Department of Defense Education Activity

DoDEA VS: Responsibilities


Students who have never taken an online class are probably wondering how online courses compare to traditional classes – especially for younger students. Online courses and traditional classes have similarities such as teachers, classmates, completion requirements, course materials, and assignments. Though the basic academic skills for success are similar for all grade levels, self-direction, time management, and self-motivation are critical for student success in the online environment. For younger students, the help of a caring adult is important for developing these characteristics.

Student Expectations

Once enrolled, all DVS students are expected to

  • Complete the online course.
  • Log into the course daily and interact with the teacher often.
  • Communicate politely with teachers and classmates.
  • Be flexible, patient, and tolerate change.
  • Demonstrate a sincere desire to learn and participate in class activities.

Student Opportunities

Depending upon their grade level and development, students enrolled in online courses will be provided with the opportunity to increase their ability to

  • Maintain self-discipline and avoid procrastination.
  • Be self-directed and self-motivated in their approach to learning.
  • Possess effective study skills and habits.
  • Work independently and have the ability to pace one's own learning.
  • Meet deadlines and fulfill course requirements in a timely manner.
  • Read carefully and follow written and verbal instructions.
  • Utilize basic computer skills such as emailing, downloading documents, utilizing the internet for research and/or data collection and using productivity software (i.e., Microsoft Office and/or Google Apps for Education).
Parent, Sponsor, and Guardian Responsibilities

Caring adults play an important role in each student’s education. Best practices and research indicates that students do best when they receive additional support and guidance from an adult who will make a commitment to routinely provide educational support.

Monitor Student Computer Time and Daily Work

Each student is unique in their learning needs – and their learning needs may not match our own! For example, does your child do best when learning in a quiet space or does the child do best when in a space with a little bit of distraction? If students work in their own room, ensuring that they are spending time in the courseware is important. Sometimes, the best space for school work is the kitchen or dining room table where students have ready access to an adult.

Monitor Student Weekly Progress and Grades

  • Parents can monitor student work in Schoology using their student's login information.
  • Each course contains a weekly assignment schedule with required activities and due dates.
  • Checking on your student’s progress in Schoology is an important step for each parent to ensure students have completed their weekly work. 
  • In addition to using Schoology, parents of students enrolled in grades 4-12 may have access to a parent account with the official DoDEA grade program, GradeSpeed. To obtain a GradeSpeed parent account, please contact the Educational Technologist at your child's local brick and mortar school.
  • Utilizing the information found in Schoology and GradeSpeed, engage in a weekly conversation with your student about their progress and goals.

Communication with your student’s teacher(s) is essential, especially for students in grades K-8. We encourage parents to reach out to their child's teacher(s) with any questions or concerns.

Help with Course Navigation

The DVS will provide an orientation designed to help students navigate Schoology and their individual courses. While teachers offer navigational help, it may not always be possible for the student’s teacher to meet with each student at the moment they are challenged. Until they are fully familiarized with the routines of navigation, they may need some help from you. 

Communicate with Teacher(s) Regularly

The DVS communications philosophy is built upon the idea that healthy relationships provide a necessary component to effective teaching and learning. Teachers are eager to build a relationship with both their students and parents. The DVS encourages parents to reach out whenever they have questions or concerns or celebrations to share.

Questions, Concerns, and Teacher Contact Information

Parents who have questions and/or concerns should first contact their student's teacher(s) and are encouraged to seek immediate resolution of any issues. Prompt action can frequently prevent complications and more serious problems in the future. Teacher contact information and office hours can be found in each course within Schoology. 

Parent-Teacher Conferences

A virtual parent-teacher conference day is scheduled each semester. Additional meetings to discuss concerns, questions, and student progress may be scheduled at any time during the semester. Parents are encouraged to contact their child's teacher as soon as questions arise. Requests for conferences may also be directed to the assistant principal for coordination with the teacher.

Behavior Guidelines Matrix

The DoDEA Virtual School Discipline Policy is intended to define and interpret key points within the scope of DoDEA Regulation 2051.1 but is not intended to supersede it in content or intent. Students are expected to treat our staff, school property and their peers with respect; students should observe the accepted forms of good behavior. These rules of conduct apply during virtual instruction and learning on Schoology or any other Learning Management System (LMS), using any DoDEA resources, Google Apps and other software, hardware (laptops), and any other technology that is associated with DoDEA Virtual School. These are suggested consequences for when students do not uphold the high standards that have been set for our DVS students. 

Category Description 1st Offense 2nd Offense 3rd Offense

Truancy

Online student truancy consideration takes several elements into account:

  • Number of hours necessary for a student to complete coursework
  • Successful completion of assignments in a timely manner
  • Ongoing communication with the online teacher and School staff
  • Students who are deliberately absent from a required meeting with a teacher

A student is considered in violation of the attendance policy if he/she is not passing an online course AND not logging in to that class

Students who are truant often do not finish a specific task completion for a given time period, communicate with teachers and peers, and do not complete a minimum lesson/unit requirements.

Teacher-Parent Conference/ Admin Notification

 Parent Conference w/Teacher, Admin and Student/SST Referral for Success Plan

3rd Offense: The school administration ultimately reserves the right to

  1. Meet with a parent or sponsor Command assistance
  2. Recommend participation in makeup class(es)
  3. Recommend participation in summer school course(s)
  4. Make recommendations and follow up with the SST process

General Infractions

Category 1 - Minor 1st Offense 2nd Offense 3rd Offense

Examples

  • Disruptive behavior
  • Dress code violation
  • Does not obey instructions
  • Failure to comply
  • Using inappropriate language
  • Uncooperative with teacher

Individual Counseling by Teacher / Parent Notification

Teacher-Parent Conference/ Admin Notification

Parent Conference w/Teacher and Admin and Student/

Develop a Student Behavior Success Plan to Address the Noted Infraction(s)

Category II – Intermediate 1st Offense 2nd Offense 3rd Offense

Examples

  • Cheating
  • Plagiarism
  • Providing false information
  • Disrespectful to another student or adult
  • Insubordination

Teacher-Parent Conference/ Admin Notification

Parent Conference w/Teacher, Admin and Student/

Success Plan

The school administration ultimately reserves the right to suspend LMS & email accounts for up to one week

Category III – Serious 1st Offense 2nd Offense 3rd Offense

Examples

  • Threatening behavior
  • Insubordination with disrespect and profanity
  • Bullying/Cyber Bullying
  • Sexually offensive behavior

Parent Conference w/Teacher, Admin and Student/Success Plan

 

Sexually offensive behavior can result in the completion of a Problematic Sexual Behavior in Children and Youth Matrix Referral

The school administration ultimately reserves the right to suspend LMS & email accounts for up to one week

The school administration ultimately reserves the right to suspend LMS & email accounts for up to two weeks

Category IV:  Severe 1st Offense 2nd Offense

Examples

  • Threatening to harm, bully, harass, or abuse others, sexual harassment or harm
  • Bomb threat

The school administration ultimately reserves the right to immediately terminate LMS & email accounts, notify law enforcement, and if applicable, initiate an Expulsion/Discipline Committee Hearing

*in coordination with the student’s  Brick-and-Mortar School Administration

Required Expulsion Recommendation/Discipline Committee Hearing

*in coordination with the student’s  Brick-and-Mortar School Administration

Online/Electronic Communication Infractions

Category I – Minor 1st Offense 2nd Offense 3rd Offense

Examples

  • Misuse of email or instant message web conference tools (Chat box, Google Hangouts, Google Meet, Teams, etc.) 
  • Spamming
  • Contacting inappropriate persons
  • Using e-mail at inappropriate times

Individual counseling by teacher/Parent Notification

Teacher-Parent Conference/ Admin Notification

Parent Conference with Teacher and Admin to include a Student/ Success Plan

Category II:  Intermediate 1st Offense 2nd Offense 3rd Offense

Examples

  • Sending or receiving offensive materials
  • Violating copyright
  • Using computer resources without permission

Teacher-Parent Conference

Admin Notification

Parent Conference with Teacher and Admin to include a Student/Success Plan

The DVS school administration ultimately reserves the right to suspend LMS & email accounts for up to one week

Category III:  Serious 1st Offense 2nd Offense

Examples

  • Intentionally or willfully modifying, deleting or misusing public files
  • Intentionally or willfully attempting to get around safety and security measures (i.e., web filters, virus scan)
  • Using another user’s account or allowing student’s own account to be used by others
  • Intentionally or willfully accessing restricted or private information
  • Cyber Bullying
  • Sexually offensive behavior

The DVS school administration ultimately reserves the right to suspend LMS & email accounts for up to two weeks and, if applicable, to notify to law enforcement agencies.

 

Sexually offensive behavior can result in a Problematic Sexual Behavior in Children and Youth Matrix Referral

The DVS school administration ultimately reserves the right to suspend or to immediately terminate LMS & email accounts and, if applicable, to notify to law enforcement agencies.  An Expulsion or Discipline Committee Hearing may be required *

*in coordination with the Brick-and-Mortar School Administration

Category IV: Severe 1st Offense 2nd Offense

Examples

  • Repeatedly using electronic means to threaten, bully, harass and/or abuse others
  • Intentionally accessing restricted or private information
  • Intentionally damaging hardware, software, or network; changing network or computer configurations

The school administration ultimately reserves the right to immediately terminate LMS & email accounts, and, if applicable, to notify to law enforcement agencies.  An Expulsion or Discipline Committee Hearing may be required *

*in coordination with the Brick-and-Mortar School Administration

Expulsion Recommendation Required/Discipline Committee Meeting*

*in coordination with the Brick-and-Mortar School Administration

Glossary

Infraction Description

Bomb threat

Willful and malicious threat to destroy school property.  Includes such action as the use or threat of bombs and/or explosives.

Bullying

Bullying is a widespread and serious problem across our nation. It's what happens when someone repeatedly hurts or threatens another person on purpose. Bullying comes in many forms-name-calling, leaving people out, spreading rumors or physically hurting someone. And it can happen in person, in writing, online, on cell phones, in school, on the bus, at home, or anywhere. It is not a normal rite of passage; it has serious consequences and it's NOT acceptable. A repeated occurrence over time.

Cheating/Providing false information

 

Cheating and providing false information are done willfully and knowingly by the student to act dishonestly or unfairly in order to gain an advantage.

Examples include:

  • Sharing of information among test takers or the use of covert notes or crib sheets
  • Obtaining the questions or answers to a test ahead of time
  • On essay assignments or term papers cheating often takes the form of plagiarism.
  • Contract cheating has been observed, where students have work completed on their behalf.
  • Using websites and other electronic devices to retrieve answers to questions when not authorized to do so.  

Contacting inappropriate persons

All student user accounts should be used for school related activities.  When students use their school assigned accounts to contact persons outside of school sponsored assignments, they could be in violation of contacting inappropriate persons.

Examples could include:

  • Participating in illegal or prohibited activities, such as those related to gambling, illegal weapons, or terrorist activities.
  • Pursuing private commercial business activities, including those conducted on Internet sites (online buying and selling sites).
  • Using/linking their personal social media accounts to their student.dodea.edu email account unless the site is DoDEA approved

Cyber Bullying

Cyber bullying Involves harassing, embarrassing, or threatening a young person via the Internet, email and mobile device. Technically, cyber-bullying takes place between two or more young people. When adults are involved, it is typically referred to as cyber-harassment or cyber-stalking.

Did not obey instructions/Failure to Comply

Refusal to carry out instructions, open defiance of faculty or staff members or repeated violations of school/class rules or behavior which threatens the immediate safety or welfare of students/staff

Disrespectful to another student

Use of profane, vulgar or obscene words or gestures; or actions that are ethnically or racially inflammatory; or disrespectful conduct.

Disrespect to teacher or another adult

Refusal to carry out instructions, open defiance, or disrespect of faculty or staff members or repeated violations of school/class rules or behavior which threatens the immediate safety or welfare of students/staff.  

Disruptive behavior

Acts which may cause substantial disruption of learning opportunities. 

Examples can vary by grade level but can include but are not limited to:

  • Repeatedly leaving and entering the learning space.
  • Making loud and disruptive noises
  • Continually interrupting a speaker
  • Opening multiple windows
  • Refusing to mute their microphone

Dress code violation

 Students shall dress in an appropriate manner so as not to distract or interfere with the operation of the school.

  • Students must be fully clothed online.
  • Students will not wear any clothing that displays drugs/alcohol, paraphernalia, or is sexual in nature.)

Insubordination with disrespect and profanity

Refusal to carry out instructions, open defiance, or disrespect of faculty or staff members or repeated violations of school/class rules or behavior which threatens the immediate safety or welfare of students/staff.  

Use of profane, vulgar or obscene words or gestures; or actions that are ethnically or racially inflammatory; or disrespectful conduct.

Intentionally accessing restricted private data

Attempt to harm or destroy data of another user, the internet, or any other network. This includes creating or knowingly transmitting a computer virus or worm, or attempting unauthorized access to files, computers, or networks (i.e., "hacking").

Deliberately with malice intent and determined intention to do as one wants, regardless of the consequences gaining or attempting to gain unauthorized access to other computer systems.

Gain, or attempt to gain, unauthorized access to other computer systems. Examples include:

  • Accessing Teacher’s Courseware
  • Accessing Teachers Gradebook
  • Accessing Other students/teachers personal accounts.
  • Accessing ASPEN.

Intentionally/willfully attempting to get around safety and security measures (i.e., web filters, virus scan)

Deliberately with malice intent and determined intention to do as one wants, regardless of the consequences disabling any IT security or auditing system software.

Intentionally/Willfully modifying, deleting or misusing public files

Deliberately with malice intent and determined intention to do as one wants, regardless of the consequences modifying, deleting or misusing public/shared files.

Examples include:

  • Deleting or modifying courseware
  • Deleting or modifying shared documents without the consent of all collaborators

Misuse of email/Instant Message Web Conference Tools (Chat box, Google Hangouts, Google Meet, etc.)

A Chat box is a computer program that is designed to simulate human conversation. Users communicate with these tools using a chat interface or via voice, just like they would converse with another person.

Google Hangouts allows conversations between two or more users. The service can be accessed online through Gmail.

Like Hangouts, Google Meet also offers group video calls, not just video chat, but in an expanded capacity.

Harassment is characterized by or using ongoing pressure or intimidation.

The student Acceptable Use Policy covers email as well as other technologies.

Below are examples of misuse:

  • Using Email, Chat box, and Google Hangout is for other than school related communication.
  • Sending harassing messages or content.
  • Sending spam email messages or content.
  • Sending messages that contain a virus or other malicious content.
  • Sending or reading email at inappropriate times, such as during class instruction.
  • Sending emails and messages to share test answers or promote cheating in any way.
  • Using the account of another person.
  • Sending "chain letters" or "broadcast" messages to individuals or to lists of individuals.
  • Attempting unauthorized access to files, computers, or networks (i.e., "hacking")
  • Pursuing private commercial business activities, including those conducted on Internet sites (online buying and selling sites).
  • Sending, or knowingly receiving material that is illegal or offensive to others, such as hate speech or any material that ridicules others based on race, creed, religion, color, sex disability, national origin, or sexual orientation.
  • Sending, or knowingly receiving material that is obscene, pornographic, or sexually suggestive.
  • Participating in illegal or prohibited activities, such as those related to gambling, illegal weapons, or terrorist activities.

Plagiarism

Plagiarism is copying another person's ideas, words or writing and pretending that they are one's own work. It can involve violating copyright laws.

Sending or receiving offensive materials

Creating, accessing, downloading, viewing, storing, copying, sending, or knowingly receiving material that is illegal or offensive to others, such as hate speech or any material that ridicules others based on race, creed, religion, color, sex disability, national origin, or sexual orientation.

Creating, accessing, downloading, viewing, storing, copying, sending, or knowingly receiving material that is obscene, pornographic, or sexually suggestive.

Sexually offensive behavior (Problematic Sexual Behavior in Children and Youth Matrix and Referral)

Sexual harassment is unwelcome words or behaviors that are sexual or sex-based in nature from students or adults (of the same gender or not) that interfere with your ability to learn, study, work, or participate in school or work activities.

The harassment can be in the form of words said or written, something visual, or some form of unwanted physical touching that is sexual or targets you for your gender. The conduct can make you feel embarrassed, sad, scared, pressured, upset, uncomfortable, humiliated, or angry, and interferes with your ability to focus on what you’re doing or to feel safe at school or work. It can happen on or off school grounds, in person or through other ways, such as by email or social media. It can range from mildly annoying comments or actions to unwanted touching and, in extreme cases, sexual activity forced upon a person without their voluntary or lawful consent, known as sexual assault, sexual violence, or rape.

Spamming

Spamming is the act of sending unsolicited, bulk (and usually commercial) electronic messages. Though this can be done through any number of media, the most common is email.

Spamming deliberately disrupts network use by others. Therefore, students will not send "chain letters" or "broadcast" messages to individuals or to lists of individuals.

Threatening behavior

Communication of a threat intended to terrorize school employee(s) or student(s)

Verbal assault, threatening, or intimidating another individual with violence

Threatening to harm, bully, harass, or abuse others, sexual harassment

Communication of a threat intended to terrorize school employee(s) or student(s)

Verbal assault, threatening, or intimidating another individual with violence

Commission of an act of indecent exposure, sexual contact, or transmission of sexual material

Uncooperative with teacher/Insubordination

Refusal to carry out instructions, open defiance, or disrespect of faculty or staff members or repeated violations of school/class rules or behavior which threatens the immediate safety or welfare of students/staff

Using another user’s account or allowing another user to use yours

 

Computer accounts should only be used by the student to whom the account was issued to. Only DoDEA approved software and applications should be used by students on DoDEA issued equipment.

Examples of misuse:

  • Not logging out of your account when work is completed.
  • Willfully and knowingly logging into someone else's account.
  • Sharing passwords with other individuals.

Using computer resources without permission

Computer accounts should only be used by the student to whom the account was issued. Only DoDEA approved software and applications should be used by students on DoDEA issued equipment.

Examples of misuse:

  • Not logging out of your account when work is completed.
  • Willfully and knowingly logging into someone else's account.
  • Sharing passwords with other individuals.
  • Plugging in external devices that are not approved.
  • Downloading and installing software
  • Participating in illegal or prohibited activities, such as those related to gambling, illegal weapons, or terrorist activities.
  • Pursuing private commercial business activities, including those conducted on Internet sites (online buying and selling sites).

Using electronic means (email/Instant Message Web Conference Tools, Chat box, Google Hangouts, Google Meet, etc.)  to threaten, bully, harass and/or abuse others

A Chat box is a computer program that is designed to simulate human conversation. Users communicate with these tools using a chat interface or via voice, just like they would converse with another person.

Google Hangouts allows conversations between two or more users. The service can be accessed online through Gmail.

Like Hangouts, Google Meet also offers group video calls, not just video chat, but in an expanded capacity.

The student acceptable use policy covers email as well as other technologies.

Below are examples of misuse:

  • Sending harassing messages or content.
  • Sending, or knowingly receiving material that is illegal or offensive to others, such as hate speech or any material that ridicules others based on race, creed, religion, color, sex disability, national origin, or sexual orientation.
  • Sending, or knowingly receiving material that is obscene, pornographic, or sexually suggestive.
  • Using swear words, use vulgarities, or using harsh, abusive, sexual, or disrespectful language and/or images.

Using e-mail at inappropriate times

Using e-mail at inappropriate times could include but is not limited to sending or reading email at inappropriate times, such as during class instruction and sharing test answers that promote cheating in any way.

Using inappropriate language

Use of profane, vulgar or obscene words or gestures; or actions that are ethnically or racially inflammatory; or disrespectful conduct.

Violating copyright

A copyright is a law that gives the owner of a written document, musical composition, book, picture, or other creative work, the right to decide what other people can do with it. Copyright laws make it easier for authors to make money by selling their works. Because of copyright, a work can only be copied if the owner of the copyright gives permission.

When someone copies or edits a work that is protected under copyright without permission, the owner may sue for the value of the violation. Most such cases are handled by civil law.

Willfully Damaging Hardware, Software, or network; changing configurations

Deliberately with the intention of causing harm causing physical damage to school owned hardware, software, or networks or changing the configurations of the same.

Examples are:

  • Creating or knowingly transmitting a computer virus or worm, or attempting unauthorized access to files, computers, or networks (i.e., "hacking")
  • Attempting to disable any IT security or auditing system.
  • Willful and malicious destruction of, or threat to destroy, school property including online software and hardware.