Ed Tech Audit Case Study Pete Reilly
Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator Meeting with teacher teams from each building Surveys of the entire staff copyright 2008 Ed Tech Journeys
Process Visits to labs and facilities WAN and LAN technical data Examination of all policies, plans, and documentation Discussions with RIC and BOCES Additional meetings for clarification and verification copyright 2008 Ed Tech Journeys
Areas of Focus Leadership Infrastructure and Access Technical Support Professional Development Software and Content Safety and Security copyright 2008 Ed Tech Journeys
Leadership Vision and Goals Governance Policy Procedures Budget and Financing copyright 2008 Ed Tech Journeys
Leadership Is there a clear-shared vision? Is there Leadership at high levels? What decision making process is in place? Are there appropriate policies in place? Are there procedures and processes in place? Is there adequate financing? copyright 2008 Ed Tech Journeys
Infrastructure & Access Access to technology Cabling Local area network Wide area network Application servers copyright 2008 Ed Tech Journeys
Infrastructure &Access Is there enough access? Is technology deployed in ways that maximize usage? What are the ages of the computers? How are the buildings cabled? Are they certified and documented? copyright 2008 Ed Tech Journeys
Infrastructure & Access How is the network designed? Is there a suitable backbone? Are switches adequate? Servers? What network OS is in place? What workstation OS is in place? copyright 2008 Ed Tech Journeys
Infrastructure & Access How is the WAN configured? What is the bandwidth to the Internet? How are the traffic patterns? What are the key apps running on the infrastructure ( server, etc.) copyright 2008 Ed Tech Journeys
Tech support Network Issues Network administration Network maintenance Installations and projects Equipment repair Desktop support copyright 2008 Ed Tech Journeys
Tech support How are network problems reported and queued? How satisfied are users with tech support? What is the average response/resolve time? Do you have support contracts for routers, switches, servers? copyright 2008 Ed Tech Journeys
Tech Support Do you have complete network documentation including passwords for all systems and applications? Who maintains firewall, content filter, spam filter, server, web server, DNS server, routers, and switches? Is there backup for technical staff in emergencies? copyright 2008 Ed Tech Journeys
Tech Support What are the key technical issues? Are there policies and procedures for adding and deleting users, rolling over users to new grade levels, etc. How quickly are new patches and service packs applied to servers and workstations? How are new installs and special projects handled? copyright 2008 Ed Tech Journeys
Tech Support What support do users get at the desktop level? How are warranty and equipment repairs handled? copyright 2008 Ed Tech Journeys
Prof Development What PD opportunities are available? How effective is the PD? How aware are staff members about what is available to them? How open are teachers to PD? copyright 2008 Ed Tech Journeys
Software & COntent Software acquisition approach and process Software usage Software license and compliance Software updates Administrative software copyright 2008 Ed Tech Journeys
Safety & Security Student Safety Security - Prevention Security - Recovery copyright 2008 Ed Tech Journeys
safety & security Have you focused on Cyberbullying and provided the related PD?Cyberbullying What policies are in place to protect students? Who decides what is blocked and filtered? copyright 2008 Ed Tech Journeys
Safety & Security Has there been an outside, high level security audit performed? Are there written security policies and related PD? Is the firewall up to date? Reviewed periodically? Are patches applied to all systems quickly? copyright 2008 Ed Tech Journeys
Safety & Security Are there proper backups being taken? Are tapes rotated off-site? Is there an agreement with a Hot Site partner to restore tapes in case of emergency? How are desktops secured? Is the wireless secure? copyright 2008 Ed Tech Journeys
Cyberbullying Statistics 90% of MS students have had their feelings hurt online 42% have been bullied online copyright 2008 Ed Tech Journeys
Cyberbullying Statistics 35% have been threatened online 21% have gotten threatening copyright 2008 Ed Tech Journeys
Cyberbullying Statistics 53% have said something mean or hurtful online 58% have not told their parents about bullying incidents copyright 2008 Ed Tech Journeys
Cyberbullying Bully At school Poor relationship with teachers Fear of physical retribution Cyberbully At home Good relationship with teachers Fear of loss of tech privileges Further under the radar than bullying copyright 2008 Ed Tech Journeys
copyright 2008 Ed Tech Journeys