Post on 06-Jan-2016
description
transcript
ACSAAcademy
Technology Seminar 01/24/2009
Technology for the CBO
Why I am here? What I want to see and learn. What will I learn today? Check list Is this going to be techie stuff? The Business of Technology, not the 0’s and 1’s
of technology There are 10 ways to do everything in computers
and a 100 ways to build a network Best practices
Areas of IT Personnel Networks Servers Backups Security Power AUP Internet Asset or
liability? Tech Plan/Erate
Areas of IT Resources Discuss the impact of technology in schools Standards CALPADS
Technology for Business Managers 6 things people love to say about IT….
6 - IT is nothing but a black hole 5 - All IT wants is more money 4 – All IT gets is more money 3 – Do they eat anything but pizza and Coke? ** 2 – @#$%^&* the network is down again! 1 – I can’t understand a word they’re saying.
Personnel
Personnel Yearly Evaluations Calendar notes Improvement Plans Chain of Command Training New Tools Priorities – Keep the techs focused
Admin, Accounting, Payroll Servers, Backups PC’s, Printers, Scanners, PDA
Involve IT in Modernization, New Construction
Personnel Parts – for troubling
shooting Hard drives, memory
Clothing, Shirts, Jackets Can you tell the difference
between your techs and students?
Same equipment as everyone else
Network
Network
LAN – Local Area Network WAN – Wide Area Network Switches – No hubs Wiring – Cat5e or better Fiber – Where needed
Multi-mode for short runs Single-mode for long runs
Router – 5 years or newer
Network Check list Is the LAN an all switched network? Is all wiring Cat5e or better? Do we have fiber where needed? Do we have network documentation?
Get the information out of their heads Network, DNS, Timesync WAN Phones IP Scheme – 10.xxx.xxx.xxx
Servers
Servers
Server is the main storage unit for all data Have a server replacement plan every 4-6 years.
Plan on storage space for 3-5 years Limit storage space or it will be used up in a week
OS Updates Microsoft Critical updates, WSUS Novell Service Packs (SP5, SP6, SP7….)
Servers Is the server in a
physically safe place?
Is the room locked? Is the room air-
conditioned? Who has access to the
room? Who really needs access? Is the room alarmed? If the server was missing
how long would the list of suspects be?
Virtualization
Many to one
Virtualization One server acting and running as many
Virtualization
Why Virtualization? Less hardware Less downtime Less energy used Less cooling Much more efficient use of resources Less overtime for Tech staff during
change out of hardware.
Backup
Backup How often are you backing up?
Once a week Twice a week Once a month Everyday M-F
Are you doing full backups or differential Full backup - every file every time Differential - only modified files since last full backup
How many tapes would it take to recover a server?
Backup Where are your tapes
stored? All tapes should be
stored in a fire proof safe
Are all backup jobs logged everyday?
Every backup job should be checked everyday by a tech and hand logged into a binder that is kept with the tapes
Who is responsible for this?
BackupBACKUP PROCEDURES
These procedures are for the backup and safe recovery of SUHSD data. These procedures are to be followed at all times. Under NO circumstance are these procedures to be overruled except by order of the Director of IT.
All backup tapes will be rotated every night except holidays and weekends. In the event the site technician will be gone, arrangements should be made by that technician to ensure tape rotation.
1. All backup jobs will be logged in the Log Book.2. Any continuing failure of backups should be brought to the attention of the senior
technician or the Director of IT.3. All tapes will be kept in the fireproof safe at all times.4. Previous week’s tapes will be moved to another building or safe on campus each
Monday.5. From each site backup system one tape each month will be placed in the District Office
safe 6. Before any upgrade or other possible data-impacting event, a special backup will be
done to ensure data safety.
Backup Are the backup tapes tested?
Tapes should be tested once a month Note: test files at the end of the tape
Offsite storage Are tapes stored offsite in a secure location
Note: employee’s home is not a secure location
Security
Security Physical security of assets Passwords Firewall Email/Spam Anti Virus Content Filtering
Security
Physical Security Are servers in a locked room? Are video cameras used around lab
areas Memory, mouse, cards, CPU’s
Are PCs asset tagged and inventoried?
Security
Passwords How offend are passwords changed for users? How offend are passwords changed for
servers? Are passwords complex?
food12 Can passwords be repeated over and over? Do switches, copiers, printers, phones
systems, A/C systems have passwords assigned?
Security
Passwords Do you have a list of the passwords?
Routers, SNMP-RO, RW Switches Servers Copiers, printers Phone system, Voicemail Applications BIOS
Security
Firewall Who manages your firewall? Are you restricting outbound traffic?
Can anyone send email from their PC out to the Internet? Do you allow spamming from inside your network?
Do you have a DMZ on your network? How quickly can you adapt? Are you monitoring log files? How old is your firewall?
Many older firewalls can not thaw new threats or adapt to new technology
Security
Email/Spam Are you winning the battle? Do you even care anymore? What products are being used? Do you check every email for a virus before it
gets to your PC? Do you provide email to students?
Note your liability Can students send any amount of email out? Can students send emails to staff
Security
Email/Spam Do you allow IM (Instance Messenger)?
Note: IM is not track able Retention of emails
Security Anti Virus
Do all servers have anti virus installed? Do all computers have anti virus installed? How often is your anti virus updated?
Every day Every week Every month Every hour
Can you identify which computers have current anti virus software from a central command point?
Can you “push” new anti virus software/updates to your computers?
Can your computers get updates from a local server?
Security
Content Filtering How many connections to the Internet does
your district have? Note: If it is more than one, you might be in
trouble Who provides your content filtering? How good is the filtering? How often is the database updated? Can you add sites to be blocked? Can you block individual students? You must have content filtering - CIPA
Security Content Filtering
Do you filter ? IM Chat rooms Hate sites Web email Drug sites, Shopping sites Sports sites - fantasy football… Hacker sites Gambling, Games
Argument – “But I need to get to all these web sites for my class!!!”
Rebuttal – “How does this web site correlate with the class curriculum?”
Note: There is no filter that can identify the difference between a picture of a naked woman or a Monet
Video Monitoring
Camera System Demo Board Policy
Power
Power/Electrical Electricity – the life blood of computers UPS – keeps the blood clean and safe Do you have dedicated circuits for servers? Do you have servers, routers, and phone
systems on UPS? How long can your UPS run?
10 minutes? 1 hour? 5 hours?
What happens when you lose power?
Power/Electrical Do you have a small 3-6 Kw generator to keep the
phones up for emergency communications? Do you have a test schedule for UPS?
Test bi- annual Batteries typically need to be replaced every 2-3 years Most UPS have to much equipment plugged in to them
Are you using an IP phone system? Do you have a UPS at every desk for emergency
power? Are your phones powered from the switch?
Scenario #1 You have been told that a teacher is “seeing a 16 year old
student”. You start to check out the rumor and find that it is very credible. You are told that the two email each other all day long. You have IT read the emails in the teachers’ school email box and watch the emails from the students’ hotmail account. You find the teacher is “way over” the line and you confront the teacher. The teacher says you have violated his/her civil rights and broken federal wire tap laws, and he/she going to sue the district for everything it’s worth.
Q. Was the reading of both emails OK? Q. Does the student have a right to privacy concerning their
emails which is out of school control.
Same scenario, but the teacher uses the telephone to call the student which is VoIP. The district owns the phone. IT captures the VoIP data off the network and plays it back for you the Administrator.
Q. Was the capture of VoIP data OK?
Scenario #2 A teacher has been accused of viewing pornography in the
classroom. The accusations come from a TA who the teacher released earlier in the semester. You ask IT to investigate. IT informs you that over 14 different students have logged on and used the computer in the last 8 months, in addition to the teacher and 2 subs. The pictures are stored in a common area of the local hard drive. Note: One of the 14 students is a board members daughter and another is a District employee’s son.
Q. What do you do?
Scenario #3 A man who claims to be from the Sacramento FBI branch office
calls you up and demands that you give him the address, phone number and email of a girl that in enrolled in one of your schools. He explains that they are investigating a crime and he needs the information ASAP and the girls’ safety depends on it.
Q. What do you do?
AUP
AUP Acceptable Use Policy – AUP Do you have one? Do you make everyone sign it every year?
Students Teachers Staff Note: place the AUP in the Teacher and Student
handbook and send it to staff every year.
AUP The main areas of the AUP
Define what Acceptable Use is Its a privilege, not a right! We will monitor, nothing is secret. Be nice - Network Etiquette Security Prohibited Activities and Content Controversial Materials No Warranties - implied or otherwise Posting of materials on District web sites
AUP
Software Licensing… Make sure its legal Local Area Network use Sanctions… Put some ouch in to it!!
Note: EC 48900(f)(t) Expulsion for harming data Unlawful access to school data is now a felony
Proprietary Information… Its your information - protect it
Internet
CIPA – Federal programs: CIPA compliance is required when using funds for particular purposes from three federal programs: E-rate, Title II D (Ed Tech), and LSTA. When a school or library receives discounts from the E-rate program, its CIPA requirements take precedence over the requirements in the II D or LSTA sections of CIPA.
Myspace CGI Proxies www.getpast.us
Tech Plan/Erate
Tech Plan/Erate Technology plans are required by
EC51871.5, AB598 in order for schools to receive any technology grant money EETT Perkins Microsoft settlement money Note: to receive basic Telco Erate $$ only,
you don’t need a tech plan Only do a EETT tech plan, with an Erate addendum
Tech Plan/Erate Main areas of the EETT Tech plan
Mission Statement Stakeholders Curriculum Development Professional Development Infrastructure, Hardware, Technical Support,
Software Budget and Funding Monitoring and Evaluations Lots of Appendices A-J
Small District 40-70 pages, Big district 110-150 pages
Free and Reduced Lunch
Tech Plan/Erate
Where to start? Start with a small Technology committee Let department chairs gather info for input to
Tech committee Include different people, one from each site Remember the EETT plan is more about
Curriculum and Professional Development than it is about hardware and tech stuff.
Tech Plan/Erate Where to start?
Use existing documents to help build and supplement the Tech plan
DHS plan District strategic plan Site tech plans Under performing school plan School improvement plan SB-1882 Staff development plans Technology Standards Local improvement plan
NEW !! http://www.ctap2.org/Tech_Plans.html
EETT vs. E-rate
An approved EETT plan is considered an approved E-rate plan.
An approved E-rate plan is not necessarily an approved EETT plan.
Tech Plan/Erate
Free and Reduced Lunch This is one of the most important forms
in your district - Handout
Tech Plan/Erate
Your Fair Share Form Discount Matrix
Get highest discount possibleYour Child’s Fair Share
Your Child’s Fair Share – Document provided in binder
1Q. What is Your Child’s Fair Share? 1A. Your child is entitled to federal tax dollars
collected by the federal government. In order for your child’s school to collect these funds this form must be fill out. This is “your child’s fair share” of tax dollars.
2Q. Who will see this form? 2A. This form will ONLY be seen by the
school’s registrar. This information WILL NOT be sent to any other agency.
Your Child’s Fair Share - cont 3Q. What kind of funding will this effect?
3A. This form effects: E-Rate technology funding Millions of available dollars in grants State entitlement fund State Title I funding Free and reduced lunch Microsoft Settlement money
4Q. How is my school’s fair share determined? 4A. The Federal Government determines this based
on national family income amounts. The more households that meet the federal standard the more money our schools get. Well over 55% of all Shasta County households meet this survey standard.
Discount Matrix
If the % of students in your school qualifies for the National School Lunch Program is:
…and you are in an URBAN area, your discount will be…
…and you are in a RURAL area, your discount will be…
Less than 1% 20% 25%
1% to 19% 40% 50%
20% to 34% 50% 60%
35% to 49% 60% 70%
50% to 74% 80% 80%
75% to 100% 90% 90%
Tech Plan/Erate
Resources www.ed-data.k12.ca.us www.cde.ca.gov/ls/et/rs www.portical.org www.CSIS.k12.ca.us www.ctap.k12.ca.us www.iste.org www.ctap2.org/grants.html#9 http://www.suhsd.net/download/IT/
ErateandEETTPlanExpireR2_post.xls
Standards
Standards Switches Computer – most important! - Imaging Servers Printers Projectors Smart Boards Wireless AP (access point)
Statewide Education
Data SystemsCALPADSCALTIDES
CALPADS Statutory Goals
Provide school districts and CDE access to data necessary to comply with federal NCLB reporting requirements
Provide a better means of evaluating educational progress and investments over time
Provide LEAs information that can be used to improve pupil achievement
Provide an efficient, flexible, and secure means of maintaining longitudinal statewide pupil level data
California Longitudinal Teacher Integrated Data Education System (CALTIDES)
Authorizing Legislation Senate Bill 1614 required:
Creation of a longitudinal teacher data system
Assignment and maintenance of Statewide Identifiers for all credentialed staff
CALPADS will include:
Pupil achievement data from all statewide assessments
Data necessary for reports required by NCLB, including: Student demographic data, Program participation data, Highly qualified teacher data, and Discipline data
Proposed Collection Windows
text
September September
October November December January February March April May June July August
10/111/15 12/15
10/1 12/15 1/15
10/1 1/15
3/1 3/31
6/1 9/1
9/1
9/1
Annual Enrollment
Update / Grads and
Drops
Course Enrollments
Teacher Assignments
EL Counts & Immigrant
Status
Course Completion
Student Program
Participation
Discipline and Truancy
4/30
12/15
6/1
6/1
CALPADS Data Collection Windows
AYP/API
9/18/1
Legend
Certify
Amend
CALPADS Data Collection Periods, Windows, and Required File Formats
R=Required file submission for the specified collection window O=Optional file submission for the specified collection
SHASTA UNION HIGH SCHOOL DISTRICTMandatory Events List 2009-10
JULY 2009 Enter/update all pertinent student data – Site Run Query – Missing PreId Data End of Course Exam Results posted in Datawise – Site 15 New year roll over - DO
AUGUST 2009 Anomaly Resolution - Ongoing 10 Finalize Master Schedule - Site 17-18 Count of Locator cards not picked up – Site 18 Drop all No Shows by end of day – Site 21 Run Attendance Audit Report - Site 21 Finish entering any missing student data - Site Run Query – Missing PreId Data 24 Request SSIDs for new students - DO 28 October CAHSEE PreID file due – DO 28 Run Enrollment Audit Listing and Students Actively Enrolled in
Two Schools reports; send to schools to resolve problems
SUHSD TRAINING
Aeries setup for CALPADS Anomaly Resolution Training
Training March 20th or 27th 2009
You, CALPADS and Aeries
IT in Schools What is the impact of technology in schools? Has the impact been greater in Admin or the
classroom? How long could you last without a network?
Internet Email IFAS, ESCAPE
Impact of Technology
The Zoo Theory
Other areas of IT
Disaster recovery planning Contracts Disposal Donations Help Desk Network Hygiene Licensing
Helpful Resources
mvincelli@suhsd.net (530)-225-8441
http://www.suhsd.net/download/