Presentation is loading. Please wait.

Presentation is loading. Please wait.

This resource sponsored by Intel Education Copyright © 2014 K-12 Blueprint. *Other names and brands may be claimed as the property of others www.k12blueprint.com.

Similar presentations


Presentation on theme: "This resource sponsored by Intel Education Copyright © 2014 K-12 Blueprint. *Other names and brands may be claimed as the property of others www.k12blueprint.com."— Presentation transcript:

1 This resource sponsored by Intel Education Copyright © 2014 K-12 Blueprint. *Other names and brands may be claimed as the property of others www.k12blueprint.com Technology Policy for Administrators

2 Does your technology policy need an update? Copyright © 2014 K-12 Blueprint. *Other names and brands may be claimed as the property of others www.k12blueprint.com

3 Streamline technology policies Copyright © 2014 K-12 Blueprint. *Other names and brands may be claimed as the property of others www.k12blueprint.com Focus on educational and institutional goals. Target desired student and staff behaviors rather than specific types of technology. Refrain from addressing issues covered in other policies. Source: California School Boards Association. (2012). A New Approach to Technology PoliciesA New Approach to Technology Policies

4 Build policies for instructional technology approaches Classroom computers Computer labs 1:1 computing Bring Your Own Device (BYOD) Source: California School Boards Association. (2012). A New Approach to Technology PoliciesA New Approach to Technology Policies Copyright © 2014 K-12 Blueprint. *Other names and brands may be claimed as the property of others www.k12blueprint.com

5 Set technology priorities Copyright © 2014 K-12 Blueprint. *Other names and brands may be claimed as the property of others www.k12blueprint.com Emphasize professional development. Provide equal access for all students. Ensure that infrastructure will meet present needs and can grow as necessary. Communicate with parents Comply with state and federal regulations, such as CIPA. Conduct a technology security audit to identify vulnerabilities.

6 Revisit Acceptable Use Policy Copyright © 2014 K-12 Blueprint. *Other names and brands may be claimed as the property of others www.k12blueprint.com “Highly restrictive Internet and mobile policies in the school environment provide only a false sense of protecting kids.“ Recognize that mobile devices and social media are not only prevalent but have the potential to engage students. Remember that behaviors such as cyberbullying, copyright infringement, and plagiarism, are addressed in other policies and need not be addressed in AUPs. Teach students skills for safe and appropriate technology use inside and outside the school environment. Source: California School Boards Association. (2012). A New Approach to Technology PoliciesA New Approach to Technology Policies

7 References and Resources Copyright © 2014 K-12 Blueprint. *Other names and brands may be claimed as the property of others www.k12blueprint.com Brush Up Your AUP. Technology and Learning.Brush Up Your AUP Moving From ‘Acceptable’ to ‘Responsible’ Use in a Web 2.0 World Education Week.Moving From ‘Acceptable’ to ‘Responsible’ Use in a Web 2.0 World National Education Technology Plan. U. S. Department of Education.National Education Technology Plan A New Approach to Technology Policies. California School Boards Association.A New Approach to Technology Policies Project Red.Project Red Bring Your Own Device: Individual Liable User Policy Considerations. Good Technology.Bring Your Own Device: Individual Liable User Policy Considerations Technology Leadership Network. National School Boards Association.Technology Leadership Network


Download ppt "This resource sponsored by Intel Education Copyright © 2014 K-12 Blueprint. *Other names and brands may be claimed as the property of others www.k12blueprint.com."

Similar presentations


Ads by Google