Technology+Report

Security in the Digital Age is an often overlooked but vital component to the overall technology landscape of a school district. The threats of attack from hackers, online predators, and cyber bullies are but a few of the myriad obstacles that exist within the digital realm of the Internet. In many instances the fiscal cost of properly securing a school districts technology or digital resource serves as a deterrent to the implementation of the proper safeguards to protect student, teachers, and other stakeholders in the educational process. Firewalls, antivirus software, and the proper formatting of passwords are some of the key areas that many institutions should spend more time focusing on but they do not. There is real life threat that exists from the compromising of data and students being put into precarious situations while online that must be address at the top of the institutional structure so that a climate of concern and accountability can spread within the ranks of those entrusted with teaching students. In the article //Avoiding Technology PR Nightmares// Elliot Levine states that school districts should adhere to nine basic rules that when implemented will enhance the security of a school districts day-to-day interactions in the realm of all things technology and Internet related. The first and probably most important of the suggested steps is to maintain secure and complex passwords. (2008) More often than not individuals’ use easily guessed simple passwords for computer logins, email accounts, and software like electronic grade books. The essential purpose of a password is to prevent the unauthorized use or access of a particular resource. By utilizing weak passwords to safeguard important data and various pieces of technology like personal computers, end users are literally leaving the door open for a malicious attack or unauthorized use. In instances in which a secure password is created users sometime make the mistake of giving their passwords to friends or co-workers who may have forgotten their login credentials. This circumvention of acceptable security protocol defeats the purpose of creating a personalized password. An end user should never share their personal passwords with anyone.

The securing of school data and equipment is important but the most valuable resource that schools have are the children whose well-being should be a major concern for teachers. To that end teachers must be the shepherds who keep children safe through an ongoing and vigilant effort through awareness, education, and supervision. (Joseph, 2007, p.17) A large part of keeping children safe when dealing with technology and the Internet is the education that they receive in regards to the proper behaviors that should be practiced when making use of these mediums. In order for teachers to teach students appropriate steps to protect themselves online; the teachers must receive instruction and guidance themselves. Content rating sites, national technology standards in the areas of social, ethical, and human issues, and internet safety publications are a few of the resources available to aid in this endeavor. In addition, district in-services and professional development opportunities will also increase educator’s toolset and knowledgebase in training and teaching students in the proper procedure for utilizing technology resources. Another security area of particular concern on campuses is the prevalence and rise in the occurrence of cyberbullying among school age children. In the article //Cyberbullies, Online Predators, and What to Do About Them// Hitchcock states that bullies now have a new hunting ground that allows them to keep constant tabs on the victims of their indiscriminate acts. (2007) The pages of social networking sites like MySpace are no longer just for casual non-threatening interactions between students and their peers, it has become an extension of the school yard playground were teasing and bullying traditionally takes place. The seemingly unrestricted landscape of Internet has breed a sense of immunity to consequence within the perpetrators and the role of a teacher as guardian must be reinforced through making oneself available for students when they report these incidents and to help students as they deal with the trauma that is likely to accompany attacks by bullies. By dealing with cyberbullying in a swift and decisive manner educators can hopefully prevent further confrontations. The need for proper security measures to be in place within school districts has never been more necessary, and through the education of teachers, students, and other stakeholders the task is not so insurmountable. Hitchcock, J.A. (2007). Cyberbullies, online predators, and what to do about them. Multimedia & Internet Schools @ Schools, May/June 2007, 13-15. Joseph, Linda (2007). Keeping safe in cyberspace. Multimedia & Internet Schools @ Schools, Jan/Feb 2007, 17-20. Levine, Elliott (2007). Avoiding Technology PR Nightmares. School Administrator, 65,