Home ยป Should I let my child’s school have access to my kid’s personal laptop?

Should I let my child’s school have access to my kid’s personal laptop?


Needing to install things is kind of the point of needing the laptop, so it makes perfect sense that they want to install Office, AV, and certificates. There are no surprises there. To do that, they need admin access, but I would want to revoke that access once they were done.

I would want to know the list of everything they want to install, and if they have central control over the AV (and if they do, why they want that).

If your worry is that they might install malware, then download a Live CD of an anti-malware program and run it on the laptop after they are done.

If the laptop is only used for school work, then there is really no harm here. If your child will be using it for other things, then there might be some privacy conflicts.

The onslaught of comments and the split in votes highlights a difference in understanding of the operating model here. This is not a situation where the school wants sudden control of a personal device. This is a situation where the school is asking the parent to purchase a device for the school to control and this answer is meant to be applied in this model. The school needs to be able to control the device as a part of due care (and remember that the child in this case is a minor; 12 or 13). In terms of protecting the child’s privacy, my advice to make sure that the device is only used for school work holds.

The fact that the parent can retain admin control is a great thing for the protection of the child, something that would not be possible if the school owned the device. The parent can inventory, patch, and uninstall.

This operating model means that the school can ensure consistency of software, which would be required for teaching consistency, it lowers the cost to the school (yes, it increases direct costs to the parents, but does offer cost efficient options) and it offers due care controls for the protection of the child. You just have to shift your mindset that just because you bought the device does not mean that you should have 100% control of the device.

And again, with the new onslaught of comments, I say: consider the idea of a “burner” device. You own it, but it is meant to be, at least in part, out of your control and properly classified for certain activities.

If the operating model was that the school wanted sudden control of a personal device, my answer would be very different (more like AviD’s).

It might just be because I am already “that parent”, but it would be a strong NO from me – and the school administration would get a strong talking to about this. I would push to have that policy changed (though without much hope), for everyone and not just my own child.

There are privacy issues. Security issues. Potentially legal issues – is the software licensed? Cracked? Are they logging all traffic from the laptop, or more? Do they want to install custom software?
And, why are they even asking for all this? What justification could they have.

  • They want to ensure the children are safe online.
    Fine, require some form of parental control. It’s your laptop, it’s your child – it’s your responsibility. (E.g. my son’s school requires content filtering on smartphones brought into school. They “demand” some dodgy app by a local fellow. I declined and installed a proper app.)

  • They want to ensure children’s laptops are secure.
    Great, first lesson “how to stay safe online”. Require Windows Defender (or some other AV/AM) is active and updated, etc. Though this really shouldn’t matter to their network…

  • They want to ensure children are not accessing illegal / inappropriate sites.
    First of all, it only concerns them inside/during school. None of their business at home… And they can easily set up a locked down proxy for the school network.
    And again, at home they should still have the parental control / filtering software anyway.

  • They want to educate your children.
    Oh do they? Because this sounds like the opposite of that. This is an educational opportunity, a veritable goldmine for several topics, and they are going the other way.

You might need to discuss with the teachers, the principal, the school board… You might need to reeducate them about this. And you might even lose, but fighting this is the right thing to do – as @Mike and some of the commenters mentioned, best chance to teach your kids about safeguarding your own privacy and preventing onerous demands from misguided authority. ๐Ÿ™‚

I wouldn’t.

You have no real way to tell exactly what they’ve changed. Some schools are excessively nosy or controlling.

And even if the district is being respectful of your privacy, they could have a rogue admin in their ranks.

Others have been bitten.

There have been lawsuits because of blatant misconduct before. They have alternatives, so administrative access should not be necessary.

How should they do it?

Cloud-based software requires no installation. As long as you have a modern OS and web browser, you’re ready to go. While I dislike cloud apps in a number of scenarios, it’s perfect for bring-your-own-device (BYOD) scenarios. Obviously, they did not choose this if they’re asking for admin rights. You might suggest it to them.

With volume-licensed software, they should able to provide a product key or setup a license server on their network. (The stuff that requires license servers is more common for university-level applications, but I’ve heard of it in technically-oriented college prep schools, too.)

What would I do?

I would install the applications myself. It doesn’t take a lot of time, and typically they don’t change over the course of the year.

Certificates can be installed very easily on Windows, but I’d have to see them first before I could say whether or not that’s a good idea.

Related Solutions

Don’t understand how my mum’s Gmail account was hacked

IMPORTANT: this is based on data I got from your link, but the server might implement some protection. For example, once it has sent its "silver bullet" against a victim, it might answer with a faked "silver bullet" to the same request, so that anyone...

What is /storage/emulated/0/?

/storage/emulated/0/Download is the actual path to the files. /sdcard/Download is a symlink to the actual path of /storage/emulated/0/Download However, the actual files are located in the filesystem in /data/media, which is then mounted to /storage/emulated/0...

How can I pass a command line argument into a shell script?

The shell command and any arguments to that command appear as numbered shell variables: $0 has the string value of the command itself, something like script, ./script, /home/user/bin/script or whatever. Any arguments appear as "$1", "$2", "$3" and so on. The...

What is pointer to string in C?

argv is an array of pointers pointing to zero terminated c-strings. I painted the following pretty picture to help you visualize something about the pointers. And here is a code example that shows you how an operating system would pass arguments to your...

How do mobile carriers know video resolution over HTTPS connections?

This is an active area of research. I happen to have done some work in this area, so I'll share what I can about the basic idea (this work was with industry partners and I can't share the secret details ๐Ÿ™‚ ). The tl;dr is that it's often possible to identify an...

How do I change the name of my Android device?

To change the hostname (device name) you have to use the terminal (as root): For Eclair (2.1): echo MYNAME > /proc/sys/kernel/hostname For Froyo (2.2): (works also on most 2.3) setprop net.hostname MYNAME Then restart your wi-fi. To see the change, type...

How does reverse SSH tunneling work?

I love explaining this kind of thing through visualization. ๐Ÿ™‚ Think of your SSH connections as tubes. Big tubes. Normally, you'll reach through these tubes to run a shell on a remote computer. The shell runs in a virtual terminal (tty). But you know this part...

Difference between database vs user vs schema

In Oracle, users and schemas are essentially the same thing. You can consider that a user is the account you use to connect to a database, and a schema is the set of objects (tables, views, etc.) that belong to that account. See this post on Stack Overflow:...

What’s the output of this code written in java?

//if you're using Eclipse, press ctrl-shift-f to "beautify" your code and make it easier to read int arr[] = new int[3]; //create a new array containing 3 elements for (int i = 0; i < 3; i++) { arr[i] = i;//assign each successive value of i to an entry in...

How safe are password managers like LastPass?

We should distinguish between offline password managers (like Password Safe) and online password managers (like LastPass). Offline password managers carry relatively little risk. It is true that the saved passwords are a single point of failure. But then, your...

Can anyone tell me why this program go to infinite times?

while (i <= 2) { while (i > 0) { a = a + b; i--; <- out the inner while loop when i = 0 } printf("%d", a); i++; <- at here, the i==0 each time, so infinity loop } Because your nested loop always restores the value of i to 0, And 0 <= 2 is always...

How to conditionally do something if a command succeeded or failed

How to conditionally do something if a command succeeded or failed That's exactly what bash's if statement does: if command ; then echo "Command succeeded" else echo "Command failed" fi Adding information from comments: you don't need to use the [ ... ] syntax...

How to turn JSON array into Postgres array?

Postgres 9.4 or newer Obviously inspired by this post, Postgres 9.4 added the missing function(s): Thanks to Laurence Rowe for the patch and Andrew Dunstan for committing! json_array_elements_text(json) jsonb_array_elements_text(jsonb) To unnest the JSON array....

Implementing a 2D destructible landscape (like Worms)

I don't know how the landscape in worms was implemented exactly, but I'm pretty sure they used a bitmap for the landscape (at least in the older games of the series). A very basic approach would be a bitmap image (B/W) where black pixels represent air and white...

Huge procedurally generated ‘wilderness’ worlds

I think I better understand what you are asking now. Noise is not random - it's random-looking but is completely based on a mathematical formula and is repeatable. All the information is encoded in the formula. This means that you can have a formula that...