Why Should Administrators be Concerned About Computer Crime and Technology Misuse?
Most schools now use technology for organizing and accessing information. Networked computers have significantly improved the speed with which administrative functions can be performed. Additionally, information regarding students, staff, courses, programs and facilities is made much more readily available. There is a cost and potential source of concern that arises as technology-based interactions become a major mode of communication. Academic records must be secured, and sensitive information must be restricted in its availability. Each institution is ultimately responsible for the integrity and security of its data.
Allowing students increased access to the world via computer connections brings on a new set of risks and concerns. For example, during the Spring, 1999 semester, a small group of students at Urbana High School (Urbana, IL, USA) were found to have been involved in credit card fraud. The sophomore group had been using their home machines, school machines and sniffer software to procure credit card numbers, which in turn were used by the students to purchase goods online. Though the students were ultimately held responsible for their activities, it is possible that in some situations, school administrators, technology coordinators, system operators or supervising teachers may be made considered responsible for some aspects of the situation. Educational institutions which fail to exercise due care and reasonable safeguards open themselves up to allegations of incompetence, negligence, law suits and forfeiture of insurance claims.
Our resource, Educator's Guide to Computer Crime and Technology Misuse , introduces many topics we consider essential for teachers and administrators to understand and consider when integrating technology-based activities to their teaching and professional activities. Please contact us if you have any thoughts or ideas we should consider as we continue to develop this resource.
Return to Educator's Guide to Computer Crime and Technology Misuse