Safe Schools

  • School Attendance Review Board (SARB) - December 18, 2017

    The School Attendance Review Board (SARB) meeting is designed for school site/district staff, law enforcement, probation, community mental health and youth advocates who have responsibilities as members of School Attendance Review Boards.  To register or for more information, please see attached flyer. 

    Tobacco Use Prevention Education (TUPE)

    The Marin County Office of Education receives grant (competetive/non-competetive) funding to support the implementation prevention curriculum, youth development activities, cessation programs, and to provide technical assistance to districts in planning and implementing tobacco prevention activities.  For specific information on this topic, please see attached.  If you have questions regarding these resources please contact Kristen Marcucci at kmarcucci@marinschools.org

    Wildfire Evacuation Guide

    If a wildfire requires evacuation in Marin and time allows, emergency managers will use the "Alert Marin" system to send out notifications by telephone, cellular, VOIP, and text message. If you live, work or go to school in Marin County you may register your cell phone or VOIP (voice over internet protocol) phone to receive emergency alerts sent by call, text, email or smartphone application from the County of Marin.

    The ability to securely connect to virtual systems is an important element within a safe and supportive learning environment. That is why the Readiness and Emergency Management for Schools (REMS) Technical Assistance (TA) Center has spent the past year researching how cyber incidents affect education agencies and steps they can take to respond. The result of that research is the development of three fact sheets for schools, school districts and institutions of higher education (IHEs) on cyber safety and cybersecurity. Find details about each fact sheet below. To download a copy, click the fact sheet title.

    • Cyber Safety Considerations for K-12 Schools and Districts
      • Focuses on addressing cyber threats to students (i.e., the human element)
      • Lists and defines several of the most common cyber threats to students, including cyberbullying and access to inappropriate content.
      • Describes what schools can do before, during, and after an incident, including:
        • creating Responsible Use Policies (RUPs), filtering and blocking content, stressing digital citizenship, and providing training.
        • to whom students, teachers, and members of the public can report a concern.
      • Details how to create, review, or revise a cyber annex, including activities to address threats to students, through the six-step planning process described by the Guide for Developing High-Quality School Emergency Operations Plans (School Guide).
      • Provides additional resources.

    • Cybersecurity Considerations for K-12 Schools and Districts
      • Focuses on addressing threats to a school's or district's information technology network and systems.
      • Describes key privacy and confidentiality regulations and laws schools need to consider.
      • Lists and defines some of the most common threats to systems and networks, including data breaches and malware/scareware.
      • Describes what schools can do before, during, and after an incident, including:
        • creating firewalls, monitoring networks, and developing and promoting policies on responsible use.
        • to whom a school can report a cyber issue.
      • Details how to create, review, or revise a cyber annex, including activities to address threats to students, through the six-step planning process described by the School Guide.
      • Provides additional resources.

    • Cybersecurity Considerations for Institutions of Higher Education
      • Focuses on addressing threats to an IHE's information technology network and systems.
      • Describes key privacy and confidentiality regulations and laws IHEs need to consider.
      • Lists and defines some of the most common threats to systems and networks, including data phishing, unsecure personal devices, and malware/scareware.
      • Describes how IHEs can prepare for, respond to, and recover from cyber incidents, including:
        • creating firewalls, monitoring networks, and developing and promoting policies on responsible use.
        • considering how incidents affect people, policies, and technology.
      • Details how to integrate cybersecurity into emergency operations plan (EOP) development using the six-step planning process described by the Guide for Developing High-Quality Emergency Operations Plans for Institutions of Higher Education.
      • Provides information about additional resources and key organizations.

    For general information related to cyber incidents, visit the NEW Topic-Specific Resources section of the Reading and Emergency Management Center and Technical Assistance site. 

    You may also access related Webinars we've created on this topic for K-12 and higher ed populations:


    Check out a recap of our #CyberAwareCampus Twitter Chat, hosted in collaboration with the U.S. Department of Education's Office of Educational Technology and other partners in higher ed emergency management including the Higher Education Information Security Council (HEISC).


    Sincerely, 

    The REMS TA Center Team