Feeds

School data not good enough

The public sector gravy train steams on

The essential guide to IT transformation

Educational computer systems in Britain face a radical overhaul in order to improve authorities' intelligence about the children in their care.

Ruth Kelly, Secretary of State for Education & Skills, gave a hint of the enormity of the task during a speech at the education technology trade show, BETT, in London today.

Data held about school children must be brought up to the "highest standard", she said, so that it could be shared with other government departments, parents and teachers.

"We intend to establish governance arrangements which will bring together the key partners across the children and learning sectors to tackle this issue system-wide," she said.

Behind the scenes, the British Educational Communications and Technology Agency, a quango, has been entrusted with much of the strategic direction behind this and related technological schemes in education.

The Department for Education & Skills wants schools to share data about children with police and social services. But many school systems are not up to scratch. Becta will accordingly be pushing for schools to overhaul their management information systems. These will be linked into learning environments, as well as the systems of external agencies.

The department also intends to fold pupils' data back into the system to tailor learning provision to their individual needs.

This is all going to take a lot of money, not least because bringing school data up to scratch is going to depend on the completion of a number of other schemes being co-ordinated at Becta.

As it happens, every one of the key policy areas being tackled by Becta for the DfES (infrastructure, data, learning, connectivity) will have some bearing on the validity of data held in education.

Not surprisingly, said a source at Becta, improving the quality of data in education is going to be a "mammoth task".

In 2005, the quango began setting up procurement frameworks to govern suppliers who do the work in these areas. The most significant framework agreements, which will govern the detail of Kelly's plans, are still on the drawing board.

Frameworks for infrastructure services, learning services and MIS systems will be decided this year, even as Becta and the DfES are pushing for schools to get on with upgrading their systems in these areas. ®

Build a business case: developing custom apps

More from The Register

next story
Super Cali signs a kill-switch, campaigners say it's atrocious
Remote-death button bad news for crooks, protesters – and great news for hackers?
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.