Technology @ DeMatha
Technology instruction is a valuable learning tool and is part of the curriculum at DeMatha Catholic High School.
DeMatha combines the manageability of Microsoft, flexibility of Google and student portal benefits of Veracross to create a superior experience for students. Through the DeMatha Way, freshman receive a complete orientation on how to use the technology tools available. Students will have their own computer account which will be used to access computers, Veracross and a number of useful programs through Google Apps for Education. Listed below is important information about using technology at DeMatha and some of the tools you have available to you. Parents and students should be fully aware of our technology and mobile device policies prior to the first day of classes. Be sure to speak with the subject teacher regarding specific requirements for technology use.
Technology instruction is a valuable learning tool and is a required part of the curriculum at DeMatha Catholic High School. The Acceptable Use Policy (see below) explains the student’s responsibilities while using school resources. Violations of this policy can result in loss of computer use, disciplinary action including dismissal, and/or appropriate legal action. The BYOD Policy explains the rules regarding bringing personal devices to school.
Student ID and ID Cards
The student ID number is the unique piece of identification required for obtaining an account and is printed on all schedules and report cards for reference. Students may also contact their counselor for this number.
ID Cards are provided to students after their first picture day. This is typically competed as part of the beginning of school orientation. Replacement cards can be requested for a fee in the Main Office. Your ID Card is also used to participate in the optional online payment program for the cafeteria. (ID cards may have uses for admission to events at other schools and at retail establishments.)
Obtaining a User Login
All students are issued an account their first year at DeMatha. This information will be provided during orientation or on the first day of classes. Students enrolling after the first day of classes should see their guidance counselor.
Upon graduation, students have until August 1 to obtain all of their data before all login accounts are deleted from all systems. In addition to creating an archive, users can visit Transfer your content to transfer email and Drive files to another consumer or G Suite domain account. Students who voluntarily withdraw midyear will be provided no more than 14 days before account removal.
All student accounts are linked to a master password that is stored on internal servers. These systems sync with all of our other resources. Therefore, students can use the same account information for various resources at DeMatha. In general, usernames contain the student's legal first name, followed by a period(.), then the student's last name, and finally the two-digit year of graduation. For example, if your name is John Smith with a year of graduation of 2019, your username would be john.smith19. When logging into Veracross or Google, students MUST include their full email address. Using the previous example (John Smith), the full username would be email@example.com. Students will be prompted to change their password each year. Passwords should never be shared with other students and should be difficult to guess to protect your account from unauthorized access.
Computer accounts are used to generate e-mail accounts, provide wireless access, and permit access to Veracross.
Forgot Your Password?
DeMatha now offers the ability for students to reset their own password. Before using the tool a student must complete the enrollment process. The enrollment process asks students to verify their identity. All data entered on the site is highly encrypted and will not be shared. To enroll you must use one of the following forms of identification in addition to your DeMatha password:
a. Mobile Code [text; a code will be sent to your cell phone]
b. Google Authenticator [app is available on the Play Store and Apple App Store; requires a second device to scan a QR code]
c. Specops Fingerprint [app is available on the Play Store and Apple App Store; uses a devices fingerprint reader to generate a secure token]
Please go to the Technology Center (Room 300) between 7:45 AM and 3:15 PM during the school day if you have any questions. Password changes will not be honored via e-mail.
Google Apps - Email, Drive, Calendar, and Beyond
School resources include, but are not limited to, laptops, desktops, tablet devices, Internet access, network folders, e-mail addresses, projectors, printers, and all infrastructure related equipment. Violations of the Code of Ethics can result in loss of computer use, disciplinary action including dismissal, and/or appropriate legal action. Use of Google Apps is governed by this policy in addition to Google policies.
Veracross is a comprehensive school information management system that will enable you to effectively monitor your education and activities. For specific questions about schedules, please contact your counselor. For grade concerns, it is best to contact the subject teacher. If you have account problems, questions, or comments, please contact the technology center at: firstname.lastname@example.org or email@example.com.
Acceptable Use Policy (AUP)
Access to online services, Internet resources, and other educational technology resources complement the DeMatha philosophy of a “broad-based curriculum that incorporates appropriate pedagogical techniques and technological innovation”. The AUP outlines the policies and procedures related to providing all students with the ability to collaborate, innovate, and communicate with modern technology in the 21st century. The school’s technology resources, including Google Apps for Education and Internet access, are provided for educational purposes only. All violations of this policy will follow the discipline procedures outlined in the 2016-2017 Student Handbook. Acceptance of the AUP is completed during the Online Enrollment and Re-Enrollment process.
The use of technology, whether owned by DeMatha or the student, involves responsibility. Use of the DeMatha network is a privilege, not a right. Failure to comply with school policy may result in temporary or permanent loss of access and well as further disciplinary or legal action. Students will be held accountable for all activities that occur with their account and/or personal devices.
DeMatha has various hardware and software for student use including mobile carts, tablets, network printers, and multiple instructional computer areas. Use of these items is limited to the policy defined herein. DeMatha will issue user accounts for computer access. This unique account will also be used for access to Google Apps (email) as well as the Veracross Student Portal. Personal email accounts are not allowed except to request access to the school-provided account.
Student Safety and Security
The following expectations are in place for all technology at DeMatha:
• Students will not access or post inappropriate materials including, but not limited to sites containing sexual content, obscene content, threatening material, profanity, illegal activities, hacking/proxy avoidance systems, commercial activities, or virus/spyware content.
• DeMatha has content filtering policies applied to all Internet connections. Students will not attempt to circumvent the filter or deliberately attempt to access resources to which the user is not authorized. Students additionally may not install or alter any system hardware or software on DeMatha-owned equipment without direct supervision from the technology department staff. Reading or modifying other student files in any way is not permitted.
• Only files for DeMatha coursework will be saved to a student’s Google Drive or Network Drive. Any file loss due to saving to 'My Documents' (local disk) will not be recoverable.
• Recording of audio, images, or video for any reason without express permission from both a staff member and the individuals being recorded is prohibited.
• Students understand that printing at school from personal devices will not be possible. Alternatively students can save their work to their Google Drive and then open those files on designated DeMatha computers for printing purposes.
• Personal devices used while at school are the responsibility of the owner. DeMatha is not liable for any device that is stolen or damaged on campus. The school reserves the right to monitor, review, and restrict the use of any device. The contents of the equipment are subject to review at any time, for any lawful reason, consistent with the policies of the Student Handbook and applicable law.
• Devices should be fully charged and are expected to run off their battery during the school day. Students should not expect teachers to make outlets available for charging during class and no student should disconnect other technology equipment to gain access to a power outlet. Additional batteries are recommended for devices that are not capable of running for an entire school day.
Cell Phone Use
Cell Phone use on the DeMatha Campus from 7:30 a.m. to the end of the school day is restricted as follows:
• Outside of the buildings: Students may text, make phone calls and be on their devices
• Cafeteria: Students may text and be on their devices (no phone calls)
• Administrative Offices and Classrooms: Students may use devices or make phone calls with permission
Online Community Rules
1. What you post is not personal.
– Once you’ve posted information on the Internet you’ve relinquished any claim to privacy.
2. What you post can be viewed by your teachers.
– Before you post something negative about Mr. Smith, remember that Mr. Smith might be reading the comment tomorrow.
3. What you post can be viewed by potential employers.
– With an unrestricted account, your information could come up with a simple Yahoo! or Google search. With college alumni receiving .edu e-mail accounts, your potential employer can also view your Facebook page.
4. What you post is permanent.
– You may apply security settings to restrict access and regularly delete information from your web page, but there is a decent chance someone or some program has archived your most detailed, potentially damaging content somewhere. Assume that everything you write could come back to haunt you in 5, 10, or 20 years.
5. What you post can be a literal road-map to your door.
– Detailed information is fine for friends, but it’s an invitation to your home for a predator. Use available security settings and be cautious is posting too much physical location information.
6. What you post can subject you to discipline or even expulsion.
– If something you post violates the Student Handbook, you can and will be disciplined. Your online blog is not a safe haven.