Protect Data

Introducing JonesCare: Protect your school devices– and your budget– with "just right" coverage

Safeguard your school’s technology with our comprehensive coverage programs

Prepping Your School’s Device Management for Summer Break: Inventorying, assessing and planning for the break– and beyond

While the summer break might mean long, leisurely days at home or camp for students, it means something quite different for a school’s IT Team. Depending on the school and its policies, the break presents a window of time to collect, inventory, clean and update devices, as well as assess and plan for the next school year. 

Below, we outline some of the common action items IT teams prepare to tackle as the summer break approaches. 

Decide whether devices will be returned to school or go home with students

The question of whether districts should allow devices to stay with students over summer break is a controversial one. Proponents argue that allowing students to keep devices offers an opportunity for learning to continue over the summer months. Others, though, might view a summer take home device program as a logistical nightmare that increases the risk of devices being damaged or lost.  

Inventorying and inspecting

If your school does collect all school-owned devices at the end of the year, IT departments may commiserate with school librarians– you both spend a significant portion time attempting to track down and wrangle missing (and overdue) items.

Once the devices are collected, they can be inventoried and inspected for damage. 

Cleaning devices and identifying devices that are damaged or in need of repair

As students and teachers return their devices, your IT team will be looking for devices that have incurred damage over the school year. Devices will also need to be cleaned– for instance, laptop vents need to be dusted to prevent overheating, and 

Consider whether it’s time to retire aging devices

As you assess devices that are damaged, some will likely be at or near the end of their lifecycle. These devices will need to be recycled, and, depending on your school’s needs, replaced. 

Coordinate repairs for damaged devices

It’s likely that your team will identify many devices that need repair. Your IT team will want to coordinate the repair of these devices so that they’ll be ready for the new school year

Software and security updates 

The summer break presents an ideal opportunity for IT teams to perform software updates with minimal disruptions to students or staff. Security updates and device refreshes can also take place during this time. 

Arrange training for staff and students (if necessary)

Is your school introducing new technology to teachers and students? If so, you’ll likely need to schedule training sessions to familiarize staff to new devices. 

Reconsider your school’s device insurance 

Once your device inventory is complete and you’ve identified which need to be repaired or replaced, it’s an ideal time to decide whether your current device warranty or insurance coverage is adequate. Standard factory warranties for tech devices often don’t provide the coverage schools need, particularly as devices begin to age. 

Consider scheduling a JonesCare Needs Assessment. We’ll take an in-depth look at your district’s needs, budget and assess the lifecycle stages of your district’s devices. Then, we’ll work with you to customize a protection plan that’s tailored to your district’s unique needs. Our goal with JonesCare is to provide a seamless experience with minimal disruption to students and staff when devices need to be repaired or replaced.

Reach out today to book a JonesCare Needs Assessment.

Six Key Tips for Protecting Your Child’s Data

The downside to being a 21st century kid is obtaining an online presence long before you’re able to make fully informed decisions. Through smart phones, tablets, computers, and games, children amass a large amount of data. According to Wired, 92% of the children in the United States will have a digital footprint before they turn two years old. The ramifications of this only increase in importance as children grow up and use technology more frequently and more independently. 

When people consider the consequences of young people and the Internet, their essential concern is social media. Their fears focus on the idea that short-term pictures can cause long-term problems. Sound social media decisions are undoubtedly important, but they aren’t the sole worry of online privacy violations. When security breaches occur, the hackers are mining for both personal and consumer information.  

Fortunately, there are several safeguards that parents can employ (along with their kids) to help protect their safety and security online. 

Start the conversation.  

For young children, especially, the thrill of using a fun new app or device surpasses any concern (or knowledge) of risks. Discuss with them the importance of privacy; that passwords shouldn’t be shared with anyone other than a parent or teacher, and that an authority figure needs to approve an application before it’s purchased or downloaded. 

Check privacy settings.  

After a new app’s initial set up, go back and make sure you’ve handled the privacy settings. Disable location sharing and the application’s request to post on other social media platforms. For apps that include messaging ability, make sure to choose “friends only” to filter users who are allowed to send your child messages.  

Disable location sharing. 

This one has can lead to serious repercussions, but it’s often overlooked when setting up a profile. Be thorough with reviewing the location settings on your kids’ devices and apps. Likewise, set expectations for photo sharing as it relates to location; it’s not prudent to publicly broadcast a vacation, for example, due to home security reasons. Young people need guidance to make prudent choices. 

Read the fine print.  

Terms and conditions are tedious, but they’re key to understanding what you’re agreeing to. Read the T&C together with your kids, modeling meticulously good online habits. This way, if something appears that you don’t feel comfortable with, you can cancel the download without unintended consequences. 

Use parental blocks. 

Parental blocking technology is designed primarily to protect children from illicit material and unknown Internet dangers. It’s important to keep your own information safe as to not accidentally provide your kids with administrator access. While there is no replacement for vigilant supervision from real parents, a parental block can help provide another layer of protection. 

Establish a VPN. 

If you’re interested in greater Internet anonymity, you may want to consider a Virtual Private Network. There are two primary benefits to using a VPN. The first is that all of your family’s data will travel through an encrypted virtual tunnel, making you less susceptible to cyber attacks. The second benefit is that this tunnel also hides your IP address (the online equivalent of a postal address). This provides you with more anonymity and less vulnerability. 

The Internet provides countless advantages. But with more interconnectedness and information sharing, the importance of privacy intensifies. These precautions will help you and your children enjoy the use of your devices while knowing you’re protected.