Learn These Security Terms
Active Directory - Directory service devel-
oped by Microsoft, primarily used in Windows domain networks to manage users, computers, and other network resources.
SOC 2 - Framework developed by the Amer-
ican Institute of Certified Public Accountants that assess how organizations manage data and related systems with a focus on ensuring the security, availability, processing integrity, con- fidentiality and privacy of sensitive data. SOC 2 compliance is achieved through independent audits that verify an organizations implementa- tion of appropriate controls and processes.
Zero Trust - Cybersecurity approach that
assumes no user or device can be trusted by default, regardless of whether they are inside or outside the network perimeter
MFA (Multi-Factor Authenitcation) - A
security system that requires users to provide mulitple forms of identification to vertify their idenity when accessing an account or system.
SSO (Single Sign-on) - Authentication method that allows users to access mulitple ap- plications with a single set of login credentials.
Identify and Access Management - Security
framework that manages and controls user ac- cess to digital resources within an organization.
ISO 27001 - Standard for information se-
cuirty management systems. ISO 27701 - Standard that provides a frame-
work for managing privacy information.
TLS 1.2 - Security protocol designed to pro- vide secure communication over a network AES-256 - Symmetric block cipher used for
data encryption
On-Premise - Running software applications or IT infrastructure on servers located within an organization’s own facilities, rather than relying on third party providers.
The Cloud - allows users to access comput- ing services over the internet, rather than local hardware.
Visit
stnonline.com/technology-resources for a more complete glossary of technology terms.
one to two months. “Whenever we have an incident on the bus one of our staff members archives the footage remote- ly. We then save that footage on one of our local servers at the district.” He noted that individuals who have access to the cameras
is controlled by the transportation department. To access the software to view the video, he said a user must have an account that’s managed in-house. “For example, how we have our access set up is, the
director, superintendent, and department supervisors have access to the camera system,” he shared. “Administration at the schools all have the software installed at their schools, but we have it set so that they can only view footage that has been archived and shared with them by us.” He noted this reduces bandwidth and protects student
identities, ensuring only Family Educational Rights and Privacy Act-complaint footage is being shared. Because Fort Mills opted for a cellular cloud connection vendor, transportation needed little to no assistance from IT. However, Weston noted that IT did set up a shared network drive between transportation and the schools to help facili- tate video sharing. Nagra at Clovis Unified in California noted that the cam- era systems were not fully deployed until late last school year and this new school year will be the first full year of running the system. The system retains footage for 30 days and archiving is done manually by staff as needed. He noted that any “video not archived is overwritten automat- ically based on the determined retention period. Archived video has not been deleted yet and we have not had the system long enough to determine when, if, why we need to periodically delete archive video,” he shared, adding trans- portation follows all laws related to data privacy. For Clovis, having access to real-time footage is new. “We
have not had any issues thus far that have warranted the need to check video in real time,” Nagra added. “The ability to do so allows the transportation team to quickly look into an incident faster and easier than in the previous system and we anticipate that will be valuable to us in the future.” Over the years, the district has encountered numerous instances where video footage was required. “Our staff had to wait for the bus to return to the yard, then extract the SD card and sift through hours of footage. Even if we were lucky enough to have a functional camera, the process consumed several hours of staff time to download and review the necessary footage.” As districts navigate this new age of data storage and
security, conversations with IT and security depart- ments, as well as vendors goes a long way in terms of protecting data. ●
54 School Transportation News • SEPTEMBER 2025
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78