Staff training session

26
Staff Training Session Internet Safety for High School Students Amanda Hillman American College of Education ET5083 Educational Technology Systems Management

description

 

Transcript of Staff training session

Page 1: Staff training session

Staff Training SessionInternet Safety for High School

Students

Amanda Hillman

American College of Education

ET5083 Educational Technology Systems Management

Page 2: Staff training session

Lesson GoalsGain information on protecting the digital rights

and identify of students.Retain knowledge in the ethical and legal use of

internet within school environment.Comprehend internet filtering according to the

Children’s Internet Protection Act.Identify potential threats to school safety.Identify appropriate firewalls and protecting

computers with secure username and passwords.Monitor internet browsing with proper software

capabilities.

Page 3: Staff training session

ObjectivesLearn to properly protect the digital rights

and identities of their students within the confines of the classroom.

Model ethical and legal use of the internet and digital tools for their students.

Demonstrate digital responsibility by retaining information in how to filter internet resources according to the Children’s Internet Protection Act.

Locate potential internet threats to students and classroom safety.

Page 4: Staff training session

Objectives (continued)Learn how to monitor internet browser

utilizing appropriate educational software uses and capabilities to protect student autonomy.

Page 5: Staff training session

Getting Started…As teachers, we have the opportunity to shape

the mind of the future generation to ensure

students gain the knowledge and skills

required to develop into responsible and

capable members of society. Protecting the

individuality and digital rights of our students

is one of the sole technological

responsibilities of any educator.

Page 6: Staff training session

However, not all teachers are aware of the specific components in how to

demonstrate legal and ethical usage of internet and digital technology tools for

school environments.

We must learn to communicate and model the legal use of internet for our students

and colleagues.

Page 7: Staff training session

By learning how to properly protect student’s

autonomy, model legal and ethical use of internet

resources, gauging internet filtering according to

grade level and subject, identifying possible

threats to student safety, and actively monitoring

student internet usage and browsing, instructors

may meet the school district’s commitment to

academic excellence in all educational endeavors.

Page 8: Staff training session

Are the student protected?In order to determine if your students’ digital

rights are protected according to your school’s internet usage, ensure all staff members understand cyber security to

protect student digital citizenship.

Page 9: Staff training session

Internet policy in place? The school’s internet safety policy protects

all students from seemingly harmful cyber behavior towards one another in the school environment.

Do all students, teachers, administrators, and school district employees follow the internet policy current in place? Have all students and teachers signed an agreement?

Page 10: Staff training session

Acceptable Use PolicyAny school’s Acceptable Use Policy of

technology should be in place to deem appropriate material for students to view within schools.

Teachers should ensure students and parents are aware of the school’s Acceptable Use Policy for internet usage before gaining computer and internet access.

Page 11: Staff training session

The Palm Beach County School District mandates at the beginning of the school year, every employee and student will sign a Code of Conduct agreeing to follow school internet usage.

Page 12: Staff training session

According to the Children’s Internet Protection Act, school must develop an internet safety policy to limit student access to destructive or inappropriate material.

Retrieved from https://lh5.googleusercontent.com/zCBu2e8Bbeo3ISIT7hUHX_fAl-ky6oDUDtgS8kNlqqjKIaMr4BJs1RPKhsxu9-r2y8S18TV3VQYhXFyjCsezHUDLS2_OyFk5wjs9alu6Kz2MOac8kHw

Page 13: Staff training session

CIPA also regulates..Ensuring all capabilities of email, chat, and discussion

board usage is monitored through teacher and firewall protection.

Staff and student email is protected by logging into the school’s database with a username and password to protect unauthorized access to personal information.

Student records such as grades and personal information are protected under the school district policy.

All online activities will be monitored utilizing the school’s firewall for student, teacher, staff members, and administrators.

Page 14: Staff training session

See the attached links to examine CIPA in further detail

http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=3902&context=flr

http://www.cisco.com/web/strategy/docs/gov/screen.pdf

Page 15: Staff training session

However, to properly maintain student privacy…Personal emails or telephone numbers should

not be released to any other student or teacher.

Teachers should have the understanding that district email is monitored and not private.

Students and teachers should utilize only their own username and passwords when logging into school technological equipment or resources.

Students and teachers should not post any personally harmful or untrue information on internet profiles or social networks

Page 16: Staff training session

More protection..Network firewalls should monitor

incoming and outgoing information to ensure students’ privacy is protected. Firewalls

should ensure no student receives potentially harmful

viruses, spam, as well as dangerous software dangerous

for school property.

Page 17: Staff training session

Internet browsing will be monitored by school network to ensure no

inappropriate or obscene information or graphics

are displayed for minors’ access.

Page 18: Staff training session

Certain factors are used to maintain student privacy

Personal emails or telephone numbers should

not be released to any other student or teacher.

Teachers should have the understanding that

district email is monitored and not private.

Students and teachers should utilize only their

own username and passwords when logging into

school technological equipment or resources.

Page 19: Staff training session

Students and teachers should not post any

personally harmful or untrue information on

internet profiles or social networks.

Page 20: Staff training session

See the link below to examine a

general Code of Computer Ethicshttp://lrs.ed.uiuc.edu/students/mickley/ethicsnew.htm

Page 21: Staff training session

One of the best ways to monitor student computer usage is through

real-time software

Page 22: Staff training session

Real-time software should have the ability to:Monitor student internet use.Observe all websites minimized on

screens.Control in opening and closing all

browsers.Record browsing history on every

computer station.Prevent harmful websites or programs

from loading on student computers.Maintain district-approved websites are

accessed only on student computers.

Page 23: Staff training session

See the links below to compare several popular real-time programshttp://www.netsupportschool.com/index.asp

http://www.compuguardian.com/

http://www.spector360.com/Education/

Page 24: Staff training session

Dual responsibilities…Both educator and students right are equally important in order to create a safe and well-balanced

educational environment encountered by all who

experience it.

Page 25: Staff training session

In conclusion…As teachers, we claim an ownership in

cultivating the minds of the future

generation of adolescents who

deserve a safe atmosphere to learn

and academically flourish in utilizing

their technology use.

Page 26: Staff training session

References Retrieved from

https://lh5.googleusercontent.com/zCBu2e8Bbeo3ISIT7hUHX_fAl-ky6oDUDtgS8kNlqqjKIaMr4BJs1RPKhsxu9-r2y8S18TV3VQYhXFyjCsezHUDLS2_OyFk5wjs9alu6Kz2MOac8kHw

Cisco (2012). http://www.cisco.com/web/strategy/docs/gov/screen.pdf. Retrieved December 12, 2013, from http://www.cisco.com/web/strategy/docs/gov/screen.pdf

Fordham Law Review (2003). fordham.edu. Retrieved December 12, 2013, from http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=3902&context=flr

Uiuc.edu (n.d.). Code of Computer Ethics for Educators. Retrieved December 12, 2013, from http://lrs.ed.uiuc.edu/students/mickley/ethicsnew.htm

Compguardian.com (2013). School Computer Monitoring Software, Student Internet Filtering Program, Keylogger. Retrieved December 12, 2013, from http://www.compuguardian.com/

Netsupportschool.com (2013). NetSupport School - Classroom Management Software. Retrieved December 12, 2013, from http://www.netsupportschool.com/index.asp

SpectorSoft (2013). Spector360 for Education. Retrieved December 12, 2013, from http://www.spector360.com/Education/