- Meet the Dept. - Information
- Technology Trouble Ticket
- Request Technology Resources
- Interactive Video Conferencing
- District Technology Policies
- Cloud Command
- Site Login
- Mitel Fax Lines
- Mitel Portal
- Technology Newsletters
- BYOD Parent Survey
You are here
Brush Student Email Accounts now on Google
- A more modern, stable, and secure way to collaborate.
- It's green.
- It's familiar.
- It has more features.
Login to your Email at:
Brush School District has created Google accounts for all K-12 students to allow for collaborative sharing using Google Apps for Education. These accounts will be used for school-related communication and projects only. However, email will be restricted to the Brush school domain. A student will not be able to correspond with aol, yahoo, gmail, etc. accounts, but only with staff and students within the district. No student will be assigned an account without parental or guardian approval. The account naming convention will be email@example.com.
In the event that two or more students share a first and last name the student’s middle initial will be inserted (e.g.,
Brush Technology supports the use of Google accounts to enhance the teaching and learning process. All student.brushschools.org email accounts are housed on a Google mail server, thereby giving students access to Google Docs (word processor, spreadsheet, and presentation software). This also allows teachers and students to share information housed in these file areas with others.
Students must follow the Brush School District Internet, Digital Information and Communications Technologies Acceptable Use Policy. Access to and use of student accounts is a privilege and Brush Schools maintains the right to withdraw the access and use of an account when there is reason to believe that violations of the law or district policies have occurred. In such cases, the alleged violation will be thoroughly investigated.
The Brush School District does not guarantee the security of electronic files located on the Google system. Privacy will be maintained to the extent possible; however, system administrators may have to examine activities, files, and electronic mail to gather sufficient information to diagnose and correct problems with system software or hardware, as well as investigate any alleged misuse.