C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 8 Physical Policy © Routledge Richard.

Slides:



Advertisements
Similar presentations
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Advertisements

Cleveland School District Gerald Finley, Property Manager Friday, July 27, 2012.
C HAPTER 3 A CCEPTABLE U SE P OLICY C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES © Routledge.
Fixed Assets Policies and Procedures that directly affect Your work, Your budget And your responsibility for protection of WSSU assets as custodian department.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 10 Privacy Policy © Routledge Richard.
System Implementation Dr. Dania Bilal IS 551 Fall 2005.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 12 Electronic Bullying © Routledge.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 6 Access Policy © Routledge Richard.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Cisco – Semester III Documentation. What is it most important component of a good network?  Documentation.
Textbook Tracking Change or Not to Change. Determine if change is needed. Factors to consider: *Is there a system in place? Is it working? Does it need.
Functional areas Retail Business.
Developing a Chemical Risk Management Program
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
 REPORT Cost Center’s Uncapitalized Tangible Property Inventory Report (PCS #3-2918) is completed any time after the fiscal year begins by conducting.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 2 Total Cost of Ownership © Routledge.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
School Technology Solutions, LLC Technology Audits What's in it for you? 4 th Annual SW/WC Technology Conference March 11, 2010 Presenter: Lee Whitcraft.
An interactive exploration of SWCD Financial Management.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 13 Electronic Sexual Harassment.
Property, Plant, and Equipment: Depreciation and Depletion Chapter 13.
Welcome to School! Computer Applications Class Don Miller, Teacher How to Access my Web Page: Go to Click on “Los Altos High”
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE CHAPTER Types of Production Production Planning Planning.
Lowe’s Certification and Accreditation.  Systems Boundaries and Functions  Vulnerabilities, Threats, and Threat Sources  Annual Loss Expectancy  Identification.
C HAPTER 4 A UTHENTICATION POLICY C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES © Routledge.
Records Management Presentation. Overview Directories for administrating health care information Integrated records management Making of new records Straight.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 7 Auditing Policy © Routledge Richard.
ACTIVE DIRECTORY : AN INTRODUCTION The Network Team Knox County Schools.
Chapter 11 Designing Effective Output. E – 1 E – 1 (Cont.)
© Dr. John T. Whiting All Rights Reserved Slide 1 Information Technology – The Key to Public Education Reform Based.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 9 Analysis Policy © Routledge Richard.
A Guide to Group Contracts. Contract Parts  Contact information  Group Goals  Roles and Responsibilities  Rules  Steps for firing a member  Signatures.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 1: Introduction © Routledge Richard.
BOARD POLICY H-26 NON-CAPITALIZED ASSET MANAGEMENT.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
AAAF ALTERNATE ASSESSMENT & ACCOUNTABILITY FOLDER.
System Implementation Dr. Dania Bilal IS 582 Spring 2009.
System Implementation Dr. Dania Bilal IS 592 Spring 2005.
April 28, A shared commitment to provide the most effective education to all students so they live successful lives. In order to accomplish the.
Dept. of Contracts & Property Presented by: Property Office
So You Want To Be A Principal By Dr. Harold Smith.
CHALLENGER COMPUTER LAB Rules and Guidelines. Do not bring into the lab: Food Drinks (including water) Gum.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Chapter 15 Telecommunication Department Management.
Chapter 13 Preparing The Systems Proposal Systems Analysis and Design Kendall and Kendall Fifth Edition.
3 STUDENT ASSESSMENT DEPARTMENT
The Acceptable Use of Technology
IT Risk Management Assessor SPECTRIM Tool Training
UNCAPITALIZED TANGIBLE PROPERTY INVENTORY REPORT AND SPREADSHEET
Title I Equipment Inventory Requirements
Title I Equipment Inventory Requirements
Title I Equipment Inventory Requirements
Technology Inventory Wendy L. Fairbanks EDT530.
Information Technology (IT) Audits
Technology Department Annual Report
Quality Management Process
Buff Business Welcome- Bryan Glenn, Director of Purchasing, Inventory Services, HUB Coordinator, Process Improvement and Contract Administration.
Title I Equipment Inventory Requirements
asset tracking and inventory management
2016 ISSA/INTERCLEAN “Taking Stock, Assessing Your Program”
County HIPAA Review All Rights Reserved 2002.
Title I Equipment Inventory Requirements
Schedule Q – Construction in Progress
Managing Your Federal Grant Award
Topics.
Presentation transcript:

C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 8 Physical Policy © Routledge Richard Phillips and Rayton R. Sianjina

P HYSICAL P OLICY All of the technology equipment a school district purchases should be labeled with some sort of physical identification and recorded by the IT department. A spreadsheet or other document should be used to identify each employee, their work location, and what routers and/or servers exist at that work station to provide technology. Any and all technology equipment in the employee‘s office and/or assigned to them to work outside the work environment should also be recorded. © Routledge

As a district or building administrator, it‘s important to be able to answer these general questions: 1. Do all your computers have locks? 2. Is your wiring closet secure and temperature controlled? 3. Is there a water-generated fire sprinkler system in your computer labs? 4. Is your wiring closet in your server closet? Why water? 5. Is there a sign out list for equipment? © Routledge P HYSICAL P OLICY

6. Is your technology inventory up to date? 7. Can your teachers, administrators, or staff access school data via smartphone? 8. Is there a maintenance audit? 9. Do you have a short-term and long-term technology plan that reflects the TCO? © Routledge P HYSICAL P OLICY

Ultimately, it is the building administrator‘s responsibility to schedule, monitor, and report the findings of school technology audits. This includes missing and damaged hardware. © Routledge P HYSICAL P OLICY

C ONCLUSION Understanding tangibles as hardware and intangibles as software is important for educational leaders in this age of accountability and valuable in planning the future of the organization’s technology expenditures. © Routledge