Hardworking School Network Technicians Spy on Children
in their own House
Network Technicians
Students are not
permitted
to refuse the laptop and use their own,
it's required that they use the one issued to them by the District.
APA CITATION STYLE FOR YOUR RESEARCH
58,000 photos taken by the school district, all by remotely accessing the webcam in the students' laptops while spying on their students in the students homes and in other places off the school premises.
Stryde Hax found a 2008 Webcast featuring Mike Perbix, an employee of the Lower Merion School district talking about how he was able to configure LANRev to go into "curtain mode" to surreptitiously peer into remote machines. In the Webcast, Perbix said "You can go into curtain mode, so if you're controlling someone's machine and you don't want them to see what you're doing you just click on the curtain mode icon...you can take a snapshot of the screen by clicking on the little camera icon." He also told about a time when they "actually had some laptops we thought were stolen which actually were still in a classroom because they were misplaced, and by the time we found out that they were back I had to turn the tracking off and I had a good 20 snapshots of the teacher and the students using the machines in the classroom."
8/17/2010 Feds won't press charges: US Attorney Zane David Memeger announced in Philadelphia that he would not file charges against officials in the Lower Merion School District. He said the review was conducted by the Federal Bureau of Investigation, as well as local and county law enforcement officials. “We have not found evidence that would establish beyond a reasonable doubt that anyone involved had criminal intent,” Mr. Memeger said.
2/16/10 VIDEO Mark Haltzman, who filed the lawsuit on behalf of Robbins and his family , said evidence now shows the district used the tracking software for non-authorized reasons - for instance, when students failed to pay the required insurance or return the laptops at year's end. At least once, a name mix-up led the district to activate the wrong student's laptop, he charged. "Thousands of webcam pictures and screen shots have been taken of numerous other students in their homes, many of which never reported their laptops lost or missing," Haltzman wrote in a motion filed Thursday. According to Haltzman, technology coordinator Carol Cafiero refused to answer his questions at a recent deposition, citing her Fifth Amendment right against self-incrimination. She and technician Michael Perbix were the only employees authorized to activate the webcams. Perbix did not fight the deposition. Haltzman called Cafiero a possible "voyeur" and wants access to her personal computer to see if she downloaded any student images. To support the charge, he cited her response to an e-mail from a colleague who said viewing the webcam pictures was like watching "a little LMSD soap opera." "I know, I love it!" Cafiero allegedly replied.
Attention Americans highly value their privacy.
U.S. Sen. Arlen Specter, D-Pa., introduced a bill Thursday to treat video surveillance the same as electronic communication under the federal Wiretap Act. Sen. Russ Feingold, D-Wis., a co-sponsor.
These are VERY important issues that have to be explained, there is nothing fun / sexy / or entertaining about it, so most folks can't be bothered to focus on this kind of information and have no notion of what their privacy rights actually are. School systems across the country must look at their security and privacy guidelines.
Apr. 21, 2010 Even in his own home, the Harriton High School sophomore had "no legitimate expectation of privacy" from the camera on his school-issued laptop, information systems coordinator Carol Cafiero contended in a court filing on Tuesday . Cafiero - who is on paid leave while the district investigates the laptop controversy - claimed Robbins lost any legal protection from the Web-camera security system when he took a school laptop home without permission. Robbins had previously broken "at least two" school computers and did not pay the insurance fee required to get permission to take home the Apple MacBook that later snapped his pictures, Cafiero's attorney, Charles Mandracchia, wrote in the filing. District officials said Monday that the built-in cameras on students' laptops had been switched on 146 times, taking 56,000 pictures in the process. District lawyer Henry E. Hockeimer said none of the photos appeared to be "salacious or inappropriate" but said that did not justify the use of the program. It was not immediately clear if the school district agreed with any of the arguments made in Cafiero's court filing. Revelations about the laptop security system's use have also prompted a federal investigation, and on Tuesday, Cafiero told an FBI agent that she had a "very limited" role in the Web-camera usage, her lawyer said. Haltzman said Cafiero's latest filing showed "no respect for the privacy of Blake Robbins" by offering details of the sophomore's past issues with computers and insurance fees. Haltzman also said the district itself "has never asserted" that Robbins had waived his right to privacy by taking home a laptop without permission. "It is false to say that he did not have an expectation of privacy," Haltzman said. "It is also wrong for Cafiero to make that type of assertion in her pleading." The civil case is due back in court Wednesday for a closed-door conference before Chief Magistrate Judge Thomas J. Rueter.
Judge Rules LM School District Insurance Company pays
:
School District Ballard Spahr law firm and L3, a computer forensics
company, charged more than $550,000 in invoices for their services
to Lower Merion, which the insurance company had to pay.
The court order is part of a proposed class-action lawsuit against
the 6,900-student district, which discontinued the
LANrev webcam-tracking program
in February after a sophomore's parents learned that their son was
secretly photographed at home. Under the order (.pdf), issued by
Magistrate Judge Thomas J. Rueter of the Eastern District of
Pennsylvania, affected students and their parents will have the
option of viewing the captured images privately, though they won't
be given a copy. The students can also preview the images outside
the presence of their parents, and ask the judge to block their
parents from access to particularly sensitive images.
The Lower Merion School District on Friday argued that the district's insurer should pay what could be a million-dollar tab to resolve a lawsuit over its now-disabled laptop tracking program. In a counterclaim filed in federal court, attorneys for the district also accused New York-based Graphics Arts Mutal Insurance 180 Genesee St New Hartford NY 13413-2200 Phone: (315) 734-2000 of breaching the terms of the multimillion-dollar policy it issued last year. Graphic Arts balked, contending that its policy covered only personal injury or bodily harm, not the kind of damage that Robbins alleged. The company filed its own lawsuit against the district, asking a federal judge to rule that the contract released it from any liability related to the Robbins matter. In the interim, Graphic Arts said it would cover only 80 percent of Lower Merion's costs, and reserves the right to recoup that money if the judge rules in its favor.
Perfect Storm Many School Districts won't issue Webcam Laptops
Consortium for School Networking, an association of technology leaders who advise school districts, needs an education. Citizens need an education. Can people really be so unaware of the issues involved with trusted computing that school districts, administrators, IT professionals, and security professionals see nothing wrong with using remote administration software?
Technicians and Police Officers are incompetant. If you want to find a stolen laptop you contact a professional to get the job done. When you file a stolen vehicle report with the police, police computers send a silent radio signal to your car, automatically activating the hidden LoJack transmitter in your vehicle. Police can then track the signal and locate the vehicle. How do you report a stolen laptop to the police? Then the school is notifed to use the software to locate the laptop. With the way webcam theft tracking works, we'll need a new type of search warrant: Location To Be Determined After Search. When these laptops wake up and retrieve orders to activate their webcams, they can literally be anywhere. Bergen County school district has 2,100 students in two high schools and they use a tracking system to locate missing or stolen laptops by using [a computer's Internet] address, then police obtain a search warrant to check for the laptop. In the Henrico County, Va., public schools, about 26,000 laptops have been issued to students and the remotely operated Web cams are disengaged until a computer is stolen and reported to the police. In California, the Fullerton Elementary School District provides laptops to its pupils but - like Henrico County - it requires a reported theft before security measures are activated. The school system's technology director can turn on the camera only after the theft has been reported to police and the number of the report is entered, officials said. Police need a search warrent . If you don't know where to look and just activate the software to look you may find out that the stolen computer is somewhere you shouldn't be looking, like a child's bedroom or SKIF . So how will you fill out a webcam search warrants? How is that going to work?
Lillie Coney of the Electronic Privacy Information Center "If they thought it was right, they wouldn't have stopped. "But they weren't thinking. And they weren't planning to get caught. So they didn't tell anybody." "We've been conditioned to think we'll give up anything for security, but people have more say about these things than they think."
Put another way, principals may rule at school, but students' homes must remain a refuge. "For this school district to develop police powers in secret and then exercise those powers in secret," she said, "is problematic and disturbing."
If you tried to Protect your Privacy then jail breaking was grounds for explusion.
Parents are citizens who may be ignorant of their rights and not realize that it's wrong, and don't realize it's spyware and think they have signed their rights away when they accept the free computer, but should protest.
Missing the Boundary Line is Key:
The Police Were Not Called.
This particular laptop has never been asserted to be lost,
stolen, misplaced, or missing.
If you are using it to locate stolen property you would call the
police right? If software is used to watch what children are doing,
that is spying.
ADMINISTRATORS ARROGANCE: NOT THE FIRST COMPLAINT
Student representatives had twice objected to the program's
intrusiveness to the school administrators and had been ignored.
Leardership Starts From The Top of the state. PENNSYLVANIA
INFORMATION TECHNOLOGY
|
on paid leave Michael Perbix, a network technician
, and
|
THE LOWER MERION NETWORK TECHNICIANS
1) Brad Miller 312 Davis Road Havertown, PA 19083 [p] 610-853-1161
2) Jeremy Valentine 1378 Indian Creek Dr. Wynnewood, PA 19096 [p] 610-896-469
3) Mike Perbix Network Technician has been blogging and posting on
Apple mailing lists how he did it.
Mike Perbix
talks about spying with Remote Desktop Curtain Mode
Lower Merion School District Telecommunications Specialist
[e]
PERBIX@lmsd.org
(610) 645-1964 - Work
(610) 896-2019 - Fax
Open Subscriber
Stryde Hax , who says he works for the security firm Intrepidus Group, strydehax [e] stryde dot blog at gmail dot com did a brilliant job looking into sleuthing this out!
"Mike Perbix has a large online web forum footprint as well as a personal blog. During our testing, we infected a laptop with LANRev, then closed the lid, hoping to activate the LANRev feature which takes a webcam picture when the computer wakes. As my colleague Aaron opened the lid of his Mac, the green webcam light flickered, ever so briefly. It wasn't a glitch. It was a highly sophisticated remote spy in his system. And even though he was in control, the effect was still very creepy.
LANrev contains a security hole that put the students at risk of being spied on by people outside the school, according to a security firm that examined the software. The LANrev program contains a vulnerability that would allow someone using the same network as one of the students to install malware on the laptop that could remotely control the computer. An intruder would be able to steal data from the computer or control the laptop webcam to snap surreptitious pictures.
See the LanRev remote monitoring product Promo where
"Mike Perbix identifies himself as a high school network tech, and then speaks at length about using the track-and-monitor features of LanRev to take surreptitious remote pictures through a high school laptop webcam. A note of particular pride is evident in his voice when he talks about finding a way outside of LANRev to enable "curtain mode", a special remote administration mode that makes remote control of a laptop invisible to the victim. Listen at 35:47, when he says: "you're controlling someone's machine, you don't want them to know what you're doing" ~Mike Perbix
It isn't until 37 minutes into the video till Perbix begins talking about the Theft Tracking feature, which causes the laptop to go into a mode where it beacons its location and silent webcam screenshots out to an Internet server controlled by the school."
Mike Perbix: disable firmware lock intel laptops
* Subject: Re: disable firmware lock intel laptops
* From: "Perbix, Michael" <email@hidden>
* Date: Wed, 21 Oct 2009 19:30:37 -0400
OFPW (the latest version) is a universal binary and works. OFPW
-command 0
will turn it off.
You could also use NVRAM, built in to the OS....
Sudo nvram -p shows you all the variables currently in your nvram....
sudo nvram security-mode=none
Turns off security, to turn it on
sudo nvram security-mode=command
To set the password, you need to know the encrypted version of it....set the password on another machine, then use sudo nvram-p to see it, copy the encrypted form of the password and use
sudo nvram security-password=<place encrypted password here>
sudo nvram security-mode=command
I use this from LANrev and sending unix scripts to set users
firmware
passwords that may be wrong....or missed during a service call.
You can script a firmware password check script using openssl so that you don't have to put the weakly encrypted password in a visable script...
http://bestsinceslicedbread.blogspot.com/2009/09/compare-secure-values.html
I started documenting things I do like this in my blog...if you can
call it
a blog 8-)...
-Mike
On 10/21/09 6:36 PM, "nate st.germain" <email@hidden> wrote:
try using this utility: http://code.google.com/p/efipw/
sudo efipw -p "" should set the pass to nothing.
sudo efipw -d will decrypt it.
>
> On Oct 21, 2009, at 6:32 PM, Bob Henry wrote:
>
>> Can anyone direct me to a CLI solution to turning firmware
protection off on mac books?
>> I scraped this off my shoe:
>> /usr/local/bin/OFPW -pass mypassword
>> /usr/local/bin/OFPW -mode 1
but seems that OFPW is a PPC util. Please advise TIA
Bob Henry IT & DATA Wrangell Public Schools 907-874-2321 x244
Michael Perbix
Lower Merion School District
Network Technician
http://bestsinceslicedbread.blogspot.com
He describes using the remote monitoring feature to locate a stolen laptop:
Turning off the Lightspeed LsSaAlerter in OSX
We were having an issue with LsSaAlerter application which is part
of the Lightspeed systems Security Agent for OSX. the LsSaAlter
application is responsible for the menu bar icon that shows you the
status of the security agent and what it is currently doing. There
is also a shortcut to get to the Lightspeed Preferences Pane by
clicking on the menu icon.
There does not appear to be any current way via filtering policies
to disable that menu and even if you MANUALLY go into the
com.lightspeedsystems.securityagent.plist and set the "Enable
Manger" key to false, it resets on next logout/login.
So, to manually force that option we look to Apple's MCX system that
we use to manage our laptops via group policy. Using the Workgroup
Manager application, we select the computer group and click on
PREFERENCES, then click on the DETAILS tab. Click the little +
symbol at the bottom and find the Lightspeed preference file and
load it in making sure you are loading it into the ALWAYS category.
The preference file is found at
/Library/Preferences/com.lightspeedsystems.securityagent.preferences.plist
Once loaded, click on the EDIT symbol (little pencil) next to the +
and - buttons, and expand the ALWAYS selection. Click on each entry
and hit DELETE to remove it. The only entry you wish to remain is
"Enable Manager" which should be set to boolean and false. This
allows the other items to still be controlled by the filtering
policy.
Now, next time your clients in that computer list refresh their
preferences, the menu item will no longer be present.
BTW, this is a good way to force preferences for many third party
programs that support PLIST preference files. Of course, it is good
to test, and you may have to use OFTEN or ALWAYS. Always means that
the preference can NOT be changed...OFTEN means it sets the
preference on login, and can be changed, but on next login the
preferences will be reset to what you want them.
Sunday, September 13, 2009
Enable and Disable the built in iSight.
This can be accomplished by changing the permissions of 2 files. It
can be done by removing rwx for all users (ie chmod a-rwk) on the
following
/System/Library/QuickTime/QuickTimeUSBVDCDigitizer.component/Contents/MacOS/QuickTimeUSBVDCDigitizer
/System/Library/PrivateFrameworks/CoreMediaIOServicesPrivate.framework/Versions/A/Resources/VDC.plugin/Contents/MacOS/VDC
This has been tested on OSX 10.5.7 (MacBook) and OSX 10.5.8 (MacBook
Pro)
A DMG with the completed script and application can be found
here
.
The script should go somewhere in your path (/usr/sbin or such) and
have the appropriate permissions and owner. You can then run it from
a utility such as ARD or LANrev, or from a SSH login by issueing the
command with the appropriate option use -h or -help for info.
The Application has a copy of the isighter script contained in it's
bundle. The actual Applescript is an example of how to run a
terminal command with admin privileges and can be found
here
.
ENJOY!
Posted by Michael Perbix
strydehax
explains that "Perbix
puts it in context on an admin newsgroup
, in a post which makes it clear that his script allows for the
camera to appear shut down to user applications such as Photo Booth
but still function via remote administration:
"what this does is prevent internal use of the iSight, but some
utilities might still work (for instance an external application
using it for Theft tracking"
What's the purpose of shutting down a camera for the user of the laptop but still making it available to network administrators? Ask yourself: if you wanted to convince someone that a webcam blinking was a glitch, would disabling the cameras help make your case?"
" Posted on digg and SAC: ""As a recent graduate of Harriton, I thought I could shed some light on the situation. These laptops were 2.0ghz 2gb Macbooks issued out to all the students for the entire year to do whatever they wanted and this was the 2nd year of the program. The webcam couldn't be disabled due through tough tough security settings. Occasionally we would notice that the green light was on from time to time but we just figured that it was glitching out as some macbooks do sometimes. Some few covered it up with tape and post its because they thought the IT guys were watching them. I always thought they were crazy and that the district, one of the more respectable ones within the state, would never pull some s*** like this. I guess I was wrong. I am a little surprised because nobody in the past had be disciplined for doing anything inappropriate during school or outside of school. The only thing coming close was a kid performing a simple hack to make another account in order to install games. This specific incident was traced through the network by the IT dept. While I still think there might be a chance the vice principal/ disciplinarian doesn't have these specific images as she is quite the type to make a bluff like that, it sounds to me like this is legit. If they have been watching all of us and looking at our logs and looking at what we type, I can assure you that they have seen lots and lots and lots of dirty things."" "
" I am the father of a 17 y/o Harrington High student. She has had one of these laptops for 2 years. She has noticed the "green light" coming on but was not computer literate enough to know what initiated it. While it is true that frivolous law suits exist, there are many suits that are found to be true. The LMSD has helped create an atmosphere of distrust in their community. It should be no surprise that parents do not automatically come to their defense.My daughter's noticing the light on her laptop was identified prior to any news of a laptop. The assumption was that it was a defect. That is now not as clear. "Were students and families explicitly told about the laptop security system?
Removing Webcam Tracking feature from Laptops at LMSD
Strydehax Update 2/23/2010 11:28am
Aaron Rhodes says the reason LANRev is using the raw camera device
is that
Apple implemented security measures to prevent remote activation
of the webcam
in OSX.
LANRev was designed to bypass this security measure
. Ask yourself, "what kind of software bypasses OS security
measures?"
On the topic of whether or not we yet have proof of illegal use, I
would ask you to listen carefully to the webcast, and listen for the
word "house" at 1:28. Listen for "yes we have used it."
THE AUP
- Staff Access to Networked Information Resources Acceptable Use Policy PDF
- Administrative Regulations for Staff Acceptable Use Policy PDF
- Staff Network Account Request Form PDF
- Student Network Access Policy PDF
-
Student Guidelines
PDF
Educational Technology for the 21st Century
• Use of district technology for communication and operations
• Guide students to the understanding and adherence of guidelines
for acceptable use of technology
• Awareness and use of technology resources
• Basic knowledge and use of district network
• Awareness and development of age appropriate technology
competencies for students
• Apply technology tools to best practices for teaching and learning
Supervisor of Instructional Technology - Jason Hilt
Administrative Assistants - Andrea Papsin. Sherry Zielke
Webmaster - Jason Michael
SIS Support Technicians - Jessica Bolton, Jim Roletter
Desktop Technician - Chuck Ginter, Jim Wills
Helpdesk Technician - Amanda Wuest
Audio/Visual Technician - Jim Rigby
Building Level Technology Support - Tom Crocker, David Feight, Kyle
O'Brien, Neil Pancoast, Matt Shaw, Matt Stanford
Building Level Instructional Technology Specialists - Beth Hampton,
Rhonda Keefer, James Langmayer, Tom McGee, Andy Pron
In this episode we show you how to take a
USB web cam and turn it into a spy camera.
Further Reading:
Why K-12 School Districts should be using Open Source Software Technology
Trusted Computing is controversial as the hardware is not only
secured for its owner, but also secured against its owner as well.
Such controversy has led opponents of trusted computing, such as
Richard Stallman
, to refer to it instead as
"treacherous computing"
, even to the point where some scholarly articles have begun to
place scare quotes around "trusted computing".
Trusted Computing opponents such as the Electronic Frontier
Foundation and Free Software Foundation claim trust in the
underlying companies is not deserved and that the technology puts
too much power and control into the hands of those who design
systems and software. They also believe that it may cause consumers
to lose anonymity in their online interactions, as well as mandating
technologies Trusted Computing opponents deem unnecessary. They
suggest Trusted Computing as a possible enabler for future versions
of mandatory access control, copy protection, and
digital rights management
.
Some
security experts
have spoken out against Trusted Computing, believing it will provide
computer manufacturers and software authors with increased control
to impose restrictions on what users are able to do with their
computers. There are concerns that Trusted Computing would have an
anti-competitive effect on competition in the IT market.
There is concern amongst critics that it will not always be possible
to examine the hardware components on which Trusted Computing
relies, the Trusted Platform Module, which is the ultimate hardware
system where the core 'root' of trust in the platform has to lie.
The whole focus is on giving the system operator lots of flexibility to do whatever they want , while giving customers, experimenters, competitors, and citizens zero flexibility or opportunity.
If not implemented correctly, it presents a security risk to overall platform integrity and protected data . The specifications, as published by the Trusted Computing Group, are open and are available for anyone to review. However, the final implementations by commercial vendors will not necessarily be subjected to the same review process. In addition, the world of cryptography can often move quickly, and that hardware implementations of algorithms might create an inadvertent obsolescence. Trusting networked computers to controlling authorities rather than to individuals may create digital imprimaturs.
The Cambridge cryptographer Ross Anderson has great concerns that "TC can support remote censorship [...] In general, digital objects created using TC systems remain under the control of their creators, rather than under the control of the person who owns the machine on which they happen to be stored (as at present) [...] So someone who writes a paper that a court decides is defamatory can be compelled to censor it — and the software company that wrote the word processor could be ordered to do the deletion if she refuses. Given such possibilities, we can expect TC to be used to suppress everything from pornography to writings that criticize political leaders." He goes on to state that:
[...] software suppliers can make it much harder for you to switch to their competitors' products. At a simple level, Word could encrypt all your documents using keys that only Microsoft products have access to; this would mean that you could only read them using Microsoft products, not with any competing word processor. [...]
The [...] most important benefit for Microsoft is that TC will dramatically increase the costs of switching away from Microsoft products (such as Office) to rival products (such as OpenOffice). For example, a law firm that wants to change from Office to OpenOffice right now merely has to install the software, train the staff and convert their existing files. In five years' time, once they have received TC-protected documents from perhaps a thousand different clients, they would have to get permission (in the form of signed digital certificates) from each of these clients in order to migrate their files to a new platform. The law firm won't in practice want to do this, so they will be much more tightly locked in, which will enable Microsoft to hike its prices.[7]
Ross Anderson summarizes the case by saying
"The fundamental issue is that whoever controls the TC infrastructure will acquire a huge amount of power. Having this single point of control is like making everyone use the same bank, or the same accountant, or the same lawyer. There are many ways in which this power could be abused."
Microsoft Spy
- 17-page Microsoft Global Criminal Spy Guide. Its programs, make it
easier for law enforcement to obtain user data, violations of trust
toward its customers. For a large corporation with millions of users
and an aggressive PR agenda, the document raises concerns and sparks
conversations the company would rather not confront.
"It's part of a very intense political debate about the role of
intermediary companies like Microsoft aiding surveillance for law
enforcement. It's embarrassing for Microsoft for their users to see
how much the people who carry their email have arrangements with law
enforcement... All of the people who carry our communications are an
easy conduit for our government to spy on us, and a lot of people
are unhappy about that.
Is your data encrypted? 45 state privacy laws - Only Safe
Harbor-Data Encryption
Almost all states and the federal government have enacted or plan to
enact legislation requiring notification of security breaches
involving personal information. Many existing state and federal
privacy laws have also gained teeth recently-including stiff
penalties in some cases. These include:
- MA 201.CMR.17 - The new model for privacy laws, Massachusetts's recent legislation mandates encryption and even impacts companies in other states (compliance deadline extended to March 1, 2010)
- CA SB1386 - If you handle data for residents of the country's most populous state, California, you must notify individuals if a breach occurs-unless the data is encrypted
- NV SB 227 - Vendors in Nevada must now comply with the Payment Card Industry Data Security Standard (PCI DSS)
APPLE CLASSROOMS
OF TOMORROW
What a nightmare!
THE APPLE COMPUTER
is marketed to all the School Districts and the District Lawyers
and Technologists aren't experts who know the issues or
understand the law which is no excuse.
Just because there is
an
AUP
doesn't mean the school district has the right to spy on citizens.
Hard working, well meaning, sincere, but ignorant employees of the
school systems in this country are enabled to buy the computer
technology with your tax dollars using
government funds - and apple wants the easy money.
Apple
sold
these computers
to the School District. Apple makes a lot of money when it promotes
the
Understanding of 21st Century Skills and Outcomes Curriculum
.
Can Apple prove they informed the School District that the webcams
should not be used to spy on children?
Apple should be held accountable for telling the School District
what to include in the AUP. Apple needs to be investigated and
possibly prosecuted for negligence if they did not take
responsibility for giving the school district an AUP for the
parents.
This school document
identifies the hardware and software in use as Macbook laptops
running OSX.
Apple Remote Desktop 3
: Administrators have access to the laptop of every kid in the
school through this program, and can switch from one to another and
watch what the kids are doing on their computers in real time.
Remote observation and control of target computers is plainly listed
in the
Apple Remote Desktop 3 Feature List
.
Webcameras are enabled by the IT department to allow Administrators
to see their screens, and faces and communicate with th student and
take a picture of them (admins can control their laptops remotely)
in Photo Booth, or interrupt their IM conversation with their own
message. No one informed the kids that they were being monitored.
Even if the laptops don't belong to the student, so should have be
able to expect privacy. The potential for abuse is nearly limitless,
especially since many teens keep their computers in their bedrooms.
Even when a non-IT employee clearly is to blame for a security breach, IT is still responsible.
Dan Morill ~ "We need to remind ourselves again and again that information security is not a technology issue - it's a people issue. We are reliant on people, their awareness, ethics and behaviour, and we must understand what they want to achieve if we are to accomplish the goals of business. This includes the employees that deliver our services and the customers that take advantage of them, as well as the senior executives and board room directors that grant us our budgets."
Guidelines for Use of Student Laptops
1
The laptop computers that will be issued to all high school students
are the property of Lower Merion School District
. Students are responsible for the appropriate use of these laptops
both at school and at home. The laptops are for the use of students
for educational purposes. All commercial, illegal, unethical and
inappropriate use of these laptops is expressly prohibited.
Students are to comply with copyright laws. Downloading games or
software is expressly prohibited. Only District licensed software is
to be installed on the laptops.
The maintenance of laptops is the student's responsibility. If
laptops need repair or maintenance students are to report to the
Technology Center in their building. Vandalism to any laptop or
accessory is strictly prohibited. Students must present school
issued picture ID when they bring their laptop in or pick up from
repair.
Students should refer to the Student Acceptable Use Policy and their
Guidelines. Any violation will be subject to discipline as outlined
in the Harriton and Lower Merion Student Guide.
High school teachers will distribute laptops during Advisory period
on September 8, 2009. Laptops will have a label containing the
student's name and other information specific to the laptop for
identification.
APPLE SALES PITCH TO SCHOOLS
Creating a 21st Century Learning Environment with Anytime Anywhere
Access to Digital Resources
The major goals of this initiative are to provide students with 21st Century learning environments both at home and in school, and to give all students access to technology resources. We have the opportunity and the responsibility to utilize research-based, technology-enabled practices to inspire and capture the imagination of our students. LMSD seeks to create a learning environment that fosters deeper cognitive development through inquiry, real and relevant project-based learning, and differentiated instruction - all supported by continuous access to digital technologies. Students will have the ability to work on projects and research both at school and at home. They will have 24/7 access to the software that they use in school. We believe that the laptop is an essential tool to assist them in thinking critically, analyzing data, solving real world problems and publishing their work.
- Letter to Parents
- Letter to LMHS Parents
- Letter to HHS Parents
- 21st Century Learning FAQ
- Classrooms for the Future
- Measuring What Really Matters
- Insurance Payments
- Getting Started Guide for Students
- Student Helpdesk Login
- Student Printing
- Home Filtering Letter
- One to One Printing and Filtering at Home
- For more information about the topic(s) covered on this page, please email email_link("laptopfaq","lmsd.org","Letter to HHS Parents"); laptopfaq@lmsd.org .
YOU ARE ON PAGE 2