Friday, March 22, 2019
Essay --
BYOD/11 CONSIDERATIONSRegulatory complaisanceChildrens Internet Compliance Act CIPAMust commence a filter in straddle that blocks students from doorwaying picturesMust have a written Internet Safety indemnity addressing how they allow prevent minors from admission priceing inappropriate matter on the Internet, condom and security in electronic communications, and other protections. Notice must be given during a public meeting.CIRPA tractable policies must include precept for minors well-nigh appropriate online behavior, social networking websites and in chat board as well as cyberbullying.Schools and libraries must certify that they atomic number 18 CIPA compliant to be eligible for e-rate funding.FERPA Federal education Rights and Privacy ActoA federal privacy law that affords pargonnts the right to have access to their childrens education records, seek to have the records amended, and consent to the disclosure of personally identifiable information from education record s, except as provided by law. How get out BYOD or 11 effect student records retention? What sheath of retention policy forget you have to write for classroom activities that are recorded on a BYOD. FERPA mandates that you protect a childs piiHealth indemnification Portability Accountability ActIn general with exceptions for services that are bill out, medical records are considered part of education records amd covered under FERPA, and not HIPAA.Payment Card Industry Data Security Standard (PCI DSS)If your aim accepts credit cards for processing of student fees or lunches, you leave alone enquire to be PCI compliant.PoliciesStudent behavior policies need to be re-written. Do you have a cell resound confiscation policy? Strong policies about misuse and cheating need to be written. Po... ...addition to this, all federal regulations will still have to be maintained, such as filters for network access to prevent access to sites covered under CIPA regulations. Network tools nee d to be in place to identify if a student is using their phone to provide network access to other students. Additional hardware and wireless access points will be needed to supply access to BYOD. Your firewall will need to be evaluated to determine if it can handle the extra traffic. IPads and iPhones will each d birthload updates. Each device will have their own download stream of the same data, usually the same day. This will position peak loads on your Internet traffic. This differs from the Microsoft devices on the inside of your network. Those devices are controlled, and one single stream of data is downloaded, saved on a server, and then distributed on your faster, internal network.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment