120 likes | 214 Views
The Technology Policies We Need Now and Why. A Proposal For Improvement Of Kearney R-1 School District’s Acceptable Use Policy. Agenda. Kearney’s Current AUP Current Challenges Suggestions. Kearney’s Current AUP.
E N D
The Technology Policies We Need Now and Why A Proposal For Improvement Of Kearney R-1 School District’s Acceptable Use Policy Q367 WS2002 Stefan Frank's Technology Presentation
Agenda • Kearney’s Current AUP • Current Challenges • Suggestions Q367 WS2002 Stefan Frank's Technology Presentation
Kearney’s Current AUP At this point Kearney is having an acceptable use policy in place and trying to enforce it as good as possible. The policy clearly outlines what is acceptable and what is not.Without going into too much detail I would like to give one example of how detailed the policy is at this point. Q367 WS2002 Stefan Frank's Technology Presentation
Terms of Agreement (Term1): “1. …Such conduct would include, but is not limited to the altering of system software, the placing of unlawful or inappropriate information,computer viruses, obscene, pornographic, abusive, or otherwise objectionable language or images on the computer system…” Q367 WS2002 Stefan Frank's Technology Presentation
The policy is very detailed, ensuring that legal challenges in the near future are limited to a possibility of slim to none.Student’s have to bring a consent form (signed by parent or guardian) back to school before they are able to use the Internet. Kearney also took a proactive approach in regards to security and safety issues by installing Sonic Firewall and Fortress to all the computers used by the student body. Q367 WS2002 Stefan Frank's Technology Presentation
Current Challenges Everything seems fine until… • The use of email becomes a • challenge. • Games become a challenge. • Policing the use of the Internet • becomes a challenge. Q367 WS2002 Stefan Frank's Technology Presentation
Trouble! Speaking to a librarian I found out that it is difficult to monitor students who are using email or playing games on the Internet. May I also add that I think it could be possible for students to sneak into the library and use the Internet without having a consent form on file. This does not have to but it could lead to legal challenges. Q367 WS2002 Stefan Frank's Technology Presentation
Suggestions for Improval • Control Of E-mail Traffic • Password Based Internet Access Q367 WS2002 Stefan Frank's Technology Presentation
Control of E-mail Traffic This suggestion may seem a little bit radical, but it could work. I would recommend to add a list of email servers such as hotmail, iname, yahoo, etc. to the blocking software. I would then allow students to use a limited numbers of computers for email. These computers would have to be monitored by either a person or camera to ensure proper use. Since students would use these computers voluntary, I don’t think a violation of privacy issues would be a challenge at this point. Q367 WS2002 Stefan Frank's Technology Presentation
Password based Internet Access I am not an expert on password administration, but I think it would is possible to set up Internet browsers so that they are only accessible if students have a password. Of course, the possibility exists that students may swap their passwords. But then again, the passwords would enable the administrator to track down which web sites have been accessed by which user. Q367 WS2002 Stefan Frank's Technology Presentation
If it is made clear to the students that they are responsible for their password and that they will be responsible for what they have accessed with it, a swapping of passwords becomes more unlikely. Q367 WS2002 Stefan Frank's Technology Presentation
Conclusion Kearney’s AUP is in pretty good shape. I think the suggestions I gave may help Kearney to increase the efficiency rate of monitoring possible abuse of the policy. Q367 WS2002 Stefan Frank's Technology Presentation