120 likes | 220 Views
The Technology Policies We Need Now and Why (Kearney’s Technology Policies Revisited). A Review Of Kearney R-1 School District’s Acceptable Use Policy Improvements over the last 3 years. Agenda. Kearney’s Current AUP Improvements Made Current Challenges Suggestions.
E N D
The Technology Policies We Need Now and Why(Kearney’s Technology Policies Revisited) A Review Of Kearney R-1 School District’s Acceptable Use Policy Improvements over the last 3 years SISLT 7366 Stefan Frank's Technology Presentation
Agenda • Kearney’s Current AUP • Improvements Made • Current Challenges • Suggestions SISLT 7366 Stefan Frank's Technology Presentation
Kearney’s Current AUP At this point Kearney is still having an acceptable use policy in place and trying to enforce it as good as possible. The policy clearly outlines what is acceptable and what is not.Without going into too much detail I would like to review an example of how detailed the policy is at this point. SISLT 7366 Stefan Frank's Technology Presentation
Terms of Agreement (Term1): “1. …Such conduct would include, but is not limited to the altering of system software, the placing of unlawful or inappropriate information,computer viruses, obscene, pornographic, abusive, or otherwise objectionable language or images on the computer system…” SISLT 7366 Stefan Frank's Technology Presentation
The policy is very detailed, ensuring that legal challenges in the near future are limited to a possibility of slim to none.Student’s have to bring a consent form (signed by parent or guardian) back to school before they are able to use the Internet. Kearney also took a proactive approach in regards to security and safety issues by installing Sonic Firewall and Fortress to all the computers used by the student body. SISLT 7366 Stefan Frank's Technology Presentation
Improvements Made last 3 years • Students have to log in now to access the computer. They cannot just sneak in like they used to. In order to access a password, their contract must be on file. • Students activity can be tracked. The librarian can track down which sites students have visited. SISLT 7366 Stefan Frank's Technology Presentation
Current Challenges Everything seems fine until… • The use of e-mail becomes a • challenge. • Games become a challenge. SISLT 7366 Stefan Frank's Technology Presentation
Trouble! While it is easier now to track what students do, students still check their e-mail, visit chat rooms and play games. Additional steps need to be taken to avoid this kind of dilemma. SISLT 7366 Stefan Frank's Technology Presentation
Suggestions for Improval • Modification of accessibility list. SISLT 7366 Stefan Frank's Technology Presentation
Control of E-mail Traffic This suggestion may still seem a little bit radical, but it could work. I would recommend to add a list of email servers such as hotmail, iname, yahoo, etc. to the blocking software. I would also add games sites such as bonus.com to the list. I would then allow students to use a limited numbers of computers for email. These computers would have to be monitored by either a person or camera to ensure proper use. Since students would use these computers voluntary, I still don’t think a violation of privacy issues would be a challenge at this point. SISLT 7366 Stefan Frank's Technology Presentation
If it is made clear to the students that they are responsible for their password and that they will be responsible for what they have accessed with it, a swapping of passwords becomes more unlikely. SISLT 7366 Stefan Frank's Technology Presentation
Conclusion Kearney’s AUP is in pretty good shape. I think the suggestions I gave may help Kearney to increase the efficiency rate of monitoring possible abuse of the policy. SISLT 7366 Stefan Frank's Technology Presentation