Staff training session

Click here to load reader

download Staff training session

of 26

  • date post

    25-Jan-2015
  • Category

    Education

  • view

    1.353
  • download

    2

Embed Size (px)

description

 

Transcript of Staff training session

  • 1. Internet Safety for High School Students Amanda Hillman American College of Education ET5083 Educational Technology Systems Management

2. Lesson Goals Gain information on protecting the digital rights and identify of students. Retain knowledge in the ethical and legal use of internet within school environment. Comprehend internet filtering according to the Childrens Internet Protection Act. Identify potential threats to school safety. Identify appropriate firewalls and protecting computers with secure username and passwords. Monitor internet browsing with proper software capabilities. 3. Objectives Learn to properly protect the digital rights andidentities of their students within the confines of the classroom. Model ethical and legal use of the internet and digital tools for their students. Demonstrate digital responsibility by retaining information in how to filter internet resources according to the Childrens Internet Protection Act. Locate potential internet threats to students and classroom safety. 4. Objectives (continued) Learn how to monitor internet browser utilizingappropriate educational software uses and capabilities to protect student autonomy. 5. Getting Started As teachers, we have the opportunity to shape the mind of the future generation to ensure students gain the knowledge and skills required to develop intoresponsible and capable members of society. Protecting the individuality and digital rights of our students is one of the sole technological responsibilities of any educator. 6. However, not all teachers are aware of the specific components in how to demonstrate legal and ethical usage of internet and digital technology tools for school environments.We must learn to communicate and model the legal use of internet for our students and colleagues. 7. By learning how to properly protect students autonomy, model legal and ethical use of internet resources, gauging internet filtering according to grade level andsubject, identifying possible threats to student safety, and actively monitoring student internet usage and browsing, instructors may meet the school districtscommitment to academic excellence in all educational endeavors. 8. Are the student protected? In order to determine if your students digital rights are protected according to your schools internet usage, ensure all staff members understand cyber security to protect student digital citizenship. 9. Internet policy in place? the schools internet safety policyprotects all students from seemingly harmful cyber behavior towards one another in the school environment.Do all students, teachers, administrators, and school district employees follow the internet policycurrent in place? Have all students and teachers signed an agreement? 10. Acceptable Use Policy Any schools Acceptable Use Policy of technologyshould be in place to deem appropriate material for students to view within schools. Teachers should ensure students and parents are aware of the schools Acceptable Use Policy for internet usage before gaining computer and internet access. 11. The Palm Beach County School District mandates at the beginning of the school year, every employee and student will sign a Code of Conduct agreeing to follow school internet usage. 12. According to the Childrens Internet Protection Act, school must develop an internet safetypolicy to limit student access to destructive or inappropriate material.Retrieved from https://lh5.googleusercontent.com/zCBu2e8Bbeo3ISIT7hUHX_fAlky6oDUDtgS8kNlqqjKIaMr4BJs1RPKhsxu9r2y8S18TV3VQYhXFyjCsezHUDLS2_OyFk5wjs9alu6Kz2MOac8kHw 13. CIPA also regulates.. Ensuring all capabilities of email, chat, and discussionboard usage is monitored through teacher and firewall protection. Staff and student email is protected by logging into the schools database with a username and password to protect unauthorized access to personal information. Student records such as grades and personal information are protected under the school district policy. All online activities will be monitored utilizing the schools firewall for student, teacher, staff members, and administrators. 14. See the attached links to examine CIPA in further detail http://ir.lawnet.fordham.edu/cgi/viewco ntent.cgi?article=3902&context=flr http://www.cisco.com/web/strategy/doc s/gov/screen.pdf 15. However, to properly maintain student privacy Personal emails or telephone numbers should not bereleased to any other student or teacher. Teachers should have the understanding that district email is monitored and not private. Students and teachers should utilize only their own username and passwords when logging into school technological equipment or resources. Students and teachers should not post any personally harmful or untrue information on internet profiles or social networks 16. More protection.. Network firewalls should monitor incoming and outgoing information to ensure students privacy is protected. Firewalls should ensure no student receives potentially harmful viruses, spam, as well as dangerous software dangerous for school property. 17. Internet browsing will be monitored by school network to ensure no inappropriate or obscene information or graphics are displayed for minors access. 18. Certain factors are used to maintain student privacy Personal emails or telephone numbers shouldnot be released to any other student or teacher. Teachers should have the understanding thatdistrict email is monitored and not private. Students and teachers should utilize only theirown username and passwords when logginginto school technological equipment or resources. 19. Students and teachers should not post any personally harmful or untrue information on internet profiles or social networks. 20. See the link below to examine ageneral Code of Computer Ethics http://lrs.ed.uiuc.edu/students/mickley/ ethicsnew.htm 21. One of the best ways to monitor student computer usage is through real-time software 22. Real-time software should have the ability to: Monitor student internet use. Observe all websites minimized on screens. Control in opening and closing all browsers. Record browsing history on every computer station. Prevent harmful websites or programs from loading on student computers. Maintain district-approved websites are accessed only on student computers. 23. See the links below to compare several popular real-time programshttp://www.netsupportschool.com/index.asp http://www.compuguardian.co m/ http://www.spector360.com/Ed ucation/ 24. Dual responsibilities Both educator and students right are equally important in order to create a safe and well-balanced educational environment encountered by all who experience it. 25. In conclusion As teachers, we claim an ownership in cultivating the minds of the future generation of adolescents who deserve a safe atmosphere to learn and academically flourish in utilizing theirtechnology use. 26. References Retrieved from https://lh5.googleusercontent.com/zCBu2e8Bbeo3ISIT7hUHX_fAlky6oDUDtgS8kNlqqjKIaMr4BJs1RPKhsxu9r2y8S18TV3VQYhXFyjCsezHUDLS2_OyFk5wjs9alu6Kz2MOac8kHw Cisco (2012). http://www.cisco.com/web/strategy/docs/gov/screen.pdf. Retrieved December 12, 2013, from http://www.cisco.com/web/strategy/docs/gov/screen.pdf Fordham Law Review (2003). fordham.edu. Retrieved December 12, 2013, from http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=3902&context=flr Uiuc.edu (n.d.). Code of Computer Ethics for Educators. Retrieved December 12, 2013, from http://lrs.ed.uiuc.edu/students/mickley/ethicsnew.htm Compguardian.com (2013). School Computer Monitoring Software, Student Internet Filtering Program, Keylogger. Retrieved December 12, 2013, from http://www.compuguardian.com/ Netsupportschool.com (2013). NetSupport School - Classroom Management Software. Retrieved December 12, 2013, from http://www.netsupportschool.com/index.asp SpectorSoft (2013). Spector360 for Education. Retrieved December 12, 2013, from http://www.spector360.com/Education/