Technology
Technology plays an integral role in the daily operations of SAU 70 Schools. The Technology Department serves students and staff by providing both technical and instructional support, professional development, and logistical assistance.
An Integrated Approach to Building Digital Literacy and Citizenship
By embedding technology in the curriculum, we offer students authentic, real-world ways to seek knowledge, problem solve, create content, and analyze data. Technology in SAU 70 Schools is purposefully integrated across each curricular area. Each component of technology whether it be hardware or software, devices or apps, is utilized in a developmentally appropriate way to enhance teaching and learning. The emphasis is making students more self-aware and cognizant consumers of information, as well as emphasizing the role of becoming more thoughtful and skillful creators of digital content.
Responsible Use Policy (RUP)
SAU 70 Responsible Use Policy
- I am responsible for my accounts.
- I understand that passwords to my accounts are private and only for school use.
- I understand that I am responsible for all online activities conducted through my accounts whether I am at school or out of school.
- I understand that it is unacceptable to attempt to capture another person’s password.
- I will log off all devices to protect my password and account information.
- I will notify the tech department immediately if I think my password is no longer private.
- I will be respectful and constructive in my language and actions on any digital platform whether I am at school or out of school.
- I will use digital platforms to build positive relationships and never engage in online bullying in or out of school.
- I will contribute positively to our school community.
- I will use technology and digital learning resources to enhance my learning and personal growth.
- I'll seek out appropriate, educational content that aligns with our school's values.
- I will verify that a link is legitimate before I click on it, and I will only download with permission.
- I'll respect security settings and filters and only use approved software on school devices.
- I will always represent myself and others honestly online
- I will only use accounts created in my own name and only devices on which I am signed in.
- I will refrain from representing official school organizations.
- I will treat all school technology with care and keep it in good working order.
- I will use resources responsibly.
- If I notice any issues with equipment, I'll promptly inform a teacher or member of the tech department.
- I will honor copyright laws and licensing agreements.
- I will consult with school staff when I am unsure of content use.
- When using others' work including content generated by AI, I'll provide proper citations and seek permission when necessary.
- I will create and submit my own original content ethically, using technology to support rather than replace my original thinking and creativity.
- I understand that it is unsafe to share or post personally identifying information, images and/or recordings.
- I will protect my privacy and that of others by not sharing personally identifying information, photos, recordings, or videos without proper consent.
- I will refrain from providing personal information when interacting with technology.
Adapted From: APS and BPS Acceptable Use Policy, some rewriting with Perplexity AI
Last updated June 6, 2025
Cybersecurity Notification
January 2025 SAU 70 Cybersecurity Notification
Based on a recent presentation by NHOCC (https://www.nhocc.com) please be aware that we are seeing an increase in cybersecurity concerns globally and we want our organization and community to be informed and safe. I will highlight some of the most common concerns below along with resources to learn more about them.
RANSOMWARE (https://www.cisa.gov/stopransomware/resources)
In the last 30 days, there have been at least seven new variants of ransomware. Ransomware can be used to encrypt data and interfere with business operations. Ransomware and extortion enable a significant funding source. What’s worse is that some of the new variants called wipers are designed to irrevocably destroy data.
PHISHING (https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams)
We have also seen an uptick in phishing emails and texts. Phishing emails and text messages may look like they’re from a person or company you know or trust. They often tell a story to trick you into clicking on a link or opening an attachment, sharing credentials, or sharing confidential information.
PASSWORDS (https://security.harvard.edu/use-strong-passwords#first)
Use a different password for each of your important accounts, like your email and online banking. The current best practice is to use a trusted password manager. Long passwords are stronger, so make your password at least 12 characters long. Try to use: A lyric from a song or poem; A meaningful quote from a movie or speech; A passage from a book; A series of words that are meaningful to you; An abbreviation: Make a password from the first letter of each word in a sentence. [Don’t use personal info; Avoid creating passwords from info that others might know or could easily find out. Examples: Your nickname or initials, The name of your child or pet, Important birthdays or years, The name of your street, Numbers from your address, Don’t use common words & patterns. Examples: Obvious words and phrases like "password" or "letmein"; Sequences like "abcd" or "1234"; Keyboard patterns like "qwerty" or "qazwsx".] Do not share your passwords with anyone.
Help Desk
Please send an email to start your help ticket. Give a brief explanation as to what your concern or issue is.