The Craig School has been at the forefront of emerging educational technology since our inception in mid 1980's. Every Craig student in every Craig classroom has access to a personal desktop or laptop computer that is equipped with internet access and a multitude of assistive technology software programs that supports individual academic growth. These programs are integrated into every subject area and are continually updated to provide to our students the most effective learning tools available. In addition, every classroom at Craig is equipped with an interactive whiteboard and a Front Row System. The Front Row System is a wireless, infrared sound field system that amplifies the teacher's voice and helps reduce ambient noise. Research has supported the effectiveness of the Phonic Ear in increasing the ability of children with ADD to attend to classroom instruction. Teachers also find that the device reduces vocal strain and is effective in focusing attention even when the teacher is facing away from the class as, for example, when writing on a whiteboard.
TECHNOLOGY, ASSISTIVE TECHNOLOGY, AND COMPUTER PROGRAMS AT CRAIG
The following is a list of the many of the technologies, assistive technologies, and computer programs used at Craig. The school is continually researching new software for students with learning disabilities and pilot each new program with a select number of students before ever introducing it into our general curriculum:
- One-to-One laptop Program
- iPads - Furnished with apps that support students with language processing disorders
- Read and Write
- Voice Dream Writer
- Voice Typing
- Read and Write
- Voice Dream reader
- CoWriter- A word predictability program
- Learning Ally - An extensive library of over 80,000 human read books.
- Scholastic Reading Inventory (SRI) - SRI is a reading assessment program which provides immediate, actionable data on students’ reading levels and growth over time. SRI helps educators differentiate instruction, make meaningful interventions, forecast growth toward grade-level state tests, and demonstrate accountability.
Lexia- Core 5 and Strategies for Older Students - Lexia web version helps students ages four-adult acquire and improve essential reading skills, while supporting educators in monitoring and informing reading instruction in classrooms, schools, and district-wide. Lexia reading includes and auto placement tool, helping new students quickly and seamlessly begin using lexia at their individually-suited skill level.
- Read Naturally - Read Naturally Software Edition (SE) develops fluency, supports vocabulary development, and promotes comprehension using powerful, research-based Read Naturally strategy, taking advantage of the benefits and functionality of computers. Text and audio prompts guide students through the steps of the program, maximizing their time on task. Read Naturally SE includes a modeling step (Read Along), a repeated reading step (Practice), and progress monitoring using computer-generated graphs of student scores. Students work in Read Naturally SE three-five times a week for at least 30 minutes a day.
- STEM Lab - 3d printer, coding kits.
Free educational exercises in math and science with related videos for grades K-12
Online program - diagnostic and assessment program with curriculum aligned math activities, clear and intuitive feedback, live competitive mathematics and interactive tutorials, support and extend the learning.
ACCEPTABLE USE POLICY
THE DEVELOPMENT OF A COMPREHENSIVE COMPUTER NETWORK AT CRAIG PROVIDES A VIRTUALLY UNLIMITED ARRAY OF RESOURCES AND INFORMATION TO THE COMMUNITY. NETWORK FILE-SHARING, ONLINE/CLOUD-BASED COMPUTING SERVICES, ELECTRONIC MAIL, AND MOST PARTICULARLY THE INTERNET ACCESS. THESE COMPUTING RESOURCES ARE DESIGNED TO SUPPORT THE INSTRUCTIONAL, RESEARCH, AND ADMINISTRATIVE ACTIVITIES OF CRAIG’S ACADEMIC COMMUNITY. THE INTERNET IS AN ELECTRONIC HIGHWAY CONNECTING THOUSANDS OF COMPUTERS ALL OVER THE WORLD AND LINKING MILLIONS OF INDIVIDUAL SUBSCRIBERS. WITH THE INTERNET, USERS NOW HAVE ACCESS TO:
- Electronic mail communication with users all over the world;
- Current and up-to-the-minute information;
- Pictures, movies, sounds, and text from research institutions, organizations and museums;
- Public domain software and shareware of all types;
- Discussion groups and news-feeds on virtually any topic; and
- World wide public and academic libraries, including the Library of Congress.
The purpose of having Internet access at Craig is to promote the objectives of the school by providing access to the vast educational resources available on the Internet, to promote academic collaboration as well as to augment independent learning and research through the use of current technologies. These resources, and those that will add functionality to the network in the future, place an enormous responsibility on all users. General Usage Guidelines and Rules
A. Internet. Because the Internet is a vast and unregulated information network, it also enables access to ideas, information, images, and commentary beyond the confines of Craig’s mission, physical library collections, selection criteria and collection development policies. Since all access points on the Internet can, and do, change rapidly and unpredictably, Craig cannot protect individuals from information or images that they might find offensive or disturbing. Therefore, it is the responsibility of the user to retreat immediately from such inappropriate material. All users are cautioned that ideas, points of view, and images can be found on the Internet that are controversial, divergent, and/or inflammatory.
B. Usage. The use of the Craig computer network by its end users should be consistent with the educational and institutional objectives of our school. All users are expected to use the computer network to pursue intellectual activities, seek valuable resources, access libraries and develop other types of learning activities. These intellectual activities are meant to be shared with the broader learning community. All users of the network must adhere to the same code of ethics that governs every aspect of life in our learning community.
C. Academic Honesty. Improper use or distribution of information is prohibited. This includes copyright violations such as software piracy. The computer network is another academic resource, and use thereof is governed by the same rules as library resources with regard to plagiarism. Ideas, text images, programs, and sounds are all considered intellectual property; their sources should be documented. Faculty and employees should be aware that academic honesty is imperative when using the network.
D. Safety. Users should not intentionally divulge personal information about themselves or others via the computer network. Users are cautioned that, because security in an electronic environment such as the Internet cannot be guaranteed, all transactions, files, and communications are vulnerable to unauthorized access and use, and therefore, should be considered public. Such information includes addresses, phone numbers, credit card numbers, social security numbers, passwords, other personal identifiers or confidential information to which strangers should not be privy. Everyone must be aware that it is extremely dangerous to arrange a meeting with a stranger over the Internet. Information sent across the computer network should not be considered secure. These rules are intended to safeguard all users from fraud and other dangers associated with use of the computer network and the Internet.
E. Reliability. Users should understand that their use of information obtained via the Internet is at their own risk. Craig makes no guarantee, either express or implied, with respect to the quality or content of the information available on the Internet. Not all information available via the Internet is accurate, current, or complete. Craig specifically denies any responsibility for the accuracy or quality of information obtained on the Internet. Support will be present in the form of teaching and training users to evaluate sources of information, but users themselves are encouraged to be good information consumers by assessing the validity of the information accessed on the Internet with a critical eye.
F. Represent Your School. Employees using the computer network are representatives of Craig and are expected to behave accordingly. Employees who are unsure of what constitutes appropriate behavior should ask themselves the question: “Will my actions reflect well on the Craig community?” All users should remember that when they are on the Internet, they are representing Craig. Therefore, when posting messages to discussion groups and newsgroups, end users should not write anything that they would not be comfortable sharing with the entire Craig community at any all-school forum.
G. Network Capacity. Because computer networks have limited capacities users should also work to ease network congestion. No one should tie up the network or computers with idle activities. Users should use their computer access time efficiently and avoid prolonged periods of email use while at school. Mass mailings and chain letters are generally considered bothersome and inappropriate uses of e-mail. All users should operate with respect and consideration for others.
H. Liability. Craig makes no warranties of any kind for these computer resources and cannot be held liable for damages suffered whether from delays or inability to access the resources, loss of data, inability to deliver data or files, or interruptions of service for any reason. Craig, however, will take reasonable steps to secure the information and resources maintained on its computer network.
I. Data Backup. It is the responsibility of the user to make additional backup files of essential documents that they create. Although the Craig computer network is backed-up nightly and is duplicated with mirroring technology, Craig makes no guarantee that files or items stored on the network will be available without error. In the unlikely event that all network redundancies fail, the user is responsible for maintaining additional back-ups. Faculty laptop users must make a backup of their data before returning their laptops.
J. Ownership of the Computer Network and all Electronic Records. Craig owns the computer network, all associated system features, and all electronic records contained within or on the computer network. Even if the School’s computer network is used for personal reasons, all messages and documents are the property of the School. Users should have no expectation of privacy in any electronic records, including e-mail messages, stored on or within the computer network. Users also should be aware that it is possible to retrieve and read electronic records even after they have been deleted or erased.
Misuse of Computer Resources. The following conduct/activities shall violate the Computer Use Policy and shall be grounds for disciplinary action in accordance with the Employee and Student Handbooks.
I. Sharing copyrighted content, including music or movie content, with others through the use of peer-to-peer software or other means.
II. Downloading computer programs, software applications, or executable files without the prior permission of the IT department.
III. Excessive use of the network for commercial purposes, product advertisement, political lobbying, or in support of illegal activities.
IV. Using the network to view websites depicting or displaying pornographic or obscene images.
V. Abusive use of the network to play video games or to engage in other non-educational or non-intellectual endeavors.
VI. Using the network to gamble, bet on sports, and/or participate in free or fee-based sports leagues or tournaments.
VII. Abusive use of the network to shop for or purchase items unrelated to the educational or intellectual mission of Craig.
VIII. Using the network to tamper with Craig computer systems, networks, equipment, software, files, documentation, accounts or information associated therewith.
IX. Giving a user’s password to any individual, except an authorized network administrator or immediate supervisor. Each user must Use of computer resources to misrepresent herself/ himself as another individual.
Misuse of E-Mail. The following conduct/activities shall violate the E-Mail Use Policy and shall be grounds for disciplinary action .
A. The use of profane, abusive, harassing, threatening, obscene, pornographic, or other offensive language in an e-mail. B. Attaching profane, abusive, harassing, threatening, or offensive images (sexual or other) to an e-mail message.
C. Excessive use of e-mail for commercial or political purposes without prior written consent of Craig.
D. The use of e-mail for any unlawful purpose, including without limitation: (1) transmitting copyrighted material without express permission; and harassing, defaming, unlawfully discriminating against, or otherwise unlawfully injuring others.
E. Reading the e-mail messages of other users.
Monitoring of Users. Users of the Craig computer network understand that the Craig administration maintains the right to monitor and regulate use of the computer network in the following ways:
A. Ownership of eMail Messages. Craig owns, and retains the rights in, all electronic records stored on the computer network, including e-mail messages. Employees should have no expectation of privacy in email messages sent or received. Even when a message is erased or deleted it is still possible for that message to be retrieved and read.
B. Access to E-Mail. Craig retains the right to monitor the use of its email systems for any reason, including ensuring compliance with this policy, observing the operation of the computer network, and resolving system problems. Further, Craig may access a user’s account at any time for any reason or no reason to read e-mail message to ensure compliance with this policy. All users should be aware that Craig reserves the right to conduct random reviews of e-mail accounts to ensure compliance with this policy.
C. Tracking Web Sites Accessed. Craig retains the right to monitor the web sites accessed.
D. Making Complaints. If a user becomes aware of or suspects a violation of this policy, such users may make a complaint by notifying their division head or an immediate supervisor or any other administrator of the suspected violation.
E. Responding to Complaints. In the event that Craig becomes aware of a violation or alleged violation of this policy, Craig reserves the right to: (1) read the e-mail messages of the suspected user and closely monitor such user’s use of e-mail and/or the computer network; (2) take other disciplinary action against the user
Third Party Services and Information Collection
Below is a list of third party applications currently being used by The Craig School. These require student information to provide functional access. Additions to this list may occur at any time.
- Lexia (Strategies for Learning/Core 5) - This research-proven, technology-based approach accelerates reading skills development, predicts students' year-end performance and provides teachers data-driven action plans to help differentiate instruction
- Scholastic Reading Inventory- a reading assessment program which provides immediate, actionable data on students' reading levels and growth over time.
- Socrative - gives teachers the ability to poll their students, create formative assessments, graph students results to better gauge their level of understanding.
- G-Suite for Education