Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.

Slides:



Advertisements
Similar presentations
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Advertisements

Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
Woodland Hills School District Computer Network Acceptable Use Policy.
Internet Safety in Henry County Schools By the division’s Internet Safety Task Force.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
East Ayrshire Libraries Acceptable Use Policy and Filtering.
Security Controls – What Works
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Acceptable Use Policy Quiz Boston Public Schools Technology Awareness Initiative.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
Yusuf İ slam Ş EFLEK 11 TM/A 85.  An acceptable use policy is a set of rules applied by the owner/manager of a network, website or large computer system.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Katherine Kingston EDLD May 15, 2011 This presentation will see just how well Galena Park ISD’s technology plan compares with the National.
Learning management systems Web based LMS WebCT courses.yahoo.com Syllabase Others? What do they offer?
Technology Leadership
Promising Practices in Policy Making Michael Morris Chair, Educational Leadership Team (ELT)
Technology Integration Planning Guidelines for Development A Visual Guide.
Presented by- Kelley F. Davis Lamar University Educational Technology.
An Evaluation done by: Lisa R. Hansen Needs Assessment Analysis Star Chart Analysis Results Campuses are at a Developing Technology Level In the areas.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
CSC 386 – Computer Security Scott Heggen. Agenda Security Management.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Clark County School District (CCSD)
1:1 Computing Initiative RttT Fidelity Check Spring 2013.
GOOGLE APPS IN SCHOOLS. Overview Google apps addresses all of a school’s communication and collaboration needs. – , calendaring, document creation.
Chapter 8 Selecting and Maintaining Digital Resources.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
Technology Overview Kim Davis Coordinator of Technology Support Services.
25/09/2003 ISA Products Quality Products Specialist Products Management Products Project Mandate Project Brief Project Organisation Method of Approach.
Important to Remember! Name of tool used to collect data. Date the tool was administered.
ICT Information and Communication Technology. Two parts : Core (Compulsory) part Elective part.
Building Capacity for Technology in Upward Bound Projects Upward Bound Forum on Technology Chicago, IL - July 24, 2002 Angela D. Benson Assistant Professor.
08/02/20051 Administrative Staff Planning Retreat Barton Creek August 2, 2005.
Information Security Training for People who Supervise Computer Users.
Implementing an Institutional Repository: Part III 16 th North Carolina Serials Conference March 29, 2007 Resource Issues.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Can We Keep Our Kids Safe on the Internet? By Kim Hollingsworth - ETEC 562.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
20 Ways to…Empower Diverse Learners With Educational Technology and Digital Media By Karla V. Kingsley.
Technology Gap. Objectives Develop a deeper understanding of technology gaps in relation to IDT Discuss the strengths and weaknesses of e-resources as.
Proposal for a Bring Your Own Device Initiative Technology Academies of Greater Harrisburg Image courtesy of John.Karakatsanis on Flickr.
Teaching and Learning with Technology Chapter 12 Issues in Implementing Technology in Schools ETEC 562 Spring 2004 Sherri Fetter
System Check for TestNav Overview. Copyright © 2012 Pearson Education, Inc. or its affiliates. All rights reserved.2 Agenda System Check for TestNav URL.
WRIGHT STATE UNIVERSITY College of Education and Human Services Integrating Technology Into Foundations and Methods Courses.
Using Computers: Legal and Ethical Issues Objectives and Guidelines We Must Follow.
+ 1:1 Technology Information Night Bear Creek Elementary March 27, 2014.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
Family Connection Collaborative Webs A Tool for Creating and Managing Web sites.
Smart Labs Introducing BitVergis. Enhancing Your Computer Labs We have features for every step of the way 1 Problems in Computer Labs 2 Maintenance and.
Woodland Hills School District Computer Network Acceptable Use Policy.
The Savvy Cyber Teacher™ Using the Internet Effectively in the K-12 Classroom Copyright  2001 Stevens Institute of Technology, CIESE, All Rights Reserved.
2006 OSEP Project Directors’ Conference July 31, 2006 Pip Campbell Tracy Gray Chuck Hitchcock Preston Lewis.
Cloud Computing By Reedy McGeady. What is Cloud Computing? Cloud Computing is using another organisations computer, which are known as hosts.
Policies and Procedures for a Web 2.0 Friendly Environment Tim Mangan II FSD145 Best Practice Coach for Technology
Alexander County Schools Review of Board of Education Policies Technology Responsible Use 3225/4312/7320 Internet Safety 3226/4205 Technology In The Educational.
ASH INFO 103 E NTIRE C OURSE W ITH F INAL Check this A+ tutorial guideline at For more classes.
Acceptable Use Policy.
Local Area and Wide Area Networks
CAPE Internal Assessment
Local Area and Wide Area Networks
IS4680 Security Auditing for Compliance
Implementing an Institutional Repository: Part III
Online Learning.
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
Woodland Hills School District
Website Training Departments
Presentation transcript:

Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the implications of all this?

The Needs Assessment What do we want to do with our site? Will we use the site to improve the instructional program? Our business practices? Both? Who will have access? Administrators? Teachers? Students? Parents? What resources are available to us? People? Money?

Once We Have our Site…. How do we maintain and evaluate the content of the web site? What are “content guidelines?”

Legal Issues and Policies Acceptable Use Policies Sunshine Laws Accessibility Guidelines Student Rights and Privacy Copyright Compliance Filtering Content

To Host or Not to Host? How do we determine if we should host the web site “in-house?” How do we handle training of staff? Technical support? Computer users?

Procuring Resources Once we know the things we need, how do we get them? Using the bid process Basic design parameters Contract parameters Vendor/contractor qualifications Legal Issues

When We Have “It,” How Do We Create a Secure Environment? What steps can we take to secure computer hardware and software? How can we secure our physical network? How can we maintain data integrity?

Strategic Solutions What are the implications of all this? What are our next steps?