Technology and Management Information Systems
1702 N. Alamo St. | San Antonio, Texas 78215-1213


Custom Installation

San Antonio ISD Statement of Work
Set-up services are restricted to one physical location and must be completed during "normal" business hours (Monday - Friday, 8:00 am to 5:00 pm, local time), unless otherwise specified below.

Scope of Services:

  • Provide a Statement of Work for your review and approval
  • Unpack each system
  • Inspect and install systems per product specifications
  • Attach each system’s display, keyboard, mouse and cords
  • Install any Apple add-ins that have been purchased with the system such as additional memory, an AirPort Card or a network interface card
  • Set up and connect Apple peripherals and accessories to each computer
  • Connect the computers and peripherals to an existing local area network
  • Verify that computers and LAN connections are operational
  • Provide a Service Completion Report for your signature
  • Etch the words "Property of SAISD" on each computer
  • Place district-provided asset tag on each computer
  • Record serial number, model number, and asset tag number in MS Excel format for all computers installed. Excel file provided to district upon completion.
  • Installation of Noble lock on iMac; computer secured to fixed location.
  • Provide Noble Expansion Kit for securing iMac lock down cables to desks.
  • Installation of Noble Expansion Kit.
  • Installation and Purchase of Office 2001 Academic Open License.
  • Installation and Purchase of Norton AntiVirus 8.0.

This service does not include:

  • Moving systems from warehouse or loading dock
  • Installing other third-party software (not Office 2001 and Norton AntiVirus 8.0 or hardware
  • Loading, backing up, or transferring customer data
  • Planning or designing networks
  • Installing or repairing networks
  • Connecting computers and peripherals to a LAN that does not have a close outlet
  • Removing packing materials and product boxes from the site (hauling)
  • Drilling of holes in tables for security locks.

Back to Top

For Questions, Comments, or to Report a Broken Link
Please Contact the Webmaster at