Report: Teacher Evaluations Meaningless Without Supporting PD

Many states have been implementing new teacher evaluation systems in an effort to improve teacher effectiveness, but those evaluations have little meaning unless they are accompanied by individualized professional development and support, according to a new report from the School Improvement Network, a provider of professional learning and training resources for educators.

The report, "Beyond Teacher Evaluation: Prioritizing Teacher Instructional Effectiveness with Meaningful Professional Development," examines state policies on teacher professional development related to evaluations, with the goal of helping state and district leaders implement teacher evaluation and support policies that have a meaningful effect on teacher effectiveness.

"For evaluations and observations to have a meaningful impact on educators and the students they teach, educators must have the personalized resources and support they need to improve practice and spur professional growth," said Chet D. Linton, CEO and president of School Improvement Network, in a prepared statement. "Without this connection, evaluations are merely compliance."

Key findings of the report include:

  • Connecticut, Kentucky, New Jersey and South Dakota are the only states that have made a significant effort to implement teacher support related to evaluations;
  • Eight states were confident local education agencies were developing and implementing personalized professional learning plans related to teacher evaluations;
  • Nine states are still in flux over their evaluation system, preventing work towards corresponding professional growth plans;
  • Four states' teacher evaluation systems do not include a professional learning provision for teachers; and
  • Fifteen states offer little or no funding for professional support and resources.

According to the report, states are failing to implement effective teacher support related to evaluations because they don't feel responsible for overseeing compliance with evaluation policies, because they don't have the ability to support local education agencies in this area or because they're still in the early stages of implementation.

The report includes case studies detailing the efforts of Connecticut, Kentucky, New Jersey and South Dakota in creating systems to provide teacher support related to evaluations.

The full report, "Beyond Teacher Evaluation: Prioritizing Teacher Instructional Effectiveness with Meaningful Professional Development," can be found on the School Improvement Network's site.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • DreamBox Math

    Discovery Education Announces Updates to Experience, DreamBox Math

    K-12 learning solution provider Discovery Education has announced enhancements to its Discovery Education Experience and DreamBox Math products, designed to create a more personalized, engaging learning experience for students.

  • abstract pattern of cybersecurity, ai and cloud imagery

    Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • digital dashboard featuring a shield icon, graphs, a world map, and network nodes

    IBM Launches Agentic AI Governance and Security Platform

    IBM has introduced a new software stack for enterprise IT teams tasked with managing the complex governance and security challenges posed by autonomous AI systems.

  • laptop and fish hook

    Security Researchers Identify Generative AI 'Vishing' Attack

    A new report from researchers at Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.