Tuesday, September 3, 2019

Essay --

BYOD/1:1 CONSIDERATIONS Regulatory Compliance †¢ Children’s Internet Compliance Act CIPA Must have a filter in place that blocks students from accessing pictures Must have a written Internet Safety Policy addressing how they will prevent minors from accessing inappropriate matter on the Internet, safety and security in electronic communications, and other protections. Notice must be given during a public meeting. CIRPA compliant policies must include education for minors about appropriate online behavior, social networking websites and in chat rooms as well as cyberbullying. Schools and libraries must certify that they are CIPA compliant to be eligible for e-rate funding. †¢ FERPA Federal education Rights and Privacy Act o A federal privacy law that affords parents the right to ï‚ § have access to their children’s education records, ï‚ § seek to have the records amended, and ï‚ § consent to the disclosure of personally identifiable information from education records, except as provided by law. How will BYOD or 1:1 effect student records retention? What type of retention policy will you have to write for classroom activities that are recorded on a BYOD. FERPA mandates that you protect a childs pii Health Insurance Portability Accountability Act In general with exceptions for services that are billed out, medical records are considered part of education records amd covered under FERPA, and not HIPAA. †¢ Payment Card Industry Data Security Standard (PCI DSS) If your school accepts credit cards for processing of student fees or lunches, you will need to be PCI compliant. Policies Student behavior policies need to be re-written. Do you have a cell phone confiscation policy? Strong policies about misuse and cheating need to be written. Po... ...addition to this, all federal regulations will still have to be maintained, such as filters for network access to prevent access to sites covered under CIPA regulations. Network tools need to be in place to identify if a student is using their phone to provide network access to other students. Additional hardware and wireless access points will be needed to supply access to BYOD. Your firewall will need to be evaluated to determine if it can handle the extra traffic. IPads and iPhones will each download updates. Each device will have their own download stream of the same data, usually the same day. This will put peak loads on your Internet traffic. This differs from the Microsoft devices on the inside of your network. Those devices are controlled, and one single stream of data is downloaded, saved on a server, and then distributed on your faster, internal network.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.