Monte Vista School DistrictTechnology Manual
Updated July 24, 2013
Acceptable Use Policy (AUP)
As per district policy EGAEA, EAGEA-R, EHC, EHC-E, EHD, EHD-E all staff and students of Monte Vista School District must read and sign the approved AUP prior to using the district network or the Internet. The students must have a parent/guardian signature. Take a few minutes to review the Agreement form: District Network/Internet Use Polices
Children's Internet Protection Act
We must comply with the Children's Internet Protection Act (CIPA) which requires us to filter Internet access on district computers.. Here are some sites with information you may find helpful in understanding its impact on our use of the Internet.
ETIL: Education Technology and Information Literacy
The ET-IL plan is a requirement for the Enhancing Education Through Technology Title II-D Formula portion of No Child Left Behind, E-rate and Accreditation.
Monte Vista Plan
If you need more information on ETIL, you can go to CDE's website:
http://www.cde.state.co.us/edtech/plng-etil.htm
Monte Vista Plan
If you need more information on ETIL, you can go to CDE's website:
http://www.cde.state.co.us/edtech/plng-etil.htm
User-names/Passwords and Security Issues

Each user will be issued a "username" and password. It will typically be the first name and first initial of the last name. This username should be the same for both the network logon and for e-mail. Password should be at least 5 alpha/numeric characters.
We can change forgotten passwords and if you feel someone may have yours, please notify Michele immediately!
When you turn on your computer you will see the above screen. Press CTRL+ALT+Delete then enter your username, your password.
The issue of security is very important. Since sensitive information is available over the network, we must be very careful to limit access to that information. This is done with passwords and with "Permissions". This means, that if a teacher logs on to the network, that teacher’s permissions are available to anyone who sits at that machine. Since all students will have their own accounts, please log off and let them log on with their own accounts. Do not allow students to use the computer when you have logged on. Please do not allow students access to Infinite Campus at any time!!!! It is essential that teachers log off or lock their computers when you expect to be away for even a short time, and definitely at the end of the day. If you leave your computer and did not log off, anyone can come in, sit down and use that computer and have your Permissions. Whatever you have access to, they now have access to. They can also set your account so you can not get into it. If they wish to do damage to our system and they have the knowledge, you've now given them access. And all has been done under your log in name. The records will indicate that the user who logged on is responsible.
Teachers are responsible for student use of the computers in their classrooms. Be vigilant and make it clear that transgressions are severely dealt with. The computer and the Internet are for educational use, and inappropriate or illegal use will not be tolerated.
To reiterate: Do not allow use of your computer by others with your account; log off when your are not at your computer.
Protect your passwords!!!
Monitor student use of the computer and the Internet. Be looking over their shoulder regularly.
We can change forgotten passwords and if you feel someone may have yours, please notify Michele immediately!
When you turn on your computer you will see the above screen. Press CTRL+ALT+Delete then enter your username, your password.
The issue of security is very important. Since sensitive information is available over the network, we must be very careful to limit access to that information. This is done with passwords and with "Permissions". This means, that if a teacher logs on to the network, that teacher’s permissions are available to anyone who sits at that machine. Since all students will have their own accounts, please log off and let them log on with their own accounts. Do not allow students to use the computer when you have logged on. Please do not allow students access to Infinite Campus at any time!!!! It is essential that teachers log off or lock their computers when you expect to be away for even a short time, and definitely at the end of the day. If you leave your computer and did not log off, anyone can come in, sit down and use that computer and have your Permissions. Whatever you have access to, they now have access to. They can also set your account so you can not get into it. If they wish to do damage to our system and they have the knowledge, you've now given them access. And all has been done under your log in name. The records will indicate that the user who logged on is responsible.
Teachers are responsible for student use of the computers in their classrooms. Be vigilant and make it clear that transgressions are severely dealt with. The computer and the Internet are for educational use, and inappropriate or illegal use will not be tolerated.
To reiterate: Do not allow use of your computer by others with your account; log off when your are not at your computer.
Protect your passwords!!!
Monitor student use of the computer and the Internet. Be looking over their shoulder regularly.
Infinite Campus
A username and password will be set up for you by the school office. Contact Melissa at the High School (852-3586), Karen at the Middle School (852-5984), Lupe at Bill Metz (852-4041) and Cindy at Marsh (852-3231).
If a Parent/Guardian needs a username/password for the Portal, have the parent/guardian contact Michele at 852-2212 ext 6113.
If a Parent/Guardian needs a username/password for the Portal, have the parent/guardian contact Michele at 852-2212 ext 6113.
E-Mail and Internet
Most of us will use e-mail and the Web most frequently. Your username and the district’s domain name "monte.k12.co.us" makes your e-mail address. username@monte.k12.co.us For example, michele@monte.k12.co.us is my e-mail address.
Support numbers
- District Technology - 852-2212
- Michele - ext. 6113
- Patrick - ext. 6115
- Computer Support Request Form
- Michele - ext. 6113
Student use of District computers and the Internet
The computers we have invested in are here to improve the educational opportunities of our students. This technology and the Internet can put our kids on an even playing field and if we use it properly, it can give them an edge. So we must encourage the proper use of the technology. Students must be allowed to use the computers in your classrooms, they are not just for teachers.
All students must have an AUP signed by their parents on file with the district before they can use a networked computer. See Acceptable Use Policy above for more information.
One of the topics that we are asked about is protecting students from inappropriate materials on the Internet. The best solution is the presence of the teacher. Software is available that can block much of the stuff we don’t want kids to see, be it isn’t fool proof and could lull us into a sense of false security. Tell kids what is acceptable and what is not and then keep your eyes open. They have to learn to make these decisions, and if they make the wrong decision, make sure they suffer the consequences. These consequences are spelled out in the AUP. We are using a filtering software and are able to block sites. The Internet usage is being monitored daily.
Be sure to remind your students that they protect their passwords. Giving their passwords to a ‘friend’ is a very big mistake. That person could conceivably ruin the students life or at least cause them great embarrassment. This is far more serious that giving out their locker combination. If someone commits a crime (sending threatening e-mail, posting pornography where children can see it, and a host of other dirty deeds) the user’s name will identify the responsible party, even if they didn’t do it. Kids must understand that their username and password are theirs and theirs alone. Admonish them to protect their privilege.
All students must have an AUP signed by their parents on file with the district before they can use a networked computer. See Acceptable Use Policy above for more information.
One of the topics that we are asked about is protecting students from inappropriate materials on the Internet. The best solution is the presence of the teacher. Software is available that can block much of the stuff we don’t want kids to see, be it isn’t fool proof and could lull us into a sense of false security. Tell kids what is acceptable and what is not and then keep your eyes open. They have to learn to make these decisions, and if they make the wrong decision, make sure they suffer the consequences. These consequences are spelled out in the AUP. We are using a filtering software and are able to block sites. The Internet usage is being monitored daily.
Be sure to remind your students that they protect their passwords. Giving their passwords to a ‘friend’ is a very big mistake. That person could conceivably ruin the students life or at least cause them great embarrassment. This is far more serious that giving out their locker combination. If someone commits a crime (sending threatening e-mail, posting pornography where children can see it, and a host of other dirty deeds) the user’s name will identify the responsible party, even if they didn’t do it. Kids must understand that their username and password are theirs and theirs alone. Admonish them to protect their privilege.
Viruses
Computer viruses are just like biological ones. That’s why they’re called viruses. And just like biological viruses, computer viruses are always with us and will always be with us. The only way to avoid getting a virus is to never go anywhere or never use your computer. So your computer will end up with a virus sooner or later. If you have any problems, please contact us right away.
You will eventually receive e-mail messages warning you about viruses that are part of e-mail messages. These are hoaxes. They are actually a benign form of a virus themselves. They get transmitted from computer to computer by well meaning people. do not click on any links within the email message unless it comes from someone you are absolutely sure about. If you are not sure, do not click and contact the tech dept.
You will eventually receive e-mail messages warning you about viruses that are part of e-mail messages. These are hoaxes. They are actually a benign form of a virus themselves. They get transmitted from computer to computer by well meaning people. do not click on any links within the email message unless it comes from someone you are absolutely sure about. If you are not sure, do not click and contact the tech dept.
Backing up your files
There are few things that will raise your anxiety level like loosing your data to a hard disk crash or a power outage. The solution is simple: keep your data backed up onto the server - your "H" drive. To protect from power outages, Save to your folder on the server, often. You’ll hate it when (yes, I said when) you’ve spent 2 hours writing out an exam to be given the next morning, when the lightening strikes and click goes your computer. All that work gone into the ozone, never to be seen again. And of course, you can’t remember exactly how you phrased that one question that was just right. Next time you’ll remember to click on the little save icon and save into your folder on the server. This does not apply only to power outage. If you save everything on your hard drive and it crashes and you have NO backup......oh no.... now what... Well, if it was saved into your folder on the server, you could access these files from another computer. This is backed up on a regular base. Decide how often to "Save" by deciding how much time you won’t mind reinvesting. I’m at about every 3-4 minutes. It’s when I get lax and the next thing I know its an hour since I last saved and you can guess what happens. Well, it’ll happen to you, I bet.
Servers to save to: You will find your folder with your username on your server
High School/Delta/Admin \\monte.k12.co.us\users\hsstaff
Middle School \\monte.k12.co.us\users\msstaff
Bill Metz \\monte.k12.co.us\users\bmestaff
Marsh \\monte.k12.co.us\users\mestaff
If you need help, please contact Michele @ michele@monte.k12.co.us
Servers to save to: You will find your folder with your username on your server
High School/Delta/Admin \\monte.k12.co.us\users\hsstaff
Middle School \\monte.k12.co.us\users\msstaff
Bill Metz \\monte.k12.co.us\users\bmestaff
Marsh \\monte.k12.co.us\users\mestaff
If you need help, please contact Michele @ michele@monte.k12.co.us
Substitute Policy
What do you do about your computer when you have a Sub? Do not allow them to let the students access your computer. Remember who’s responsible for their actions. Under no circumstances give a sub your password. If they need an account, we have a guest account for them to use. Contact Michele at 852-2212 ext 6113 or email: michele@monte.k12.co.us You can also contact Carol Manzanares at the DELTA Center 852-2212. she has that information as well.
The office will provide subs with a roster for attendance.
The office will provide subs with a roster for attendance.
Software Licensure
When you buy a program, you are actually purchasing a license to use the software. You do not own the software; the developer/provider owns the software. The license is the page of very fine print and/or shiny seal that the disks came packaged in. You probably threw that stuff away. Don’t throw them away anymore. That is proof that you have purchased a license to use the software. The CDROM or DVD will not suffice. Those can be duplicated. All software installed on District computers must be licensed. If you have a copy of a software that someone let you install, you are using a "pirated" copy. That’s a nice way to say "stolen". Since we are not in the habit of stealing books or pencils or anything else, we cannot steal software.
Yes, we can find unlicensed software all over the place. We will have to begin buying licenses or deleting those programs. If you read the license, you may be allowed to install it at work and at home. Most software companies recognize that educators need to have a copy at home so they can work at home as well as at school.
Another common occurrence is for students to ask either to install their software on a school computer or they ask to borrow a program so they can install it at home. You can do this only if the license allows it and most licenses allow a single installation. Installing student owned software is a great way to get a case of the Form Virus of some other nasty bug. Our recommendation is don’t. Just tell kids that it’s against district policy to loan software or install non district owned programs. Piece of cake.
Yes, we can find unlicensed software all over the place. We will have to begin buying licenses or deleting those programs. If you read the license, you may be allowed to install it at work and at home. Most software companies recognize that educators need to have a copy at home so they can work at home as well as at school.
Another common occurrence is for students to ask either to install their software on a school computer or they ask to borrow a program so they can install it at home. You can do this only if the license allows it and most licenses allow a single installation. Installing student owned software is a great way to get a case of the Form Virus of some other nasty bug. Our recommendation is don’t. Just tell kids that it’s against district policy to loan software or install non district owned programs. Piece of cake.
Staff Development
Under construction