Department of Education Seeking Best Practices for Reopening Schools

The U.S. Department of Education has issued a request for information on how schools, colleges and universities, and early education providers are reopening, operating safely and supporting students during the COVID-19 pandemic. The information gathered will inform ED's Safer Schools and Campuses Best Practices Clearinghouse, a website under development that will highlight lessons learned from the field and provide resources for meeting student, teacher, faculty and staff needs.

The request for information is focused on three topics:

  • Safe and healthy environments. Here, ED is looking for institutional approaches to implementing the CDC's recommended COVID mitigation strategies and preparing for and sustaining in-person operations safely. This includes, for example, social distancing during and between classes, mask wearing, use of pods with educational equity and staffing considerations, and protocols for extra-curricular activities.
  • Providing support to students. Examples here include helping students deal with grief, re-engaging those who have been chronically absent or have had significant adverse experiences in remote learning, and identifying and mitigating equity issues such as broadband access.
  • Teacher, faculty and staff well-being, professional development and support. This includes stabilizing a qualified and diverse educator workforce, providing access to training in effective virtual or hybrid instruction, mental health support, assistance with childcare, and accommodating staff with health risks.

Submissions should provide a description of the lesson learned or best practice plus a summary of its impact and any evidence of positive outcomes, and include "substantive materials" such as "fact sheets, step-by-step guidance, policies or regulations, sample agreements among partners (e.g., between a local education agency and a local health agency, or an employee union), ready-to-implement resources, videos or other media focused on how to implement practices, and descriptions of how strategies have been implemented."

Submissions can be made by e-mail to [email protected] until September 2021. The full request for information can be viewed in the Federal Register.

About the Author

Rhea Kelly is editor in chief for Campus Technology, THE Journal, and Spaces4Learning. She can be reached at [email protected].

Featured

  • tutors helping young students with laptops against a vibrant abstract background

    K12 Tutoring Earns ESSA Level II Validation

    Online tutoring service K12 Tutoring recently announced that it has received Level II validation underneath the Every Student Succeeds Act (ESSA). The independently validated study provides evidence of K12 Tutoring's role in creating positive student outcomes through effective academic intervention and research-based solutions.

  • elementary school boy using a laptop with a glowing digital brain above his head and circuit lines extending outward

    The Brain Drain: How Overreliance on AI May Erode Creativity and Critical Thinking

    Just as sedentary lifestyles have reshaped our physical health, our dependence on AI, algorithms, and digital tools is reshaping how we think, and the effects aren't always positive.

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation in Education

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education, from preschool through higher education.

  • a cloud, an AI chip, and a padlock interconnected by circuit-like lines

    CrowdStrike Report: Attackers Increasingly Targeting Cloud, AI Systems

    According to the 2025 Threat Hunting Report from CrowdStrike, adversaries are not just using AI to supercharge attacks — they are actively targeting the AI systems organizations deploy in production. Combined with a surge in cloud exploitation, this shift marks a significant change in the threat landscape for enterprises.