AS 91367 Demonstrate understanding of advanced concepts relating to managing shared information within the information systems Level2 3 Credits Shared information Systems Shared information systems relate to be being able to effectively communicate and share important information and ideas to not only the school yet globally using the computer system and its software. Students within High School are able to access their own individual accounts via a student log on, this re uires a username - given to the student by the school, and a password for security and access. Staff and the schools administrator can access students within their log on if the student needs a document to be printed. Students can save work on their H. drive into main folders and sub folders. Documents are usually created using softwa programs such as Microsoft Word 2010 that staff and the administrator can bypass student passwords on their own computer systems. Other methods of saving students work are usin external drive like USB sticks. Students can also access W: drive for material to be edited or used in class, this material used on .~t91l!l W: drive is created by staff within the school; . l'i r;;;;•c;;;;;;······-·-- · -·i2 students are unable to save their own work to - . '!-0 • this drive. TheY: drive is used for students to access graphics and clipart's, the material ,. ......, within theY: drive is also created by staff, and · -=- ~ students must not save their work to this , .... drive. Other drives include T: Q: and F: these are accessed by staff only (students logon) Q: "~:::... ... ~•. MUSAC accounting and students information, ;=~::= .,._ T: allows staff to share information about requirements within the school, e.g. NZQA, curriculum and exams. Students are unable to - -a..r............ .,..; ,_..:.. -.~::::J ,~..;.,.... r Hctwott.N.t S,.Uft~.HI6t • ~~NfJ'S save work on these drives. High School has a website school.nz) and links are provided on the High School website to social networking sights such as Facebook, Twitter and Moodie. This allows students to share and view information such as upcoming events, cancellations made by the school etc. Moodie is like a website designed for staff to put student work and revision papers on. Only staff within the school can access and place information for students on Moodie, otherwise a student (www. 1 ---~ - -.. .......... ~ ........ i ~ .....:::-~-::... ~-· ---.· .. ... 1••• _.. ~ 1';11..-­ _.,.;;;wy,.~ - -ao=:::-.:;;:. ... ....... ,._ m::'·.:.:.:::.-::.:..::.... . & r::-.:-r:7:.:o~~ :·;··- --..: !!--:?~7.'::'"::"::-"""'"'- ... -u :~?c:::-:-- •?;~T --~·..: t.=.-:;·~:r..::_ iii:::::=-= - ·- .• 1:11 I password and student username is given to students by the school to access the information website. staff have placed on the website for revision. To the right is an image of the Image source: http://www.facebook.com/ students whom have their own individual Facebook accounts are also able to ask questions such as "Is the fun runs still on?" in which will be answered by the individual running the schools Facebook Page, the area marked by the arrow demonstrates this. Hardware Computers hardware is the most important component in the running of a computer system. Computer hardware itself incorporates all the visible and physical components of a computer system. Hardware within a school computer system means students can access software on their computers due to the reliance of the computer's hardware to operate the software within the computer system. Hardware available for students to use include the printer the option of black or white printing, the keyboard, the mouse, the CPU (computer processing unit) scanner, speakers, laptops (available from the library), and the monitor. Staff hardware includes projectors and smart boards - used to display content to the class, only staffs have an obligation to use these. Below is an example of some computer hardware components that can be found in the school environment. Image Source: warepin.com Software Applications and programmes within the computer which convert all data/ information put into the computer by the user into responses by the hardware. It is the applications that make the computer work like Windows operating \system. There are also other Software that are available on the computer are \Software including Microsoft Office, Microsoft Word and more. The following image to the right demonstrates some familiar software applications available to students on the school computer system. Image source: blogsolute.com Data Data is the main information a student uses via a software program such as Microsoft Word to produce information suited to the individual. Data covers a broad spectrum of different information by using words, numbers, measurements, observations, descriptions, statistical data, instructions, lists, graphics anCJ animations, in which a student can use to produce information. Students put in work and manipulate it using a different format by printing it out, analysing it and creating a new document, examples include spread sheets, word documents and movies. The schools limits access to data e.g. internet by blocking sites such as Facebook and limiting internet time access by giving each student the same amount of internet data per week, once this is used up by the student they may have to wait the next week until their data is reset again. Components: Hardware: Features: Hardware is the range of physical features and elements that combine to form the computer system. Software: Software is the computers instructions or main data. Anything within the computer system that can be stored electronically is software. Data: Data is a collection of facts, figures and statistics related to a particular topic. Data can be used to form useful information and is a valuable asset for an organisation such as the school. Data is used to perform effective and successful · operations within the school. Compu.t er procedures within the school are guidelines as to Procedures: Example: The physical components of a computer include: monitor, keyboard, hard disk, mouse, etc. Objects you can physically touch include: Disks, disk drives, display screens, keyboards, printers etc. Microsoft Word, Microsoft PowerPoint, Microsoft Access, Microsoft Excel, Firefox, Safari, Windows Media Player, etc. Students signing the role when they get to school stating they are present are stored electronically to keep track of each student's attendance at school. Each student has a personal fact sheet written about them e.g. stating the students name, parents name, address, phone number etc. Interacts: Hardware interacts with application software to allow students to access information, produce their own information, and print out final results. Students can also save their work so it is able to be retrieved at a later date. When a student uses application software this works as a middleman converting the users input into instructions for the operating system to understand. The operating system then converts the instructions to the computer's hardware allowing the computer accomplishes the task we set before it. The Data that's available within a school is there under the conditions of the privacy act and cannot be exposed to outside parties. Data interacts with software through the recording of personal information etc. For example if a student is sick, that data goes through the software to send an email or text message. Anti-virus software is usee to authorise only suitable sites and software on systems. The school Guidelines must be followed for the use of software that is available and the data that can be People: how things are done. Instruction manuals are an example of how procedures are explained for users to operate hardware or software and data. People include those whom use the computer system. Computer skills classes allow individuals to learn how to operate computing systems. Administrator is the only used e.g. student photos person authorised to add can only be used on the school website. computer software programs. The principal- final decider on what will be available to students, the finance managerdeals with the costs of computing, the technician- puts software programs onto computers, ICT Staff/committee- looking at what's available and what's suitable, general staff/office- looking at what's available and what's suitable, librarian- issuer of laptops and does research and studentshave very minimal say. Procedures Procedures are rules or instructions for organisations such as the school to follow in order to show how things work. These may be covered via instructions or user manuals. The school uses different procedures to allow students and staff safe access to equipment. Students must sign a contract to use the computers in the correct way. Anti-virus software is used to authorise only suitable sites and software on systems. The school Administrator is the only person authorised to add computer software programs. Personnel "Hierarchy" People involved in creating and using the school system. These include the student themselves using the computer system, the principal- final decider on what will be available to students, the finance manager- deals with the costs of computing, the technician- puts software programs onto computers, ICT Staff/committee- looking at what's available. People involved in creating and using the school system. These include, the student themselves using the computer system, the principal- final decider on what will be available to students, the finance manager- deals with the costs of computing, the technician- puts software programs onto computers, ICT Staff/committee- looking at what's available and what's suitable, general staff/office- looking at what's available and what's suitable, librarian- issuer of laptops and does research and students- have very minimal say. The following above image demonstrates the common features and their order of the operating system. 4 Advantages and disadvantages of shared information Systems: Advantages: Globalisation: Information technology has allowed organisations such as to share and gain information efficiently from all around the world in a matter of seconds. We have access to information without having to physically travel to that place to get that information or to try understanding difficult language barriers or geographic barriers that may prevent our access to information. The school itself partakes in globalisation when it organises annual young leader's trips to overseas destinations such as Japan or the USA. Communicating via email and being able to share the details and underlined instructions of how to be a part of the trips is shared to our school from overseas, which is then passed on to staff and students, allowing us to interact with overseas organisers and share information to one another via email or online internet websites such as http://www.cylc.org/gylc/ (website for the global young leaders conference. Impact: Information is accessed from all sorts of information via the internet and a wide variety of countries e.g. not from English or American text books. Communication: Communication via information technology means we can quickly and effectively communicate to almost anyone around the world with the click of a button. These include text messaging to overseas personals, communicating via email, Facebook, even video calling others from Skype, or Windows Live Messenger. The school uses mainly email to communicate with other individuals from overseas, however it is mainly staff that are able to do this as students ( other than using their own email accounts to send emails) are unable to ac~ess staffs emails. Staff may use email to contact NZQA personals with questions about particular papers and their marking requirements. Impacts: Students in the school are able to use Moodie to communicate to one another within the school environment only; conversations however are monitored by the schools computer administrator to watch for any inappropriate conversations, this has allowed quick and easy communication between students. Cost effectiveness: Information technology has helped businesses become more "computerized" helping them to become cheaper and more efficient. Information can be placed on a business's website without having to pay for costly advertisements which take up both time and money. This in effect helps to raise business profits, and have a more relaxed and organised business environment. Businesses can now also manage thousands of customers online with efficient technology in the workplace. An example of this includes the High School Website (www. school.nz) where those individuals from overseas can access information about the school via photos, enrolment information, costs, school activities, hostel information etc. This way the school is gaining larger profits by inviting a greater number of students to the school due to easily accessible online information. Impacts: The school charges a voluntary contribution of approximately $40.00 to cover the cost of using technology equipment within the school environment. This includes the cost of printing, the ink for printers and paper that's used for printing out material. Students are allowed a $3.00 print charge per term which is automatically added further printing means students put their own ~ridging the cultural gap: Information technology has allowed us to understand a wide range of diverse cultures to communicate and share ideas, this means we can increase our understanding and awareness of other cultures and reduce preconceptions. Our school does this by introducing a school cultural week. International leaders at the school are able to share their cultures to students within the school environment to show their traditions, whether it be arts, food cultural activities etc., and ideas are also gained via the internet for example looking at how other cultures live by interacting with individuals of another culture. s Impacts: High School has their own international website www. com in which is specifically designed for international students and parents looking at sending their daughters to the school. The website is offered in 7 different languages including English, Korean, Japanese, German, Chinese and Thai. This has helped increase the number of international students to the school dramatically over the past years offering student roles within the school such as international leader. More time: Information technology means that businesses can now operate 24 x 7 all around the world and be open anytime during the week and at any location, allowing purchases to be made from different countries by simply using a credit card. This is more time efficient and convenient for businesses who want to make large profits. Staff at the school may use online stationary websites to order stationary in bulk for students ordering their stationary via the school e.g. from (www.officemax.co.nz) Impacts: The school website is an example of a business that can now operate 24 x7 for students and parents to visit and view information, this has allowed the school to become more recognised not only within New Zealand yet around the world as the school showcases itself online. C'reation of new jobs: Information technology has allowed new jobs to be created within the l)chool environment. These jobs are surrounding the computer systems e.g. ICT manager, computer administrator, system analysts etc. Impacts: Creation of new jobs include having student roles such as year 13 ICT leader which helps to make informed decisions with the main computer administrator about loading new software onto the computer etc. Disadvantages: Staff having to learn new skillsPrivacy: Information technology has allowed the world to communicate and share ideas, however it is becoming easier to gain unauthorized access to others personal information without them knowing via hacking through email and other personal files in which may become public knowledge for others to view without you knowing. In the school by limiting the amount of access students have via email memory this helps to prevent hackers from gaining access to staff and student emails, the school also has traffic watch where inappropriate websites that may be of target to online hackers are blocked and the school computer administrator keeps an eye on students internet activity and firewalls are also used to block websites such as Facebook. Impact: The main impact of privacy issues within the school has mean the school has had to set up firewalls to block students from entering sites considered inappropriate, as well as virus protection programmes. Lack of job security: Jobs security has become an issue due to the changes in technology each day. Updating skills on how to continue to keep jobs secure and learning methods of how to do this are essential if the business wishes to remain stable. Impact: There is a need for continued retraining and people may find themselves on short term contracts rather than permanent employment, financially they will have to structure there use of money. There are opportunities to work independently as well, and work for you. Advantages of my own: Working remotely: Information technology systems allow remote access to an individual's company electronic network, this allows business employees to work from anywhere they want whether it is home or away. This allows increased productivity as work is still being done to 6 '• satisfy the workplace even when you aren't physically at work. This applies for Girls High Students as well whom are able to access online internet sites such as Moodie for teacher answers and workbook exercises (these are placed on the website by the teacher) or NZQA offer information and access to past papers in which can be found on their website helping the student toward study for end of year exams or midyear school tests. Students also have access to teachers email to ask for catch-up work to be emailed due to explained absences. Impact: People can put in more work without being in an office which means they can work 24 x 7 if they want to, students have a lack for supervision as to what they are accessing. More reliance on technology, handwriting becomes affected. Storing and Protecting Information: Information technology allows us to store valuable work electronically. Storing students work, exam results, records of students reports or even students own personal work can be saved electronically to keep information safe only allowing certain users to access the information by changing, withdraws or adding to the documents. Students and teachers at use personal log on usernames and passwords to protect their information at the school, this way only students can get into their personal work and information, however teachers can gain access to students work to correct or look at work as well as the school administrator whom keeps track of student internet activity. Impact: Students have their own log on's and passwords so it is up to them to store their own work in which an H:/drive is offered as students own storing drive. Disadvantages of my own: Implementation Expenses: Implementation of expenses refers to the start-up costs of placing any software programmes etc. onto the computer system. These costs of hardware, software user licenses for each student using the operating system will cost the school money. If faults occur within the computers the costs of having to fix the faults by a specialised IT personal or trained technician the costs to upgrade all student costs the school a lot of money, therefore at computers is becoming too expensive therefore students are being encouraged to bring their own laptops or I pads to save costs. Impact: The school now pays $3.00 per term of printing money into each student's computers; students who use this money before the next term are obliged to pay their own money as a way of helping the school cut extra costs for students printing. Viruses: Viruses are a programme usually picked up from the internet that can disrupt the normal functioning of the computer system. Viruses can corrupt the hard drive causing save items to suddenly disappear or stop opening in their normal programmes. At school there are measures taken in place to help avoid students from receiving viruses due to online activity, these include firewalls being placed to prevent students from accessing inappropriate websites that may be a target for viruses and spyware to protect the computers from any viruses that may incur from online activity. Impact: The school has had to set up firewalls to prevent viruses from coming into the school computer systems, these can also be found on external hard drives from other students. Final Management Considerations Related To Shared Information Files and Folders The school does not have a set system for students to create files and folders. Teachers generally instruct students where to save. 7 Conventions The file name convention is the name a student calls their document they are going to save. Files can be named only with alphabet and number; there can be no added symbols. Within the school, these files can only be saved on the students H: drive or your USB. Files can be shared with others by using email, social networking, and Moodie. The storage on files is only limited space for students. On a student's H: drive they can choose what folders they can cre"ate. Old fo!~ ~r~ on student's H: drives are cleared at the end of the year. ,I. I.SIIli1l0· 1$••<•ll)po- MJ!llllll:ll- fitloldw ~ AIIlliH••'I•11<4 \IflSIIol -lt31LIJI- ""'- ,.,la..u rl - .",."""'.... 8'*« ). lNiwl• Mi!llll~,_. fitloldw l2,«;11Ull:!l- filf•lltlr ). USllli· .... lhoo! IIM,13llltlll<L flo- ~ USlliH"illw Jl"lillllli<lh.. fikloilor USZ!Il! · W- - W l - likloilor / The highlighted folder shows the correct use of using strictly alphabetical letters, numbers. !}&....., ....... ftnnl012f«:l\ll ll.ll/llnl'"'o- -Wv.ID- The input, storage, retrieval and manipulation of data within an information system. Manipulation of Data: 1. Input- Input relates to ways in which information is brought into an organisation. How information is brought into the school can be from emails, forms, phone, textbooks, teachers and staff, other students and also notices are different way information can be informed to students. Also Government and NZQA provided schools with the information that they provide the students. 2. Storage- Storage refers to how saved information is kept. Ways for schools to store the information given to them can be hard copy (something that has been printed out), software (office, music and others), library, school storage space and shelving like filing cabinets. Out of these, students can only access from the hard copies, some software, and library and storage space. Although the staff can access all of these storage spaces. 3. Retrieved- Retrieved refers to regaining possession of information. Information can be accessed by students but cannot be altered, information is put on W:/Drive by staff for student use e.g. Moodie, class tasks, e.g. information for school Facebook site. Ethical and Legal Issues related to shared information within an organisation Copyright and what it protects Copyright, often presented with a© symbol is the information an individual displays for others to access via the internet. It gives individuals the right to create personal work that may include films, artworks and personal document write-ups of their own and to permit others to do the same. In New Zealand the 1994 Copyright Law protects original literary, dramatic, musical and artistic works, sound recordings, films, communication works and the typographical arrangement of published editions. Copyright can be applied to text, or graphics particularly that supplied through the internet and textbooks. At High school Examples of Copyright Someone writing about a particular author or play and publishing their own work on the internet/another person can't come along ana use it as their own work. -· Those wanting to copy information should acknowledge the source and the original author. Example of copyrighted materials 8 - When you acknowledge the author and the source of the information e.g. book name of author or title of page, internet website and date accessed (bibliography) - You can break copyright open anything that has been created by another person if you claim it as your own or use it in any way that it is being on sold e.g. Games provided on the internet Related procedures and conventions for privacy and permissions at the school Organisation Policy-The school may be able to set up a password barrier on the wireless internet, a school based password so students can access information. Students must be able to pass a cyber-safety course to decide what is appropriate and what isn't on a school system. Watching "Traffic"-, As a technician the school administrator can watch the amount of traffic that is going to certain or popular sights, e.g. News sights for breaking news within the community e.g. the 3 missing boys in New Plymouth. The traffic slows down as we get further away from the event, socially as it becomes a lower priority than what it was. Traffic flows are important way of gaging what it going on within the school and what students are interested in. It visibly presents the peak (or websites that are of most interest, used frequently). It is like doing a survey e.g. which websites are the most popular to students at this will be answered by the amount of girls that go onto a website. Installing Firewalls- for example the school has set up a firewall to block all social websites from students such as YouTube, Facebook and bebo etc., particularly websites that have high graphic content. Firewalls were created to block pornographic websites and inappropriate materials that some students may be exposed to. Firewall protects users against inappropriate websites. The school policy means students are warned if the firewall is broken they will be warned with a "access denied" page, if the firewall is broken on several occasions the administrator can physically shut down the students account. Sharing files- in the school by limiting the amount of access by way of email memory that can be used by students and staff. Ethical Issues Privacy Act 1993- the New Zealand Privacy Act 1993 is an agency in which controls how storage, disclosure, uses and collection of your personal information is access. The Privacy Act 1993 gives guidelines as to what you are allowed to access toward others personal information and prevents others from giving out information that's not their own personal details. How to control Privacy on your computer It's important that students choose a website that they trust and that they are familiar with a website that is secured. Students must control what information is placed on the internet with their personal details including photos, blogs and passwords etc. and make sure you place appropriate items when using the internet as many personal items can be hacked and used by others e.g. on social sites such as Facebook and Twitter. If students have placed personal information of the internet and it has been written incorrectly, ask for it to be corrected. Use Nicknames instead of first names and surnames to disguise your name. Students must refrain from using credit cards for online purchases at school, for example using security checks online to make sure the website is secure. Students must remember to log out of their account or delete information they have placed on the computer before they leave the class. 9 The school has limitations on how much material can be photocopied from text books, copyrighted materials must be acknowledged by the user. Producing material for assessments that is from other copy righted material particularly internet material e.g. internet, music etc. Backup procedures and conventions for information systems within an organisation. Data can be lost in many ways and usually occurs when the media that the data is backed on fails. Students at the school have many personal and important school related files and documents which are stored into the students H:/Drive or external hard drives such as a USB stick. These hard drives do not last forever and can unexpectedly shut down and database can become corrupt when viruses etc. attack the computer system causing permanent data loss which cannot be recovered. Faults It is essential to have backup/recovery procedures and conventions put in place to ensure personal documents and files are backed up, as once these are permanently demolished due to any of the above occurrences they may never be able to be retrieved again. This is why backing up data is so important and should be regular basis. Two backups during the week in the school will amount of information is stored away from the school. Par videos should be a number one priority as once these are Important business presentations and information should r important priority, or in school terms slide shows or work f back-up data should be your music, videos, bookmarks an Back-up conventions: Back-up conventions relate to having data backed up for each day of the week, e.g. in the school the administrator has data backed-up for each day of the week so that work can be constantly saved if any occurrences may happen that cause data to be lost, weekly backups help to ensure that work is fully backed-up and can be recovered after a fault or natural disaster occurs. The school has a setup of tapes that 1.6TB to back-up the schools whole computer systems; this is managed by the schools administrator. The following disk storage procedures are used as a means of back-up for students and staffs database at school. USB- A USB stick is a popular external hard drive used by many students within the school, otherwise known as a memory stick, it is a small object in which plugs in the provided USB slot in the side, front or back of a student's/staffs computer. The USB 101 allows you to store as much files, documents, music, videos and pictures as you want simply by copying and pasting the files to the USB. CD/CD-RICD-RW- A CD, is also a popular method used by students to 'bum' and copy music files onto. Otherwise known as a compact disc, its main use for disk storage is the storing of music files on to a CD. Information is burnt to the CD from the computer to copy tracks, software programmes like Window Media Player is available on the schools computers and is used for activity such as this, the CDS must be blank however and contain no previous music to in order for them to bum new songs. DVD/DVD-RIDVD-RW- DVD burning methods may be used by staff or the schools administrator to place computer programming on or DVDs in which can be used by the Year 13 JCT leader to place movies on during Tuesday mornings for the school late start. A DVD is one of the newest storage media available. Similar to a CD, a DVD is bigger and faster. A DVD is used to store mainly Movies, Audio, Computer Data and photos. External Hard Drive- This is a very important method and is mainly used by staff in the school saving bulks of computer information onto one external hard drive. External hard drives are plugged into the side of the computer just like your normal memory stick; however the drive itself is much bigger and can hold a greater quantity of information. The computer will immediately recognise the drive as it is plugged into computer and by clicking onto the pop-up on the bottom right hand side, you can set your hard drive to back-up as many times as you wish whether it be daily, monthly, or yearly (Daily is recommended), the hard drive is then left attached to the computer to automatically back-up computer files. External Hard Drives come in large capacities of storage. With an External Drive to copy items is simple, with a drop and drag from the main hard drive to the back-up. Back-up plans placed within the school consider the following points: • How important a student/staff members data is on their system, for example a students work toward an internal, exam practise questions, photos for a school assignment or media for a school assignment is considered as important and should be backed up in a file called 'school work' with sub folders to help breakdown and easily identify each different topic and the data within that file. Most students will use a USB stick as a back-up for important data such as students school work. • Most students at school will have work containing data for different subjects and assignment information including, text, graphics and media. E.g. NZQA exam practise papers or NZQA school internals a student may be working on. • Students back-up can vary, work considered important is more likely to be backed-up upon each saving time on a daily basis, however windows.microsoft.com say it is dependent on the files individuals create, new files should be backed up on a daily or weekly basis. Students whom save a Jot of digital photos should back them up straight away. Scheduled back-ups should also be put in place from external hard drives e.g. for staff at the school, this way the computer can automatically back-up important data on a daily, weekly or yearly basis. Students can also manually back-up work if they only want specific files backed up. • • • • How quickly data should be recovered should also be taken into mind, students whom have assignments due on a specific date may simply save their work as having to find it through the back-up system may be time consuming. The storage used for the back-ups is also important; most school students tend to use USB sticks. The students and staff themselves are mainly responsible for their own back-up procedures and how often they want their work to be backed-up. Students and staff should also take into mind the best times for their data to be backed-up; if students or staffs have lots of files to back-up they may choose a time in which they are not under pressure or busy as backing-up does take time. Back-up procedures: Back-up procedures identify methods or back-up plans implemented, good back-up procedures should identify the following points at a minimum: Back-up intervals: Backup intervals underline the frequency in which data at school is backed-up, a chart form may be used to record how often the data as a whole or specific data should be backed-up for example staff may require a full data back-up 5 nights per week, some things may be backed-up 7 days a week, and others of a lesser importance done weekly or monthly. Thus is dependent on how often the data changes e.g. an assignment done on the computer which is often changed and worked on may require data back-up frequently tQ constantly save the changes made to that document, work that is rarely changed can be backed-up on a less frequent basis. The location of the backup files and alternative computer facilities- For use in the event of a major disaster renders their usual equipment unusable, for example disks etc. stored which contain the schools main data information and software programmes. Who is responsible? The schools administrator is responsible for the backing up the schools main data information and software programmes; however students can also be responsible by backing their work on external devices like a USB. Students must also remember to save their work in different folders when making changes for example fi a student is working a piece of work on Microsoft Word and they make changes, saving both the original copy of that work and the piece of work with the changes made on it is a way of backing-up work. Implications of not having a robust backup plan: There is a chance that any material saved on a computer based system which for both a business and the school is large, this may include all software applications, all material that is saved on the computer, including personal information, historical information, current files, accounts, photos, videos etc. As a result of this the school would be able to get all of the relevant information up to 1 month out of date (monthly basis) this would mean only trying to track down any entries or information created within the last month a lot easier than 10 years' worth of stuff.