Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.

Similar presentations


Presentation on theme: "Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator."— Presentation transcript:

1 Ed Tech Audit Case Study Pete Reilly

2 Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator Meeting with teacher teams from each building Surveys of the entire staff copyright 2008 Ed Tech Journeys

3 Process Visits to labs and facilities WAN and LAN technical data Examination of all policies, plans, and documentation Discussions with RIC and BOCES Additional meetings for clarification and verification copyright 2008 Ed Tech Journeys

4 Areas of Focus Leadership Infrastructure and Access Technical Support Professional Development Software and Content Safety and Security copyright 2008 Ed Tech Journeys

5 Leadership Vision and Goals Governance Policy Procedures Budget and Financing copyright 2008 Ed Tech Journeys

6 Leadership Is there a clear-shared vision? Is there Leadership at high levels? What decision making process is in place? Are there appropriate policies in place? Are there procedures and processes in place? Is there adequate financing? copyright 2008 Ed Tech Journeys

7 Infrastructure & Access Access to technology Cabling Local area network Wide area network Application servers copyright 2008 Ed Tech Journeys

8 Infrastructure &Access Is there enough access? Is technology deployed in ways that maximize usage? What are the ages of the computers? How are the buildings cabled? Are they certified and documented? copyright 2008 Ed Tech Journeys

9 Infrastructure & Access How is the network designed? Is there a suitable backbone? Are switches adequate? Servers? What network OS is in place? What workstation OS is in place? copyright 2008 Ed Tech Journeys

10 Infrastructure & Access How is the WAN configured? What is the bandwidth to the Internet? How are the traffic patterns? What are the key apps running on the infrastructure (e-mail server, etc.) copyright 2008 Ed Tech Journeys

11 Tech support Network Issues Network administration Network maintenance Installations and projects Equipment repair Desktop support copyright 2008 Ed Tech Journeys

12 Tech support How are network problems reported and queued? How satisfied are users with tech support? What is the average response/resolve time? Do you have support contracts for routers, switches, servers? copyright 2008 Ed Tech Journeys

13 Tech Support Do you have complete network documentation including passwords for all systems and applications? Who maintains firewall, content filter, spam filter, e-mail server, web server, DNS server, routers, and switches? Is there backup for technical staff in emergencies? copyright 2008 Ed Tech Journeys

14 Tech Support What are the key technical issues? Are there policies and procedures for adding and deleting users, rolling over users to new grade levels, etc. How quickly are new patches and service packs applied to servers and workstations? How are new installs and special projects handled? copyright 2008 Ed Tech Journeys

15 Tech Support What support do users get at the desktop level? How are warranty and equipment repairs handled? copyright 2008 Ed Tech Journeys

16 Prof Development What PD opportunities are available? How effective is the PD? How aware are staff members about what is available to them? How open are teachers to PD? copyright 2008 Ed Tech Journeys

17 Software & COntent Software acquisition approach and process Software usage Software license and compliance Software updates Administrative software copyright 2008 Ed Tech Journeys

18 Safety & Security Student Safety Security - Prevention Security - Recovery copyright 2008 Ed Tech Journeys

19 safety & security Have you focused on Cyberbullying and provided the related PD?Cyberbullying What policies are in place to protect students? Who decides what is blocked and filtered? copyright 2008 Ed Tech Journeys

20 Safety & Security Has there been an outside, high level security audit performed? Are there written security policies and related PD? Is the firewall up to date? Reviewed periodically? Are patches applied to all systems quickly? copyright 2008 Ed Tech Journeys

21 Safety & Security Are there proper backups being taken? Are tapes rotated off-site? Is there an agreement with a Hot Site partner to restore tapes in case of emergency? How are desktops secured? Is the wireless secure? copyright 2008 Ed Tech Journeys

22

23 Cyberbullying Statistics 90% of MS students have had their feelings hurt online 42% have been bullied online copyright 2008 Ed Tech Journeys

24 Cyberbullying Statistics 35% have been threatened online 21% have gotten threatening e-mail copyright 2008 Ed Tech Journeys

25 Cyberbullying Statistics 53% have said something mean or hurtful online 58% have not told their parents about bullying incidents copyright 2008 Ed Tech Journeys

26 Cyberbullying Bully At school Poor relationship with teachers Fear of physical retribution Cyberbully At home Good relationship with teachers Fear of loss of tech privileges Further under the radar than bullying copyright 2008 Ed Tech Journeys

27 http://edtechjourneys.pbwiki.com http://preilly.wohttp://preilly.wordpress.com copyright 2008 Ed Tech Journeys


Download ppt "Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator."

Similar presentations


Ads by Google