Hardworking School Network Technicians Spy on Children
in their own House
Students are not permitted to refuse the laptop and use their own,
it's required that they use the one issued to them by the District.
58,000 photos taken by the school district, all by remotely accessing the webcam in the students' laptops while spying on their students in the students homes and in other places off the school premises.
Stryde Hax found a 2008 Webcast featuring Mike Perbix, an employee of the Lower Merion School district talking about how he was able to configure LANRev to go into "curtain mode" to surreptitiously peer into remote machines. In the Webcast, Perbix said "You can go into curtain mode, so if you're controlling someone's machine and you don't want them to see what you're doing you just click on the curtain mode icon...you can take a snapshot of the screen by clicking on the little camera icon." He also told about a time when they "actually had some laptops we thought were stolen which actually were still in a classroom because they were misplaced, and by the time we found out that they were back I had to turn the tracking off and I had a good 20 snapshots of the teacher and the students using the machines in the classroom."
8/17/2010 Feds won't press charges: US Attorney Zane David Memeger announced in Philadelphia that he would not file charges against officials in the Lower Merion School District. He said the review was conducted by the Federal Bureau of Investigation, as well as local and county law enforcement officials. “We have not found evidence that would establish beyond a reasonable doubt that anyone involved had criminal intent,” Mr. Memeger said.
2/16/10 VIDEO Mark Haltzman, who filed the lawsuit on behalf of Robbins and his family, said evidence now shows the district used the tracking software for non-authorized reasons – for instance, when students failed to pay the required insurance or return the laptops at year's end. At least once, a name mix-up led the district to activate the wrong student's laptop, he charged. "Thousands of webcam pictures and screen shots have been taken of numerous other students in their homes, many of which never reported their laptops lost or missing," Haltzman wrote in a motion filed Thursday. According to Haltzman, technology coordinator Carol Cafiero refused to answer his questions at a recent deposition, citing her Fifth Amendment right against self-incrimination. She and technician Michael Perbix were the only employees authorized to activate the webcams. Perbix did not fight the deposition. Haltzman called Cafiero a possible "voyeur" and wants access to her personal computer to see if she downloaded any student images. To support the charge, he cited her response to an e-mail from a colleague who said viewing the webcam pictures was like watching "a little LMSD soap opera." "I know, I love it!" Cafiero allegedly replied.
Attention Americans highly value their privacy.
U.S. Sen. Arlen Specter, D-Pa., introduced a bill Thursday to treat video surveillance the same as electronic communication under the federal Wiretap Act. Sen. Russ Feingold, D-Wis., a co-sponsor.
These are VERY important issues that have to be explained, there is nothing fun / sexy / or entertaining about it, so most folks can't be bothered to focus on this kind of information and have no notion of what their privacy rights actually are. School systems across the country must look at their security and privacy guidelines.Apr. 21, 2010 Even in his own home, the Harriton High School sophomore had "no legitimate expectation of privacy" from the camera on his school-issued laptop, information systems coordinator Carol Cafiero contended in a court filing on Tuesday. Cafiero - who is on paid leave while the district investigates the laptop controversy - claimed Robbins lost any legal protection from the Web-camera security system when he took a school laptop home without permission. Robbins had previously broken "at least two" school computers and did not pay the insurance fee required to get permission to take home the Apple MacBook that later snapped his pictures, Cafiero's attorney, Charles Mandracchia, wrote in the filing. District officials said Monday that the built-in cameras on students' laptops had been switched on 146 times, taking 56,000 pictures in the process. District lawyer Henry E. Hockeimer said none of the photos appeared to be "salacious or inappropriate" but said that did not justify the use of the program. It was not immediately clear if the school district agreed with any of the arguments made in Cafiero's court filing. Revelations about the laptop security system's use have also prompted a federal investigation, and on Tuesday, Cafiero told an FBI agent that she had a "very limited" role in the Web-camera usage, her lawyer said. Haltzman said Cafiero's latest filing showed "no respect for the privacy of Blake Robbins" by offering details of the sophomore's past issues with computers and insurance fees. Haltzman also said the district itself "has never asserted" that Robbins had waived his right to privacy by taking home a laptop without permission. "It is false to say that he did not have an expectation of privacy," Haltzman said. "It is also wrong for Cafiero to make that type of assertion in her pleading." The civil case is due back in court Wednesday for a closed-door conference before Chief Magistrate Judge Thomas J. Rueter.
Judge Rules LM School District Insurance Company pays:
School District Ballard Spahr law firm and L3, a computer forensics company, charged more than $550,000 in invoices for their services to Lower Merion, which the insurance company had to pay.
The court order is part of a proposed class-action lawsuit against the 6,900-student district, which discontinued the LANrev webcam-tracking program in February after a sophomore's parents learned that their son was secretly photographed at home. Under the order (.pdf), issued by Magistrate Judge Thomas J. Rueter of the Eastern District of Pennsylvania, affected students and their parents will have the option of viewing the captured images privately, though they won't be given a copy. The students can also preview the images outside the presence of their parents, and ask the judge to block their parents from access to particularly sensitive images.
The Lower Merion School District on Friday argued that the district's insurer should pay what could be a million-dollar tab to resolve a lawsuit over its now-disabled laptop tracking program. In a counterclaim filed in federal court, attorneys for the district also accused New York-based Graphics Arts Mutal Insurance 180 Genesee St New Hartford NY 13413-2200 Phone: (315) 734-2000 of breaching the terms of the multimillion-dollar policy it issued last year. Graphic Arts balked, contending that its policy covered only personal injury or bodily harm, not the kind of damage that Robbins alleged. The company filed its own lawsuit against the district, asking a federal judge to rule that the contract released it from any liability related to the Robbins matter. In the interim, Graphic Arts said it would cover only 80 percent of Lower Merion's costs, and reserves the right to recoup that money if the judge rules in its favor.
Perfect Storm Many School Districts won't issue Webcam Laptops
Consortium for School Networking, an association of technology leaders who advise school districts, needs an education. Citizens need an education. Can people really be so unaware of the issues involved with trusted computing that school districts, administrators, IT professionals, and security professionals see nothing wrong with using remote administration software?
Technicians and Police Officers are incompetant. If you want to find a stolen laptop you contact a professional to get the job done. When you file a stolen vehicle report with the police, police computers send a silent radio signal to your car, automatically activating the hidden LoJack transmitter in your vehicle. Police can then track the signal and locate the vehicle. How do you report a stolen laptop to the police? Then the school is notifed to use the software to locate the laptop. With the way webcam theft tracking works, we'll need a new type of search warrant: Location To Be Determined After Search. When these laptops wake up and retrieve orders to activate their webcams, they can literally be anywhere. Bergen County school district has 2,100 students in two high schools and they use a tracking system to locate missing or stolen laptops by using [a computer's Internet] address, then police obtain a search warrant to check for the laptop. In the Henrico County, Va., public schools, about 26,000 laptops have been issued to students and the remotely operated Web cams are disengaged until a computer is stolen and reported to the police. In California, the Fullerton Elementary School District provides laptops to its pupils but - like Henrico County - it requires a reported theft before security measures are activated. The school system's technology director can turn on the camera only after the theft has been reported to police and the number of the report is entered, officials said. Police need a search warrent. If you don't know where to look and just activate the software to look you may find out that the stolen computer is somewhere you shouldn't be looking, like a child's bedroom or SKIF. So how will you fill out a webcam search warrants? How is that going to work?
Lillie Coney of the Electronic Privacy Information Center "If they thought it was right, they wouldn't have stopped. "But they weren't thinking. And they weren't planning to get caught. So they didn't tell anybody." "We've been conditioned to think we'll give up anything for security, but people have more say about these things than they think."
Put another way, principals may rule at school, but students' homes must remain a refuge. "For this school district to develop police powers in secret and then exercise those powers in secret," she said, "is problematic and disturbing."
If you tried to Protect your Privacy then jail breaking was grounds for explusion.
Parents are citizens who may be ignorant of their rights and not realize that it's wrong, and don't realize it's spyware and think they have signed their rights away when they accept the free computer, but should protest.
Missing the Boundary Line is Key:
The Police Were Not Called.
This particular laptop has never been asserted to be lost, stolen, misplaced, or missing. If you are using it to locate stolen property you would call the police right? If software is used to watch what children are doing, that is spying.
ADMINISTRATORS ARROGANCE: NOT THE FIRST COMPLAINT
Student representatives had twice objected to the program's intrusiveness to the school administrators and had been ignored. Leardership Starts From The Top of the state. PENNSYLVANIA INFORMATION TECHNOLOGY
on paid leave Michael Perbix, a network technician, and
THE LOWER MERION NETWORK TECHNICIANS
1) Brad Miller 312 Davis Road Havertown, PA 19083 [p] 610-853-1161
2) Jeremy Valentine 1378 Indian Creek Dr. Wynnewood, PA 19096 [p] 610-896-469
3) Mike Perbix Network Technician has been blogging and posting on Apple mailing lists how he did it.
Mike Perbix talks about spying with Remote Desktop Curtain Mode
Lower Merion School District Telecommunications Specialist
(610) 645-1964 - Work
(610) 896-2019 - Fax
Stryde Hax, who says he works for the security firm Intrepidus Group, strydehax [e] stryde dot blog at gmail dot com did a brilliant job looking into sleuthing this out!
"Mike Perbix has a large online web forum footprint as well as a personal blog. During our testing, we infected a laptop with LANRev, then closed the lid, hoping to activate the LANRev feature which takes a webcam picture when the computer wakes. As my colleague Aaron opened the lid of his Mac, the green webcam light flickered, ever so briefly. It wasn't a glitch. It was a highly sophisticated remote spy in his system. And even though he was in control, the effect was still very creepy.
LANrev contains a security hole that put the students at risk of being spied on by people outside the school, according to a security firm that examined the software. The LANrev program contains a vulnerability that would allow someone using the same network as one of the students to install malware on the laptop that could remotely control the computer. An intruder would be able to steal data from the computer or control the laptop webcam to snap surreptitious pictures.
See the LanRev remote monitoring product Promo where
"Mike Perbix identifies himself as a high school network tech, and then speaks at length about using the track-and-monitor features of LanRev to take surreptitious remote pictures through a high school laptop webcam. A note of particular pride is evident in his voice when he talks about finding a way outside of LANRev to enable "curtain mode", a special remote administration mode that makes remote control of a laptop invisible to the victim. Listen at 35:47, when he says: "you're controlling someone's machine, you don't want them to know what you're doing" ~Mike Perbix
It isn't until 37 minutes into the video till Perbix begins talking about the Theft Tracking feature, which causes the laptop to go into a mode where it beacons its location and silent webcam screenshots out to an Internet server controlled by the school."
Mike Perbix: disable firmware lock intel laptops
* Subject: Re: disable firmware lock intel laptops
* From: "Perbix, Michael" <email@hidden>
* Date: Wed, 21 Oct 2009 19:30:37 -0400
OFPW (the latest version) is a universal binary and works. OFPW -command 0
will turn it off.
You could also use NVRAM, built in to the OS....
Sudo nvram -p shows you all the variables currently in your nvram....
sudo nvram security-mode=none
Turns off security, to turn it on
sudo nvram security-mode=command
To set the password, you need to know the encrypted version of it....set the password on another machine, then use sudo nvram-p to see it, copy the encrypted form of the password and use
sudo nvram security-password=<place encrypted password here>
sudo nvram security-mode=command
I use this from LANrev and sending unix scripts to set users firmware
passwords that may be wrong....or missed during a service call.
You can script a firmware password check script using openssl so that you don't have to put the weakly encrypted password in a visable script...
I started documenting things I do like this in my blog...if you can call it
a blog 8-)...
On 10/21/09 6:36 PM, "nate st.germain" <email@hidden> wrote:
try using this utility: http://code.google.com/p/efipw/
sudo efipw -p "" should set the pass to nothing.
sudo efipw -d will decrypt it.
> On Oct 21, 2009, at 6:32 PM, Bob Henry wrote:
>> Can anyone direct me to a CLI solution to turning firmware protection off on mac books?
>> I scraped this off my shoe:
>> /usr/local/bin/OFPW -pass mypassword
>> /usr/local/bin/OFPW -mode 1
but seems that OFPW is a PPC util. Please advise TIA
Bob Henry IT & DATA Wrangell Public Schools 907-874-2321 x244
Lower Merion School District
Saturday, November 28, 2009
He describes using the remote monitoring feature to locate a stolen laptop:
We were having an issue with LsSaAlerter application which is part of the Lightspeed systems Security Agent for OSX. the LsSaAlter application is responsible for the menu bar icon that shows you the status of the security agent and what it is currently doing. There is also a shortcut to get to the Lightspeed Preferences Pane by clicking on the menu icon.
There does not appear to be any current way via filtering policies to disable that menu and even if you MANUALLY go into the com.lightspeedsystems.securityagent.plist and set the "Enable Manger" key to false, it resets on next logout/login.
So, to manually force that option we look to Apple's MCX system that we use to manage our laptops via group policy. Using the Workgroup Manager application, we select the computer group and click on PREFERENCES, then click on the DETAILS tab. Click the little + symbol at the bottom and find the Lightspeed preference file and load it in making sure you are loading it into the ALWAYS category. The preference file is found at
Once loaded, click on the EDIT symbol (little pencil) next to the + and - buttons, and expand the ALWAYS selection. Click on each entry and hit DELETE to remove it. The only entry you wish to remain is "Enable Manager" which should be set to boolean and false. This allows the other items to still be controlled by the filtering policy.
Now, next time your clients in that computer list refresh their preferences, the menu item will no longer be present.
BTW, this is a good way to force preferences for many third party programs that support PLIST preference files. Of course, it is good to test, and you may have to use OFTEN or ALWAYS. Always means that the preference can NOT be changed...OFTEN means it sets the preference on login, and can be changed, but on next login the preferences will be reset to what you want them.
Sunday, September 13, 2009
This can be accomplished by changing the permissions of 2 files. It can be done by removing rwx for all users (ie chmod a-rwk) on the following
This has been tested on OSX 10.5.7 (MacBook) and OSX 10.5.8 (MacBook Pro)
A DMG with the completed script and application can be found here.
The script should go somewhere in your path (/usr/sbin or such) and have the appropriate permissions and owner. You can then run it from a utility such as ARD or LANrev, or from a SSH login by issueing the command with the appropriate option use -h or -help for info.
The Application has a copy of the isighter script contained in it's bundle. The actual Applescript is an example of how to run a terminal command with admin privileges and can be found here.
Posted by Michael Perbix
strydehax explains that "Perbix puts it in context on an admin newsgroup, in a post which makes it clear that his script allows for the camera to appear shut down to user applications such as Photo Booth but still function via remote administration:
"what this does is prevent internal use of the iSight, but some utilities might still work (for instance an external application using it for Theft tracking"
What's the purpose of shutting down a camera for the user of the laptop but still making it available to network administrators? Ask yourself: if you wanted to convince someone that a webcam blinking was a glitch, would disabling the cameras help make your case?"
" Posted on digg and SAC: ""As a recent graduate of Harriton, I thought I could shed some light on the situation. These laptops were 2.0ghz 2gb Macbooks issued out to all the students for the entire year to do whatever they wanted and this was the 2nd year of the program. The webcam couldn't be disabled due through tough tough security settings. Occasionally we would notice that the green light was on from time to time but we just figured that it was glitching out as some macbooks do sometimes. Some few covered it up with tape and post its because they thought the IT guys were watching them. I always thought they were crazy and that the district, one of the more respectable ones within the state, would never pull some s*** like this. I guess I was wrong. I am a little surprised because nobody in the past had be disciplined for doing anything inappropriate during school or outside of school. The only thing coming close was a kid performing a simple hack to make another account in order to install games. This specific incident was traced through the network by the IT dept. While I still think there might be a chance the vice principal/ disciplinarian doesn't have these specific images as she is quite the type to make a bluff like that, it sounds to me like this is legit. If they have been watching all of us and looking at our logs and looking at what we type, I can assure you that they have seen lots and lots and lots of dirty things."" "
" I am the father of a 17 y/o Harrington High student. She has had one of these laptops for 2 years. She has noticed the "green light" coming on but was not computer literate enough to know what initiated it. While it is true that frivolous law suits exist, there are many suits that are found to be true. The LMSD has helped create an atmosphere of distrust in their community. It should be no surprise that parents do not automatically come to their defense.My daughter's noticing the light on her laptop was identified prior to any news of a laptop. The assumption was that it was a defect. That is now not as clear. "Were students and families explicitly told about the laptop security system?
Strydehax Update 2/23/2010 11:28am
Aaron Rhodes says the reason LANRev is using the raw camera device is that Apple implemented security measures to prevent remote activation of the webcam in OSX. LANRev was designed to bypass this security measure. Ask yourself, "what kind of software bypasses OS security measures?"
On the topic of whether or not we yet have proof of illegal use, I would ask you to listen carefully to the webcast, and listen for the word "house" at 1:28. Listen for "yes we have used it."
- Staff Access to Networked Information Resources Acceptable Use Policy PDF
- Administrative Regulations for Staff Acceptable Use Policy PDF
- Staff Network Account Request Form PDF
- Student Network Access Policy PDF
- Student Guidelines PDF
Educational Technology for the 21st Century
• Use of district technology for communication and operations
• Guide students to the understanding and adherence of guidelines for acceptable use of technology
• Awareness and use of technology resources
• Basic knowledge and use of district network
• Awareness and development of age appropriate technology competencies for students
• Apply technology tools to best practices for teaching and learning
Supervisor of Instructional Technology - Jason Hilt
Administrative Assistants - Andrea Papsin. Sherry Zielke
Webmaster - Jason Michael
SIS Support Technicians - Jessica Bolton, Jim Roletter
Desktop Technician - Chuck Ginter, Jim Wills
Helpdesk Technician - Amanda Wuest
Audio/Visual Technician - Jim Rigby
Building Level Technology Support - Tom Crocker, David Feight, Kyle O'Brien, Neil Pancoast, Matt Shaw, Matt Stanford
Building Level Instructional Technology Specialists - Beth Hampton, Rhonda Keefer, James Langmayer, Tom McGee, Andy Pron
In this episode we show you how to take a
USB web cam and turn it into a spy camera.
Why K-12 School Districts should be using Open Source Software Technology
Trusted Computing is controversial as the hardware is not only secured for its owner, but also secured against its owner as well. Such controversy has led opponents of trusted computing, such as Richard Stallman, to refer to it instead as "treacherous computing", even to the point where some scholarly articles have begun to place scare quotes around "trusted computing".
Trusted Computing opponents such as the Electronic Frontier Foundation and Free Software Foundation claim trust in the underlying companies is not deserved and that the technology puts too much power and control into the hands of those who design systems and software. They also believe that it may cause consumers to lose anonymity in their online interactions, as well as mandating technologies Trusted Computing opponents deem unnecessary. They suggest Trusted Computing as a possible enabler for future versions of mandatory access control, copy protection, and digital rights management.
Some security experts have spoken out against Trusted Computing, believing it will provide computer manufacturers and software authors with increased control to impose restrictions on what users are able to do with their computers. There are concerns that Trusted Computing would have an anti-competitive effect on competition in the IT market.
There is concern amongst critics that it will not always be possible to examine the hardware components on which Trusted Computing relies, the Trusted Platform Module, which is the ultimate hardware system where the core 'root' of trust in the platform has to lie.
The whole focus is on giving the system operator lots of flexibility to do whatever they want, while giving customers, experimenters, competitors, and citizens zero flexibility or opportunity.
If not implemented correctly, it presents a security risk to overall platform integrity and protected data. The specifications, as published by the Trusted Computing Group, are open and are available for anyone to review. However, the final implementations by commercial vendors will not necessarily be subjected to the same review process. In addition, the world of cryptography can often move quickly, and that hardware implementations of algorithms might create an inadvertent obsolescence. Trusting networked computers to controlling authorities rather than to individuals may create digital imprimaturs.
The Cambridge cryptographer Ross Anderson has great concerns that "TC can support remote censorship [...] In general, digital objects created using TC systems remain under the control of their creators, rather than under the control of the person who owns the machine on which they happen to be stored (as at present) [...] So someone who writes a paper that a court decides is defamatory can be compelled to censor it — and the software company that wrote the word processor could be ordered to do the deletion if she refuses. Given such possibilities, we can expect TC to be used to suppress everything from pornography to writings that criticize political leaders." He goes on to state that:
[...] software suppliers can make it much harder for you to switch to their competitors' products. At a simple level, Word could encrypt all your documents using keys that only Microsoft products have access to; this would mean that you could only read them using Microsoft products, not with any competing word processor. [...]
The [...] most important benefit for Microsoft is that TC will dramatically increase the costs of switching away from Microsoft products (such as Office) to rival products (such as OpenOffice). For example, a law firm that wants to change from Office to OpenOffice right now merely has to install the software, train the staff and convert their existing files. In five years' time, once they have received TC-protected documents from perhaps a thousand different clients, they would have to get permission (in the form of signed digital certificates) from each of these clients in order to migrate their files to a new platform. The law firm won't in practice want to do this, so they will be much more tightly locked in, which will enable Microsoft to hike its prices.
Ross Anderson summarizes the case by saying
"The fundamental issue is that whoever controls the TC infrastructure will acquire a huge amount of power. Having this single point of control is like making everyone use the same bank, or the same accountant, or the same lawyer. There are many ways in which this power could be abused."
Microsoft Spy - 17-page Microsoft Global Criminal Spy Guide. Its programs, make it easier for law enforcement to obtain user data, violations of trust toward its customers. For a large corporation with millions of users and an aggressive PR agenda, the document raises concerns and sparks conversations the company would rather not confront.
"It's part of a very intense political debate about the role of intermediary companies like Microsoft aiding surveillance for law enforcement. It's embarrassing for Microsoft for their users to see how much the people who carry their email have arrangements with law enforcement... All of the people who carry our communications are an easy conduit for our government to spy on us, and a lot of people are unhappy about that.
Is your data encrypted? 45 state privacy laws - Only Safe Harbor-Data Encryption
Almost all states and the federal government have enacted or plan to enact legislation requiring notification of security breaches involving personal information. Many existing state and federal privacy laws have also gained teeth recently-including stiff penalties in some cases. These include:
- MA 201.CMR.17 - The new model for privacy laws, Massachusetts's recent legislation mandates encryption and even impacts companies in other states (compliance deadline extended to March 1, 2010)
- CA SB1386 - If you handle data for residents of the country's most populous state, California, you must notify individuals if a breach occurs-unless the data is encrypted
- NV SB 227 - Vendors in Nevada must now comply with the Payment Card Industry Data Security Standard (PCI DSS)
What a nightmare!
THE APPLE COMPUTER is marketed to all the School Districts and the District Lawyers and Technologists aren't experts who know the issues or understand the law which is no excuse.
Just because there is an AUP doesn't mean the school district has the right to spy on citizens. Hard working, well meaning, sincere, but ignorant employees of the school systems in this country are enabled to buy the computer technology with your tax dollars using government funds - and apple wants the easy money.
Can Apple prove they informed the School District that the webcams should not be used to spy on children? Apple should be held accountable for telling the School District what to include in the AUP. Apple needs to be investigated and possibly prosecuted for negligence if they did not take responsibility for giving the school district an AUP for the parents.
This school document identifies the hardware and software in use as Macbook laptops running OSX. Apple Remote Desktop 3: Administrators have access to the laptop of every kid in the school through this program, and can switch from one to another and watch what the kids are doing on their computers in real time. Remote observation and control of target computers is plainly listed in the Apple Remote Desktop 3 Feature List.
Webcameras are enabled by the IT department to allow Administrators to see their screens, and faces and communicate with th student and take a picture of them (admins can control their laptops remotely) in Photo Booth, or interrupt their IM conversation with their own message. No one informed the kids that they were being monitored. Even if the laptops don't belong to the student, so should have be able to expect privacy. The potential for abuse is nearly limitless, especially since many teens keep their computers in their bedrooms.
Even when a non-IT employee clearly is to blame for a security breach, IT is still responsible.
Dan Morill ~ "We need to remind ourselves again and again that information security is not a technology issue – it's a people issue. We are reliant on people, their awareness, ethics and behaviour, and we must understand what they want to achieve if we are to accomplish the goals of business. This includes the employees that deliver our services and the customers that take advantage of them, as well as the senior executives and board room directors that grant us our budgets."
Guidelines for Use of Student Laptops 1
The laptop computers that will be issued to all high school students are the property of Lower Merion School District. Students are responsible for the appropriate use of these laptops both at school and at home. The laptops are for the use of students for educational purposes. All commercial, illegal, unethical and inappropriate use of these laptops is expressly prohibited.
Students are to comply with copyright laws. Downloading games or software is expressly prohibited. Only District licensed software is to be installed on the laptops.
The maintenance of laptops is the student's responsibility. If laptops need repair or maintenance students are to report to the Technology Center in their building. Vandalism to any laptop or accessory is strictly prohibited. Students must present school issued picture ID when they bring their laptop in or pick up from repair.
Students should refer to the Student Acceptable Use Policy and their Guidelines. Any violation will be subject to discipline as outlined in the Harriton and Lower Merion Student Guide.
High school teachers will distribute laptops during Advisory period on September 8, 2009. Laptops will have a label containing the student's name and other information specific to the laptop for identification.
APPLE SALES PITCH TO SCHOOLS
Creating a 21st Century Learning Environment with Anytime Anywhere Access to Digital Resources
The major goals of this initiative are to provide students with 21st Century learning environments both at home and in school, and to give all students access to technology resources. We have the opportunity and the responsibility to utilize research-based, technology-enabled practices to inspire and capture the imagination of our students. LMSD seeks to create a learning environment that fosters deeper cognitive development through inquiry, real and relevant project-based learning, and differentiated instruction – all supported by continuous access to digital technologies. Students will have the ability to work on projects and research both at school and at home. They will have 24/7 access to the software that they use in school. We believe that the laptop is an essential tool to assist them in thinking critically, analyzing data, solving real world problems and publishing their work.
- Letter to Parents
- Letter to LMHS Parents
- Letter to HHS Parents
- 21st Century Learning FAQ
- Classrooms for the Future
- Measuring What Really Matters
- Insurance Payments
- Getting Started Guide for Students
- Student Helpdesk Login
- Student Printing
- Home Filtering Letter
- One to One Printing and Filtering at Home
- For more information about the topic(s) covered on this page, please email email_link("laptopfaq","lmsd.org","Letter to HHS Parents");email@example.com.
YOU ARE ON PAGE 2