At A

Deer Park k knowledge, a m may include, t these new o t technology s

D Definition F For purposes h handheld eq s systems and h handheld en w word proces t transmitting/


nternet O Only the inte c connective d b be used to a

S Security an R Responsibilit l

iable for any r restitution fo s stolen or dam p personal arti o other custom A Additionally,

B BYOT Stud T The use of te t taken away.

F Fall 2011


k ISD, we use and behavio , but are not pportunities so they may

of “Techn s of BYOT, “T uipment tha smart techn tertainment sing, wireles /receiving/s

ernet gatewa devices such ccess outsid

nd Damage ty to keep th y device stol or any stolen maged, the i ifacts that ar m touches ar , protective c

ent Agree echnology to When respe

ng Your Ow

Protocol fo

e technology ors students t limited to, s come new

become res

ology” Technology” at includes, b nologies, po t systems or ss internet a toring, etc.

ay provided as but not l e internet so

es he personal t en or damag n or damage issue will be re impacted re used to ph cases for tec

ment o provide ed ected, they w

wn Techno

or the Use

y as one way will need to district-prov responsibilit ponsible, dig

” means priv but is not lim rtable intern portable inf access, image

by the scho imited to ce ources at an

technology s ged on camp ed personal t handled thr in similar sit hysically ide chnological d

ucational m will benefit t

ology (BYO

And e of Techno

y of enhancin o succeed in

vided equipm ties. We wan gital citizens

vately owned mited to, exi net devices, formation te e capture/re

ol may be ac ll phones/ce ny time.

secure rests pus. DPISD c technologica rough the ad tuations. It i ntify your pe devices are e

aterial is a p the learning

OT) Agreem

ology on C

ng the missi the global c ment as wel nt students s.

d wireless an sting and em Personal Dig echnology sy ecording, so

ccessed whi ell network a

with the ind can NOT rep al device. If dministrative is recommen ersonal tech encouraged

privilege. Wh environmen

ment Form


on to teach ommunity. T l as persona to embrace

nd/or portab merging mob gital Assista ystems that und recordin

le on campu adapters are

dividual own lace or prov any technol e office simi nded that sk hnology from


hen abused, nt as a whole



the skills, These techn l devices. W appropriate

ble electron bile commun nts (PDAs), can be used ng and infor

us. Personal e not permit

ner. DPISD is vide financia logical devic ilar to other kins (decals) m others.

privileges w e.

Page 1

ologies With

e use of

ic nication

d for rmation

internet tted to

s not l ce is


will be


Students S

and w well as all Bo

• Must

• May maki

• May perso

• May classr

S Students a

• The d will n

• Bring dama the R

• Proce bypa

• The d probl

• Printi

• Perso batte

• The d

• The d

• The d

The s

I und requ in th

The s

S Signature of

D Date:

F Fall 2011

d parents/gu oard policies

t be in silent not be used ng personal not be used ons on camp

only be used room curricu

acknowled district’s net not be made ging on prem age, alter, de RUP.

essing or acc ssing netwo district has t lems or is th ing from per onal technol ery while at s district is NO district is NO district is NO

student choo

derstand tha uirements an he loss of my

student choo


uardians par s, particularly

mode while to cheat on phone calls to record, t pus during sc d to access f ulum. Non-in

ge that: work filters

to bypass th mises or infec estroy, or pr

cessing infor rk security p he right to c e source of rsonal techn ogy must be school. OT responsib OT responsib OT responsib

oses to parti

at participat nd guidelines y network an

oses to NOT

rticipating in

y the Respon

e on school c n assignment and text/ins transmit, or chool activiti files, applica nstructional

will be appli hem. cting the net rovide access

rmation on s policies is in collect and e an attack or nology will no e charged pr

le for stolen le for the m le for any co

cipate in BY

tion is volunt s. I further u nd/or techno


BYOT must nsible Use P

campuses an ts or tests, o stant messa post photog ies and/or h tions or inte games are n

ied to one’s

twork with a s to unautho

school prope violation of xamine any r virus infect ot be possib rior to bringi

n or damaged aintenance osts incurred

OT this scho

tary. I unders understand th ology privileg

in BYOT this



adhere to t Principles (RU

nd while ridi or for non-in

ging). graphic imag ours for non ernet sites w not permitte


a virus, Troja orized data o

erty related t

the RUP. device that tion. ble at school

ng it to scho

d personal t or repair of d due to use

ool year.

rstand and w

hat any viola ges as well a

s school year

re of Parent

he Student C UP). Addition

ing school bu structional p

ges or video n-instruction which are rele


to the inter

an, or progra or informati

to “hacking”

is suspected

. ool and must

technologica any persona of personal

will abide by

ation is unet as other disc




Code of Con nally, techno

uses. purposes (su

of a person, nal purposes evant to the

rnet and atte

am designed on is in viola

”, altering, o

d of causing

t run off its o

al devices. al technolog l technology

the above thical and m ciplinary acti

Page 2

nduct, as


uch as

, or s. e


d to ation of



gy. y.

may result