The Electronic Portfolio of Kelley Creighton

VI. Social, Legal, Ethical and Human Issues
Home
Philosophy of Education
Professional Goals
Resume
Matrix of Standards
I. Technology Operations and Concepts
II. Planning and Designing Instruction
III. Teaching and the Curriculum
IV. Assessment and Evaluation
V. Productivity and Professional Growth
VI. Social, Legal, Ethical and Human Issues
References
Artifacts
Curricular Unit

How have you applied your understanding of the social, ethical, legal, and human issues surrounding the use of technology in PK-12 schools in your practice as a teacher?

     Norwich Free Academy is considered its own district, consisting of a ninth through twelfth grade independent school serving towns in Southeastern Connecticut.  Because the school is so large, we have a large Informational Technology Department.  Apart from the IT Director, there is a staff of approximately ten people to deal specifically with IT issues.  During my course EDU624 with Dr. Tannahill, I had to evaluate the ethical issues involved in our IT Department at Norwich Free Academy including the AUP.

            The IT Department has an Appropriate Use Policy which is named IT Acceptable Use.  Every employee that receives a User ID must sign the AUP.  The form outlines property ownership, data retention, respect for others, ethical conduct and appropriate use, and ends with a declaration of understanding and adherence with a signature section.  The form is three pages long and the sections are written clearly and in understandable language.  The property ownership portion explains that the computers, systems and network resources all belong to the academy and that if there are any problems or issues with said property, the user should take steps according to the form to replace or fix the property.  The data retention portion explains that while the academy retains every site visited, email created and document saved, it respects the privacy of the users and will not view the information unless there is a potential for criminal intent. The ethical conduct and appropriate use is the lengthiest part of the entire form.  It explains that the network and property is meant for professional and academic use only and personal use should be kept to a minimum.  It explains that email is not confidential, therefore, users should be conscientious of what information they write in the messages including obscene or libelous language.  It also discusses plagiarism briefly and the use of the internet.  Throughout the form it reiterates the cautionary step of being sure to log out of workstations when you are not using or near the computer. 

            When meeting with John Baldwin, the Director of the IT Department at Norwich Free Academy, I learned that there is no one who is monitoring the enforcement of the AUP.  In order for anyone to request to review a log or audit of internet history, they would need to get approval for the IT director as well as the Director of Campus Safety.  In regards to campus email, no one monitors or reviews emails.  One could conclude that this a potential weakness of the IT department, however, I think it should trust and respect for privacy for the employees at NFA.  That being said, it contradicts what is outlined in the AUP.   Along with the lack of monitoring, there is no formal enforcement of the AUP. 

            Students must review and sign their own AUP at the beginning of the school year.  The AUP is located in the NFA Pilot, which is the student handbook that outlines all the rules and policies of the Norwich Free Academy.  It is required that all students must submit a signed AUP from the Pilot at the beginning of their ninth grade school year, or when they transfer to the school. 

            The closest tool to AUP enforcement is the filtering system for the campus network.  The IT department at NFA created two separate filtering system—one for the faculty and staff and one for the students.  It blocks websites that have certain words or information.  This has created some difficulties when designing lessons.  In my personal experience, students were unable to log on to the Democratic Party’s official website for my Political Process websearch (Appendix P). When this does happen, if it is caught in advance, teachers can submit the website’s address to the library staff and they will unblock the website. 

Our social networking occurs primarily though email.  More recently, the faculty and staff were able to sign up for remote access to the email at home.  In order to do so, they have to sign another portion of the AUP.  This additional requirement is important in maintaining the stability of the networks security.  John Baldwin referenced FERPA in our discussion of the confidentiality of online and network files (Appendix S).  FERPA stands for the Family Education Rights and Privacy Act of 1974, which protects the privacy of student education records.  Baldwin explained that FERPA sets the tone for much of what employees can and cannot access in the network. 

            Because the school is responsible for the education of many students, it is important that they set up effect security and filters to protect the students from mature and inappropriate material.  The extensive security in the NFA network protects the student population as well as the staff and faculty.

Graduate Candidate, Masters of Science in Educational Technology, Eastern Connecticut State University