Post on 02-Jun-2018
8/10/2019 Role Playing Activity
1/3
Role Playing Activity
Preface
A 1969 California Supreme Court Case set the standard for teachers right to a private life
outside of the school setting. Marc Morrison, one of the characters in the role play, resigned
his position as a teacher for the Lowell Joint School District after being accused of being part of
a brief homosexual relationship with Fred Schneringer. Mr. Schneringer was also a teacher inthe same school district. A few years after the homosexual encounters were to have occurred,
Mr. Schneringer reported the behavior to the school board and a hearing ensued. This hearing
lead to the revocation of Mr. Morrisons life diplomas due to immoral and unprofessional
conduct and acts involving moral turpitude. Whereas the exact transcript of the court case can
be found on numerous transcription services, this activity is designed to distinguish what would
be a fireable offence when it comes to the inclusion of a teacherspersonal life.
Activity
Several scenarios are presented below dealing with a teachers private life. Participants in this
role playing activity will be required to discuss whether each of the following would be
considered a fireable offense under current state law.
Lesson Plan
The Nexus Requirement calls for a direct connection to be made between the teachers
behavior and their fitness to teach. By examining each one of the following situations
individuals will be required to discuss the nuances of what would disqualify a teacher under a
fitness scenario. There are several caveats that also need to be brought into discussion
including the legal use of alcohol, legalized use of marijuana, protected class status of
homosexual relationships, Christian morality and acceptable use of social media.
Groups using this lesson plan are to come up with examples whereby there is a legitimate cause
for dismissal under each of these scenarios as well as discuss whether there is a reasonable
right to privacy in a teachers personal life.
The goal of this lesson serves to create a meaningful discussion as to the boundary between
private and professional life, the intrusiveness or protective ability of a school board and
determine a standard of ethics among a group of new teachers.
8/10/2019 Role Playing Activity
2/3
Have you ever had too much to drink:
Have you ever been divorced:
Have you ever used illegal drugs:
Are you homosexual:
:
Ever post something on social media that was against your better judgment:
https://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec8/10/2019 Role Playing Activity
3/3
Guidance for Lesson
Illegal vs. Immoral
Teachers, as other employees have to act within the code of conduct established by theirschool board. Criminal and expressly prohibited behavior is more problematic when it comes
to teacher dismissal.
State law vs. Federal law
Whereas precedent has been set under general employment law and contract theory, laws do
differ from state to state. Therefore a reasonable expectation could also be inferred that
acceptable behavior may differ from state to state. Just as the lemon test applies to
pornography, standards of behavior are local in nature.
Performance in Classroom
All behaviors should be judged about the effectiveness of a teacher when it comes to educating
their students. The paramount concern has to relate to this goal when judging the ultimate
termination of an educational professional.