Lutheran South Academy

Skip to main content
Main Menu Toggle

Middle & High School Resources

1 to 1 Macbook Program

Lutheran South is blessed to have a reputation as an innovator in learning. Students have access to cutting edge technology both in and out of the classroom.  By adopting the 1:1 model for grades 6-12, LSA has been able to engage students using innovative pedagogues and learning experiences. 

We are committed to continually improving teaching and learning at LSA. This year teachers are utilizing our web portal, myLVC, allows for learning to take place wherever there is an internet connection and we use an online grade book that parents and students can access from home to track their academic progress.

All students will be prepared and motivated to meet the challenges of a dynamic global society in which they collaborate, contribute, and flourish through universal access to people, information and ideas.

21st Century Learning is lifelong learning, with technology. Students develop the capacity to locate, consume, analyze, and evaluate information; then to create knowledge. To be literate in the 21st century is no longer simply having the ability to read and write; rather, it must also include technological fluency and dispositional attributes such as creativity, teamwork, systems thinking, responsibility, self-assessment, and inquiry. We should expect students not only to master these skills but also to apply and demonstrate them through authentic and engaging activities and assessments.

8 Criteria for Success

1.Technology is seamlessly embedded into the fabric of the student learning experience.

2.All educators will use 21st century skills and knowledge to effectively embed educational technology as necessary to enable students to achieve.

3.LSA will improve and maintain a user-focused technology infrastructure that is reliable, supported, and relevant to today.

4.All students and staff will have access to the tools of technology and information for learning.

5.Professional Development will be focused towards improving the learning process and providing relevance to the student’s world.

6.Standards will exist to enable consistency in the provisioning of the educational process and facilities.

7.Innovative use of technology will be encouraged and supported.

8.Use of technology will be personalized to the extent possible, in order to address different learning styles/needs and rates of learning.


1 to 1 Technology Program Policy


All students in Grades 6–12.


LSA students should:

  • Understand and follow the Acceptable Use Policy when using the laptop.
  • Follow these guidelines, specific school or classroom agreements, as well as the student use expectations pertaining to the use of the laptop.


Students are responsible for their own backup. Considering that a large portion of each student’s schoolwork will be on the laptop, making sure this work is safe and readily accessible is vital to the program. LSA recommends the following backup methods:

1.Copying school-appropriate files onto a personal thumb drive.

2.Dropbox Cloud Service for all School related data.

MacBook at End of Life

The Macbook is the property of LSA, and must be returned to LSA each school year. At the end of our three year lease program, LSA MAY opt to sell used Macbooks to students at their current resale value. The money from the purchase will be used to support the LSA technology department and any upgrades that are needed. Failure to return the Macbook may result in being billed for replacement cost and labor, detention of transcripts, or other penalties.

MacBook Collection and Inspection

For the purpose of assuring compliance with technology protocols, LSA reserves the right to collect and examine any issued MacBook at any time. LSA also reserves the right to remotely inspect notebook computers at school to ensure compliance with established protocols and polices.

Software Updates

Students will be requested to install updates as needed throughout the year. Many of the updates will require up to 1.5 GB of space, so ensuring there is enough space on the computer to accommodate these updates is important.

In addition, students will be required to return their laptop at the end of the year to LSA for re-imaging. Before students hand in their computer for imaging, the student must back up any user data on the computer.

Installation of Additional Software

All software provided on issued laptops is licensed for use by LSA. If a class requires specific supplemental software, students will have access to Self Service Application that will allow access to install additional approved software.

During the course of regular repairs, software upgrades and installation, and condition audits, the school tech team will remove any detected unauthorized or illegal software installed on the computer by re-imaging the MacBook prior to returning it to the student. Re-imaging will result in the loss of files, data, personal settings, and any other data not backed up by the student beforehand.

Repair to Laptop

Students are expected to have an operational laptop at all times. If the computer is not functioning properly, they need to have their computer inspected by the technology department. If repairs are necessary on the laptop, the technology department will facilitate the process. While computers are undergoing service, a loaner will be provided.

Lost or Stolen Laptop

If a student should lose or have their laptop stolen, they are expected to report the loss/theft as soon as possible to the technology department. While a replacement laptop is being purchased, a loaner will be provided, but the loaner pool is not unlimited.

Laptop Accounts

The computers in grade 6-12 will be set up with a standard user account. The school will manage software and driver updates. If new software is required, the technology department may use Self Service or push remotely. At any time a specific driver is required that is not available via Self Service, students can submit a ticket to the Help Desk by emailing

Email Protocols

Email has become a vital communication tool used by staff and students to carry out academic and administrative functions. It is important to ensure the security and responsible use of email.

All holders of school email accounts are expected to abide by the guidelines set out in this agreement.

  • As a rule, one should never say something through email that he or she would not say in person. Email should be reserved for the exchange of information and not for emotional correspondence.
  • No inappropriate e-mail is allowed including derogatory, obscene, or harassing messages. E-mail messages of an abusive or harassing nature will be subject to a disciplinary response according to the harassment policy in the student handbook.
  • Representation: When you send a letter from your school email address you are representing the school. Sending an email to an outside party is in some circumstances similar to sending a paper message with the school letterhead. It is strongly recommend not using LSA email account for personal email.
  • Students shall not send out any mass emails unless they relate directly to LSA and then only with permission from their Principal.
  • School email accounts should not be used to send out bulk email. This includes chain letters, advertisements, or used to promote the interests of external organizations.
  • Chain letters of any kind and spam are prohibited. Chain letters are defined as any e-mail message asking you to pass information or messages on to other individuals or groups via e-mail.
  • Only the approved mail service ( may be used for student mail.
  • The school reserves the right to search and read e-mail as deemed necessary.
  • E-mail during class is prohibited unless authorized by faculty or administration.
  • E-mail services provided by the school are to be used only for the exchange of appropriate information.
  • Students are prohibited from accessing anyone else’s e-mail account.
  • School e-mail addresses are not to be given to ANY websites, companies, or other third parties without the explicit permission of a teacher or administrator.

Warranty and Insurance

The MacBooks are covered by two levels of protection. The first is an extended (3-year) AppleCare Warranty that provides on-site and worldwide support for the laptop. The second level of security is the mandatory insurance that covers damage, and theft not included in the warranty.

Please note that although the warranty and insurance provide protection in case of loss, they cannot protect against lost data and time when repairs are necessary or computers need to be replaced. They therefore should not be taken as a license to be irresponsible with the laptop. Repairs and replacement also cause an impact on others by increasing the cost of insurance in the long run as well as reducing the number of loaners available.

MacBook Warranty

Each student MacBook is covered by a standard 3-year AppleCare warranty. The AppleCare Protection Plan provides repair coverage – both parts and labor – from Apple-authorized technicians around the world.

Hardware coverage includes your Mac computer, included accessories such as the power adapter, and Apple memory (RAM).

All repairs will be conducted through the LSA technology department.


The school will facilitate insuring the laptops for accidental damage each year. Accidental damage is damage that the supplier determines is not covered under the warranty agreement (i.e., cracked screens, liquid spills, broken hinges).

The cost of insurance is included in tuition, but there is a $150 deductible each time the laptop is damaged outside of AppleCare. This $150 deductible (per incident) will be automatically added to the student bill, as this cost is also the responsibility of each student/family. A stolen Macbook has a deductible of $500. If an Macbook is stolen, the family must obtain a police report and a copy of that report must be filed with the technology department. Intentional damage and lost devices are not covered under our insurance plan and the student’s tuition account will be billed for the full replacement value of the device.

Repair Fund Account

To help minimize cost to families’ year after year a $150 fee would be billed and held in a “Repair Fund Account” on any devices returned with minor cosmetic damage outside of normal wear. In doing so we hope to cut down on redundant repair cost year after year for returning students. Here are a few things to note:

  • Returning students will receive the same device that they turned in at the end of the school year.
  • If the device has minor damage outside of normal wear and tear, a deductible of $150 will be billed, and the device will NOT be repaired at that time. This only applies to damage that does not affect the functionality of the machine.
  • The deductible will be held in a "Repair Fund Account" until it is needed.
  • The repair fund account amount may be applied towards deductible fee if the device is stolen or towards the replacement cost if the insurance deems any problem as intentional damage.
  • If the repair fund is applied toward a repair, the student/family will be responsible for any additional incidents after the repair has taken place at the normal $150 deductible per incident.
  • If a student graduates or withdraws, the repair fund will be applied to refurbish the device for the next student even if there is only cosmetic damage at that time.
  • At the end of the three-year laptop cycle, the repair fund will be used to repair the cosmetic damage and/or any other damage that has occurred.

*** any device with functionality damage will be billed a $150 deductible fee and will be sent in for repair. Those funds will not be put in the "Repair Fund Account."

Folder Structure and Naming Protocol

Laptops can serve as great organizational tools; however, if not carefully monitored, lack of organization can hinder one’s ability to use it well. Hundreds of “loose” files on the desktop make it difficult to sift out the file you require; for this reason, we recommend that students adhere to not only a coherent folder structure, but also a file-naming protocol – making it easier to identify the files or types of files you wish to examine.

Students are expected to follow the file-naming protocol:

LastNameFirstName-Subject-FileName (ex. SmithJohn-Geometry-Triangle_Assignment.docx)

Students will be asked to set up a folder structure relative to grade level; it is highly recommended that students organize their files using this structure. There should be, at a very basic level, an organizational separation between a student’s non-school and school data. Under the Dropbox folder, every student should create a folder called “School” where they will keep all their files organized.


Your laptop is going to be utilized for a great deal of your schoolwork. It will contain important files and data that will be necessary for your academic success. Keeping these files safe and accessible is your responsibility as is the functionality of the laptop itself. “My laptop crashed” cannot be an excuse for the postponement of schoolwork because one of the advantages of digital learning is that backups are easy and cost effective. Additionally, there may be times when your computer is to be re-imaged, and if you wish to retain certain files not included in the image, then backup is essential. When you backup your files, you are storing your files separately from your computer, ensuring their longevity.

There are a number of ways that files can be backed up on Macs:


Dropbox is software that allows you to save up to 2 GB of data located on your computer in the Dropbox folder, and syncs the data to the cloud. This method requires an Internet connection, and is accessible from any computer or smart phone device connected to the Internet. (Data Fees may apply)

Setting up Dropbox is very easy. The first time you log into your Mac, Dropbox software will appear to complete the setup process.

All you need to do is sign up for Dropbox using your email address, and save your School Data to the Dropbox Folder.

File by file onto a thumb drive

Another option that is available is backup to a “thumb” drive – a small storage space that generally connects via a USB port. Whenever an external storage space is inserted via USB to your Mac, an icon indicating the newly inserted device will appear on your desktop and in your finder sidebar under “Devices”. For thumb drives, by selecting the drive icon, a folder should appear; you can simply drag and drop files from your local machine onto this external folder. When finished, to safely remove the storage device, you need only press the eject button next to the storage device in the finder window under the “Devices” tab.

A backup is essential for the constant accessibility of your academic work and should be done at least once a month.


Laptop Security

Keeping your laptop safe and secure is important not only for your education but also for LSA as a whole. Ensuring the operational efficiency of your laptop requires you to safeguard your laptop from any potential cyber threats. An unsecured computer on the LSA network is a danger to the entire network; not to mention that the individual unit is prone to malfunction. The functionality of your computer is your responsibility and as such you must take precautions against any possible cyber attacks and intrusion.

You are also responsible for protecting the computer from physical threats. Never leave your computer unattended or take your computer into environments that may prove harmful.


You should select secure passwords for your email address, computer login and RenWeb account. It is OK if all of the passwords are the same, as long as it is a strong password.

A strong password is generally 8-10 characters long and includes at least one capital letter, one number, and one special character among lowercase letters. A strong password is important because any individual password that may be compromised can endanger the entire LSA network.

Additionally, it is generally a good cyber-safety practice to change your password once every 6 months or so, as older passwords – those that have been used more often – are generally easier to discover than those that have been newly changed.

How to change your Computer login password

Access the “Accounts” window from the “System Preferences” application found in the “Applications” folder in the finder sidebar. Depending on which account password you wish to change, you need to select the account name. Click on the “Change Password” button and follow the prompts to change your password. You need only enter the old password once, and the new password twice. Note: That Password Changes will only work while on LSA secure network.

Physical Security

To keep your laptop in the best working condition, you need to ensure that it is physically undisturbed. Even small dents in the casing can render certain essential components of your computer unusable (i.e., the MagSafe 2 Power port, USB ports, Thunderbolt ports). So you should make sure that your MacBook is stored in a proper place (i.e., in a locked locker, or with you), is transported in a proper case, and kept away from technologically harmful materials (i.e., magnets, liquids, etc.). In the “Care of Your Laptop” Section, there are many useful tips on how to best take care of your computer.

Appropriate Storage (Bag REQUIRED)

Keeping your laptop in the carrying case will protect it against most minor bumps and jolts; however, it is important to ensure that when your laptop is in the computer bag, there is no adverse pressure applied to it. Computer hard drives & batteries do not function well after having been bumped around a great deal, and screens will break if enough pressure is applied to them.

You should also try to ensure that there are a minimal number of other objects in your computer bag alongside your laptop. Small, loose objects (such as paper clips or coins) could accidentally get stuck in openings in your laptop, if carried alongside it inside the backpack. Magnetic objects will harm the functionality of your computer and should be kept at a distance.

The bag must be separate from your book bag and have a padded computer pouch. It is highly Recommended to purchase a sleeve or protective case in addition to the bag. The bag, case, and sleeve must all be sized to accommodate a 13” MacBook Air, and will help keep the MacBook looking like new.


Care of Your Laptop

Your laptop will serve you well as a learning device for three years if you treat it well.

You are expected to have your laptop in a full-functioning order for every class every day you come into LSA. Constant use obviously takes a large toll on the machine, and in three years, a great deal can happen to your computer internally – aside from any extraneous physical damage or other non-academically related problems. For this reason, it is vital that you take the utmost care in keeping your computer functioning. There are several ways to maximize the usefulness of your computer.

First and foremost is shutting your computer down at regular intervals. Since Macs have no central registry, this need not occur as often as with PCs.

Second is ensuring that the airflow vents for your MacBook are unobstructed. Do not place your laptop on a pillow or other soft materials when it is on, as the malleable material can block the airflow vents and cause the computer to overheat. The bottom case of a Mac can become warm during prolonged use and so should not be kept on one’s lap for extended periods of time. Rather, placing the MacBook on a flat, stable surface allows the bottom case to function as a cooling surface that transfers heat from the inside of the computer to the cooler outside air.

DO NOT PUT ANY STICKERS OR TAPE ON THE MACBOOK. If you do you may be subject to $30 - $100 cleaning fee.

Keep your laptop away from water or other liquids. Don’t eat or drink while using the computer as crumbs that may fall into the keyboard can remain there and eventually cause the disabling of certain keys. Don’t insert inappropriate objects into any openings in your Mac – common sense is the biggest guide here, as metallic or magnetic objects can easily damage components. Attempt to keep your laptop away from excessive heat or cold or even high levels of humidity, as too much dampness can damage your computer.

When you are carrying the laptop, try to keep the lid closed, because the open lid can put adverse pressure on the base and screen.

Don’t use your computer as a folder to store papers, pencils, or any other small objects; doing so can cause the computer to switch on and off, causing excessive heat and using excessive power, while also potentially damaging the trackpad and keyboard.

Keep your laptop in a carrying case when you aren’t using it and remember where the carrying case is placed. Don’t try to squeeze it into small spaces – such as an overcrowded locker. The main reason for these precautions is that hard drives can get easily damaged if they are bounced around too much and screens will break if too much pressure is applied to them.

You do not need to clean your computer if it is properly taken care of. But, if the need arises, remember to shut down the computer and unplug the power adapter before doing so.Second, use only a soft, lint-free cloth to clean the computer. Avoid abrasive cloths, towels, paper towels, and similar itmes that might cause damage. Keep liquids away from the computer. Avoid getting moisture in any openings. Do not spray cleaners directly on the computer. Don't use aerosol sprays, solvents, abrasives, or cleaners containing hydrogen peroxide that might damage the finish.

To clean the screen on your MacBook Air, first shut down the computer and unplug the power adapter. Then use a soft, lint-free cloth.

Finally: Be patient. The computer may take a few seconds to “think”, and in that time, pounding on the keys or repeatedly entering the same operation is only going to slow the process and damage the long-term functionality of the computer.Be patient with your laptop.It is a tool that can offer you great access to a variety of information, but it will only cooperate if you treat it well.


You should come to school with a fully charged battery. Let it discharge while at school, and then before going to bed that night, plug in your computer so that it charges fully through the night and is ready for the next day. The standard lithium-based battery needs its electrons to move around once in a while; if the computer is constantly plugged into the charger, the electrons in the battery are not active and so the total capacity of your battery can decrease. It is good practice to let the computer run on batteries once it is fully charged.

The MagSafe power adapter contains a magnet and so you should be careful about leaving the adapter around things like credit cards, ID cards, etc., because the magnet could erase their data. The power adapter takes about 4 hours to charge your battery from 0% to 100%. As mentioned above, leaving your computer charging all the time is not recommended as it reduces your total battery life. Furthermore, the power adapter itself is vulnerable to wear and tear. When packing up your chargers, make sure that the wires are somewhat slack and not too tight because eventually too much pressure could render the adapter unusable.

Some ways you can maximize your battery life while at school are:

If you’re going to be away from your computer for more than 5-10 minutes, consider putting the MacBook to sleep. You can do this either by closing the screen or going to the Apple menu () and choosing “Sleep” from the pull-down menu. A sleeping computer uses much less battery than while awake, and when the computer is woken (by either opening the lid or pressing the power button), it skips the tedious boot-up process a shut down computer must complete.

Just as you would turn off the lights in an unused room, turning off unused applications on your computer reduces the toll on the battery. If there is no wireless available, or if you are using an Ethernet connection, you can turn off the AirPort and save some battery life. Similarly, if you do not use Bluetooth devices, turning off the “Discoverable” capability allows your computer to conserve some energy.

Dimming the brightness of the screen, apart from preventing eyestrain, reduces battery consumption.

If there are momentarily unused peripherals attached to your computer – such as an external optical or hard drive device – ejecting them will conserve battery power.

LSA Electronic Community

LSA has implemented a series of electronic services that are a comprehensive communications and information system. This system is available to all students, staff, and families of the LSA community. At the beginning of the year, students should ensure they can access each of the following systems: their LSA MacBook account, email, and RenWeb.

LSA MacBook Account

The username for the MacBook student account is the student’s firstname.lastname (ex – brad.pitt). The default personal network password is South2014, and each student should personalize their password immediately. When setting a password, be sure it is at least 8 characters long, and contains at least one capital letter and one number. Students are NOT to share their account or password with any other student.

Internet Access at School

Access to the Internet is available through the MacBook at any time of the day, via the LSA-Classroom wireless network. The LSA-Classroom network is password protected so that access is limited to school-provided Mac laptops. The password is preset; if a student loses access, then turn the airport off and on again.

Guests have limited Internet access through the open network, LSA-Guest.

Content Filtering and Monitoring

The Lutheran South Academy will monitor the online activities of minors and operate a technology protection measure (“filtering/blocking device”) on the network and/or all computers with Internet access, as required by law. The filtering/blocking device will be used to protect against access to visual depictions that are obscene, harmful to minors and child pornography, as required by law. Because the LSA technology is a shared resource, the filtering/blocking device will apply to all devices with Internet access. Filtering/Blocking devices are not foolproof, and the Lutheran South Academy cannot guarantee that users will never be able to access offensive materials using LSA’s equipment. Evasion or disabling, or attempting to evade or disable, a filtering/blocking device installed by the LSA is prohibited.

The Director of Technology or the Network administrator may disable the LSA's filtering/blocking device to enable an adult user access for bona fide research or for other lawful purposes. In making decisions to disable the filtering/blocking device, the administrator shall consider whether the use will serve a legitimate educational purpose or otherwise benefit LSA.

OpenDNS Umbrella

Lutheran South Academy utilizes OpenDNS Umbrella to provide security, and web filtering to all student devices while at home and on campus. Email

All students receive a email account when they register for the school. This email address is It is important to note:

•Teachers and the school will only use accounts for communications.

•Students are expected to only use their accounts when communicating with school faculty and staff; personal accounts at Yahoo!/Hotmail, etc. are not acceptable for school purposes.

•Students are expected to check their school email accounts regularly in order to receive pertinent class, club, and school information.

•Students can access their email from home using the web access at or


RenWeb is an online personalized learning environment for students and teachers. It is both an academic tool and a way for co-curricular groups such as sports, service groups, and clubs to organize and document their work. For students, RenWeb is used as a class information tool where teachers post assignments, resources, lesson plans, and links to Internet sites. RenWeb has an integrated calendar that can be used by students as well as teachers to post reminders.

Other Network Access

LSA provides network access in a controlled educational environment; students are prohibited from making attempts to bypass our network access with cellular technology or other methods while on campus.

With the use of technology, including the Internet, Intranet, hardware, and software, LEAH Schools is expanding learning access for students, staff, parents and the entire LEAH SCHOOLS community. With this opportunity comes the responsibility for appropriate use.


Electronic Network Use Guidelines 


The operation of technology in the association relies heavily on the proper conduct of the users. Every user has the responsibility to respect and protect the right of every user in our community. LEAH SCHOOLS users are expected to act in a responsible, ethical and legal manner, by the missions and purposes of the networks they use on the Internet and with the laws of Texas and the United States.


School computer systems are for use by authorized individuals only. Any unauthorized access to these systems is prohibited and is subject to criminal and civil penalties. Use of any other network or computing resources must be consistent with the rules appropriate to that network.


All network users are expected to use moral and ethical guidelines in making appropriate decisions regarding network use. Use of the association network is not a right, but a privilege and inappropriate use will result in cancellation of that privilege, disciplinary action, and prosecution. Before participation, a potential network user will receive information about the proper use and sign a user agreement. Administrators will decide what constitutes inappropriate use and their decision is final. Violations will be dealt with by each campus Student Code of Conduct policy or employee handbook code of conduct, or local, state or federal law.


This unacceptable conduct includes, but is not limited to: (SEE ALSO, Student and Technology Handbooks)


  • Using the network for any illegal activity
  • Transmitting material in violation of any federal, state, or local law or Association policy
  • Violating software copyright or other contracts
  • Using Association technology for financial or commercial or personal gain
  • Degrading or disrupting equipment or system performance
  • Defacing Computer property with any sticker(s) 
  • Vandalizing hardware
  • Vandalizing the data of another user
  • Wastefully using finite resources
  • Unauthorized use of Association resources, including (i.e.,. Digital camera, projector, etc.) and printers for reasons other than job-related duties (LEAH SCHOOLS business).
  • Gaining unauthorized access to resources or entities
  • Invading the privacy of individuals
  • Sharing your username and password
  • Using someone else’s username and password
  • Placing of unlawful information on a system
  • Using for political lobbying
  • Intentionally accessing pornographic, inappropriate or unauthorized material either directly or by proxy
  • Intentionally bypassing the network systems and policies or using non-LEAH SCHOOLS proxies
  • Intentionally transmitting viruses or making any changes that may result in the loss of recipients' work or systems
  • Chain letters or any use that would cause congestion of the networks or otherwise interfere with the work of others
  • Installing software onto computers without appropriate approval
  • Personal use of electronic media that violates the Student or Technology Handbooks.


Warranties – LEAH Schools and joint providers of the network make no warranties of any kind, whether expressed or implied, for the services provided. LEAH SCHOOLS will not be responsible for any damages suffered while using the system. These include, but are not limited to, loss of data, delays, non-deliveries, service interruptions caused by the system, or service interruptions caused by errors or omissions of the user. The Association expressly disclaims responsibility for the accuracy or quality of information obtained through Internet connections.


Security - Security is a high priority due to the number of users. Computer security cannot be made perfect, and it is likely that a determined user could access network resources for inappropriate purposes or that an inquisitive user could encounter unacceptable material. Identified security problems should be reported to a system administrator or appropriate supervisor immediately and not shared with other users. Attempts to log on as another user may result in cancellation of user privileges. Any user identified as a security risk will be denied access.


Vandalism - Vandalism is any deliberate attempt to harm or destroy data or property of another user or LEAH SCHOOLS, the Internet/Intranet, or other networks. Vandalism includes the creation of or the uploading of computer viruses to the Internet/Intranet or host site and destruction of hardware. Vandalism will result in cancellation of user privileges.


Harassment – Harassment is targeting another person, group or organization to cause distress, embarrassment, injury, unwanted attention or another substantial discomfort. Personal attacks or other actions to threaten, intimidate or embarrass an individual, group or organization are prohibited. Users of the Association Network are expected to respect the rights of others to have freedom from harassment or intimidation.


Installing Software - Use of computer software is governed by copyright laws and network configurations. Care must be taken to avoid copyright violations and disruptions of the system related to incompatible or corrupted software; therefore, installation of any program or application onto any computer with access to the Association electronic network must be approved by the Technology department.


Monitoring - The information networks are "public places, " and user actions are visible to others on the network. LEAH Schools has the right to monitor network use to ensure that the system continues to function properly for all of its users. Anyone using electronic systems expressly consents to such monitoring. Monthly reports of Internet use may be shared with campus administrators. Prosecution and termination of user privileges will occur without warning.


1:1 Device Program


The Association may provide an electronic device, such as an iPad or Macbook, for grade levels participating in a one to one program to enhance the educational environment of our students. Access is given as a privilege, not a right, and may be limited or denied by each school. Each school’s administration, faculty, and staff reserve the right to review and remove any student’s files and data records used on the school technology system, which violates the Terms and Conditions below.


Terms and Conditions you agree to as a Student


  1. I understand that...


Device use that disrupts the educational environment is not permitted.


Anything I do on a LEAH SCHOOLS device, or on the LEAH SCHOOLS network is not private and can be monitored by LEAH SCHOOLS faculty and staff.


  1. I will...


Abide by all rules and regulations of the system as changed or added from time to time by the administration (including the Technology Handbook)


Address all concerns regarding the use of technology first to the supervising teacher and then to the schools’ administration.


  1. I assume responsibility for...


Any damages to school equipment while I am using equipment, including paying for repairs. For fees, please refer to the Technology Handbook.


Any consequences that arise from my use of technology, including my cell phone, while at school.


My actions while online. This means that I will be polite to others and use appropriate language.


Consequences for violations


Network Safety Policy


It shall be the responsibility of all LEAH SCHOOLS staff to educate, supervise and monitor appropriate usage of the online computer network and access to the Internet by this policy, the Children’s Internet Protection Act, the Neighborhood Children’s Internet Protection Act, and the Protecting Children in the 21st Century Act.


Use of Internet and other telecommunication activities must be in support of education and research that is consistent with the educational goals, objectives, and policies of the Lutheran Education Association of Houston.


All network users are expected to use moral and ethical guidelines in making appropriate decisions regarding Internet use. Use of the Internet is not a right, but a privilege and inappropriate use will result in cancellation of that privilege. Before participation, a student will receive information about the proper use of the Internet and sign a user agreement. School and district administrators will decide what constitutes inappropriate use of the Internet direct electronic communication. Their decision is final.


In the classroom, student access to and use of the Internet will be under teacher direction and monitored as any other classroom activity; however, it is impossible to control all materials on a global network and users may encounter inappropriate information. Even with filtering the association cannot prevent the possibility that some users may access material that is not consistent with the educational mission, goals, and policies of the Association.


Each Association computer with Internet access shall have a filtering device or software that blocks access to visual depictions that are obscene, pornographic, inappropriate for students, or to any material deemed harmful to minors as defined by CIPA and as determined by the Executive Director or designee.


With access to computers and people all over the world, there may be some material or individual communications, which are not suitable for school-age children. LEAH Schools views information gathered from the Internet in the same manner as other reference materials identified by the schools. Specifically, the Association supports resources that will enhance the learning environment with directed guidance from the faculty and staff.


Publishing - Students may have the opportunity to publish electronic work. Any information about LEAH SCHOOLS students or activities, even hosted on outside servers, should follow LEAH SCHOOLS web posting policies. The district respects the rights of parents to restrict their children from publishing on the Internet and will secure parental permission for the current school year. Parents will be required to sign a form if they choose to deny having student work, pictures, and student’s name appear on the Internet/Intranet.


Distance Learning – Students may have the opportunity to participate in distance education activities including virtual field trip connections with entities such as zoos, museums, universities, and government agencies. Classes may also participate in point-to-point connections with other classrooms around the association and the world or multipoint conferences connecting many classrooms. In a distance learning environment, the teacher and students’ voice, physical presence and participation in classroom activities may or may not be recorded.


Security - Security is a high priority due to the number of users. Computer security cannot be made perfect, and it is likely that a determined user could access network resources for inappropriate purposes or that an inquisitive user could encounter unacceptable material. Identified security problems should be reported to a system administrator or appropriate supervisor immediately and not shared with other users. Attempts to log on as another user may result in cancellation of user privileges. Any user identified as a security risk will be denied access to the system.


LEAH SCHOOLS believes that the benefits to educators and students from access to electronic networks and the Internet far exceed any disadvantages. Ultimately, however, parent(s), and guardian(s) of minors are responsible for setting and conveying the standards that their child or ware should follow. To that end, LEAH SCHOOLS supports and respects each family’s right to decide whether or not to permit a child to a participate in Internet access.

Case Policy:

All students must keep their Macbook Air in a protective bag at all times.

Appropriate Storage (Bag)

Keeping your laptop in the carrying case will protect it against most minor bumps and jolts; however, it is important to ensure that when your laptop is in the computer bag, there is no adverse pressure applied to it. Computer hard drives & batteries do not function well after having been bumped around a great deal, and screens will break if enough pressure is applied to them.

You should also try to ensure that there are a minimal number of other objects in your computer bag alongside your laptop. Small, loose objects (such as paper clips or coins) could accidentally get stuck in openings in your laptop, if carried alongside it inside the backpack. Magnetic objects will harm the functionality of your computer and should be kept at a distance.

The bag must be separate from your book bag and have a padded computer pouch. It is highly Recommended to purchase a sleeve or protective case in addition to the bag. The bag, case, and sleeve must all be sized to accommodate a 13” MacBook Air, and will help keep the Macbook looking like new.


Cases we like:

City Brief by Incase: Click Here
Kips Bay by Cocoo Innovations: Click Here

   Snap on Cases: (Optional)

 SeeThru by Spec: Click Here
SeeThru MacBook Air 13" Cases
Hardshell by Incase: Click Here
Product Alternate View #2
*All of the purchase links should take you directly to the correct model, but please double-check to make sure you’re ordering the correct Macbook Air 13".

These are simply suggestions. You are not limited to these options. If you have any questions about a case that you would like to purchase, contact