Brought to you by:
Tuesday, January 26, 2010 | 1 pm PST / 4 pm EST
Are your school computers being used in ways that violate Acceptable Use Policies? Probably.
Do you have time to investigate every instance of someone sending personal emails or conducting personal business using school resources? Probably not.
But you have an obligation to both identify and be prepared to prosecute serious, potentially dangerous, infractions of your policies. Nowhere is this more true than in the case of sexual predation.
Join our webinar as we discuss:
• How to create Acceptable Use Policies that both deter such behavior and make clear the violations
• How to utilize network activity reports to identify suspicious behavior
• How to collect the evidence you need to suspend, terminate, or even prosecute the violators in your school district
• And hear from a district technology director on best practices for protecting your district
Phil Scrivano, Lightspeed Systems, VP of professional development and former FCMAT Management Analyst, State of California District IT director