Common sense technology policy2
-
Upload
john-robinson -
Category
Documents
-
view
477 -
download
1
description
Transcript of Common sense technology policy2
Common Sense Technology Policy
Balancing Security and Access
Access vs. Safety
The Big 6 Concerns?Inappropriate Content
Predators
Misuse of Mobile Communications Devices
Cyberbullying
Network Security
Copyright Infringement
Inappropriate Content
Misperceptions About Inappropriate Content
Web Content Can Be Completely Controlled
Misperceptions About Inappropriate Content
Intentional Viewing of Objectionable Content by Students
Inappropriate Content: The Reality
CIPAFERPA
HIPA
Legal Issues Funding Issues
State Law
Local Policy
Internet Predators
Misperceptions Internet Predators
Adult male posing online to lure very young children into places where they can be kidnapped and assaulted
Misperceptions Internet Predators
Young children being lured by predators into giving personal information that leads to them being harmed.
Predators: The Reality
• Most predation and ensnarement crimes involve adolescents.
• Predators play to teens need to connect, need for info about sex, their search for romance.
• Teens usually do not respond to predator’s solicitations and dismiss them as “litter” on the information superhighway.
Misuse of Mobile Communications Devices
Students recording other students and school staff and postinghttp://dangerouslyirrelevant.org/2008/03/cell-phone-came.html
Misuse of Mobile Communications Devices
Sexting
Misuse of Mobile Communications Devices
Cheating on School Tests and Assignments
Misuse of Mobile Communications Devices
Sending threatening messages or bullying.
Cyberbullying
Pew Research Center Research on Cyberbullying
• 1 in 3 online teens have experienced online harassment.
• Girls are more likely to be victims.• Teens say they are more likely to be
bullied offline than online.• Teens who share their identities and
thoughts online are more likely to be targets than those who lead less active online lives.
Pew Research Center Research on Cyberbullying
• 1 in 6 teens said someone had forwarded or posted communication they assumed was private.
• 13% said someone had spread a rumor about them online.
• 13% said someone had sent them a threatening or aggressive email.
• 67% said bullying happens more offline than online
Network Security
Data Theft and Identity Theft
Network Security
Disabled, Hacked or Vandalized Networks
Network Security
Virus and other Malicious Network Attacks
Dealing with Inappropriate Content
• Focus on teaching students Internet literacy, safety and responsibility.
• Enforcement of reasonable AUPs.• Teachers should monitor students while
online.• Use history folders and other
technological measures to monitor students.
Dealing with Internet Predators
• Establish open communications between adults and young people.
• Parents and professional educators must take responsibility for learning about technologies and how to monitor their young people.
• Adults must engage young people in conversations about the problem of adults posing online for the purpose of engaging in sexual activity.
Dealing with the Misuse of Mobile Communications Devices
• Teach students proper and constructive uses of MCDs rather than banning them.
• Directly teach students when to use the devices appropriately.
Dealing with Cyberbullying
• Provide students, parents, and all educators with information regarding the prevention of cyberbullying.
• Be aware of all laws and policies regarding cyberbullying.
Dealing with Network Security: Data/Virus/Malicious Threats
• Have a network rights strategy.• Make sure desktop is secure but not at
expense of instructional needs.• Balancing security with server space
and network use.• Use solutions to monitor student use.• Use good firewalls.• Complete periodic security
assessments.
My Educational Technology Gottas
• Least restrictive technology environment as possible.
• Encourage the use of technology in as many ways possible.
• Get teachers involved in security.• Approach administration of technology
with students and teachers are customer mindset.
Questions and Discussion