Presentation is loading. Please wait.

Presentation is loading. Please wait.

C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 8 Physical Policy © Routledge Richard.

Similar presentations


Presentation on theme: "C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 8 Physical Policy © Routledge Richard."— Presentation transcript:

1 C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 8 Physical Policy © Routledge Richard Phillips and Rayton R. Sianjina

2 P HYSICAL P OLICY All of the technology equipment a school district purchases should be labeled with some sort of physical identification and recorded by the IT department. A spreadsheet or other document should be used to identify each employee, their work location, and what routers and/or servers exist at that work station to provide technology. Any and all technology equipment in the employee‘s office and/or assigned to them to work outside the work environment should also be recorded. © Routledge

3 As a district or building administrator, it‘s important to be able to answer these general questions: 1. Do all your computers have locks? 2. Is your wiring closet secure and temperature controlled? 3. Is there a water-generated fire sprinkler system in your computer labs? 4. Is your wiring closet in your server closet? Why water? 5. Is there a sign out list for equipment? © Routledge P HYSICAL P OLICY

4 6. Is your technology inventory up to date? 7. Can your teachers, administrators, or staff access school data via smartphone? 8. Is there a maintenance audit? 9. Do you have a short-term and long-term technology plan that reflects the TCO? © Routledge P HYSICAL P OLICY

5 Ultimately, it is the building administrator‘s responsibility to schedule, monitor, and report the findings of school technology audits. This includes missing and damaged hardware. © Routledge P HYSICAL P OLICY

6 C ONCLUSION Understanding tangibles as hardware and intangibles as software is important for educational leaders in this age of accountability and valuable in planning the future of the organization’s technology expenditures. © Routledge


Download ppt "C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 8 Physical Policy © Routledge Richard."

Similar presentations


Ads by Google