Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Technology And Safety[1]


Published on

Published in: Economy & Finance, Education
  • Be the first to comment

  • Be the first to like this

Technology And Safety[1]

  1. 1. Technology and Safety Norman Morgan Eanes Independent School District Partnership for Teacher Excellence Program
  2. 2. The Web, Cyberspace, Internet, Online, WWW, etc. <ul><li>What is it? No matter the name, the majority of people are now going online. </li></ul><ul><ul><li>Electronic mail (E-mail) and instant messages </li></ul></ul><ul><ul><li>Participate in chat groups </li></ul></ul><ul><ul><li>Post and read messages in social networking sites and blogs </li></ul></ul><ul><ul><li>“ Surf” the world wide web and many other online activities. </li></ul></ul><ul><li>Children are no exception in fact they are more likely to be online than adults. </li></ul><ul><li>Community </li></ul>
  3. 3. Risks <ul><li>Situations and Behaviors that Make You Feel Uncomfortable </li></ul><ul><li>Putting Yourself in Physical Danger </li></ul><ul><li>Giving Up Privacy Or Putting Yourself or Your Our Family In Financial Risk </li></ul><ul><li>Harassment and Bullying </li></ul><ul><li>Hurting Others and Getting into Trouble </li></ul>
  4. 4. Basic Rules for Online Safety <ul><li>Keep Your Identity Private </li></ul><ul><li>Never Get Together with Someone You “Meet” Online </li></ul><ul><li>Never Respond To E-Mail, Chat Comments, Instant Messages Or Other Messages That Are Hostile, Belligerent, Inappropriate Or In Any Way Make You Feel Uncomfortable </li></ul><ul><li>Talk with your Students/Parents About Their Expectations and Ground Rules for Going Online </li></ul>
  5. 5. Acceptable Use Policies (AUP) <ul><li>First line defense </li></ul><ul><ul><li>Your guideline from the District </li></ul></ul><ul><ul><li>Your students are protected by the Distict </li></ul></ul><ul><li>AUP’s are basic &quot;contracts“ </li></ul><ul><li>Outline how students can use the technology </li></ul><ul><li>What you and your students can and cannot do with technology </li></ul><ul><li>Consequences for violating the policy. </li></ul><ul><li>Become familiar with your district’s policy </li></ul>
  6. 6. Students Names and Pictures <ul><li>Protect your students identities </li></ul><ul><li>Student names on web pages </li></ul><ul><ul><li>Either their names not be used or only their first names be posted. </li></ul></ul><ul><li>Student pictures on web pages </li></ul><ul><ul><li>We encourage the posting of student work that may include student pictures but we strongly encourage teachers to get written permission to post student pictures and work before placing it onto the web. </li></ul></ul><ul><ul><li>Most schools already have such permission slips for use when student pictures are placed in newspapers. These can often be re-worded to cover the issue of posting to the web. </li></ul></ul>
  7. 7. School or Classroom Web Pages <ul><li>It is important to recognize that a web presence that refers to your school or district represents them in cyberspace. You need to respect the interests of the schools system and post only appropriate materials to a web site. </li></ul><ul><ul><li>What is &quot;appropriate&quot; regarding content should be clearly defined in the schools AUP. </li></ul></ul><ul><ul><li>Content should be controlled by the teacher and/or approved by the appropriate school personnel. </li></ul></ul>
  8. 8. Conduct on the Technology System <ul><li>Responsibility of your class – direct and indirect </li></ul><ul><li>Passwords </li></ul><ul><ul><li>Do not share or expose your password </li></ul></ul><ul><ul><li>Passwords are a two-fold safety net </li></ul></ul><ul><ul><ul><li>Protection of your content </li></ul></ul></ul><ul><ul><ul><li>Protection of the individual – inclusion, anonymity </li></ul></ul></ul><ul><li>Be aware of the environment (community) </li></ul><ul><ul><li>Classroom </li></ul></ul><ul><ul><li>Online </li></ul></ul><ul><li>Filter – restricts information that is accessed </li></ul><ul><ul><li>Do not disable, bypass, or attempt to disable filter (Proxy) </li></ul></ul><ul><li>Do not access, submit, publish, or display materials that are abusive, obscene, pornographic, sexually oriented, threatening, harassing, damaging to another's reputation, or illega l. </li></ul>
  9. 9. Youth Targets of Internet Security <ul><li>Plan of action </li></ul><ul><ul><li>Click for Basic Rules for Youth </li></ul></ul><ul><li>Youth and Identity Theft </li></ul><ul><ul><li>Kids are enticed into the same traps as adults </li></ul></ul><ul><ul><li>Phishing – Victims are asked to enter personal information on what appears to be a legitimate site but is actually a site set up by criminals to harvest information. </li></ul></ul><ul><ul><ul><li>Whether they enter a contest </li></ul></ul></ul><ul><ul><ul><li>Download an animated cursor or music </li></ul></ul></ul><ul><ul><ul><li>Make a purchase </li></ul></ul></ul>
  10. 10. Conclusion <ul><li>Millions of people including teenagers go online every day, and most are safe. </li></ul><ul><li>Be proactive – understand the dangers and follow simple rules to protect our community. </li></ul><ul><li>By following these rules you minimize the risks, but you can never completely eliminate all risks in life. </li></ul>
  11. 11. Contact information <ul><li>Norman Morgan </li></ul><ul><li>Eanes Independent School District </li></ul><ul><li>Westlake High School </li></ul><ul><li>[email_address] </li></ul><ul><li>512-732-9280 ext. 33459 </li></ul>