1 / 12

The Technology Policies We Need Now and Why

The Technology Policies We Need Now and Why. A Proposal For Improvement Of Kearney R-1 School District’s Acceptable Use Policy. Agenda. Kearney’s Current AUP Current Challenges Suggestions. Kearney’s Current AUP.

ely
Download Presentation

The Technology Policies We Need Now and Why

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Technology Policies We Need Now and Why A Proposal For Improvement Of Kearney R-1 School District’s Acceptable Use Policy Q367 WS2002 Stefan Frank's Technology Presentation

  2. Agenda • Kearney’s Current AUP • Current Challenges • Suggestions Q367 WS2002 Stefan Frank's Technology Presentation

  3. Kearney’s Current AUP At this point Kearney is having an acceptable use policy in place and trying to enforce it as good as possible. The policy clearly outlines what is acceptable and what is not.Without going into too much detail I would like to give one example of how detailed the policy is at this point. Q367 WS2002 Stefan Frank's Technology Presentation

  4. Terms of Agreement (Term1): “1. …Such conduct would include, but is not limited to the altering of system software, the placing of unlawful or inappropriate information,computer viruses, obscene, pornographic, abusive, or otherwise objectionable language or images on the computer system…” Q367 WS2002 Stefan Frank's Technology Presentation

  5. The policy is very detailed, ensuring that legal challenges in the near future are limited to a possibility of slim to none.Student’s have to bring a consent form (signed by parent or guardian) back to school before they are able to use the Internet. Kearney also took a proactive approach in regards to security and safety issues by installing Sonic Firewall and Fortress to all the computers used by the student body. Q367 WS2002 Stefan Frank's Technology Presentation

  6. Current Challenges Everything seems fine until… • The use of email becomes a • challenge. • Games become a challenge. • Policing the use of the Internet • becomes a challenge. Q367 WS2002 Stefan Frank's Technology Presentation

  7. Trouble! Speaking to a librarian I found out that it is difficult to monitor students who are using email or playing games on the Internet. May I also add that I think it could be possible for students to sneak into the library and use the Internet without having a consent form on file. This does not have to but it could lead to legal challenges. Q367 WS2002 Stefan Frank's Technology Presentation

  8. Suggestions for Improval • Control Of E-mail Traffic • Password Based Internet Access Q367 WS2002 Stefan Frank's Technology Presentation

  9. Control of E-mail Traffic This suggestion may seem a little bit radical, but it could work. I would recommend to add a list of email servers such as hotmail, iname, yahoo, etc. to the blocking software. I would then allow students to use a limited numbers of computers for email. These computers would have to be monitored by either a person or camera to ensure proper use. Since students would use these computers voluntary, I don’t think a violation of privacy issues would be a challenge at this point. Q367 WS2002 Stefan Frank's Technology Presentation

  10. Password based Internet Access I am not an expert on password administration, but I think it would is possible to set up Internet browsers so that they are only accessible if students have a password. Of course, the possibility exists that students may swap their passwords. But then again, the passwords would enable the administrator to track down which web sites have been accessed by which user. Q367 WS2002 Stefan Frank's Technology Presentation

  11. If it is made clear to the students that they are responsible for their password and that they will be responsible for what they have accessed with it, a swapping of passwords becomes more unlikely. Q367 WS2002 Stefan Frank's Technology Presentation

  12. Conclusion Kearney’s AUP is in pretty good shape. I think the suggestions I gave may help Kearney to increase the efficiency rate of monitoring possible abuse of the policy. Q367 WS2002 Stefan Frank's Technology Presentation

More Related