Download presentation
Presentation is loading. Please wait.
Published byKevin Stone Modified over 9 years ago
1
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 8 Physical Policy © Routledge Richard Phillips and Rayton R. Sianjina
2
P HYSICAL P OLICY All of the technology equipment a school district purchases should be labeled with some sort of physical identification and recorded by the IT department. A spreadsheet or other document should be used to identify each employee, their work location, and what routers and/or servers exist at that work station to provide technology. Any and all technology equipment in the employee‘s office and/or assigned to them to work outside the work environment should also be recorded. © Routledge
3
As a district or building administrator, it‘s important to be able to answer these general questions: 1. Do all your computers have locks? 2. Is your wiring closet secure and temperature controlled? 3. Is there a water-generated fire sprinkler system in your computer labs? 4. Is your wiring closet in your server closet? Why water? 5. Is there a sign out list for equipment? © Routledge P HYSICAL P OLICY
4
6. Is your technology inventory up to date? 7. Can your teachers, administrators, or staff access school data via smartphone? 8. Is there a maintenance audit? 9. Do you have a short-term and long-term technology plan that reflects the TCO? © Routledge P HYSICAL P OLICY
5
Ultimately, it is the building administrator‘s responsibility to schedule, monitor, and report the findings of school technology audits. This includes missing and damaged hardware. © Routledge P HYSICAL P OLICY
6
C ONCLUSION Understanding tangibles as hardware and intangibles as software is important for educational leaders in this age of accountability and valuable in planning the future of the organization’s technology expenditures. © Routledge
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.