I wrote this several years ago and realized it was still in draft mode. So, let's call this a "Christmas in July" post!
‘Twas the week before winter break, when all through the LAN
Not a server was malfunctioning, not even the SAN;
I wrote this several years ago and realized it was still in draft mode. So, let's call this a "Christmas in July" post!
‘Twas the week before winter break, when all through the LAN
Not a server was malfunctioning, not even the SAN;
My very first trip to a national technology conference was in 2005 when I attended NEC (now known as ISTE) in Philadelphia. I was invited to attend by Discovery Education because I was one of three winners of their “Win a Wireless Laptop” contest. They paid for my airfare and booked me at the Marriott Old City, where my love for the national technology conference, ISTE, was born.
Eighteen
years later, I was invited to attend ISTE in Philadelphia again, and – once
more – I booked lodging at the Marriott Old City. I’d like to say that I
remembered that hotel was the same hotel where I stayed in 2005, but that would
be untrue. It wasn’t until I walked into the hotel to check in that the memory
resurfaced. Looking around in the lobby, I could see that the hotel had changed
a little – the décor was updated, and the flooring had changed. But the layout
of the lobby was exactly as I remembered. When I opened the door to my room,
though, I realized just how much had changed in 18 years. New bedding, flooring,
tiling, technology…everything was updated and very different.
I
have that same feeling about technology then and now. Everything is updated
and very different.
Back
in 2005, at the NEC conference, I first learned about Moodle, an early learning
management system, that ran on an internal server. I was astounded and returned
to my district, hired a new network administrator, and gave him his first task
of setting up Moodle so I could introduce our teachers to a learning management
system. Compare that experience to this year’s hot ISTE topics – cybersecurity,
interoperability, and digital identity – and we find that everyone is concerned
about safe access and productive digital environments, both inside and outside
of a district’s network. My how times have changed!
My
invitation to attend ISTE this year was extended by Identity Automation (IA), a
powerful identity and access management (IAM) solution, and I was fortunate to
join IA employees in their vendor booth. Some might question my use of the word
“fortunate” in this scenario because standing for hours in a booth may not be
everyone’s ideal conference activity. But I love it. Really love it. I love it
because I can talk to technology directors, network administrators,
supervisors, and district leaders to share my 20+ years of experience working
in the world of K-12 technology. Hearing real-world scenarios from CIOs who
struggle with the security of their digital environments, while trying to
provide a perimeterless and safe environment in their networks, gives me a
chance to sympathize but also explain attainable solutions using Identity
Automation’s Identity and Access Management (IAM) platform.
Today,
IAM solutions are essential for K-12 districts to prioritize the safety,
productivity, and user-centric outcomes of students, teachers, staff, parents,
and district leadership. IAM platforms offer a comprehensive framework for
secure access management through authentication, authorization, user
management, and central user repositories. By investing in true identity and
access management, districts ensure a safe and productive digital environment,
foster collaboration, and drive positive educational outcomes.
Yes,
the technology landscape is really different from my first attendance at
NEC/ISTE, but one thing remains the same…change. That’s right; change is life’s
only constant. The best way we can guarantee safe expansion of
technology is to build upon our foundation of safekeeping, and always keep in
mind that the goal of every IT staff member is security of and productivity for
digital identities, without inhibiting access to legitimate learning and
administrative tools.
Like my walking into that hotel lobby 18 years later, we all should
approach the ever-changing technological landscape with an insatiable
curiosity, balanced by subtle recognition that “we’ve been here before”, and
with IAM solutions, we can rest assured that where we’re going is much safer
than where we’ve been.
Remember when moving from one end of a state to another often meant changing phone numbers because the new residence would be in a different area code? And, after cell phones were born, remember when relocating across the country meant ditching a cell phone company, along with the number, because the new area of the country didn’t include the same coverage? Chances are, if you are as old as I am, these scenarios do sound familiar. For most cell phone users, however, changing cell numbers just because you relocate is a foreign concept. A cell phone number becomes part of who we are, part of our contact identity, and - if we don’t want to - we never have to change cell numbers again.
Now, let’s apply this scenario to today’s school environment and student data. Huh? I know you’re thinking this analogy might be a stretch, but stay with me, and I promise this will all make sense.
In today’s schools, nearly all aspects of student data reside on IT systems in the K-12 ecosystem. From birthdates to medical records, from assessment scores to classroom assignments and everything in-between, student data are housed on some type of electronic system. And, the seamless use of that data through various technologies is paramount in ensuring a stellar educational experience for students and teachers.
When teachers and administrators need to bring in student data, protect that data, and adapt to unique needs among various stakeholders who need access to the data, often the amount of time between data entry and usage is so lengthy that end-user experiences only lead to frustration. IT staff are challenged with managing data for new enrollments, teachers, substitute teachers, and administrators, including automated tasks that span both cloud-based and on-premise systems, and the end result of the entire process often trickles down to provide a negative experience to the most important cogs in this wheel - our students.
I know I’m an idealist, but I envision a scenario in which students and employees who move between schools in the same state lose no data…lose no documents, no video projects, no graded assignments. And, they are not expected to download everything from their previous school’s cloud domain before they move to their new school. Wouldn’t that be a perfect world? Students log out of one network on Friday and safely log into a different network on Monday in their new school, and all of their records are visible and secure…immediately….and without additional effort on the teacher’s part to “turn on” access to new materials.
I believe this ideal situation can be a real situation, and I think the time cannot come quickly enough!
One of the reasons this type of access to data is so important is because of school choice, particularly in Kentucky, my home state. Kentucky recently signed into law House Bill 563 (HB563) called the Nonresident Pupil Enrollment Policy, sometimes referred to as the No Boundary law.
Codified into the state’s revised statute, the Kentucky General Assembly announced that as of July 2022, Kentucky school districts must allow open enrollment of nonresident pupils without any contractual agreements, permissions, or discrimination, except when enrollment capacity is reached. Essentially, Kentucky students in any district and in any county can go to another district (assuming it’s not full) and the state’s funds and federal funds follow them.
The passing of Kentucky HB563, the state’s brand new stance on open enrollment, illustrates why school districts need to implement a cybersecurity system that works seamlessly outside of one specific district – and in my state’s case - all districts within its borders. Any open enrollment situation is a seemingly obvious case study for the need for easy integrations that focus on minimizing any impact on learning, regardless of where a student was enrolled the year previously. And, open enrollment stands as a solid illustration of the potentially negative impact that cybersecurity and, more importantly, hands-on protection tools, such as user authentication, can have on a student’s experience.
All learners need an individual path to flourish. If the data that follows them down their educational path isn’t comprehensive or lacks details teachers need, delays or setbacks can result. And, unfortunately, that all-too-common lack of access to needed information for a particular student is an alarming hindrance. Retaining and accessing vital student data that teachers need immediately upon a new student’s enrollment is a process that screams for standardized methods.
Educators need student data now, and, really, now is sometimes not soon enough. Slow, manual, untailored and unprotected methods of accessing student information should not be the status quo for districts. Without proper tools and ease of access to student data, educators face huge delays when they receive new students, and these delays are often a result of school electronic systems that do not “talk” to one another. Kentucky has done a great job through the years in standardizing many aspects of “talking” to other districts (e.g. state-mandated student information system), but I believe Kentucky - and all other states - can do more.
The correct mixture of communication, IT and protection should now be at the root of all K-12 data systems. Through a more seamless transition, educators can remain vigilant on individual needs or interests of students and provide an enhanced learning experience tailored to every individual. Students moving between districts would do so with one digital identity, an identity that holds much more than information - an identity that holds promises for success.