« Warning to all parents! | Main | If you could only have 6... »
Wednesday
Jul282010

The 2-page security guideline for teachers

 

We've begun to prepare for new teacher orientation that will start in less than a month. (Anybody else get a little rattled seeing the Back to School ads in last Sunday's paper?). Anyway, I'm in the process of reviewing some materials we share with new teachers and thought others might benefit from the document below. Yes, it is more than 500 words long, but hopefully it is short enough that teachers will actually read it.

You are welcome to modify and use this in your district if you wish. (Source attribution is always nice.)

As you read, think  

What doesn't need to be in here?

What should be added/strengthened?

Should we be encouraging teachers to make back-ups of documents stored in the cloud (on GoogleDocs, for example)?

Teacher Guide to Computer Network Security

Mankato Area Public Schools
Fall 2010

Recommended security manuals for school districts are about 200 pages long. Here are the most critical things, as a teacher in the Mankato Area Public Schools, you need to know and practice – in two pages. Please read them carefully.

 

An increasing amount of critical, confidential data is transmitted and stored electronically in our district. Despite its intangible nature, digital records, communications, and intellectual property, whether owned by the school or you as a professional, is as valuable and important as physical property. Safeguards to protect it are essential and using them is a professional obligation.

High security and high convenience are incompatible. Our district attempts to achieve a sensible balance, placing a high degree of faith in the professionalism of our staff, rather than technological fixes to insure data security. So far, this has worked well.

Passwords
As a teacher in ISD77, you have the responsibility of a variety of passwords including those for Infinite Campus, your e-mail/MAPS Apps accounts, your Lodestar online file storage account, your computer’s screensaver, and your voice mail. All passwords should:


  • Be unique for each application.

  • Be changed on a regular, frequent basis.

  • Be composed of both letters and numbers for highest security.

  • Be composed of a string of characters not found in a dictionary.

  • Be kept in a secure place if written down.

  • Never be given to anyone else, especially students

  • Never be given to a tech support person who is unknown to you.

  • Be written on only yellow sticky notes when attached to the computer monitor. (No, don’t do that - just wanted to see if you were really reading this.)

 

Treat passwords with the same care you would a paper gradebook, the key to your classroom, or the code to your ATM card.

Back-ups
It is your responsibility to maintain at least one back-up copy of your your self-created school documents (word processing files, presentations, etc.) The district provides online file space on the Lodestar server for you to do this. You may also choose to use writeable CD-ROM or DVD disks to create copies of your files if your computer is equipped with a writeable CD or DVD drive. These back-up disks should be kept in a secure place, preferably not in your school building. You can also keep copies on your home computer. Unless your data is stored on MAPS Apps, you need to have a copy in two different places. Two copies on one computer is NOT a back up.

We recommend backing up all personal files on at least a monthly basis; more often if you are working on a critical project. You need to ask yourself, “What would I lose if my computer’s hard drive were to die right now?”

The district is responsible for creating back-ups of data from district-wide applications (your e-mail, MAPS Apps documents, and Infinite Campus data.)

Viruses
Computer viruses (as well as worms and Trojan horses) are small pieces of computer code that may have the ability to destroy data on your computer or on computer networks. Needless to say, our district takes extreme precautions to protect our computer users from these programs that are spread as e-mail attachments, hidden in programs downloaded from Internet websites, and as macros in word processing and other documents. While our firewall (a computerized filter that screens all data coming into the district) and our spam filter catch many of viruses, new ones are being constantly created and no filter is perfect. Our district to date has been less susceptible to viruses since the majority are written to hurt Windows computers, but viruses also are written for the Macintosh operating system with OSX becoming an increasingly popular target.

As a teacher, you can minimize your exposure to viruses by:


  • Never opening an attachment you were not expecting, even from someone known to you. (E-mail addresses can be spoofed.)

  • Never download programs from unknown sources on the Internet (or let your children download them).

  • Turn the “macro” feature off or turn “macro security” on in word processing and spreadsheet programs.

  • Scan your computer regularly using a virus protection program, especially if you have a laptop or desktop computer you use both at home and at school. Our district uses Sophos and if it is not running on your school computer, visit with your tech.

 


Data Privacy
The protection of the privacy of our students is a professional responsibility. This means knowing the laws, district policies and building guidelines about what student information can be shared and with whom. Increasingly this also means indirectly protecting student records and personal information by following the password guidelines listed above. Under no circumstances should library records be displayed that link the student name to specific titles that the student may have used.

We recommend that you use a screen-saver that automatically starts after a short period of inactivity on the computer in your classroom so that screen contents are not easily viewed when you are away from your desk. For added security, a password to quit the screen saver should be set.

Parental permission forms need to be completed prior to posting photographs or student work on the school’s website. No students’ last names, e-mail addresses, or other identifying information should appear on the school website. Readers wishing to comment on student work that may appear on the district website should do so through a teacher and his/her e-mail account.

Student need to recognize that school provided e-mail accounts, file storage space (YODA), and login and usage logs may be viewed if necessary. Our district Internet Acceptable Use Policy (524) VIII.A states: “Users should expect only limited privacy in the contents of personal files on the school district system.” To date, we have only had to exercise the right to view student files when there has been suspicion of wrong doing, rather than employing a continuously running monitoring program. We hope to continue the “only as needed” approach.

Personal Privacy
As e-mail and Internet users, teachers also need to follow guidelines to protect their personal data and privacy. As district employees, we are subject to the same Acceptable Use Policy as are our students, including the “limited privacy” rule. As with students, we only use the “only as needed” approach to viewing staff e-mail and files.

If you use the Internet to purchase goods, sign-up for newsletters, or complete forms or surveys, you will be asked for personal information. Do so at your own risk. Some guidelines:


  • Never give your social security number over the Internet. Be very careful to whom you supply your telephone number, e-mail address, mailing address, and other personal information.

  • When making a purchase using a credit card on the Internet, make sure the site is reputable and “secure.” A secure site’s address will begin with https rather than simply http.

  • Limit the “cookies” your Internet browser will accept.

  • Maintain two e-mail addresses: one that is used only for business or with those people you know; one for commercial transactions, surveys, etc. The second e-mail address can be a free account from a provider such as Yahoo and can be easily changed if too much spam is being sent to your account.

  • When using a Windows computer, regularly run a “spyware” detection program such as the free SpyBot to detect and eliminate hidden programs on your computer.

  • Outside of school, use caution about what you share on social networking sites. See Guidelines for Educators Using Social and Educational Networking Sites

 


Hardware Security
Computers and other hardware can also be stolen and damaged through both carelessness and maliciousness.


  • Computers should be on a firm surface, well away from desk and table edges to prevent them from being accidentally pushed off.

  • Computer cords and cables should be in molding, raceways or cable trays to prevent damage both to the computer and anyone who might trip over them.

  • If your computer is a laptop, use a security cable to lock it to your desk if it is left unattended.

  • All hardware needs to be purchased through District Media and Technology Services so it can be inventoried and engraved with a school ID.

  • If you use your school computer at home or take it to meetings or conferences, be sure your homeowners’ insurance covers it if lost or damaged. Take special precautions at airports (especially at security), hotels and in meetings to make sure your computer is not left unattended. Most hotels will provide an in-room safe or a secure area at the front desk where you can safely store a laptop computer. 

  • Under no circumstances should you open (or attempt to open) your computer’s case. Touching the wrong gizmo may not only hurt the computer, it may seriously damage you. Let a district technician handle any repairs that require the case to be opened.

 

 

EmailEmail Article to Friend

Reader Comments (2)

Dear Doug,

As usual, a wonderful post--you keep doing our work for us!

A few tweaks I would appreciate if I were a teacher on the receiving end:

1) Back up weekly, not monthly.

Teachers live in a Kafkaesque world--time get chunked into periods/days/weeks/marking period. "Months" do not exist, except maybe for faculty meetings, and they always surprise us. A teacher's life revolves around the week. Weekly practices happen.

2) Drop "Computers should be on a firm surface, well away from desk and table edges to prevent them from being accidentally pushed off."

If your district hired someone who needs to be told this, you are going to be having bigger problems than dislodged cards. If you need to tell someone this, it's not going to make a difference anyway.

3) "Under no circumstances should you open (or attempt to open) your computer’s case. Touching the wrong gizmo may not only hurt the computer, it may seriously damage you."

The few of us who have any desire to dive into computer cases get why you don't want us doing this; the explanation is patronizing. ("Gizmo"?) If you must justify the rule, then just say it voids the warranty. That's what everybody else says.

As always, I love reading your words. And for the few folks who may not know this, Doug does a lot more of our work for us in his FREE book Machines are the easy part; people are the hard part.

July 28, 2010 | Unregistered CommenterMichael Doyle

Hi Michael,

Great suggestions. Thank you.

I think our number one issue with computer damage is computers being pushed off desks. Maybe we are just slow here. The "gizmo" comment was not meant to be condescending, but now that you mention it, I can see how it might be taken as such.

I recognize that all the warnings and advice in the world won't stop some people from doing misguided things, but part of this is just showing due diligence. If a teacher does open the computer case and not unplug it or hit a capacitor with a screw driver, at least we can say "But they were warned!"

Doug

July 30, 2010 | Unregistered CommenterDoug Johnson

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>