Role Playing Activity

download Role Playing Activity

of 3

Transcript of Role Playing Activity

  • 8/10/2019 Role Playing Activity

    1/3

    Role Playing Activity

    Preface

    A 1969 California Supreme Court Case set the standard for teachers right to a private life

    outside of the school setting. Marc Morrison, one of the characters in the role play, resigned

    his position as a teacher for the Lowell Joint School District after being accused of being part of

    a brief homosexual relationship with Fred Schneringer. Mr. Schneringer was also a teacher inthe same school district. A few years after the homosexual encounters were to have occurred,

    Mr. Schneringer reported the behavior to the school board and a hearing ensued. This hearing

    lead to the revocation of Mr. Morrisons life diplomas due to immoral and unprofessional

    conduct and acts involving moral turpitude. Whereas the exact transcript of the court case can

    be found on numerous transcription services, this activity is designed to distinguish what would

    be a fireable offence when it comes to the inclusion of a teacherspersonal life.

    Activity

    Several scenarios are presented below dealing with a teachers private life. Participants in this

    role playing activity will be required to discuss whether each of the following would be

    considered a fireable offense under current state law.

    Lesson Plan

    The Nexus Requirement calls for a direct connection to be made between the teachers

    behavior and their fitness to teach. By examining each one of the following situations

    individuals will be required to discuss the nuances of what would disqualify a teacher under a

    fitness scenario. There are several caveats that also need to be brought into discussion

    including the legal use of alcohol, legalized use of marijuana, protected class status of

    homosexual relationships, Christian morality and acceptable use of social media.

    Groups using this lesson plan are to come up with examples whereby there is a legitimate cause

    for dismissal under each of these scenarios as well as discuss whether there is a reasonable

    right to privacy in a teachers personal life.

    The goal of this lesson serves to create a meaningful discussion as to the boundary between

    private and professional life, the intrusiveness or protective ability of a school board and

    determine a standard of ethics among a group of new teachers.

  • 8/10/2019 Role Playing Activity

    2/3

    Have you ever had too much to drink:

    Have you ever been divorced:

    Have you ever used illegal drugs:

    Are you homosexual:

    :

    Ever post something on social media that was against your better judgment:

    https://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXt.vWJUVJsAVmyJzbkF;_ylu=X3oDMTIydHFjZmM0BHNlYwNzcgRzbGsDaW1nBG9pZANiOWIxMjVlZDEzZjczOGM2OTQwYmRkOTVhN2ViZjQzZARncG9zAzMEaXQDYmluZw--?back=https://images.search.yahoo.com/yhs/search?p=instagram&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=3&w=1024&h=768&imgurl=blogs.protegerse.com/laboratorio/wp-content/instagram.jpg&rurl=http://blogs.protegerse.com/laboratorio/2013/05/06/vulnerabilidad-en-instagram-permite-acceder-a-cualquier-cuenta/&size=86.3KB&name=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&p=instagram&oid=b9b125ed13f738c6940bdd95a7ebf43d&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Vulnerabilidad+en+%3Cb%3EInstagram%3C/b%3E+permite+acceder+a+cualquier+cuenta&b=0&ni=336&no=3&ts=&tab=organic&sigr=13i58945f&sigb=15r341unc&sigi=11pm5jtv5&sigt=125397ak9&sign=125397ak9&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztechttps://images.search.yahoo.com/images/view;_ylt=AwrTcXhovWJUGQMA3YaJzbkF;_ylu=X3oDMTIzbjc2YzJqBHNlYwNzcgRzbGsDaW1nBG9pZANlZThjODJlOTk0MWRiOWQ4YTA2YTdiMjI4NjIwMDA5ZgRncG9zAzIzBGl0A2Jpbmc-?back=https://images.search.yahoo.com/yhs/search?p=twitter&n=60&ei=UTF-8&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec&tab=organic&ri=23&w=1091&h=1110&imgurl=www.prconversations.com/wp-content/uploads/2011/08/twitter_icon4.jpg&rurl=http://www.prconversations.com/index.php/2011/08/using-twitter-for-pr-events/&size=285.6KB&name=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&p=twitter&oid=ee8c82e9941db9d8a06a7b228620009f&fr2=sb-top-images.search.yahoo.com&fr=yhs-aztec-default&tt=Using+%3Cb%3ETwitter%3C/b%3E+for+PR+events&b=0&ni=336&no=23&ts=&tab=organic&sigr=12dip03qd&sigb=15qhr26la&sigi=124o8v7ss&sigt=11242vj83&sign=11242vj83&.crumb=S6qTyHfJJES&type=bar_1_476&fr=yhs-aztec-default&fr2=sb-top-images.search.yahoo.com&hsimp=yhs-default&hspart=aztec
  • 8/10/2019 Role Playing Activity

    3/3

    Guidance for Lesson

    Illegal vs. Immoral

    Teachers, as other employees have to act within the code of conduct established by theirschool board. Criminal and expressly prohibited behavior is more problematic when it comes

    to teacher dismissal.

    State law vs. Federal law

    Whereas precedent has been set under general employment law and contract theory, laws do

    differ from state to state. Therefore a reasonable expectation could also be inferred that

    acceptable behavior may differ from state to state. Just as the lemon test applies to

    pornography, standards of behavior are local in nature.

    Performance in Classroom

    All behaviors should be judged about the effectiveness of a teacher when it comes to educating

    their students. The paramount concern has to relate to this goal when judging the ultimate

    termination of an educational professional.