skip to main content
 
Los Altos High School and Mountain View High School are BYOD (Bring Your Own Device) environments, created to support students using 21st-century skills and promote equitable access. Our BYOD system integrates digital technology and “Cloud-based” learning in every class.
 
Students and families have two options to meet this BYOD learning expectation:
  • Students can bring and use their own device that meets or exceeds the standards expected.
  • Students may check out a Chromebook for their use during the school year from their respective high school book room.
 
Students are expected to bring their charged digital device to their classes daily, and will be used as directed by the teacher. This device will be regularly used in many classes to find, create and share digital materials, as well as to access a variety of learning tools and materials in the cloud and on the web. Students will also use this same device outside of class and at home.
 
The “DIGITAL DEVICE RESPONSIBLE USE AND BORROWING AGREEMENT” explains the details of the contract students and families must sign in order to ensure that digital devices are used appropriately while at school.
 
Should a student choose to check out a school-owned Chromebook, there is an additional agreement outlining the requirements for the use of a school-owned Chromebook.

Digital Device User Agreement

Mountain View Los Altos School District

The use of digital technology, especially devices that create digital content and access the internet, are essential elements of a high quality educational experience. Greater flexibility and mobility in the use of digital technology enhances learning opportunities. Many classes require students to create and share digital content, and to access and use educational content and materials on the internet.

Many students already have the appropriate technology. We expect those students to bring the device to all academic classes with them every day, as directed by the teacher of each class. 

Students who do not have a digital device that meets the minimum requirements for classroom use may borrow a device for academic use as per the agreement below.

MVLA Acceptable Use and Agreement for Technology and Internet/Network Access

Electronic information resources are available to qualifying students in the Mountain View-Los Altos Union High School District (MVLA). 

These resources include access to the Internet and other network files or accounts. Our goal in providing electronic services to students is to promote educational excellence by facilitating resource sharing, innovation, and communication. 

Access to our computer network, which supports our entire learning community, is a privilege. Since all students and staff rely on our computers and network, responsible behavior on the part of all persons using this system is essential. 
 
Only those students who have a Responsible Use and Internet Safety Agreement on file will have access to our computers, digital devices and our network. 
 
Please read this document carefully. If you have any questions concerning this agreement, please call your principal’s office. 
 
Terms and Conditions of this Contract 
  • The student who utilizes district technology resources is responsible for proper use of those resources at all times. Students shall keep account passwords, home addresses and telephone numbers private. They shall use the system only under their own name. 
  • Students shall use the district's system responsibly and primarily for educational purposes. 
  • Students shall not access, post, submit, publish or display harmful or inappropriate matter that is threatening, obscene, disruptive or sexually explicit, or that could be construed as harassment or disparagement of others based on their race/ethnicity, national origin, gender, sexual orientation, age, disability, religion or political beliefs. 
  • Harmful matter includes matter, taken as a whole, which to the average person, applying contemporary statewide standards, appeals to the prurient interest and is matter which depicts or describes in a patently offensive way sexual conduct and which lacks serious literary, artistic, political or scientific value for minors. 
  • Students shall not use the system to encourage the use of drugs, alcohol or tobacco, nor shall they promote unethical practices or any activity prohibited by law or Board policy. 
  • Students shall not use the system to engage in commercial or for profit activities. 
  • Students shall not use the system to threaten, intimidate, harass, bully or ridicule other students or staff. 
  • Copyrighted material shall not be placed on the system without the author's permission. Students may download copyrighted material for their own use only. 
  • Students shall not intentionally upload, download or create computer viruses and/or maliciously attempt to harm or destroy district equipment or materials or manipulate the data of any other user, including so-called "hacking." 
  • Students shall not read other users' email or files. They shall not attempt to interfere with other users' ability to send or receive email, nor shall they attempt to delete, copy, modify or forge other users' mail or digital files.
  • Students shall report any security problem or misuse of the services to a teacher or the principal. 
  • The district reserves the right to monitor any communications or activity which utilizes district networks, computers and/or other district owned or operated digital devices for improper use. Electronic communications and downloaded material, including emails and other files deleted from a user's account, may be monitored or read by district officials to ensure proper use of the system. 
 
Privileges 
The use of the information system is a privilege, not a right, and inappropriate use will result in a cancellation of those privileges. Each person who receives access to the system will participate in a discussion with a school site staff member as to proper behavior and use of the network. The system administrator (operating under the aegis of the principal) will decide what is appropriate use and his/her decision is final. The system administrator or staff of the MVLA District may close an account or deny access at any time deemed necessary. The administration or staff of the MVLA District may request that the system administrator deny, revoke or suspend specific user access and/or accounts. 

Network Etiquette and Privacy 
You are expected to abide by the generally accepted rules of network etiquette. In our attempt to monitor network use, you should expect your activities to be reviewed. These rules include (but are not limited to) the following: 
 
  • BE POLITE. Never send, or encourage others to send, abusive messages. 
  • USE APPROPRIATE LANGUAGE. Remember that you are a representative of your school and district on a non-private system. You may be alone with your computer, but what you say and do can be viewed globally! 
  • Never swear, use vulgarities, or any other inappropriate language. Illegal activities of any kind are strictly forbidden. 
  • PRIVACY. Do not reveal any personal information, social security numbers, credit card numbers, passwords or other vital personal information.
  • EMAIL. Email (email) is not guaranteed to be private. Messages relating to or in support of illegal activities must be reported to the authorities. 
  • DISRUPTIONS. Do not use the network in any way that would disrupt use of the network by others. 

Services 
The MVLA District makes no warranties of any kind, whether expressed or implied, for the service it is providing. The MVLA District will not be responsible for any damages suffered while on this system. These damages include loss of data as a result of delays, non-deliveries, mis-deliveries, or service interruptions caused by the system or your errors or omissions. Use of any information obtained via the information system is at your own risk. The MVLA District specifically denies any responsibility for the accuracy of information obtained through its services.  
Security 
Security on any computer system is a high priority because there are so many users. If you identify a security problem, notify a staff member at once. Never demonstrate the problem to other users. Never use another individual’s account. All use of the system must be under your own account. Any user identified as a security risk will be denied access to the information system.  

Vandalism 
Vandalism is defined as any malicious attempt to harm or destroy data of another user or any other agencies or networks that are connected to the system. This includes, but is not limited to, the uploading or creation of computer viruses and damaging cabling and hardware components of the network. Any vandalism may result in the loss of computer services, disciplinary action, and/or legal referral. 

Additional Provisions for students who enter a loan agreement for school equipment:

  • The term “equipment” or “technology” refers to tablets, laptops, batteries, power cord/chargers and cases.
  • Each piece of equipment is loaned as an educational resource. 
  • Students and their families/guardians are responsible for the return of all equipment undamaged and in working order, except for the results of normal use. Failure to do so will result in fines for repair or replacement.
  • Students are expected to immediately report damage or loss of their equipment to a teacher or other staff member immediately, no later than the next school day.
  • Students may not loan school issued equipment to any other person, for any reason. Students who do so may face disciplinary action.
  • Equipment may come with a background image already loaded, as well as other “personalization” settings. Any changes to device settings must be consistent with all elements of this responsible use agreement.
  • Los Altos High School reserves the right to demand immediate return of the equipment at any time.

Parents/guardians/students have 30 days to pay any fees or fines for lost or damaged equipment. If fines are not cleared within 30 days, students/parents will be billed for the full cost of repairs, and a claim will be filed by the school. The school may setup payment plans to clear fines, if needed.
Mountain View-Los Altos Union High School District
Responsible Use and Internet Safety Agreement
Required Signatures Please sign and return to your school

STUDENT 
I understand and will abide by the provisions and conditions of this contract. I understand that any violations of the above provisions may result in disciplinary action, the revoking of my access, and appropriate legal action. I also agree to report any misuse of the information system to a staff member. Misuse may come in many forms, some of which have been noted and described above. 
 
Student Name (please print): _________________________________________ 

Student Signature: _____________________________Date:_____________ 
 
PARENT OR GUARDIAN 
Students under the age of 18 must also have the signature of a parent or guardian who has read this contract. 
 
As the parent or guardian of this student, I have read this contract and understand that it is designed for educational purposes. I understand that it is impossible for the MVLA District to restrict access to all controversial materials, and I will not hold the school responsible for materials acquired on the network. I also agree to report any misuse of the information system to a staff member. Misuse may come in many forms, some of which have been noted and described above. 

I accept full responsibility for supervision if and when my child's use is not in a school setting. I hereby give my permission for my child to have access to the information system and certify that the information contained on this form is correct. 
 
Parent or Guardian’s Name (please print): _______________________________ 

Signature: __________________________________Date:______________

Please initial and sign below:

My student will use his/her own digital device. I understand Los Altos High School, the Mountain View-Los Altos Union High School District and its representatives and employees are not liable for any damage or loss of the digital device.


My student will check out a digital device form Los Altos High School. I accept responsibility and liability as described above for the use and return of the digital device.


Parent or Guardian’s Name (please print): _______________________________ 

Signature: __________________________________Date:______________

Digital Citizenship

Digital Citizenship

What is Digital Citizenship?
 
What is Digital Citizenship?
Let's see how several pioneers in the field have defined the term:
 
Digital citizenship refers to "the ability to think critically, behave safely, and participate responsibly in our digital world. These 21st century skills are essential for students to harness the full potential of technology for learning." - Common Sense Media
"Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/young people/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology. Too often we are seeing students as well as adults misusing and abusing technology but not sure what to do. The issue is more than what the users do not know but what is considered appropriate technology usage." - Mike RibbleDigitalCitizenship.org
"Critical thinking and ethical choices about the content and impact on oneself, others, and one's community of what one sees, says, and produces." - Anne CollierConnectsafely.org
 
The concept of digital literacy can fall under the umbrella of digital citizenship. Although the lines are blurred in defining these two terms, digital literacy has more to do with information literacy skills around the ability to access, analyze, evaluate, and create messages with digital media. Media scholar Renee Hobbs refers to four areas of digital literacy: 1) Computer Skills and Access Issues; 2) Issues of Authorship; 3) Issues of Reputation; and 4) Online Social Responsibility. Being an informed media consumer and creator--essentially, being digitally literate--is an important aspect of digital citizenship.
 
Most schools are including digital citizenship (often framed as "Internet safety") as part of their Acceptable Use Policy, as part of the agreement in using technology at school.
Internet Safety
Picture
 
Internet safety refers to staying safe from online risk, such as avoiding risky online talk with others; protecting against online scams and schemes like phishing; avoiding encounters with inappropriate content online; using powerful passwords and secure websites; protecting from viruses and spyware, and learning how to protect personal information online. Although Internet safety can also include other risks such as cyberbullying, here it's more narrowly focused on behavior that puts a child's safety at risk, and falls under the larger category of digital citizenship.
 
Read/watch the following resources:
 
Watch a few videos that introduce Internet safety topics (OnGuardOnline.gov)
 
Cyberbullying, Communication and Relationships
 
Cyberbullying, Communication and Relationships
In the early days of the Internet, there were utopian visions of how this wonderful technology would bring people together as part of thriving, empowering communities. And although that indeed is the case, we also have seen the opposite--the Internet (and other digital media like cell phones) as a place to spread hate and cruelty. Just like bullying occurs on the playground or in school hallways, it now happens online. So what is cyberbullying?

"Cyberbullying is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones." (StopCyberbullying.org). One important distinction is that cyberbullying has to do with minors. When adults are involved it falls into the realm of harassment or stalking.

Examples of cyberbullying include mean posts (via text, email, social media site); spreading rumors, sharing embarrassing or private pictures, videos, or information; impersonation; forwarding something that was private; and creating a "slam" page to demean someone.

You probably have heard of terrible stories about cyberbullying on the news or maybe even in your school community. One of the reasons cyberbullying can be so devastating is that it is different from face-to-face bullying. Take a moment to consider the ways that cyberbullying is different. (Check out some of the key differences here.)

Increasingly states are passing laws, and schools are having policies regarding bullying and cyberbullying. See The Cyberbullying Research Center's Bullying and Cyberbullying Laws Fact Sheet to see where your state stands.

When teaching kids about cyberbullying, it's important to focus on how cyberbullying is broader than the target and the bully--there are also bystanders and upstanders. Here are the roles define (vocabulary taken from Common Sense Media's high school lesson, Taking Perspectives on Cyberbullying):
  • target: a person who is the object of an intentional action
  • offender: a person who intentionally commits acts to hurt or damage someone
  • bystander: a person who passively stands by and observes without getting involved
  • upstander: a person who supports and stands up for someone else
 
Kids should be encouraged to move from being bystanders watching bullying happen, to being upstanders to stop the bullying and/or support the target. Also keep in mind that kids can play different roles in a cyberbullying situation, and those roles can change.
 
Privacy, Digital Footprints and Identity
 
Privacy, Digital Footprints and Identity
Each time a young person fills out a profile, comments on something, posts a video, or texts a picture of themselves to friends, they reveal themselves to the world. Understanding how to protect online privacy goes beyond knowing how to customize privacy settings. Privacy settings aren't a cure-all in a world where anything posted can be copied, pasted, taken out of context, and sent to millions of people in a heartbeat. And, privacy not only has to do with the information we share about ourselves and how this might affect our reputation, but also understanding:
  • opt-in or opt-out rights to privacy (i.e. those long boring privacy policies we click "agree" to but never read)
  • how companies gather, track, and use data about consumers, and how this affects our online experience (i.e. targeted advertising)
  • understanding laws that protect privacy, such as the Children's Online Privacy Protection Act. This law i. Read more about COPPA and the Federal Trade Commission's 2012 updates to the law.
 
Check out this infographic and consider the range of issues that fall under privacy: Understanding your online privacy: a (really long) infographic
 
But most parents - and teachers - are concerned with what kids post about themselves and how this affects them not only now, but in the future. From the moment they start sharing information online, kids are building digital footprints that will stay with them for life. Those decisions to post something not-so-smart can haunt a kid years later. And, increasingly college admissions officers, scholarship committees, and employers are "googling" people as part of their applications process. Read this article: Beware: Potential Employers are Watching You.
 
Finally, being responsible for online privacy means not only protecting our own privacy, but protecting the privacy of others. Students may share information, such as a photo of their friend at the mall (when they were supposed to be doing homework!), without thinking about how it affects their online privacy.
 
Copyright and Fair Use
 
Copyright and Fair Use
Kids live in a "copy/paste culture" where they often think, if it's online, it's mine! Most teachers have experienced some kind of problem with student plagiarism and/or improper citation (or lack thereof). Palfrey et al. (2009) found, in research with 12-22 year-olds, young people are fairly ignorant of their rights and restrictions with copyright law, but yet show an interest in the rights and livelihoods of creators. In a digital age, it's more important than ever that students learn about copyright, fair use, and attribution. And, in a digital age we no longer cite just the quotes we use from a book or article, but the images, videos, and websites we use too.
 
Read and/or watch the following resourcesto get familiar with fair use and copyright:
  • Get some background about intellectual property and public domain (Stanford)
  • What is Fair Use? (Stanford University Libraries)
  • Watch the clever A Fair(y) Use Tale, a social commentary on copyright and fair use
 
Another aspect that falls under copyright is learning about the legal and ethical issues regarding piracy (illegal downloading of music, movies, software, etc.). Read this article to get a background on how piracy affects everyone, and why education is an important part of the solution (Forbes, 2012).
 
Teaching about copyright does not have to be one-sided in having students learn their responsibilities as creators in a digital world. They also should learn about their rights as creators--particularly their rights to fair use. One question that most students get invested in is: How would you allow others to use your work (can others share it, alter it, make money from it, etc.)? Students can also learn about Creative Commons, an alternative to copyright that gives people the right to share, use, and even alter and build upon a work. Watch this short video about Creative Commons and explore the different types of licenses.
 
Additional resources
Easy Bib: Free automatic bibliography and citation maker
Copyright and Fair use lessons for high school (Media Education Lab)
 
Effective Searching on the Web
 
Effective Searching on the Web
Students have all had the experience where they've searched for information online and the search brought back over 2 million results in 0.9 seconds. Now comes the daunting task of narrowing down these results to find the exact information they were looking for.
 
With information on the visible web growing each day, learning how to search more effectively is more important. There are several techniques that will help to narrow the results of a search.
  • use more descriptive wording such as porcelain china doll, instead of doll or ceramic doll
  • use boolean operators such as labrador not dog if you want to eliminate information about dogs while searching for information on the island or mountain.
  • Many websites will accept quotes around a word string such as "barrier reef" which will force the search engine to look for pages with those two specific words together.
 
These and other tips as shared in the articles listed below will help students to refine and better define their searches.
  • Tips to Effective Internet Searching (Southern Oregon University)
  • Building Good Search Skills: What Students need to Know (KQED Mind/Shift)
 
Evaluating Credibility and Trustworthiness
 
Evaluating Credibility and Trustworthiness
Ever heard the one commercial that touts: "They can't put anything on the Internet if it isn't true!"? Just reading that statement has to make one wonder about the reliability of information found online. Remember, almost anyone can post information online. It is important that educators continue to help their students understand how to evaluate online information to determine if the information is accurate.
 
Below are some key things to look for when evaluating a website orwebpage:
  • Author or contact person: are they credible? (usually found on the home page)
  • Institution supporting the site/author: who are they? (usually linked with the author)
  • Domain – the last segment of the URL (for example, .edu, com., org., .mil, .net, .gov)
  • Date of creation or revision (is the site current?)
  • Intended audience (for whom did the author create this site?)
  • Purpose of the information (does the author present their information with a bias?)
 

MVLA Technology Standards

Minimal standards for MacBook (Pro) and Windows Notebooks(Dell Latitude 54xx)
  • Processor (Windows i7 / M1 for MacBooks)
  • 16gb Ram
  • 256gb SSD
  • Bluetooh, wireless
  • 13.3" Screen (Mac) | 14" Screen (Windows)