A $1.5 Million Question Mark

An In-Depth Examination of IT Spending, Vendor Dominance, and Accountability at the Santa Barbara County Education Office

The Quest for Transparency: When Public Records Illuminate Systemic Issues

In our communities, public education offices are more than just administrative bodies; they are stewards of our children's future, managers of significant taxpayer funds, and operators of the critical infrastructure that supports modern learning. Ensuring these institutions operate with transparency and accountability is not just a civic ideal, it's a public right. The California Public Records Act (CPRA) provides every citizen with the tools to look behind the curtain, to understand how decisions are made, how money is spent, and how well our public agencies are serving their mission.

This investigative blog post series embarks on such a quest for transparency, focusing on the Santa Barbara County Education Office (SBCEO). Between April and May of 2025, a series of CPRA requests were initiated. These requests were not born from idle curiosity. They followed extensive prior attempts by a then-internal IT technician, Victor McConnell, to address escalating concerns about IT governance, vendor relationships, cybersecurity preparedness, and personnel management directly with SBCEO leadership and Human Resources. When internal channels appeared to yield insufficient action on systemic issues, the CPRA became the necessary next step to seek documented facts.

The aim was clear: to obtain public records that could shed light on how SBCEO's Information Technology Services (ITS) department operates, how it manages multi-million dollar vendor contracts, its approach to cybersecurity (especially in light of a critical 2021 Grand Jury report), and its oversight of internal resources and personnel.

The journey for these records, as is sometimes the case when seeking information from public agencies, has been complex. It has involved phased document productions, significant redactions of information that was later challenged, outright denials of access to certain categories of records, and detailed correspondence with SBCEO's legal counsel. Despite these hurdles, the documents that have been produced seem to illuminate a concerning landscape.

At the forefront of these initial findings is what appears to be a deeply entrenched and financially significant relationship with a single external IT vendor, a partnership that seems to dominate many core aspects of SBCEO's technology operations. As we will explore in this series, this reliance raises critical questions about cost-effectiveness, the utilization of SBCEO's own internal IT staff, the independence of technical oversight, and ultimately, whether the public is receiving the best possible value and service from its educational support agency.

This series will unpack the data provided by SBCEO itself, financial records, internal communications, and official responses, to piece together a clearer picture of an agency at a potential crossroads. It's a story about more than just IT; it's about accountability, the stewardship of public trust, and the vital role transparency plays in ensuring our public institutions truly serve the public good. These Records can be found HERE.

The CompuVision Nexus: A Multi-Million Dollar Partnership Dominating SBCEO’s IT Landscape

Public records often tell a story, and in the case of the Santa Barbara County Education Office (SBCEO), financial documents released under the California Public Records Act (CPRA) begin to sketch a narrative of a remarkably deep and costly relationship with a single Information Technology vendor: CompuVision.

The Numbers: Over $1.54 Million and an All-Encompassing Role

An analysis of SBCEO's own financial summaries (primarily "ReqPay21c" reports from their ESCAPE system, provided in a batch of records on May 15, 2025) reveals a striking figure. Between fiscal year 2021/22 and early 2025, SBCEO requisitioned or had purchase orders amounting to approximately $1,542,880.35 with CompuVision.

This substantial sum wasn't for a one-off project or a niche specialty. The records look to indicate that CompuVision has been contracted for a vast array of core IT services, positioning them as a central, almost indispensable, operational partner. The services covered by this spending include:

  • Ongoing, Foundational IT Support: Multiple, large blanket purchase orders for "LAN Support" (e.g., Reqs. #95B22-00005, #95B23-00006, #95B24-00002, #95B25-00009, often budgeted at $200,000 per year), and extensive "Escape infrastructure labor" for SBCEO's financial system (e.g., Reqs. #00B22-00008, #00B23-00017, #00B24-00002, #00B25-00003, with annual requisitions sometimes approaching $190,000).

  • Cybersecurity Services & Incident Response: Including "Escape Cyber Security Incident Response" (Req. #00B24-00059 for $15,000) and "Network (LAN) Cyber Security Incident Response" (Req. #95B24-00011 for $20,000). They also provide ongoing security services like "Huntress Converged Cybersecurity / Managed EDR Protection" (e.g., Req. #95B25-00004 for $26,520 annually) and "Tenable.io Vulnerability Scanner Subscription" (Req. #95P24-00054 for $4,262.82).

  • Hardware and Software Procurement & Implementation: The records show CompuVision sourcing and installing critical infrastructure, such as Fortinet firewalls and subscriptions (e.g., Req. #00P25-00027 for $27,380.06), SonicWALL license renewals (e.g., Req. #00P24-00024 for $55,984.17), and the nearly $100,000 Ruckus switch deployment at the North County office (Req. #95P25-00042 for $97,180.78).

  • Identity Management & Authentication: CompuVision has been the provider for "Gemalto Dual Factor Authentication Hosting" across various SBCEO systems, including Office 365 and the Escape network, with multiple requisitions totaling tens of thousands of dollars annually (e.g., Reqs. #00B25-00004 for $43,200; #95P25-00013 for $41,600).

  • Managed Monitoring Services: Recurring costs for "NetAlert Managed Services" (e.g., Reqs. #95B22-00002, #95B23-00008, etc., typically $23,940 annually).

This extensive list, derived directly from SBCEO's financial summaries, seems to demonstrate that CompuVision is not merely an auxiliary support vendor but is fundamentally involved in the daily operations, security, and strategic hardware decisions of SBCEO's IT department.

While this $1.54 million figure is substantial on its own, it's important to remember it reflects only what was present in the specific batch of financial summaries provided by SBCEO. Whether this constitutes the entirety of the financial relationship over this period, or if further records would reveal an even larger commitment, remains an open question.

The depth of this vendor integration becomes even more critical when juxtaposed with the capabilities of SBCEO’s own internal IT staff and the history of internal discussions regarding how these essential IT functions should be managed. As we will explore, questions were being raised from within SBCEO about this level of dependency, the cost-effectiveness of such extensive outsourcing, and whether the considerable skills of in-house technical staff were being fully and appropriately utilized even as these expenditures were being approved.

Internal Expertise: An Underutilized Asset?

The Santa Barbara County Education Office's significant financial commitment to its primary IT vendor, CompuVision, exceeding $1.54 million in identifiable requisitions from just one batch of public records, raises a fundamental question: what about SBCEO's own in-house IT talent?

SBCEO reportedly employs an internal Information Technology Services (ITS) team, understood to consist of approximately six IT technical staff (referred to as the "Micro" team or Computer/Network Technicians I) and around three additional software engineers primarily dedicated to the "Escape" financial system. With this internal capacity, one might expect a more balanced approach to IT operations, where external vendors supplement, rather than dominate, core functions.

However, a narrative of underutilized internal expertise and sidelined capabilities emerges from a review of internal communications, reports previously submitted to SBCEO leadership and Human Resources by former IT technician Victor McConnell, and the very nature of the tasks outsourced to CompuVision.

A Pattern of Sidelining? Documented Concerns from Within:

Internal documents, including emails, chat logs and formal reports, and a comprehensive Exit Interview submitted by McConnell, paint a picture where qualified internal staff allegedly found their roles diminished and their expertise often bypassed.

  • Core Responsibilities Outsourced: A central theme in these internal documents is the assertion that core IT duties, explicitly outlined in the job descriptions of Computer/Network Technicians, were systematically reassigned to CompuVision. This included critical functions like:

    • Firewall Administration: Despite internal staff having documented responsibilities and skills (including specific vendor knowledge like SonicWall and Cisco listed in job descriptions), access to manage firewall configurations was allegedly restricted, with these tasks deferred to CompuVision. Emails from January 2025, for instance, detail needing CompuVision-provided credentials via ITS supervisors just to troubleshoot basic network issues or correct DNS misconfigurations on firewalls they were physically installing.

    • Network Configuration (DHCP, VLANs): Chat logs appear to show internal technicians unable to access switch configurations or resolve DHCP conflicts directly, being told by their supervisor, Randy Smith, that "[CompuVision] moved DHCP last week" and to "Reach out to [them] on this one," or that they don't have logins for Cisco switches as "All compuvision".

    • Wireless System Management: Teams messages highlight an instance in April 2025 where access to the wireless controller was allegedly restricted to ITS leadership and CompuVision, effectively removing a core, documented duty from the technical team.

  • The Cost of Sidelining: A letter sent to SBCEO makes a direct financial argument, calculating CompuVision's effective hourly rate for such tasks to be approximately three to four times higher than that of the qualified internal Network Technicians. This suggests that the decision to outsource wasn't driven by a lack of internal capability, but rather a management choice that came at a significant premium.

Ignored Suggestions for Cost-Effective, Internally-Managed Solutions:

The internal records also suggest that initiatives by technical staff to propose or implement more cost-effective, internally manageable solutions were sometimes met with resistance or were ultimately overridden by decisions favoring existing vendor relationships or different external solutions.

  • Networking Hardware Alternatives: An email from Victor McConnell to his supervisor, dated November 21, 2024 (then forwarded to the IT manager and included in the PRA response) makes a detailed "Case for Adopting the Ubiquiti Networking Stack." This proposal highlighted Ubiquiti's lack of licensing fees, cost-effectiveness, ease of management, and robust ecosystem as a strategic alternative to more expensive options like Cisco or Ruckus (which CompuVision was later engaged to install at the North County office). While ITS leadership did engage in some email discussion comparing Ruckus to Cisco, the ultimate decision to proceed with a high-cost Ruckus deployment via CompuVision seemed to have occurred.

  • The Casmalia SPED Site: As mentioned in the public comment to the SBCEO Board on May 8, 2025, a detailed, enterprise-grade project plan for the Casmalia SPED site, addressing critical connectivity and safety needs, was reportedly developed by internal ITS staff in collaboration with the School Safety Liaison. This plan, which could have utilized cost-effective solutions similar to those successfully deployed at the ECE Main Street facility, was allegedly stalled by leadership, with consumer-grade equipment being installed instead by other parties, leaving issues unaddressed for months.

A Contradiction: Positive Reviews vs. Perceived Underutilization

Adding another layer to this narrative of underutilized expertise are the performance reviews. Victor McConnell's 2-month (January 2024) and 5-month (April 2024) probationary reviews paint a picture of a highly effective and proactive employee:

  • "Victor has demonstrated a strong technical skill set while also showing the drive to take lead and see projects from start to finish. His efforts have already helped benefit the security of SBCEO..." (Jan 2024 Review).

  • "Victor has become an enormous asset to the team and the organization. His technical skills, combined with his outgoing personality have been nothing short of outstanding to the progress of many projects. Victor has single handedly moved over 100 computers to the Azure cloud service... Victor was eager to take over this project, make suggestions and implement the changes..." (April 2024 Review).

  • Both reviews conclude with "I have no suggestions at this time and there are no areas for improvement."

This documented praise for technical ability, project leadership, and proactive problem-solving stands in stark contrast to the subsequent internal allegations of being sidelined, having core responsibilities outsourced, and seeing internally-driven initiatives and cost-saving suggestions ignored. Reported chat logs with the IT supervisor from January and May 2024 reflect an acknowledgment of this dynamic, stating, "I feel our lead technicians are often assigned lower-level tasks, and I recognize you can handle significantly more. Historically, consultants have managed most of the complex projects.". (Paraphrased)

This apparent disconnect between recognized internal capability and the pervasive reliance on external vendors for core IT functions suggests that the issue may not be a lack of internal talent, but rather systemic choices in how that talent is managed, empowered, and valued within SBCEO's ITS department. The financial and operational consequences of these choices are precisely what the public, and now SBCEO's own auditors, are being asked to examine.

Leadership and Oversight: Are the Right Questions Being Asked at SBCEO?

The preceding parts of this series have detailed over $1.54 million in identified payments from the Santa Barbara County Education Office (SBCEO) to a single IT vendor, CompuVision, and a pattern where internal IT expertise was allegedly sidelined while cost-effective internal solutions were reportedly ignored. These documented trends naturally lead to crucial questions about the nature of IT leadership and oversight within SBCEO. Is the current structure fostering sound, independent, and cost-effective technological stewardship, or has it become overly reliant on external validation and execution?

The Critical Role of Independent Technical Leadership

In any public agency entrusted with significant budgets and the management of critical infrastructure, strong internal leadership with relevant domain expertise is paramount. In Information Technology, this means leadership (like an Administrator or Manager of IT Services) that can:

  • Independently assess the agency's technical needs.

  • Critically evaluate vendor proposals and the cost-benefit of outsourcing versus in-house solutions.

  • Provide robust technical oversight of implemented projects and services.

  • Develop and champion a forward-looking IT strategy that aligns with the agency’s mission and best practices.

  • Ensure that internal technical staff are effectively utilized, developed, and empowered.

Observations and Questions Regarding ITS Leadership at SBCEO

An analysis of Internal documents, including a comprehensive Exit Interview submitted to HR in April 2025 and various internal reports and communications, raise questions about whether key ITS leadership positions at SBCEO, specifically the Administrator, Information Technology Services and the Manager, Information Technology Services, possess the deep, formal, and current technical IT backgrounds necessary for these critical functions.

These are not questions about dedication or work ethic, but about the appearance of a potential experiential gap in hands-on, high-level IT architecture, cybersecurity strategy, and independent vendor management. The concern, as articulated in the "Exit Interview," is that such a gap could lead to:

  • Over-reliance on external vendors for technical direction: Instead of internal leadership driving strategy and using vendors for specific, supplemental tasks, the dynamic may invert, with vendors heavily influencing strategy and core operational decisions.

  • Inability to effectively vet vendor recommendations: Without sufficient independent technical depth, it can be challenging to critically question a primary vendor's proposals or assess if alternative, perhaps more cost-effective or internally manageable solutions, are viable.

  • Dismissal or misunderstanding of internal technical expertise: Suggestions or warnings from qualified internal technical staff might be undervalued or misunderstood if leadership lacks the framework to assess their technical merit independently.

The "Exit Interview" reportedly argues that while ITS leadership points to their extensive collective experience, this experience may not align with the needs of a modernizing organization and its newer staff. The document suggests that technicians, with their direct, hands-on knowledge, should play a more significant part in articulating the agency's technical abilities and obstacles. Furthermore, the interview highlighted concerns such as leadership job descriptions containing outdated technologies like COBOL and lacking clear responsibilities for crucial modern IT areas like cybersecurity and cloud infrastructure.

Procurement and Project Management: Case Studies in Questionable Oversight?

Several instances highlighted in public records and internal documents raise questions about the effectiveness of IT procurement and project management oversight:

  • The $97,000+ North County Switch Deployment: As mentioned in a public comment to the SBCEO Board on May 8, 2025, on-site technical staff responsible for the North County region reportedly only learned the full scope and vendor choice (Switches via CompuVision, per PO 95P25-00042) for this significant upgrade through CPRA requests, after internal inquiries were allegedly ignored. Emails from November 2024 within the PRA responses show the ITS Manager discussing the high cost of Cisco switches and obtaining a quote from CompuVision, for another brand of switches as a comparable alternative. While due diligence in comparing options is positive, the alleged lack of consultation with the frontline technicians who would manage and support these systems regarding final selection and deployment plans is a concern. Was their deep, site-specific knowledge leveraged before the final decision and purchase from the external vendor?

  • The Casmalia SPED Site Saga: Internal project plans and emails from September 2024, show internal ITS staff, in collaboration with SBCEO's School Safety Liaison, developing a detailed, enterprise-grade plan to address urgent connectivity and safety needs at this underserved site. This plan was reportedly endorsed by the Safety Liaison and even by the Associate Superintendent of Administrative Services in terms of its structure and professionalism. However, according to the May 8th Board comment, this internally developed, professionally presented plan was allegedly stalled by ITS and SPED leadership, and consumer-grade equipment was installed instead by other parties, leaving critical needs unaddressed for months. This raises questions about why a well-researched internal proposal, aligned with user needs and safety priorities, was seemingly overridden without a clear, technically sound public justification.

  • ERP Summaries vs. Original Vendor Invoices: The primary mode of financial disclosure through CPRA has been SBCEO's internal ERP system summaries ("ReqPay21c" reports). While these are public records, they are summaries. Original vendor invoices often contain more granular detail, specific line items, hourly breakdowns, detailed service descriptions, that are crucial for full public understanding of precisely what services were rendered for the amounts paid. The preference to provide summaries over original source documents can limit comprehensive public oversight into the specifics of large vendor expenditures.

These examples, drawn from SBCEO's own records and internal communications, suggest a potential pattern where IT leadership decisions regarding procurement and project management may not always fully leverage available internal technical expertise, may rely heavily on recommendations from the primary external vendor, or may lack the rigorous, independent technical scrutiny expected for stewardship of public funds.

If leadership is not asking the tough technical questions, or perhaps lacks the deep, current technical background to do so effectively and independently, who then ensures that SBCEO is truly getting the best value, the most appropriate solutions, and the most robust oversight for its significant IT investments? These are questions the ongoing management audit, and ultimately the SBCEO Board, must thoroughly address.

Cybersecurity: Spending Millions, But Is SBCEO Truly Safer?

Cybersecurity is not an abstract concern for educational institutions; it's a fundamental necessity. Schools and county offices of education are custodians of vast amounts of sensitive data, from student records and special education plans (IEPs) to financial information and staff personal details. Protecting this data is not just an IT task; it's a profound public trust.

In 2021, the Santa Barbara County Civil Grand Jury sounded a clear alarm in its report, "Cybersecurity for School Districts in Santa Barbara County." The report highlighted critical deficiencies across the county's educational institutions, specifically pointing to a lack of mandated formal cybersecurity training, insufficient use of multi-factor authentication (MFA), and underfunding of IT, all creating significant risks. SBCEO, as a central county education entity, was expected to play a key role in addressing these concerns.

SBCEO's Response: Significant Spending, Lingering Questions

In the years following the Grand Jury report, public records show SBCEO directed considerable funds, often through its primary IT vendor CompuVision, towards services and products ostensibly aimed at bolstering cybersecurity. This includes expenditures for:

  • Multi-Factor Authentication: Requisitions for "Gemalto Dual Factor Authentication Hosting" through CompuVision (e.g., Reqs. #00B25-00004 for $43,200; #95P25-00013 for $41,600 for FY24-25).

  • Endpoint Detection and Response (EDR): "Huntress Converged Cybersecurity / Managed EDR Protection" also via CompuVision (e.g., Req. #95B25-00004 for $26,520 annually for FY24-25).

  • Vulnerability Scanning: "Tenable.io Vulnerability Scanner Subscription" through CompuVision (e.g., Req. #95P24-00054 for $4,262.82).

  • Incident Response Services: Blanket POs for "Escape Cyber Security Incident Response" (Req. #00B24-00059 for $15,000) and "Network (LAN) Cyber Security Incident Response" (Req. #95B24-00011 for $20,000), both with CompuVision.

  • Firewall Hardware and Subscriptions: Significant spending on Fortinet and SonicWALL hardware and ongoing subscriptions, often procured and managed via CompuVision.

Despite these substantial financial outlays, critical questions about the effectiveness and strategic oversight of SBCEO's cybersecurity posture persist.

Past Security Incidents and Unheeded Internal Warnings

The investment in external security services and products did not occur in a vacuum, nor did it prevent security issues. Reportedly, internal documents previously submitted to SBCEO leadership and HR reveal that significant cybersecurity concerns and even actual incidents were being identified from within ITS.

  • The "Escape Security Incident": A PRA response has a reference to a potential Cybersecurity event that may have affected the Escape Financial system.

  • Internal Cybersecurity Risk Report: A reported collection of internal documents and a cybersecurity risk assessment. This report is suggested to have warned SBCEO leadership about:

    • Vendor Dependency: Core IT infrastructure, including firewalls and switch configurations, is outsourced to third parties, restricting internal visibility and response capabilities.

    • Access Restrictions for Internal Staff: Internal Information Technology Services (ITS) staff are routinely denied administrative access to critical systems, creating operational delays and security blind spots.

    • Lack of Policy Enforcement & Decentralized Oversight: There are no unified cybersecurity policies across departments, and SPED (Special Education) sites are allowed to implement their own network infrastructure, often without technical vetting or compliance enforcement.

    • The report reportedly provided actionable short, mid, and long-term recommendations, including immediately restoring internal firewall access to ITS technicians, enforcing unified content filtering, deploying phishing simulations, and auditing SPED-managed infrastructure.

  • MFA Rollout Concerns: The implementation of the "GRID" MFA system (using Gemalto, facilitated by CompuVision) seemed to also be a subject of internal concern. Emails from Victor McConnell to ITS leadership in August 2024 is said to have suggested user frustrations, operational disruptions, and offered concrete suggestions for a more phased, user-friendly rollout, including better use of existing Microsoft MFA capabilities and more targeted application of the new tool. These suggestions, aimed at improving both security adoption and user experience, were reportedly largely ignored by ITS leadership. 

These internal warnings and documented incidents raise a critical question: If SBCEO was investing heavily in external cybersecurity vendors and tools, why were these internal vulnerabilities persisting, internal expert recommendations allegedly unheeded, and significant security incidents still occurring? Is there a disconnect between the services being paid for and the actual, on-the-ground security posture and practices being implemented and overseen by ITS leadership?

The 2021 Grand Jury report called for robust cybersecurity measures. The public records show significant spending. Yet, internal documents suggest a reality where foundational security principles, like empowering trusted internal staff with necessary access and heeding their expert advice, were potentially being undermined. This begs the question of not just how much is being spent on cybersecurity, but how effectively those resources and strategies are being managed by those in charge at SBCEO.

A Vision for Safer Schools: The Sustained Internal Push That Preceded Public Scrutiny

The efforts to bring transparency to the Santa Barbara County Education Office's (SBCEO) IT operations and spending, as detailed in this post, were not impulsive actions. They followed a prolonged period of dedicated internal advocacy aimed at fostering a safer, more modern, and equitable technological environment for all students and staff. This commitment was crystallized in a "Safe Schools" initiative, a concept developed over years of experience and internally championed at SBCEO for months prior to any public records requests.

A significant catalyst for formalizing this vision was the persistent and deeply concerning state of IT infrastructure at key SBCEO-run sites, particularly the Casmalia SPED facility. The claimed conditions and inequitable resources observed there, and at other sites like McClelland, directly contradicted SBCEO's stated mission and underscored an urgent need for a systemic, not piecemeal, approach to safety and modernization. For instance, while enterprise-grade solutions were proposed for Casmalia (the same kind later deployed at an administrative site), leadership delays reportedly resulted in consumer-grade equipment being installed, where it remained unaddressed for months. It became an ethical imperative to advocate for comprehensive change.

This "Safe Schools" concept, with its emphasis on leveraging internal expertise, ensuring equitable resource distribution, and building robust, secure infrastructure for all students and staff, was not developed in isolation. Detailed pitches and solution-oriented discussions were held with ITS and Administrative Services leadership, including Associate Superintendent of Administrative Services (whose purview includes IT), over several months. The objective was always clear: to foster collaboration and drive essential improvements from within, using frontline knowledge and technical best practices to address longstanding challenges.

The decision to subsequently pursue these matters through formal CPRA requests, and to bring these concerns to the attention of the SBCEO Board on May 8, 2025, and now to the public, arose only after these sustained, high-level internal efforts to champion proactive, positive change did not result in the anticipated transparency or commitment to the systemic reforms necessary to truly embody a "Safe Schools" environment. The pursuit of public records thus became an essential next step in seeking the accountability needed to ensure SBCEO fully meets its obligations to the students, staff, and communities it serves. The aim was, and continues to be, to help SBCEO align its practices with its vital mission.

The Transparency Deficit: A Pattern of Obscurity at SBCEO?

The California Public Records Act (CPRA) exists to ensure that the public can access information about the workings of its government agencies, fostering accountability and trust. However, the process of obtaining records from the Santa Barbara County Education Office (SBCEO) regarding its IT operations, vendor relationships, and personnel oversight has, at times, felt like navigating a deliberately constructed maze, raising questions about the agency's commitment to full transparency.

Redactions and Withholdings: A Shifting Landscape of "Security"

A primary hurdle in this CPRA journey has been SBCEO's approach to redacting information and withholding records.

  • Initial Secrecy Over Basic Hardware: In initial responses to requests for procurement documents (determination letter dated April 21, 2025), SBCEO's legal counsel redacted the make and model of network hardware, such as switches and firewalls. The justification cited was Gov. Code § 7929.210(a), claiming disclosure "may reveal vulnerabilities to SBCEO's information technology system."

  • Challenging the Narrative: This stance was immediately challenged. Correspondence pointed out that SBCEO itself had previously disclosed such details in public board agendas (surplus equipment lists) and even in its own IT job descriptions, which named specific vendors like Cisco and SonicWall. After these pointed examples of its own prior disclosures, SBCEO's counsel did agree to unredact vendor names in a revised production. However, they maintained their position on redacting the make and model of currently used IT security components.

  • The Glaring Contradiction: The most striking inconsistency emerged from SBCEO's own "final batch" of records. While continuing to obscure basic hardware details, these same documents openly revealed the names of numerous specific, and arguably more sensitive, software and security service providers. This included their Multi-Factor Authentication (MFA) provider (Gemalto), Endpoint Detection and Response (EDR) solutions (Huntress, Microsoft Defender), their vulnerability scanning tool (Tenable.io), and their Remote Monitoring & Management (RMM)/backup service (Datto/Kaseya). If merely naming a technology product creates a security risk, why was this standard not uniformly applied? This selective approach to redaction significantly undermines the credibility of the "security" justification for withholding basic hardware information.

  • A Different Approach Elsewhere: The transparency demonstrated by the Mendocino County Office of Education (MCOE) provides a stark contrast. In response to a similar PRA request in May 2025, MCOE promptly provided a full list of network infrastructure purchases, including make, model, vendor, and cost, without such redactions. This begs the question: why is information considered a high security risk by SBCEO apparently viewed as routine public record by another California County Office of Education?

Access Denied: Personnel Oversight Kept from Public View

Beyond IT hardware, attempts to gain insight into the management and oversight of SBCEO's ITS department were met with a firm denial. A CPRA request dated April 23, 2025, sought records such as performance evaluations for ITS leadership, disciplinary records within the department, exit interviews from former SBCEO employees (which might shed light on systemic issues), and formal complaints related to ITS operations.

On May 5, 2025, SBCEO's counsel denied this entire request, citing exemptions for personnel privacy (Gov. Code § 7927.700) and the "catch-all" public interest balancing test (Gov. Code § 7922.000), arguing disclosure could dissuade future complainants. While employee privacy is a legitimate concern (and redaction of purely private details was consented to in the request), a blanket denial of access to records that could illuminate leadership accountability, departmental management, the handling of grievances, or reasons for staff turnover severely limits public oversight.

The Public Record: Delays and Discrepancies?

Even the process of accessing basic public meeting records has raised eyebrows. Following a public comment made to the SBCEO Board on May 8, 2025, where many of these transparency and operational concerns were directly aired, and PRA correspondence was submitted as supporting documentation, a video of the meeting was posted online by SBCEO within a few days. However, as of May 17, 2025, the official written minutes of that meeting, which would typically document submitted written comments and attach such supplementary materials, had not yet been made publicly available on SBCEO's website.

While administrative processes take time, any unusual delay in posting complete official minutes, especially when they contain critical public input and supporting documents, can contribute to a perception of controlled information flow rather than proactive transparency.

A "Posture Towards Secrecy"?

Collectively, these experiences, the shifting justifications for redactions, the stark contrast with other agencies' openness, the broad denial of personnel oversight records, the primary provision of ERP summaries over potentially more detailed original invoices, and questions around the timely release of complete public meeting records, contribute to what was described in the May 8th Board comment as a potential "posture towards secrecy about basic infrastructure."

This isn't just about frustration for a records requester; it's about a fundamental principle. When public agencies create unnecessary hurdles or apply exemptions inconsistently, it erodes public trust and makes it harder for citizens to hold them accountable for the stewardship of public resources and the effectiveness of their operations. The CPRA was enacted to combat such opacity, but its effectiveness relies on the good-faith compliance of the agencies it governs.

The Path Forward: A Management Audit and the Enduring Call for Accountability at SBCEO

The journey through public records and internal SBCEO documents has, as detailed in this series, illuminated a concerning landscape within its Information Technology Services (ITS) department. We've seen over $1.54 million in identified payments to a single IT vendor, CompuVision, for a vast array of core services, often while the agency's own qualified internal IT staff were allegedly sidelined and their cost-effective solutions reportedly ignored.

Questions have been raised about the depth of independent technical oversight within ITS leadership, the effectiveness of substantial cybersecurity expenditures in light of past incidents (like the "Escape Security Incident") and unheeded internal warnings, and a pattern of resistance to full transparency that appears inconsistent with practices at other public educational agencies.

These are not trivial matters. They touch upon the core responsibilities of a public agency: the prudent use of taxpayer funds, the effective management of critical infrastructure, the security of sensitive data, and the foundational expectation of transparency.

The Pending Management Audit: A Step, But Not a Solution

SBCEO leadership has confirmed that an IT management audit is underway, while an external audit can be a valuable tool for identifying systemic issues and recommending improvements, it is crucial to remember, as was stated directly to the SBCEO Board on May 8, 2025, that an audit itself does not possess enforcement power. The responsibility for implementing genuine reform and ensuring accountability rests squarely with SBCEO's administration and, ultimately, with the publicly elected Board of Education for matters under its statutory oversight.

Unanswered Questions and the Public's Enduring Right to Know

Despite the production of some records, SBCEO's designation of its May 15, 2025, document release as the "second and final batch" leaves many significant questions unanswered and numerous categories of requested documents still seemingly unaddressed, incompletely provided, or improperly withheld.

The community served by SBCEO, its dedicated employees, and the taxpayers who fund its operations deserve clear, unambiguous answers:

  • Why has there been such extensive and costly reliance on a single IT vendor for core functions when qualified internal staff were allegedly available and, at times, proposing more cost-effective solutions?

  • What specific, independent technical oversight mechanisms are in place within ITS leadership to critically vet vendor proposals and ensure optimal, cost-effective IT strategies are pursued?

  • How effective have the multi-million dollar investments in cybersecurity truly been, particularly in light of past incidents and the 2021 Grand Jury's warnings? Were internal expert recommendations on security fully considered and acted upon?

  • Why the apparent inconsistencies in applying CPRA transparency standards compared to other public educational agencies, particularly regarding basic infrastructure details?

  • What concrete steps will be taken to ensure that the duties of classified IT staff are respected, their expertise fully utilized, and that outsourcing only occurs when legally justified and genuinely in the public's financial best interest?

A Call for True Accountability and Reform

The path forward requires more than internal reviews; it demands a demonstrable commitment to change from the highest levels of SBCEO. The calls to action presented to the SBCEO Board on May 8, 2025, remain critically relevant:

  1. Full Public Transparency of the IT Audit: Request that Superintendent Salcido ensure the full findings of the ongoing IT management audit are compiled into a public report, published with only those redactions strictly required by law.

  2. Standardized, Transparent IT Policies: Adopt and enforce clear, standardized IT infrastructure, procurement, and safety policies across all SBCEO-operated sites, with a particular emphasis on bringing JCCS and SPED sites into full compliance with enterprise best practices.

  3. Independent Cybersecurity Review: Initiate a truly independent cybersecurity assessment, separate from the current management audit and existing vendor relationships, to rigorously evaluate risks, identify vulnerabilities, and assess alignment with longstanding recommendations like comprehensive MFA.

  4. Procurement Accountability at the Board Level: Ensure that all major technology procurements and vendor contracts presented to the Board for approval explicitly detail how they support student safety and program needs, why internal technical expertise cannot fulfill the requirement, and a transparent cost-benefit analysis against in-house options.

Ensuring the safety of students, securing their data, wisely stewarding public funds, and operating with unwavering transparency are not optional extras for a public education office, they are foundational duties. The information brought to light through this process suggests systemic issues within SBCEO's IT governance that demand urgent, open, and accountable reform. The public, and the dedicated educators and staff of SBCEO, deserve nothing less.

Previous
Previous

Vendor-Driven or Needs-Driven? SBCEO's Switch Deployment

Next
Next

📡 The 2025 Cybersecurity Threat Landscape: What Schools Need to Know