Download presentation
Presentation is loading. Please wait.
Published byOscar Lyons Modified over 9 years ago
1
While You’re Waiting… Go here for the presentation and resources:
2
Session 249: Policy Transformations: Redefining Appropriate, Responsible, and Mandatory Christopher Wells Gwinnett County Public Schools
4
Who IS this guy? GCPS in 2001 AUPs Wikipedia “Tiered Access” ©2011 Gwinnett County Public Schools & Christopher W. Wells. All rights reserved.
5
Contents Back to Basics Reasons for Appropriate Use Redesigning Policies Essential Policy Framework Examples Resources
6
Back to Basics Policies Legal Board Public Foundation Compass Stable Short Procedures ALWAYS with a policy Longer More granular Considerations Exclusions
7
History of Appropriate Use CIPA FERPA News BYOD Bullies Social Media
8
Categories CIPA FERPA Copyright Data Privacy Email Records Policies Procedures Transcripts Student addresses Parent email addresses Facebook Twitter Pinterest Acceptable ResponsibleMandatory
9
Reason BEHIND the Reason Focus on the end goal: Technology is for teaching and learning or the support of teaching and learning ©2011 Gwinnett County Public Schools & Christopher W. Wells. All rights reserved.
10
Inappropriate Access? Too much access? Too little access? Strange expectations? Approval process?
11
Using a Framework After Rodney J. Petersen, EDUCAUSE Review, vol. 39, no. 2 (March/April 2004): 54–55. http://goo.gl/JvMfn Policies LawValuesMoralityEthics Constitution Federal / State Laws Liability Academic freedom Safety Security Privacy Obscenity Pornography Indecency Religious views Netiquette Acceptable behaviors Responsible behaviors Global Control Local Control
12
The REAL Cost +- InfrastructureConfidentiality Internet accessSafety CurriculumVendor Assurance ©2011 Gwinnett County Public Schools & Christopher W. Wells. All rights reserved.
13
Redesigning Policies Right people Reflect strategic direction Reconsider implementation Redefine goals Respond to concerns
14
Ethics and Legality Teachers are NOT the Public ! Community expectations vs Staff expectations vs Student expectations ©2011 Gwinnett County Public Schools & Christopher W. Wells. All rights reserved.
15
Acceptable Use Emphasizes technology Emphasizes network & systems Emphasizes inappropriate use Long list of No-No’s Describes punitive actions Responsible Use Acknowledges technology Emphasizes respect of others’ privacy Notes internet access & uses Shorter list of No-No’s Notes punitive measures
16
Before you get started… Assemble a team Identify instructional needs Get feedback on new uses Rethink the end goal Identify discipline needs
17
Security settings are NOT optional! Plan FIRST! Remember… ©2011 Gwinnett County Public Schools & Christopher W. Wells. All rights reserved.
18
Need More Ideas? ©2011 Gwinnett County Public Schools & Christopher W. Wells. All rights reserved.
19
Resources Common Sense Media: http://goo.gl/YFZcjhttp://goo.gl/YFZcj http://www.nethics.umd.edu/ – http://www.nethics.umd.edu/aup/index.html http://www.nethics.umd.edu/aup/index.html http://gwinnett.k12.ga.us/gcps-imdweb01.nsf http://www.aasa.org/content.aspx?id=11590 https://policy.wiredsafety.org/
20
Contact me for more info: Christopher Wells christopher_wells@gwinnett.k12.ga.us or cwells@schooltechpolicies.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.