Download presentation
Presentation is loading. Please wait.
Published byKerry Goodman Modified over 9 years ago
1
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 7 Auditing Policy © Routledge Richard Phillips and Rayton R. Sianjina
2
A UDITING P OLICY Data protection Security policies are as necessary for state and local organizations as they are for large organizations and government agencies (Conrad, 2010). © Routledge
3
Local educational agencies must comply with various regulatory compliance and security requirements that safeguard unauthorized access to sensitive data from outsiders as well as staff members of the organization who do not have a “need to know.” © Routledge A UDITING POLICY
4
Data auditing is somewhat complex but understanding best practices and utilizing a “data auditing framework” allows educational leaders, according to Jones and Ball (2008), “a mechanism for collecting such information through its audit methodology.” There are benefits to this methodology such as data risk management, data asset identification, and planning. Since this is a policy unique to the organizational culture, “the Data Audit Framework is a first step in this process, assisting organizations to collect such information so they can develop policies and processes appropriate to their needs” (p. 113). © Routledge A UDITING POLICY
5
Comprehensive technology plans include many aspects of technology. Schools that effectively use technology have a carefully designed technology plan that is a part of the overall school-improvement plan. A technology plan that is not integral to the overall improvement plan is likely to be short-lived (Cradler, 1996). © Routledge A UDITING POLICY
6
Modern technologists like those that developed the Missouri Department of Education (2011) plans from best practices believe in forming a technology planning committee with members reflecting all the stakeholders. These modern designers plan in steps: 1. Select a well-rounded technology committee. 2. Develop a technology mission statement. 3. Collect and evaluate technology raw data. 4. Develop technology goals and objectives. 5. Develop and implement an action plan and timelines. 6. Disseminate, monitor, and evaluate the technology plan. © Routledge A UDITING POLICY
7
C ONCLUSION Safeguarding the technology developed or purchased by the organization should be included in the district’s auditing policy and procedure. © Routledge
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.