Responsibilities
Student Expectations
Once enrolled, all DVHS students are expected to
- Complete the online course.
- Log into the course daily and interact with the teacher often.
- Communicate politely with teachers and classmates.
- Be flexible, patient, and tolerate change.
- Demonstrate a sincere desire to learn and participate in class activities.
Student Opportunities
Students enrolled in online courses will be provided with the opportunity to increase their ability to
- Maintain self-discipline and avoid procrastination.
- Be self-directed and self-motivated in their approach to learning.
- Possess effective study skills and habits.
- Work independently and have the ability to pace one's own learning.
- Meet deadlines and fulfill course requirements in a timely manner.
- Read carefully and follow written and verbal instructions.
- Utilize basic computer skills such as emailing, downloading documents, utilizing the internet for research and/or data collection and using productivity software (i.e., Microsoft Office and/or Google Apps for Education).
Parent, Sponsor, and Guardian Responsibilities
Caring adults play an important role in each student’s education. Best practices and research indicates that students do best when they receive additional support and guidance from an adult who will make a commitment to routinely provide educational support.
Monitor Student Computer Time and Daily Work
Each student is unique in their learning needs – and their learning needs may not match our own! For example, does your child do best when learning in a quiet space or does the child do best when in a space with a little bit of distraction? If students work in their own room, ensuring that they are spending time in the courseware is important. Sometimes, the best space for school work is the kitchen or dining room table where students have ready access to an adult.
Monitor Student Weekly Progress and Grades
- Parents can monitor student work in Schoology using their student's login information.
- Each course contains a weekly assignment schedule with required activities and due dates.
- Checking on your student’s progress in Schoology is an important step for each parent to ensure students have completed their weekly work.Â
- In addition to using Schoology, parents of students enrolled in grades 7-12 may have access to a parent account with the official DoDEA grade program, DoDEA Student Information System (DSIS). To obtain a DSIS parent account, please contact the Educational Technologist at your child's local brick and mortar school.
- Utilizing the information found in Schoology and DSIS, engage in a weekly conversation with your student about their progress and goals.
Communication with your student’s teacher(s) is important and we encourage parents to reach out to their child's teacher(s) with any questions or concerns.
Help with Course Navigation
The DVHS will provide an orientation designed to help students navigate Schoology and their individual courses. While teachers offer navigational help, it may not always be possible for the student’s teacher to meet with each student at the moment they are challenged. Students can utilize the orientation to refresh their navigation skills and if needed, submit a tech help ticket.Â
Communicate with Teacher(s) Regularly
The DVHS communications philosophy is built upon the idea that healthy relationships provide a necessary component to effective teaching and learning. Teachers are eager to build a relationship with both their students and parents. The DVHS encourages parents to reach out whenever they have questions or concerns or celebrations to share.
QUESTIONS, CONCERNS, AND TEACHER CONTACT INFORMATION
Parents who have questions and/or concerns should first contact their student's teacher(s) and are encouraged to seek immediate resolution of any issues. Prompt action can frequently prevent complications and more serious problems in the future. Teacher contact information and office hours can be found in each course within Schoology.Â
PARENT-TEACHER CONFERENCES
A virtual parent-teacher conference day is scheduled each semester. Additional meetings to discuss concerns, questions, and student progress may be scheduled at any time during the semester. Parents are encouraged to contact their child's teacher as soon as questions arise. Requests for conferences may also be directed to the assistant principal for coordination with the teacher.
The DoDEA Virtual High School Discipline Policy is intended to define and interpret key points within the scope of DoDEA Regulation 2051.1 but is not intended to supersede it in content or intent. Students are expected to treat our staff, school property and their peers with respect; students should observe the accepted forms of good behavior. These rules of conduct apply during virtual instruction and learning on Schoology or any other Learning Management System (LMS), using any DoDEA resources, Google Apps and other software, hardware (laptops), and any other technology that is associated with DoDEA Virtual High School. These are suggested consequences for when students do not uphold the high standards that have been set for our DVHS students.Â
Category | Description | 1st Offense | 2nd Offense | 3rd Offense |
Truancy |
Online student truancy consideration takes several elements into account:
A student is considered in violation of the attendance policy if he/she is not passing an online course AND not logging in to that class Students who are truant often do not finish a specific task completion for a given time period, communicate with teachers and peers, and do not complete a minimum lesson/unit requirements. |
Teacher-Parent Conference/ Admin Notification | Â Parent Conference w/Teacher, Admin and Student/SST Referral for Success Plan |
3rd Offense: The school administration ultimately reserves the right to
|
Â
Category I - Minor | 1st Offense | 2nd Offense | 3rd Offense |
Examples
|
Individual Counseling by Teacher / Parent Notification | Teacher-Parent Conference/ Admin Notification |
Parent Conference w/Teacher and Admin and Student/ Develop a Student Behavior Success Plan to Address the Noted Infraction(s) |
Category II – Intermediate | 1st Offense | 2nd Offense | 3rd Offense |
Examples
|
Teacher-Parent Conference/ Admin Notification |
Parent Conference w/Teacher, Admin and Student/ Success Plan |
The school administration ultimately reserves the right to suspend LMS & email accounts for up to one week |
Category III – Serious | 1st Offense | 2nd Offense | 3rd Offense |
Examples
|
Parent Conference w/Teacher, Admin and Student/Success Plan  Sexually offensive behavior can result in the completion of a Problematic Sexual Behavior in Children and Youth Matrix Referral |
The school administration ultimately reserves the right to suspend LMS & email accounts for up to one week | The school administration ultimately reserves the right to suspend LMS & email accounts for up to two weeks |
Category IV: Severe | 1st Offense | 2nd Offense | Â |
Examples
|
The school administration ultimately reserves the right to immediately terminate LMS & email accounts, notify law enforcement, and if applicable, initiate an Expulsion/Discipline Committee Hearing *in coordination with the student’s Brick-and-Mortar School Administration |
Required Expulsion Recommendation/Discipline Committee Hearing *in coordination with the student’s Brick-and-Mortar School Administration |
 |
Category I – Minor | 1st Offense | 2nd Offense | 3rd Offense |
Examples
|
Individual counseling by teacher/Parent Notification | Teacher-Parent Conference/ Admin Notification | Parent Conference with Teacher and Admin to include a Student/ Success Plan |
Category II: Intermediate | 1st Offense | 2nd Offense | 3rd Offense |
Examples
|
Teacher-Parent Conference Admin Notification |
Parent Conference with Teacher and Admin to include a Student/Success Plan | The DVHS administration ultimately reserves the right to suspend LMS & email accounts for up to one week |
Category III: Serious | 1st Offense | 2nd Offense | Â |
Examples
|
The DVHS administration ultimately reserves the right to suspend LMS & email accounts for up to two weeks and, if applicable, to notify to law enforcement agencies. Â Sexually offensive behavior can result in a Problematic Sexual Behavior in Children and Youth Matrix Referral |
The DVHS administration ultimately reserves the right to suspend or to immediately terminate LMS & email accounts and, if applicable, to notify to law enforcement agencies. An Expulsion or Discipline Committee Hearing may be required * *in coordination with the Brick-and-Mortar School Administration |
 |
Category IV: Severe | 1st Offense | 2nd Offense | Â |
Examples
|
The school administration ultimately reserves the right to immediately terminate LMS & email accounts, and, if applicable, to notify to law enforcement agencies. An Expulsion or Discipline Committee Hearing may be required * *in coordination with the Brick-and-Mortar School Administration |
Expulsion Recommendation Required/Discipline Committee Meeting* *in coordination with the Brick-and-Mortar School Administration |
 |
Infraction | Description |
---|---|
Bomb threat | Willful and malicious threat to destroy school property. Includes such action as the use or threat of bombs and/or explosives. |
Bullying | Bullying is a widespread and serious problem across our nation. It's what happens when someone repeatedly hurts or threatens another person on purpose. Bullying comes in many forms-name-calling, leaving people out, spreading rumors or physically hurting someone. And it can happen in person, in writing, online, on cell phones, in school, on the bus, at home, or anywhere. It is not a normal rite of passage; it has serious consequences and it's NOT acceptable. A repeated occurrence over time. |
Cheating/Providing false information  |
Cheating and providing false information are done willfully and knowingly by the student to act dishonestly or unfairly in order to gain an advantage. Examples include:
|
Contacting inappropriate persons |
All student user accounts should be used for school related activities. When students use their school assigned accounts to contact persons outside of school sponsored assignments, they could be in violation of contacting inappropriate persons. Examples could include:
|
Cyber Bullying | Cyber bullying Involves harassing, embarrassing, or threatening a young person via the Internet, email and mobile device. Technically, cyber-bullying takes place between two or more young people. When adults are involved, it is typically referred to as cyber-harassment or cyber-stalking. |
Did not obey instructions/Failure to Comply | Refusal to carry out instructions, open defiance of faculty or staff members or repeated violations of school/class rules or behavior which threatens the immediate safety or welfare of students/staff |
Disrespectful to another student | Use of profane, vulgar or obscene words or gestures; or actions that are ethnically or racially inflammatory; or disrespectful conduct. |
Disrespect to teacher or another adult | Refusal to carry out instructions, open defiance, or disrespect of faculty or staff members or repeated violations of school/class rules or behavior which threatens the immediate safety or welfare of students/staff. |
Disruptive behavior |
Acts which may cause substantial disruption of learning opportunities. Examples can vary by grade level but can include but are not limited to:
|
Dress code violation |
 Students shall dress in an appropriate manner so as not to distract or interfere with the operation of the school.
|
Insubordination with disrespect and profanity |
Refusal to carry out instructions, open defiance, or disrespect of faculty or staff members or repeated violations of school/class rules or behavior which threatens the immediate safety or welfare of students/staff. Use of profane, vulgar or obscene words or gestures; or actions that are ethnically or racially inflammatory; or disrespectful conduct. |
Intentionally accessing restricted private data |
Attempt to harm or destroy data of another user, the internet, or any other network. This includes creating or knowingly transmitting a computer virus or worm, or attempting unauthorized access to files, computers, or networks (i.e., "hacking"). Deliberately with malice intent and determined intention to do as one wants, regardless of the consequences gaining or attempting to gain unauthorized access to other computer systems. Gain, or attempt to gain, unauthorized access to other computer systems. Examples include:
|
Intentionally/willfully attempting to get around safety and security measures (i.e., web filters, virus scan) | Deliberately with malice intent and determined intention to do as one wants, regardless of the consequences disabling any IT security or auditing system software. |
Intentionally/Willfully modifying, deleting or misusing public files |
Deliberately with malice intent and determined intention to do as one wants, regardless of the consequences modifying, deleting or misusing public/shared files. Examples include:
|
Misuse of email/Instant Message Web Conference Tools (Chat box, Google Hangouts, Google Meet, etc.) A Chat box is a computer program that is designed to simulate human conversation. Users communicate with these tools using a chat interface or via voice, just like they would converse with another person. Google Hangouts allows conversations between two or more users. The service can be accessed online through Gmail. Like Hangouts, Google Meet also offers group video calls, not just video chat, but in an expanded capacity. Harassment is characterized by or using ongoing pressure or intimidation. |
The student Acceptable Use Policy covers email as well as other technologies. Below are examples of misuse:
|
Plagiarism | Plagiarism is copying another person's ideas, words or writing and pretending that they are one's own work. It can involve violating copyright laws. |
Sending or receiving offensive materials |
Creating, accessing, downloading, viewing, storing, copying, sending, or knowingly receiving material that is illegal or offensive to others, such as hate speech or any material that ridicules others based on race, creed, religion, color, sex disability, national origin, or sexual orientation. Creating, accessing, downloading, viewing, storing, copying, sending, or knowingly receiving material that is obscene, pornographic, or sexually suggestive. |
Sexually offensive behavior (Problematic Sexual Behavior in Children and Youth Matrix and Referral) |
Sexual harassment is unwelcome words or behaviors that are sexual or sex-based in nature from students or adults (of the same gender or not) that interfere with your ability to learn, study, work, or participate in school or work activities. The harassment can be in the form of words said or written, something visual, or some form of unwanted physical touching that is sexual or targets you for your gender. The conduct can make you feel embarrassed, sad, scared, pressured, upset, uncomfortable, humiliated, or angry, and interferes with your ability to focus on what you’re doing or to feel safe at school or work. It can happen on or off school grounds, in person or through other ways, such as by email or social media. It can range from mildly annoying comments or actions to unwanted touching and, in extreme cases, sexual activity forced upon a person without their voluntary or lawful consent, known as sexual assault, sexual violence, or rape. |
Spamming |
Spamming is the act of sending unsolicited, bulk (and usually commercial) electronic messages. Though this can be done through any number of media, the most common is email. Spamming deliberately disrupts network use by others. Therefore, students will not send "chain letters" or "broadcast" messages to individuals or to lists of individuals. |
Threatening behavior |
Communication of a threat intended to terrorize school employee(s) or student(s) Verbal assault, threatening, or intimidating another individual with violence |
Threatening to harm, bully, harass, or abuse others, sexual harassment |
Communication of a threat intended to terrorize school employee(s) or student(s) Verbal assault, threatening, or intimidating another individual with violence Commission of an act of indecent exposure, sexual contact, or transmission of sexual material |
Uncooperative with teacher/Insubordination | Refusal to carry out instructions, open defiance, or disrespect of faculty or staff members or repeated violations of school/class rules or behavior which threatens the immediate safety or welfare of students/staff |
Using another user’s account or allowing another user to use yours  |
Computer accounts should only be used by the student to whom the account was issued to. Only DoDEA approved software and applications should be used by students on DoDEA issued equipment. Examples of misuse:
|
Using computer resources without permission |
Computer accounts should only be used by the student to whom the account was issued. Only DoDEA approved software and applications should be used by students on DoDEA issued equipment. Examples of misuse:
|
Using electronic means (email/Instant Message Web Conference Tools, Chat box, Google Hangouts, Google Meet, etc.) to threaten, bully, harass and/or abuse others A Chat box is a computer program that is designed to simulate human conversation. Users communicate with these tools using a chat interface or via voice, just like they would converse with another person. Google Hangouts allows conversations between two or more users. The service can be accessed online through Gmail. Like Hangouts, Google Meet also offers group video calls, not just video chat, but in an expanded capacity. |
The student acceptable use policy covers email as well as other technologies. Below are examples of misuse:
|
Using e-mail at inappropriate times | Using e-mail at inappropriate times could include but is not limited to sending or reading email at inappropriate times, such as during class instruction and sharing test answers that promote cheating in any way. |
Using inappropriate language | Use of profane, vulgar or obscene words or gestures; or actions that are ethnically or racially inflammatory; or disrespectful conduct. |
Violating copyright |
A copyright is a law that gives the owner of a written document, musical composition, book, picture, or other creative work, the right to decide what other people can do with it. Copyright laws make it easier for authors to make money by selling their works. Because of copyright, a work can only be copied if the owner of the copyright gives permission. When someone copies or edits a work that is protected under copyright without permission, the owner may sue for the value of the violation. Most such cases are handled by civil law. |
Willfully Damaging Hardware, Software, or network; changing configurations |
Deliberately with the intention of causing harm causing physical damage to school owned hardware, software, or networks or changing the configurations of the same. Examples are:
|