Skip to main content
District

Technology Support

  • Coming Soon

  • Coming Soon

  • Here are the guidelines for keeping your Chromebook clean:

    1. Before cleaning, unplug and power off the device.
    2. Use a dry, soft cloth to clean the Chromebook screen or body. If needed, a slightly damp cloth can also be used.
    3. To disinfect your Chromebook, gently clean the surface with a 70% isopropyl alcohol sanitizing wipe. Avoid scrubbing too hard.
    4. Do not use chemical detergent, powder, or other chemical agents (such as benzene) to clean the Chromebook.
    5. Be mindful not to let liquid come into contact with the Chromebook's screen, or inside the USB ports, keyboard, or speaker grills.
    6. Allow the device to dry before closing the lid.
  • Should a school-issued device be lost, stolen, or damaged, please inform the school immediately.

    • If it's stolen, the student or guardian should promptly file a police report.
    • If the device is lost, stolen, or damaged due to unacceptable behavior, the parent or guardian may be responsible for replacing the device.
    • Students who withdraw from any BCSC schools must return their school-issued devices and accessories on or before their last day of school.

     

    In the event of loss, theft, or damage to the school-issued device, the BCSC Technology Department has a limited number of 'loaner' devices available for students to use during the school day until their device is repaired or replaced. Loaner devices are provided on a first-come, first-served basis daily.

  • The damage, repair, or replacement fees are as follows:

    • Chromebook Chargers: $15
    • Replacement of Broken Screens: $150
    • Replacement of Device: $350 to $425
  • BCSC Technology Department has a limited number of 'loaner' devices available for students to use during the school day until their device is repaired or replaced. Loaner devices are provided on a first-come, first-served basis daily.

  • Benton Community School Corporation devices are exclusively provided and maintained by the BCSC Technology Department. If you encounter any issues while using the device, you must promptly contact the BCSC Technology Department at 765-884-1600 ext. 1131.

  • Benton Community School Corporation has chosen School Device Coverage (SDC) to insure the school-issued devices that students will be given to your student as part of the 1:1 device program.

    If the device is lost, stolen, or accidentally damaged School Device Coverage will cover the fees. For one low annual price, you may file an unlimited number of incidents that take place with no deductibles, no added fees, and no claims limits.

    To obtain coverage, please fill out the flyer that will be given by the district and mail it in along with a check, or visit School Device Coverage. You will need your student's school-issued Chromebook Serial Number and Asset Tag numbers. The Asset Tag number is on the blue barcode sticker labeled "Property of BCSC". If you do not know the Asset Tag or Serial number you will still be covered and we will add the information to your coverage policy for you.

    Join hundreds of thousands of parents nationwide who trust SDC to ensure that their child's device is protected for the 2023 - 2024 school year!

  • BENTON COMMUNITY SCHOOL CORPORATION TECHNOLOGY ACCEPTABLE USE AGREEMENT
    Revised June 2010

    The Benton Community School Corporation is actively pursuing making advanced technology and increased opportunities available to our students and staff. We recognize that safeguards have to be established to ensure that our investment in both hardware and software is achieving the benefits of technology and inhibiting negative side effects. The goal in providing these services is to promote educational excellence by facilitating resource sharing, innovation and communication. This policy is established not only for proper acquisition of technology but also to ensure that staff and students are making appropriate and ethical use of the computers and other equipment as well as any networks that may be established. Students and employees who do not abide by this agreement may suffer disciplinary action, and be subject to denial of privileges and/or repair or replacement costs.


    Acceptable Use

    1. The use of the Internet is to facilitate communications and exploration in support of research and education by providing access to unique resources and an opportunity for collaborative work. The use of your account should be in support of and consistent with the education objectives of the corporation. Access to the Internet is made possible through money from the corporation with support from state and federal grants. All users of the Internet shall comply with existing rules and this Technology Acceptable Use Agreement.
    2. Users are responsible for their behavior and communication on the Internet.
    3. Users may only access the Internet by using their assigned network user account. Use of another person’s account/address/password is prohibited. Users may not allow others to use their accounts.
    4. Users may not intentionally seek information on, obtain copies of, or modify files, data, or passwords belonging to other users, or misrepresent other users on the network.
    5. Users may not use the Internet to engage in “hacking” or other unlawful activities.
    6. Transmission of any material in violation of any State or Federal law or regulation, or Board policy is prohibited. This includes, but is not limited to, copyrighted material, threatening or obscene material, or material protected by trade secrets.
    7. Use for commercial activities is generally not acceptable. Any use of the Internet for product advertisement or political lobbying is prohibited.
    8. Use of the Internet to access, process, distribute, display, or print child pornography and other material that is obscene, objectionable, inappropriate, or harmful to minors is prohibited. As such, the following material is prohibited: material that appeals to a prurient interest in nudity, sex, and excretion; material that depicts, describes, or represents in a patently offensive way with respect to what is suitable for minors an actual or simulated normal or perverted sexual acts, or any material that lacks serious literary, artistic, political, or scientific value as to minors. Offensive messages and pictures, inappropriate text files, or files dangerous to the integrity of the Corporation’s computers/network (e.g., viruses) are also prohibited.
    9. Mass storage devices (CD, DVD, USB, virtual drives) may be used for personal and professional purposes. However, they are never to be used for storage, transfer, or use of materials that are inappropriate, illegal, or in violation of copyright laws. The users creating or in possession of mass storage devices containing such material will be responsible for it.
    10. Accessing websites or running applications for the purpose of bypassing the Internet content filter is prohibited.
    11. Users are not to load a program or piece of code on a computer or network for the purpose of disrupting operations. This includes but is not limited to viruses, worms, adware, and keyloggers.

    Children’s Internet Protection Act (CIPA)

    The Corporation recognizes its responsibility to educate students regarding appropriate behavior on social networking and chat room sites about cyber bullying. Therefore, students shall be provided instruction about appropriate online behavior, including interacting with other individuals on social networking sites and in chat rooms and cyberbullying awareness and response.

    Students shall be provided with age-appropriate instruction regarding safe and appropriate behavior on social networking sites, chat rooms, and other Internet services. Such instruction shall include, but not be limited to, the dangers of posting personal information online, misrepresentation by online predators, how to report inappropriate or offensive content or threats, behaviors that constitute cyberbullying, and how to respond when subjected to cyberbullying. 


    Electronic Mail (E-mail)

    1. Electronic mail (e-mail) is available to most school employees. E-mail is not private and can be examined by the Network Administration when necessary. E-mail relating to or in support of illegal activities shall be reported to the authorities.
    2. Forgery or attempted forgery of e-mail messages is illegal and prohibited.
    3. Unauthorized attempts to read, delete, copy, or modify email of other users are prohibited.
    4. Users are prohibited from sending unsolicited mass emails unless the communication is an employment-related function or an authorized publication. The district’s technology resources are not a public forum for expression of any kind and are to be considered a closed forum to the extent allowed by law.
    5. All users shall adhere to the same standards for communicating online that are expected in the classroom, and consistent with corporation policies, regulations, and procedures.

    Encounter of Controversial Material

    Users may encounter material that is controversial and which users, parents, teachers, or administrators may consider inappropriate or offensive. However, on a global network, it is impossible to effectively control all data content. It is the user’s responsibility not to initiate access to such material. If a user encounters such material, they shall immediately leave that site and report the incident to the system administrator or his/her designee.


    Network Etiquette

    Users are expected to abide by the following generally accepted rules of network etiquette:

    1. Be polite, courteous, and respectful in your messages to others. Use language appropriate to school situations in any communications made through the Corporation’s computers/network. Do not use obscene, profane, vulgar, sexually explicit, defamatory, or abusive language in your messages.
    2. Never reveal names, addresses, phone numbers, or passwords of yourself or other users, family members, teachers, administrators, or other staff members while communicating on the Internet. 
    3. Do not transmit pictures or other information that may be used to establish your identity without prior approval of a teacher.
    4. Never agree to get together with someone you ‘meet’ online without prior parent approval.
    5. Never respond to unsolicited online contacts or advertisements.
    6. Any speech transmitted by the use of a school computer does not constitute speech in a “Public Forum” and is subject to regulation by the administration.

    Privileges

    The use of the Internet is a privilege, not a right. Inappropriate use, including violation of the conditions and rules, may result in cancellation of the privilege. The system administrators will deem what is inappropriate use and their decision is final. The Benton Community Schools, under this agreement, is delegated the authority to determine appropriate us and may deny, evoke, suspend, or close any user account at any time based upon its determination of inappropriate use by a user or account holder. The individual user accepts the responsibility for the ramifications and consequences of any inappropriate use of the account.


    Procedures for Use

    1. Staff members shall properly sign-up/register their class before use of the network in a lab. This procedure will vary from school to school.
    2. All users have the same right to use the equipment. Therefore, users shall not use computer resources for non-academic activities when other users require the system for academic purposes. 
    3. Users may not waste or take supplies, such as paper, printer ink, and diskettes that are provided by the corporation.

    Security

    1. Security on any computer system is a high priority, especially when the system involves many users. Users shall never allow others to use their passwords. Users shall also protect their password to ensure system security and their own ability to continue to use the system. 
    2. If you feel you can identify a security problem on the Internet or Local Area Network (LAN), you shall notify the system administrators. Do not demonstrate the problem to others.
    3. Attempts to log on to the network or the Internet as a system administrator will result in the cancellation of user privileges.
    4. Any user identified as a security risk for any reason may be denied access to the Internet and/or the LAN.
    5. Protection of student information is important in any school. Staff members should not allow students to use a computer while the staff member is still logged onto the network.
    6. The corporation will operate a technology protection measure (filtering/blocking device) on all computers with Internet access, as required by law. 

    Software

    1. BCSC Technology Department shall be notified and grant permission prior to the loading of programs onto school owned computers. The system administrator will install any software onto school owned computers. Software documentation shall be accessible at the time of the installation. BCSC is not responsible for programs not approved by the system administrators or any problems caused by or related to such programs. The system administrators reserve the right to delete any programs or files.
    2. Unless otherwise stated in the software’s license agreement, users cannot legally load software on more than one computer or onto the network.
    3. The Technology Director shall be informed of and approve all potential software purchases intended for any BCSC workstation or network installation.

    Terms and Conditions

    All computers, telephone systems, electronic systems, e-mail and voicemail systems are the property of Benton Community School Corporation. On occasion, the system administrators may need to require school owned equipment to remain on school grounds for the purposes of maintenance and/or repair. BCSC retains the right to access and review all components of these systems. A user does not have a legal expectation of privacy in the user’s electronic mail or other activities involving the corporation’s network and technology resources. A user ID is provided to users of this corporation’s network and technology resources only on condition that the user consents to interception or access to all communications accessed, sent, received, or stored using corporation technology. Review of any systems will only be done in the ordinary course of business for a legitimate reason. Searching for inappropriate use is a legitimate reason to review logs, technologies, systems, computers, e-mail or voicemails. Administrators and supervisory staff authorized by the Superintendent have the authority to search and access information electronically. 

    The system administrators will maintain the corporation’s technology in a manner that will protect the corporation from liability and will protect confidential student and employee information retained or accessible through corporation technology resources. Trained personnel shall establish a retention schedule for the regular archival or deletion of data stored on corporation technology resources. Administrators of computer resources may suspend access to and/or availability of the corporation’s technology resources to diagnose and investigate network problems or potential violations of the law or district policies, regulations and procedures, and to load or delete new programs or information, install new equipment, and upgrade any system by removing, changing, or exchanging hardware between building, classrooms, employees, or students at any time.

    The Corporation is not responsible for unauthorized financial obligations resulting from corporation provided internet access. 


    Vandalism

    1. Vandalism and harassment will result in cancellation of user privileges, other disciplinary action and/or repair or replacement costs. 
    2. Vandalism is defined as any attempt to harm, modify, and/or destroy data, Internet, equipment, or other networks that are connected through the LAN, WAN, or Internet backbone. This includes, but is not limited to, the uploading or creating of computer viruses.
    3. Harassment is defined as the persistent annoyance of another user or the interference of another user’s work. Harassment includes, but is not limited to, the sending of unwanted email, instant messages, or files.

    Warranties

    BCSC makes no warranties of any kind, whether expressed or implied, for the services, products, or access it provides. The district is not responsible for any damages suffered for any reason, including loss of data for any reason. Use of any information obtained via the network is at the user’s own risk. The corporation does not guarantee the accuracy or quality of information obtained from the Internet, or use of its technology resources.

  • For the 2023 - 2024 school year, Benton Community School Corporation is offering a limited number of mobile hotspot devices to students who take their school-issued Chromebooks home with limited or no internet access at home. The hotspots will allow internet access to students who do not have adequate access to the internet for their school work at home. The devices will have internet content filtering and browsing history will be recorded—only one (1) device per household. Priority will be given to students on the free/reduced lunch list with little to no internet access at home. The BCSC Technology Director will approve applications. Multiple students may be connected to one device. Internet speeds may vary. If slow speeds occur the students are asked to coordinate their time. 

    Please note: The mobile hotspot devices are T-Mobile, depending on the geographic location of the home the device may not work. If the device does not work, please let us know and return the device. 


    Families wanting to participate in the BCSC Stay Connect program must complete this form to be considered. Families unable to complete the online form may call the BCSC Technology Department at 765-884-1600 x1112 for assistance. By signing this form, the parent/guardian agrees to take full responsibility for the device. A replacement fee of $100 will be charged if the device is lost, stolen, damaged, or not returned. 


    Obtaining a hotspot device

    1. Complete the online application.
    2. Have limited or no internet access at home. 
    3. Priority will be given to students on the free/reduced lunch list with little to no internet access at home. 
    4. Approved families will be notified when they may pick up the hotspot device. 
    5. During pick up parents/guardians will need to sign the agreement form. Hotspot devices must be returned before the end of the 2023 - 2024 school year, upon withdrawal or request by the BCSC Technology Department. 

    Who is eligible? 

    The BCSC Stay Connected program is open to BCSC students who are enrolled in 1 of the Benton Community School Corporation schools. Priority will be given to students on the free/reduced lunch list with little to no internet access at home. The district reserves the right to loan the devices to any student who shows a need. 


    What is the cost?

    The hotspot device is free. No fees for the device. However, if the device is lost, stolen, or damaged a fee of $100 will be charged to the parent/guardian.


    Rules of use:

    • All hotspot devices are provided and maintained by the BCSC Technology Department. If any problems occur while using the device, contact the BCSC Technology department at 765-884-1600 x 1112
    • If the device is lost, stolen, damaged and/or not returned a replacement fee of $100 will be charged to the parent/guardian. The BCSC Technology Director should be notified immediately of any damaged, stolen, or lost device. 
    • Hotspots are provided for educational purposes. All users are to follow the rules listed and the BCSC Student Handbook. 
    • Hotspots must be returned to the schools at the end of the 2023 - 2024 school year, upon withdrawal or request by the BCSC Technology Department. 
    • Bypassing the internet filter, resetting the hotspot, or reconfiguring the hotspot is strictly prohibited. Doing so will cause immediate removal from the BCSC Stay Connected program, and possibly school discipline as well.