0
Common Sense Technology Policy<br />Balancing Security and Access<br />
Access vs. Safety<br />
The Big 6 Concerns?<br />Inappropriate Content<br />Predators<br />Misuse of Mobile Communications Devices<br />Cyberbully...
Inappropriate Content<br />
Web Content Can Be Completely Controlled<br />Misperceptions About Inappropriate Content<br />
Misperceptions About Inappropriate Content<br />Intentional Viewing of Objectionable Content by Students<br />
Inappropriate Content: The Reality<br />Legal Issues<br />Funding Issues<br />CIPA<br />FERPA<br />HIPA<br />State Law<br ...
Internet Predators<br />
Adult male posing online to lure very young children into places where they can be kidnapped and assaulted<br />Mispercept...
Misperceptions Internet Predators<br />Young children being lured by predators into giving personal information that leads...
Predators: The Reality<br /><ul><li>Most predation and ensnarement crimes involve adolescents.
Predators play to teens need to connect, need for info about sex, their search for romance.
Teens usually do not respond to predator’s solicitations and dismiss them as “litter” on the information superhighway.</li...
Sexting<br />Misuse of Mobile Communications Devices<br />
Misuse of Mobile Communications Devices<br />Cheating on School Tests and Assignments<br />
Sending threatening messages or bullying.<br />Misuse of Mobile Communications Devices<br />
Cyberbullying<br />
Pew Research Center Research on Cyberbullying<br /><ul><li>1 in 3 online teens have experienced online harassment.
Girls are more likely to be victims.
Teens say they are more likely to be bullied offline than online.
Teens who share their identities and thoughts online are more likely to be targets than those who lead less active online ...
Network Security<br />Data Theft and Identity Theft<br />
Network Security<br />Disabled, Hacked or Vandalized Networks<br />
Network Security<br />Virus and other Malicious Network Attacks<br />
Dealing with Inappropriate Content<br />Focus on teaching students Internet literacy, safety and responsibility.<br />Enfo...
Dealing with Internet Predators<br />Establish open communications between adults and young people.<br />Parents and profe...
Dealing with the Misuse of Mobile Communications Devices<br />Teach students proper and constructive uses of MCDs rather t...
Dealing with Cyberbullying<br />Provide students, parents, and all educators with information regarding the prevention of ...
Upcoming SlideShare
Loading in...5
×

Common sense technology policy2

481

Published on

Presentation given at NYCATE Summer Leadership Conference.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
481
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Common sense technology policy2"

  1. 1. Common Sense Technology Policy<br />Balancing Security and Access<br />
  2. 2.
  3. 3.
  4. 4.
  5. 5. Access vs. Safety<br />
  6. 6. The Big 6 Concerns?<br />Inappropriate Content<br />Predators<br />Misuse of Mobile Communications Devices<br />Cyberbullying<br />Network Security<br />Copyright Infringement<br />
  7. 7. Inappropriate Content<br />
  8. 8. Web Content Can Be Completely Controlled<br />Misperceptions About Inappropriate Content<br />
  9. 9. Misperceptions About Inappropriate Content<br />Intentional Viewing of Objectionable Content by Students<br />
  10. 10. Inappropriate Content: The Reality<br />Legal Issues<br />Funding Issues<br />CIPA<br />FERPA<br />HIPA<br />State Law<br />Local Policy<br />
  11. 11. Internet Predators<br />
  12. 12. Adult male posing online to lure very young children into places where they can be kidnapped and assaulted<br />Misperceptions Internet Predators<br />
  13. 13. Misperceptions Internet Predators<br />Young children being lured by predators into giving personal information that leads to them being harmed.<br />
  14. 14. Predators: The Reality<br /><ul><li>Most predation and ensnarement crimes involve adolescents.
  15. 15. Predators play to teens need to connect, need for info about sex, their search for romance.
  16. 16. Teens usually do not respond to predator’s solicitations and dismiss them as “litter” on the information superhighway.</li></li></ul><li>Misuse of Mobile Communications Devices<br />Students recording other students and school staff and posting<br />http://dangerouslyirrelevant.org/2008/03/cell-phone-came.html<br />
  17. 17. Sexting<br />Misuse of Mobile Communications Devices<br />
  18. 18. Misuse of Mobile Communications Devices<br />Cheating on School Tests and Assignments<br />
  19. 19. Sending threatening messages or bullying.<br />Misuse of Mobile Communications Devices<br />
  20. 20. Cyberbullying<br />
  21. 21. Pew Research Center Research on Cyberbullying<br /><ul><li>1 in 3 online teens have experienced online harassment.
  22. 22. Girls are more likely to be victims.
  23. 23. Teens say they are more likely to be bullied offline than online.
  24. 24. Teens who share their identities and thoughts online are more likely to be targets than those who lead less active online lives.</li></li></ul><li>Pew Research Center Research on Cyberbullying<br />1 in 6 teens said someone had forwarded or posted communication they assumed was private.<br />13% said someone had spread a rumor about them online.<br />13% said someone had sent them a threatening or aggressive email.<br />67% said bullying happens more offline than online<br />
  25. 25. Network Security<br />Data Theft and Identity Theft<br />
  26. 26. Network Security<br />Disabled, Hacked or Vandalized Networks<br />
  27. 27. Network Security<br />Virus and other Malicious Network Attacks<br />
  28. 28. Dealing with Inappropriate Content<br />Focus on teaching students Internet literacy, safety and responsibility.<br />Enforcement of reasonable AUPs.<br />Teachers should monitor students while online.<br />Use history folders and other technological measures to monitor students.<br />
  29. 29. Dealing with Internet Predators<br />Establish open communications between adults and young people.<br />Parents and professional educators must take responsibility for learning about technologies and how to monitor their young people.<br />Adults must engage young people in conversations about the problem of adults posing online for the purpose of engaging in sexual activity.<br />
  30. 30. Dealing with the Misuse of Mobile Communications Devices<br />Teach students proper and constructive uses of MCDs rather than banning them.<br />Directly teach students when to use the devices appropriately.<br />
  31. 31. Dealing with Cyberbullying<br />Provide students, parents, and all educators with information regarding the prevention of cyberbullying.<br />Be aware of all laws and policies regarding cyberbullying.<br />
  32. 32. Dealing with Network Security: Data/Virus/Malicious Threats<br />Have a network rights strategy.<br />Make sure desktop is secure but not at expense of instructional needs.<br />Balancing security with server space and network use.<br />Use solutions to monitor student use.<br />Use good firewalls.<br />Complete periodic security assessments.<br />
  33. 33. My Educational Technology Gottas<br />Least restrictive technology environment as possible.<br />Encourage the use of technology in as many ways possible.<br />Get teachers involved in security.<br />Approach administration of technology with students and teachers are customer mindset.<br />
  34. 34. Questions and Discussion<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×