1 / 12

The Technology Policies We Need Now and Why (Kearney’s Technology Policies Revisited)

The Technology Policies We Need Now and Why (Kearney’s Technology Policies Revisited). A Review Of Kearney R-1 School District’s Acceptable Use Policy Improvements over the last 3 years. Agenda. Kearney’s Current AUP Improvements Made Current Challenges Suggestions.

wirt
Download Presentation

The Technology Policies We Need Now and Why (Kearney’s Technology Policies Revisited)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Technology Policies We Need Now and Why(Kearney’s Technology Policies Revisited) A Review Of Kearney R-1 School District’s Acceptable Use Policy Improvements over the last 3 years SISLT 7366 Stefan Frank's Technology Presentation

  2. Agenda • Kearney’s Current AUP • Improvements Made • Current Challenges • Suggestions SISLT 7366 Stefan Frank's Technology Presentation

  3. Kearney’s Current AUP At this point Kearney is still having an acceptable use policy in place and trying to enforce it as good as possible. The policy clearly outlines what is acceptable and what is not.Without going into too much detail I would like to review an example of how detailed the policy is at this point. SISLT 7366 Stefan Frank's Technology Presentation

  4. Terms of Agreement (Term1): “1. …Such conduct would include, but is not limited to the altering of system software, the placing of unlawful or inappropriate information,computer viruses, obscene, pornographic, abusive, or otherwise objectionable language or images on the computer system…” SISLT 7366 Stefan Frank's Technology Presentation

  5. The policy is very detailed, ensuring that legal challenges in the near future are limited to a possibility of slim to none.Student’s have to bring a consent form (signed by parent or guardian) back to school before they are able to use the Internet. Kearney also took a proactive approach in regards to security and safety issues by installing Sonic Firewall and Fortress to all the computers used by the student body. SISLT 7366 Stefan Frank's Technology Presentation

  6. Improvements Made last 3 years • Students have to log in now to access the computer. They cannot just sneak in like they used to. In order to access a password, their contract must be on file. • Students activity can be tracked. The librarian can track down which sites students have visited. SISLT 7366 Stefan Frank's Technology Presentation

  7. Current Challenges Everything seems fine until… • The use of e-mail becomes a • challenge. • Games become a challenge. SISLT 7366 Stefan Frank's Technology Presentation

  8. Trouble! While it is easier now to track what students do, students still check their e-mail, visit chat rooms and play games. Additional steps need to be taken to avoid this kind of dilemma. SISLT 7366 Stefan Frank's Technology Presentation

  9. Suggestions for Improval • Modification of accessibility list. SISLT 7366 Stefan Frank's Technology Presentation

  10. Control of E-mail Traffic This suggestion may still seem a little bit radical, but it could work. I would recommend to add a list of email servers such as hotmail, iname, yahoo, etc. to the blocking software. I would also add games sites such as bonus.com to the list. I would then allow students to use a limited numbers of computers for email. These computers would have to be monitored by either a person or camera to ensure proper use. Since students would use these computers voluntary, I still don’t think a violation of privacy issues would be a challenge at this point. SISLT 7366 Stefan Frank's Technology Presentation

  11. If it is made clear to the students that they are responsible for their password and that they will be responsible for what they have accessed with it, a swapping of passwords becomes more unlikely. SISLT 7366 Stefan Frank's Technology Presentation

  12. Conclusion Kearney’s AUP is in pretty good shape. I think the suggestions I gave may help Kearney to increase the efficiency rate of monitoring possible abuse of the policy. SISLT 7366 Stefan Frank's Technology Presentation

More Related