Judson ISD Internet Safety and Filtering Hearing November 16th, 2009


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Judson ISD Internet Safety and Filtering Hearing November 16th, 2009

  1. 1. 11/12/2009 Judson ISD ERC, November 16th, 6:00pm Steve Young, CTO, Technology Services, syoung@judsonisd.org Doretta Walker, Director of Desktop Services, dwalker@judsonisd.org Beverly Ahr, Director of Instructional Technology, bahr@judsonisd.org 1
  2. 2. 11/12/2009 • It’s the law.   • Judson ISD must comply with Children s Internet  Judson ISD must comply with Children’s Internet  Protection Act (CIPA) • Requirement of Federal eRate program, which  funds a lot or technology and network access for  Judson ISD • While Judson ISD staff monitors students, the  filter servers as extra eyes, especially as the  numbers of internet devices proliferate  b   f i t t d i   lif t   2
  3. 3. 11/12/2009 • Judson ISD Board Policy CQ sets out rules for  Electronic Communication and Data Management at  Judson ISD • These were last update and adopted by the Board on  10/9/2006 (CQ Local) • CQ Local says: “The District shall provide a filtering   CQ L l   “Th  Di i   h ll  id    fil i service that attempts to block access to…..” • CQ Legal says  …as a prerequisite to receiving these  CQ Legal says “…as a prerequisite to receiving these  funds, implement certain Internet safety  measures…” • CQ Legal says “…the District must educate minors  CQ Legal says “ the District must educate minors  about appropriate online behavior, including  interacting with other individuals on social  networking Web sites and in chat rooms and  t ki  W b  it   d i   h t    d  cyberbullying awareness and response.” 3
  4. 4. 11/12/2009 Are the most detailed guidelines at JISD for use of  computers and network for all JISD users. computers and network for all JISD users C2 addresses: conduct, security, system access,  password security, confidentiality, data  password security  confidentiality  data  protection, asset protection, email, email  retention, copyright, filtering, monitoring,  vandalism, and consequences. Last updated and signed by CTO and  Superintendent in May 7, 2009. 4
  5. 5. 11/12/2009 • Every year they receive a student handbook,  which contains JISD Board of Trustee Approved  verbiage (including student code of conduct) • Handbook includes  Acceptable Use of  Handbook includes “Acceptable Use of  Internet/Computer facilities” and • “Computer/Internet Use  Offenses& Conseq ” Computer/Internet Use – Offenses& Conseq. • Parents & students must sign acknowledgement  form yearly. form  earl 5
  6. 6. 11/12/2009 • All Internet requests are filtered through  q g LightSpeed Systems filter • Specific known users (staff) may have more  relaxed filter if they have been approved for the  l dfl f h h b df h access based on job need.  ( reference JISD  procedure C2 – must use Form C2‐3  Request for  procedure C2  must use Form C2 3 “Request for  Unfiltered Internet Access” • Unknown users are restricted to most limited  Internet access, which is student access 6
  7. 7. 11/12/2009 Filtering is never 100% perfect Some bad sites can slip through People will try to circumvent the system Some acceptable sites will get blocked 7
  8. 8. 11/12/2009 • Porn and adult content • Security Risks • Drugs & Alcohol • Hacking • Weapons • Proxies • Violence & Hate Vi l  & H • Gambling • Spyware • Dating • Virus • Social Networking • Plagiarism • Instant Messaging • pp g Shopping • Peer 2 Peer File Sharing l h • Auctions • Forums, Newsgroups &  g Blogs • Music • Email & Chat • Games 8
  9. 9. 11/12/2009 On April 28, 2008 JISD implemented  Administrative Procedure C‐7 “Cyber Bullying” Ad i i t ti  P d  C  “C b  B ll i ” Seeks to make staff & students aware of internet  safety guidelines Raise awareness so that victims feel comfortable  reporting incidents p g Establishes guidelines for administrative handling of  incidents Staff & students will undergo annual training 9
  10. 10. 11/12/2009 Staff St ff Action Steps Time Line Resources Evidence of Attainment Responsible Internet Research topic Feb.-March, Instructional Internet Safety Video Research folder Locate and categorize resources 2009 Technology Staff Tape PowerPoint 2007 Create PowerPoint Presentation and June-Aug., Instructional CD of presentation and Blank CD Training Script 2009 Technology Staff hardcopy of training script Copy Paper Instructional Present to Technology Meeting scheduled and Nov-Dec., Copies of Script for Technology Staff Services/Curriculum & Instruction sign in sheets of 2009 each participant Student Services Departments for feedback attendance Staff Revised CD of Digital copies of Instructional Revise Presentation Dec., 2009 presentation and revised presentation and script Technology Staff hardcopy of training script Date of principal p p Instructional Present to Administrators P t t Ad i i t t Dec., 2009 D Meeting A M ti Agenda d meetings Technology Staff Meeting room CDs and Script for Train Counselors, Social Workers, Instructional Jan., 2009 each participant Sign in sheets CITs, Librarians Technology Staff Sign-in sheets Evaluation Forms CD and script for Counselors, Social Train all Teachers on Internet Safety trainer Feb.-May 2010 Worker, Librarians Sign in sheets and Cyber Bullying Sign in sheets and CITs Evaluation forms Train all Students in K 12 on Internet K-12 CD and script for Counselors, Social Safety trainer Feb.-May 2010 Worker, Librarians Sign in sheets Train all Students in 3-12 on Cyber Sign in sheets and CITs Bullying Evaluation forms 10
  11. 11. 11/12/2009 Internet at Judson I.S.D. Acceptable Use Policy Good Neighborhoods, Bad Neighborhoods Social Networking Sites Your Words and Pictures in Cyberspace Netiquette Online Shopping O li  Sh i 11
  12. 12. 11/12/2009 1.  Explain the main points of the JISD acceptable use policy 2.  List examples of “bad neighborhood” websites   Li   l   f “b d  i hb h d”  b i 3.  Tell how to protect oneself when using a social network site. 4. Tell why one should reconsider before placing potentially  4  Tell why one should reconsider before placing potentially  embarrassing pictures or information online 5. List rules to follow when blogging, writing instant messages,  emailing and visiting chat rooms  ili   d  i i i   h     6. Explain the dangers of revealing too much personal information to  an online acquaintance. q 7.  Tell what to do if an online acquaintance says something personal  that makes you uncomfortable or asks to meet. 12
  13. 13. 11/12/2009 JISD Philosophy Student  Definition Responsibilities Rationale/Legal Reprisal or  Statistics Retaliation Prevention Discipline and  p Consequences Warning Signs Reporting Investigating Examples Staff Responsibilities 13
  14. 14. 11/12/2009 1.  Define cyber bullying and explain why it can be  very dangerous. 2.  Give 2 examples of cyber bullying. 3.  Explain what to do if you receive a threatening  cyber bully message. 14
  15. 15. 11/12/2009 Thanks for attending this meeting. 15