairuse.stanford.edu
http://www.library.yale.edu/~okerson/copyproj.htmlhttp://www.utsystem.edu/ogc/intellectualproperty/cprtindx.htm#top
http://www.ifla.org/II/cpyright.htm
-
8/13/2019 ITD Handbook 2010-11
23/59
2010-11 Instructional Technology Handbook 23
KEYBOARDING: DISTRICT GUIDELINES Guiding PrinciplesTechnology skills are best acquired when instruction and practice are integrated with meaningful
curricular activities. There are, however, some basic skills that initially merit separate attention
and practice. Use of the computer keyboard is one of those skills.
To attain a functional level of keyboard use and to avoid forming habits that become extremely
difficult to break, students should be exposed to correct keyboarding techniques at an early age.Since the acquisition of skill is an ongoing process, instruction should be offered at every grade
level. Students should consistently improve speed and accuracy by applying keyboarding skills
in all subject areas.
Opportunities for regular practice should be provided to allow students to attain and maintain
speed and accuracy. Practice is most effective when sessions are brief but frequent. Four sessionsper week of 20 minutes each, for example, have proven much more effective than two sessionsof 45 minutes each. Frequent practice periods in a concentrated number of weeks have proven
more effective than spreading practice over several months. Teachers and administrators are
encouraged to consider these results when allocating equipment and computer time.
Students gain keyboarding skills much more effectively when the teacher is actively engaged in
delivering instruction and monitoring progress. Keyboarding software is best used for assessing
speed and accuracy, and for providing extra practice, not for teaching students to keyboard.
It is not necessary to practice keyboarding on a computer with a fast processor, a large amount of
memory, and multimedia capabilities. Keyboarding practice is a great use of older computers orof specialized hardware with limited operating systems.
To provide consistency throughout the district, elementary campuses should use the followingschedule. After completion of the defined cycle, keyboarding skills should be reinforced in brief
but frequent sessions throughout the school year as curriculum-based, word processing activities
are completed.
Grade Levels Frequency of Practice Sessions Duration of Practice
1 and 2 10 minute segments before each lesson in the lab 2nd
semester
3 and 4 20 minutes per day, 4 days per week 4 weeks (weeks 6-9)
5 and 6 20 minutes per day, 4 days per week 3 weeks (weeks 3-5)
-
8/13/2019 ITD Handbook 2010-11
24/59
2010-11 Instructional Technology Handbook 24
KEYBOARDING: DISTRICT GUIDELINES
Keyboarding speed should be slightly faster than handwriting speed at a given grade level. The
following skills and grade level expectations were derived from research and from the
Technology Applications TEKS.
Kindergarten - Grade 1 No speed requirements Attention to correct hand and body positions, location of keys, smooth and rhythmic
keystroke patterns as grade-level appropriate
Students operate alphabetic, numeric, punctuation, and symbol keys as grade-levelappropriate
Students produce documents at the keyboard, proofread, and correct errors as grade-level appropriate
Students use language skills including capitalization, punctuation, and spelling asgrade-level appropriate
Grade 2 5 Words per Minute (WPM) at 80-100% accuracy Attention to correct hand and body positions, location of keys, smooth and rhythmic
keystroke patterns as grade-level appropriate
Students operate alphabetic, numeric, punctuation, and symbol keys as grade-levelappropriate
Students produce documents at the keyboard, proofread, and correct errors as grade-level appropriate
Students use language skills including capitalization, punctuation, and spelling asgrade-level appropriate
Grade 3 Keyboarding practice in a structured program should begin at grade 3. 15 WPM at 80-100% accuracy Frequent practice for short periods of time over a concentrated number of weeks (i.e.,
20 minutes per day, 4 days per week for 4 weeks)
Students use proper keyboarding techniques such as correct hand and body positionsand smooth and rhythmic keystroke patterns
Students demonstrate touch keyboarding techniques for operating the alphabetic,numeric, punctuation, and symbol keys as grade-level appropriate
Students produce documents at the keyboard, proofread, and correct errors Students use language skills including capitalization, punctuation, spelling, word
division, and use of numbers and symbols as grade-level appropriate
-
8/13/2019 ITD Handbook 2010-11
25/59
2010-11 Instructional Technology Handbook 25
KEYBOARDING: DISTRICT GUIDELINES
Grade 4 20 WPM at 80-100% accuracy Frequent practice for short periods of time over a concentrated number of weeks (i.e.,
20 minutes per day, 4 days per week for 4 weeks)
Students use proper keyboarding techniques such as correct hand and body positionsand smooth and rhythmic keystroke patterns
Students demonstrate touch-keyboarding techniques for operating the alphabetic,numeric, punctuation, and symbol keys as grade-level appropriate
Students produce documents at the keyboard, proofread, and correct errors Students use language skills including capitalization, punctuation, spelling, word
division, and use of numbers and symbols as grade-level appropriate
Grade 5 25 WPM at 80-100% accuracy Frequent practice for short periods of time over a concentrated number of weeks (i.e.,
20 minutes per day, 4 days per week for 3 weeks)
Students use proper keyboarding techniques such as correct hand and body positionsand smooth and rhythmic keystroke patterns
Students demonstrate touch keyboarding techniques for operating the alphabetic,numeric, punctuation, and symbol keys as grade-level appropriate
Students produce documents at the keyboard, proofread, and correct errors Students use language skills including capitalization, punctuation, spelling, word
division, and use of numbers and symbols as grade-level appropriate
Grades 6 - 8 5 WPM per grade level at 80-100% accuracy (grade 6 = 30 WPM, grade 7 = 35WPM, grade 8 = 40 WPM) Frequent practice for short periods of time over a concentrated number of weeks Demonstrate keyboarding proficiency in technique and posture while building speed Use digital keyboarding standards for data input such as one space after punctuation,
the use of em/en dashes, and smart quotation marks
Plan, create, and edit documents created with a word processor Integrate the use of the word processor into multiple curricular areas
Grades 9 - 12 50 WPM at 80-100% accuracy Frequent practice for short periods of time over a concentrated number of weeks Demonstrate keyboarding proficiency in technique and posture while building speed Use digital keyboarding standards in word processing such as one space after
punctuation, the use of em/en dashes, and smart quotation marks
Plan, create, and edit documents created with a word processor Integrate the use of the word processor into multiple curricular areas
-
8/13/2019 ITD Handbook 2010-11
26/59
2010-11 Instructional Technology Handbook 26
COMPUTERLABSLessons conducted in computer labs or with mobile labs should have a meaningful curricular
purpose and should be correlated to both Technology Applications and subject-area TEKS.
Teachers should be actively involved in delivering instruction and in monitoring student
behavior and progress throughout the lesson.
A projector should be used to demonstrate lesson content and all students should be able to
view the content on a large screen.
Computer labs should not be used as free-choice opportunities for students or viewed as an
opportunity for the teacher to grade papers or make telephone calls.
Teachersare required to provide instruction in computer labs. It is not the role of the CampusTechnology Manager (CTM) or LAN Tech to deliver instruction or to supervise students.
The role of CTMs and LAN Techs is to provide technicalassistance including thepreparation of computer labs before classes and technical troubleshooting as needed.
Most CTMs and LAN Techs service technology equipment throughout an entire campus andtherefore spend a great deal of time away from labs. Because of this situation, it is important
for teachers to communicate any need for lab assistance well in advance of class time.
If assistance is needed with instructionalissues (planning lessons, integrating technology and
curriculum, identifying or locating appropriate software or online resources), the teachershould request help from a Campus Technology Trainer or a District Instructional
Technology Specialist.
Teachers who need instructional technology assistance should make arrangements to get helpduring trainers conference times or after school. Campus Technology Trainers are full-time
teachers themselves and should not be expected to stop or interrupt their own classes.
Consideration should always be given to the class that will use the lab in the next time
period. Teachers should monitor students carefully to see that they handle computers
properly, exit or quit programs correctly, take personal belongings (worksheets, pencils,printouts) with them, and leave computers and labs ready for the next group of students.
Elementary students are expected to participate in computer lab activities two times eachweek. Lessons for grades K-2 should be approximately 30 minutes in length. Lessons forgrades 3-6 should be approximately 45 minutes in length. See the section of this handbook
titled Keyboarding: District Guidelinesfor recommendations regarding the frequency and
duration of keyboarding instruction for elementary students.
Students should never be sent to computer labs unless supervised by a teacher.
Elementary schools should not use computer labs in the P.E./Music rotation.
-
8/13/2019 ITD Handbook 2010-11
27/59
2010-11 Instructional Technology Handbook 27
VIDEOCONFERENCING
AISDs videoconferencing equipment has been configured for optimal performance. Please
do not disconnect or make adjustments to the equipment. If there are problems or concerns,
please contact the Help Desk or the Distance Learning Specialist.
Lessons conducted via videoconferencing should have a meaningful curricular purpose and
should be correlated to Technology Applications and subject-area TEKS. Teachers should be
actively involved in delivering instruction, facilitating learning and monitoring student
behavior throughout the sessions.
Videoconferencing equipment should be used for students to actively participate in distance
learning events.
Before using videoconferencing equipment, teachers should receive training to become
informed about the equipment. If a situation arisespriorto training, the teacher shouldcontact the Help Desk or request assistance from the District Distance Learning Specialist.
Teachers should be familiar with distance learning etiquette and should review procedureswith students beforeparticipating in a videoconference.
If assistance is needed with identifying, locating or scheduling appropriate events or
collaborations, the teacher should contact the Help Desk or the Distance Learning Specialist.
Teachers should be aware of students whose parents did not sign the publicity release form in
the Student Handbook. Since events are often recorded, a release form should be on file.
The role of CTMs and LAN Techs is to provide technical assistancebefore classes and
technical troubleshooting as needed.
Videoconferencing equipment must be shared among all teachers, and the Distance Learning
Specialist must coordinate events with ESC 11. It is important to reserve the equipment with
appropriate building personnel and communicate the date/time of a videoconference with theDistrict Distance Learning Specialist well in advance of the event.
The teacher should notify the District Distance Learning Specialist at least 48 hours in
advance if it becomes necessary to cancel a scheduled videoconference.Failing to comply
with this guideline may result in a financial loss. Content providers, for example, may haveprepared the session and refused other requests for the applicable time slot. The District maybe required to pay fees as outlined in the original contract or agreement.
Students should never participate in a videoconference unsupervised. Teachers should
monitor students to see that they handle equipment properly. Consideration should be givento the class that will use the equipment next.
-
8/13/2019 ITD Handbook 2010-11
28/59
2010-11 Instructional Technology Handbook 28
SOFTWARE AND ONLINE RESOURCES: SELECTING AND INSTALLING Implementation of Technology Applications TEKS requires that tools such as computers,
printers, projection devices, digital cameras, and online resources become pervasive in
classrooms, and that teachers and students become proficient at using technology formeaningful curricular tasks. The best method of assuring progress is for students to use
productivity software to accomplish specific lesson objectives. Examples of excellentproductivity software include Microsoft Word, Excel, PowerPoint, Producer, Inspiration,
Kidspiration, iMovie, KidPix, TimeLiner, Graph Club, Neighborhood Map.
It is not the role or intent of the Instructional Technology Department to approve ordisapprove specific software purchases. The responsibility of ITD is to facilitate the preview
process, communicate with vendors and appropriate personnel, summarize and communicate
results, and assist personnel in using software that has been purchased.
Technology makes it easy for students to login, take a pretest, receive prescribed lessons, andview resulting reports. The technical capabilities of such management programs areimpressive and the software is very convenient for teachers since little instructional planning
is required. However, this type of software typically provides assessment rather than
instruction and lends itself to poor instructional practices (i.e., students going to a computer
lab, logging in, working on whatever content the software generates, with little teacherinvolvement and little correlation to a specific lesson objective). The result is additional
practice in answering multiple-choice questions rather than significant improvement in
student understanding. Once purchased, management software often becomes thepredominant curriculum in a computer lab even though its use does not result in mastery of
Technology Applications TEKS.
Publishers and vendors often provide examples of districts or campuses with significant gains
in test scores after using their products. Scientific researchers who view those results oftenidentify flaws in research methods and report little evidence that the software caused the
gains. It is best if research regarding the impact of software on student achievement is
conducted by qualified, third-party sources that are not in a position to benefit financiallyfrom sales of the applicable product.
Before software or online resources are purchased for districtwide use, a Technology
Resources Preview Committeestudies the materials and provides input. Several campusesshould be represented in the preview process. District subject-area coordinators and
technology specialists must also be included.
When the groups recommendations are finalized, the district subject-area coordinator
submits purchasing requests to the Assistant Superintendent for Technology and the
Executive Director of Elementary and/or Secondary Instruction. Documentation such as sign-in sheets from preview sessions, individual feedback forms, system requirements and price
quotes should be maintained and provided with the purchasing request.
-
8/13/2019 ITD Handbook 2010-11
29/59
2010-11 Instructional Technology Handbook 29
SELECTING AND INSTALLING
Issues considered include but are not limited to:
At a minimum the preview team should include teachers, district subject-area
coordinators and district technology department personnel.
Technology resources must support subject-area and technology applications TEKS as
well as AISD curriculum initiatives and objectives.
Consideration should be given to whether the District already owns software that can beused to accomplish the same tasks.
Technical requirements (operating system, standalone vs. network versions, processor
speed, hard drive space, memory, monitor resolution, colors, sound cards, microphones,CD or DVD drives, ongoing fees for upgrades or licensing, ongoing support required)
must be carefully studied and considered.
If resources are purchased with district funds, CTMs and/or LAN Techs store and manage
the inventory. If CDs are required to run a program, the CDs will be temporarily checked out
to the teacher, then returned to the CTM or LAN Tech for inventory purposes.
Several recent textbook adoptions included software, and in some instances, the software was
shipped directly to classroom teachers. The question then became whether the software could
be installed on classroom computers and who was authorized to install it. Teachers are free toinstall such software on classroom computers or to request help from a CTM if needed. The
installation process must include reading and complying with applicable license agreements.
Teachers make decisions about the appropriateness of instructional materials on a daily basis.
Whether the format is print or electronic media, the important issues are whether materials
serve a meaningful instructional purpose and support the curriculum, including the TEKS, forthe particular grade level or subject area involved. If a teacher personally owns legal software
that meets the above criteria, he/she can install it on classroom computers. Installation must
be in compliance with the number of licenses owned. If the teacher, for example, owns onecopy or license, the software can be installed on one computer. The teacher must store the
original software at school so that the legality of the license can be verified at any time. The
teacher should understand that district personnel (campus technology trainers, CTMs, LAN
Techs, district technicians) should not be expected to invest time installing, learning ortroubleshooting software purchased by the teacher.
When persistent technical problems exist on a district-owned computer, the machine is re-imagedmeaning that the hard drive is completely erased and the original software and
settings provided by the district are restored. Any custom software or settings are lost and
must be reset, if needed, by the teacher who originated them.
-
8/13/2019 ITD Handbook 2010-11
30/59
2010-11 Instructional Technology Handbook 30
CAMPUSTECHNOLOGY TRAINERSWhy does the AISD use campus-based technology trainers?
In September of 1998 Texas implemented K-12 Technology Applications TEKS, whichfocus on the teaching and learning of technology skills.
The TEKS for every subject area (language arts, math, social studies, science) addresstechnology skills that must be taught by the classroom teacher.
All teachers are expected to master standards I-V of the Technology ApplicationsStandards, which were developed by the Texas Education Agency and the State Board forEducator Certification (SBEC). Teacher Technology Competencies Certification (TTCC)assesses the mastery of these standards.
Texas Education Code, Chapter 21, Subchapter J, Section 21. 451 states that staffdevelopment must include technology and must be predominantly campus-based.
A report to the 75th Texas Legislature from the State Board of Education gives short-term, mid-term, and long-term goals of the Long-Range Plan for Technology for 1996-2010. This report and updates to the plan reference many technology competencies forteachers, including a long-term goal to incorporate technology use into the teacherappraisal system.
Research has proven that the best training a teacher can receive is from another teacher.Therefore, a trainer of trainers model for campus technology trainers was implemented in thespring of l997 and will continue, with minor modifications, into the current school year.
How are campus trainers selected?Any certified teacher assigned to a campus may apply to become a technology trainer.Campus principals submit names of recommended trainers to the Instructional TechnologyDepartment. The department assists in this process if a principal requests such assistance.The following suggestions have been given to principals to assist them in the selection oftrainers:
A certified teacher with a minimum of three years teaching experience in AISD One who is currently teaching students in the classroom One who regularly integrates technology into the curriculum
-
8/13/2019 ITD Handbook 2010-11
31/59
2010-11 Instructional Technology Handbook 31
CAMPUS TECHNOLOGY TRAINERS
On the elementary level, a classroom teacher who is familiar with the scope and sequenceof all core subject curricula PreK-6
On the secondary level, a content area teacher who is familiar with the curricula formultiple subject areas
One who is comfortable with technology though not necessarily a computer whiz One who is respected by the faculty One who can attend training classes during the summer One who is willing to complete TTCC certification during their first year of service
as a trainer.
What do trainers learn?Training topics include district policies and procedures, general computer knowledge andskills, job-related productivity tools, telecommunications, multimedia and web authoring.Equipment used includes Macintosh and PC computers, mobile labs, interactive learning andassessment systems, scanners, and digital cameras.
How many trainers can each campus have?Kooken, the Newcomer Center, Turning Point Elementary, Turning Point Junior High,Turning Point High School and Venture School have one technology trainer each. Eachelementary school is eligible for three trainers; junior high campuses are eligible for twotrainers. Comprehensive high schools are eligible for four trainers.
What compensation is available?The Department of Instructional Technology will pay for substitute teachers as needed duringthe training program. After successful completion of the requirements to become a CampusTechnology Trainer, trainers receive a $750 stipend and are paid $25 per hour for presentingtechnology sessions after school (restrictions apply). The amount of funds available to
campuses is communicated to principals on an annual basis. Trainers must submit PaymentAuthorization forms and sign-in sheets to the Department of Instructional Technology within60 days of the date that services were rendered in order to receive payment. Remuneration insubsequent years will depend on being selected as a campus trainer, completing continuingcertification requirements (attending and presenting additional staff development, assistingteachers) and future budget approval.
-
8/13/2019 ITD Handbook 2010-11
32/59
2010-11 Instructional Technology Handbook 32
CAMPUS TECHNOLOGY TRAINERS
What does the District expect campus trainers to do?
Complete an initial series (typically six days) of training to become a trainer. Complete annual requirements (typically one day per semester) to remain a certified
trainer.
Demonstrate mastery of SBEC Technology Applications Standards I-V by completingTTCC during the first year of service as a trainer.
Work with the campus principal to plan technology training classes. Submit training class information as directed for inclusion in the districts staff
development management system (ERO).
Provide an opportunity for each teacher to attend at least six hours of campus-based staffdevelopment each year including sessions that focus on the integration of technology andcurriculum.
Demonstrate on a regular basis the use of technology in the classroom. Serve as a mentor for teachers who need assistance with instructional technology. Assist in orienting new staff. Continually search for, evaluate, and implement new instructional resources including
software, websites and distance learning opportunities.
Promote a positive, caring climate for all technology learners. Model and effectively communicate district policies, procedures and guidelines. Demonstrate behavior that is professional, ethical, and responsible.
-
8/13/2019 ITD Handbook 2010-11
33/59
2010-11 Instructional Technology Handbook 33
STAFF DEVELOPMENTOPPORTUNITIES AND REGISTRATION
Employees of the Arlington ISD have numerous opportunities to obtain technology-relatedstaff development. Topics include operating systems; file management; accessing,
integrating, and creating Internet resources; Internet safety and acceptable use; videoconferencing; podcasting; digital cameras; mobile labs; and numerous software applications
such as Microsoft Office, the Macromedia Suite, Photoshop, FileMaker Pro, Acrobat,
iMovie, Inspiration, Classroom Performance Systems (CPS), Qwizdom, GPS devices, SASI,
FirstClass, and Electronic Registrar Online (ERO).
To register and/or view the most current information about technology classes:
1. Launch a browser (Firefox, Safari, Internet Explorer).2. In the Address line enter: https://ero.eschoolsolutions.com3. In the Organization ID field, enter 52002. Click Submit.
4. Enter your AISD employee ID number in the field titled User ID.5. Enter your PIN number in the field titled PIN.6. Click Login.
7. If you are unable to login, contact your Campus Technology Trainer or the StaffDevelopment Office.
-
8/13/2019 ITD Handbook 2010-11
34/59
201011InstructionalTechnologyHandbook
TECHNOLOGY DEPARTMENT PERSONNELStevenHarvey,AssistantSuperintendentforTechnologyandTelecommunications6828677314
DepartmentofInstructionalTechnology682.867.7540Sue
McGahee,
Director
CeciliaIvey,Secretary
AnnePearson,Clerk
TonyAmendola,InstructionalTechnologySpecialistSusanAnderson,InstructionalTechnologySpecialist
JanCaywood,InstructionalTechnologyTrainer
KatieFavara,InstructionalTechnologySpecialist
CharleeHagan,InstructionalTechnologyandDistanceLearningSpecialist
JimHolland,InstructionalTechnologySpecialist
GabyKrumm,InstructionalTechnologySpecialist
IcleStone,InstructionalTechnologyTrainer
DeannThompson,
Title
IInstructional
Technology
Specialist
DepartmentofInformationSystems682.867.7370CyndiMorris,Director
AS400
PEIMS(SandyFrederick,Coordinator)
SASI(WendyCarrington,Manager)
DepartmentofNetworkServices682.867.7289LanceMcCutchen,Director
Wide andLocalAreaNetworks
IP
Telephones
Servers
DepartmentofTechnologySupport682.867.7836EdCannady,Director
CTMs,LANTechs
HardwareandSoftwarePurchases,InstallationandSupport
HelpDesk
DepartmentofTelecommunications682.867.7809JimWren,Director
AnalogTelephones
AudioVideo
Support
DistanceLearningEquipmentandSupport
DistrictWebMaster(BruceBarrs)
ImageProcessing/TranscriptServices6828677656JohnKnox,Manager
RecordsManagement6828677685ShirleyLee,RecordsManagementOfficer
-
8/13/2019 ITD Handbook 2010-11
35/59
201011InstructionalTechnologyHandbook
InstructionalTechnologyTopicsandContactsAcceleratedReader(AR/STAR) TonyAmendola,CharleeHagan
AdobeAcrobat JanCaywood
Audacity JimHolland,SueMcGahee
Blogs KatieFavara
CampusTechnologyTrainers GabyKrumm,SueMcGahee
ClassroomPerformanceSystems(CPS) JimHolland
CreativeSuite
5Design
Premium
(Dreamweaver,
Fireworks,
Flash)
Katie
Favara
DigitalCameras SusanAnderson,GabyKrumm,DeannThompson
DiscoveryEducationSusanAnderson
VideoConferencing CharleeHagan
ElectronicRegistrarOnline TonyAmendola,JanCaywood,SueMcGahee
FileMakerPro TonyAmendola
FileManagement TonyAmendola,JanCaywood,IcleStone
FirstClassEmail,ConferencesandCalendars JanCaywood,SueMcGahee
FirstClassHomePages CharleeHagan
GoogleEarth SusanAnderson
GraphClub GabyKrumm
iLife
Charlee
Hagan
iMovie CharleeHagan
iWorksCharleeHagan
Inspiration CharleeHagan
iPad,iPod,iPodTouch,iPhone,iTunesTonyAmendola,JimHolland,GabyKrumm,SueMcGahee
Keyboarding GabyKrumm
KidPix GabyKrumm,DeannThompson
Kidspiration TonyAmendola
MacintoshOperatingSystems TonyAmendola,CharleeHagan
MicrosoftOfficeAccess JimHolland
MicrosoftOfficeExcel IcleStone
MicrosoftOfficePowerPoint GabyKrumm
MicrosoftOffice
Publisher
Susan
Anderson
MicrosoftOfficeWord TonyAmendola
MicrosoftProducer JimHolland,KatieFavara,GabyKrumm
MovieMaker SusanAnderson
NeighborhoodMapMachine GabyKrumm,DeannThompson
netTrekkerTonyAmendola,SueMcGahee
ParentPortal MarkMurray
PhotoStory JimHolland,GabyKrumm
PhotoshopElements SusanAnderson
PremiereElementsSueMcGahee
Podcasts JimHolland
PortalsKatie
Favara
STaRChartsInstructionalTechnologySpecialists,SueMcGahee
TEAMSGradebookAllspecialists
TEAMSStudentSystem(professionaldevelopment)JanCaywood,IcleStone
TechnologyGrantsSueMcGahee
TitleITechnology DeannThompson,SueMcGahee
TitleIIDTechnologySueMcGahee
TRIAND DebbieAllison,MarkMurray,TonyAmendola,GabyKrumm
VideoConferencing CharleeHagan
-
8/13/2019 ITD Handbook 2010-11
36/59
36
APPENDIX
-
8/13/2019 ITD Handbook 2010-11
37/59
Instructional Technology
Student Proficiencies Kindergarten
Arlington Independent School District Page 1 of 2
The information in parentheses has been added to the original TEKS for clarification purposes.
Six Weeks
Foundations 1 2 3 4 5 6
1A Use technology terminology appropriate to the task (computer,
keyboard, monitor, mouse, mouse button, cursor, open, close, menubar, trash can, hard drive icon, folder, window, slideshow...).
1A Use and understand common tools (eraser, pencil, line, shape
tools, paint bucket, paintbrush...).
1B Start and exit programs.
1B Create, name and save files.
1C Use networking terminology (online, server, spooling to theprinter).
1C Access a networked printer.
2A Use a variety of input devices such as a mouse, keyboard, disk
drive, voice/sound recorders, scanner, digital video, CD-ROM, ortouch screen.
2B Use proper keyboarding techniques such as correct hand and
body positions and smooth and rhythmic keystroke patterns as grade-level appropriate.
2C Demonstrate touch keyboarding techniques for operating the
alphabetic, numeric, punctuation, and symbol keys as grade-level
appropriate.
2C Operate keys needed in instructional applications (space bar,return, shift, option, arrows, caps lock).
2D Use a keyboard to produce documents.
2E Use letters and numbers as grade-level appropriate.
3A Follow Arlington ISD Acceptable Use Guidelines.
3B Adhere to software licensing agreements and respect theelectronic work of other individuals. (Comply with copyright law and
guidelines.)
Information Acquisition
4B Select appropriate strategies to navigate and access information
for research and resource sharing (i.e., click appropriate icon or
graphic to locate information).
5A Acquire information including text, audio, video, and graphics.
5B Use on-line help (i.e., click the help button).6A Determine the success of strategies used to acquire electronicinformation. (Did you find what you needed? Was the information
helpful? How else could you search for the information?)
-
8/13/2019 ITD Handbook 2010-11
38/59
Instructional Technology
Student Proficiencies Kindergarten
Arlington Independent School District Page 2 of 2
Six Weeks
1 2 3 4 5 6
6B Determine the usefulness and appropriateness of electronicinformation. (Does the information support the learning objective? Is
it grade-level appropriate?)Solving Problems
7A Use software programs with audio, video, and graphics toenhance learning experiences.
7B Use word processing to express ideas and solve problems.
7B Use multimedia software (KidPix, HyperStudio, PowerPoint...) toexpress ideas and solve problems.
8A Use communication tools (telephone, email, fax machine) to
participate in group projects.
8B Use electronic tools (software, Internet resources, cameras)
and research skills to build a knowledge base regarding a topic, task,or assignment.
9A Use software features (i.e., feedback provided to students and
multiple levels of difficulty) to evaluate work progress.
9B Use software features, such as previews and storyboards, to
evaluate a final product.
Communication
10A Use font attributes, color, white space, and graphics to ensurethat products are appropriate for the defined audience.
11A Publish information in a variety of media such as printed copy
or monitor display.
11B Publish information in a variety of media such as stored files orvideo.
12A Select representative products to be collected and stored in an
electronic evaluation tool (on a floppy, hard drive, server).
12B Evaluate the product for relevance to the assignment or task.
-
8/13/2019 ITD Handbook 2010-11
39/59
Instructional Technology
Student Proficiencies Grade One
Arlington Independent School District Page 1 of 2
The information in parentheses has been added to the original TEKS for clarification purposes.
Six Weeks
Foundations 1 2 3 4 5 6
1A Use technology terminology appropriate to the task (computer,keyboard, monitor, mouse, mouse button, cursor, open, close, menu
bar, trash can, hard drive icon, folder, window, slideshow...).1A Use and understand common tools (eraser, pencil, line, shapetools, paint bucket, paintbrush...).
1B Start and exit programs.
1B Create, name and save files.
1C Use networking terminology such as online, server, or spoolingto the printer.
1C Access a networked printer.
2A Use a variety of input devices such as a mouse, keyboard, diskdrive, voice/sound recorders, scanner, digital video, CD-ROM, or
touch screen.2B Use proper keyboarding techniques such as correct hand andbody positions and smooth and rhythmic keystroke patterns as grade-level appropriate.
2C Demonstrate touch keyboarding techniques for operating thealphabetic, numeric, punctuation, and symbol keys as grade-levelappropriate.
2C Operate keys needed in instruc