SlideShare a Scribd company logo
Cyber Safety Legal Responsibilities
 y         y g        p
History Lesson
      y
 Communication Decency Act (1996)
   partially overturned in 1997

 Child Online Protection Act (1998)
   An injunction was placed on this law in 1998. The
   injunction has been upheld in 1999, 2004, and
   2007.

 Children’s Online Privacy Protection Act (1998)

 Children’s Internet Protection Act (2000)
Children’s Internet Protection Act
 CIPA only effects entities that receive Federal E-
 Rate f nds
      funds.
 Effected schools and libraries must:
   provide protection measures that block access to
         d                         h bl k
   adult-oriented materials on the Internet for minors
   adopt and enact a policy that monitors the online
   activities of minors
                 minors.
   adopt and enforce a policy addressing minors
   access to the Internet including electronic mail,
   chat rooms, and other forms of direct electronic
   communication. The policy must also prevent
   access to “hacking” information and other
   unlawful content.
                 http://www.fcc.gov/cgb/consumerfacts/cipa.html
Melissa ISD Board Policy (Internet Safety)

 The Superintendent or designee shall develop and
    e Supe e de o des g ee s a deve op a d
 implement an Internet safety plan to:
  1. Control students’ access to inappropriate materials, as
    well as to materials that are harmful to minors;
  2. Ensure student safety and security when using electronic
    communications;
             i i
  3. Prevent unauthorized access, including hacking and
    other unlawful activities; and
  4. Restrict unauthorized disclosure, use, and dissemination
    of personally identifiable information regarding
       p         y                             g     g
    students.
Melissa ISD Board Policy (
                       y (Filtering)
                                  g)
 Each District co pu e w Internet access shall have a
  ac      s c computer with e e              s a ave
 filtering device or software that blocks access to visual
 depictions that are obscene, pornographic, inappropriate
 for d
 f students, or harmful to minors, as defined by the
                  h    f l             d f db h
 federal Children’s Internet Protection Act and as
 determined by the Superintendent or designee.
 The Superintendent or designee shall enforce the use of
 such filtering devices. Upon approval from the
 Superintendent or designee, an administrator, supervisor,
 or other authorized person may disable the filtering
 device
 de ice for bona fide research or other lawful p rpose
                                          lawf l purpose.
Melissa ISD CIPA Implementation
                   p


 Melissa ISD has adopted a multi-tiered
 method of protecting our students:
  TIER 1: Direct Supervision
                    p
  TIER 2: Indirect Supervision
  TIER 3: Internet Content Filter
Protecting our students
         g


•   TIER 1: Direct Supervision
      Faculty      b          i
      F l members monitor the online activities
                                   h     li     i ii
      of their students. This is one of the most
      effective methods of preventing student
        ff i        h d f             i     d
      access to inappropriate content on the
      Internet.

                          Resnick, P. J., Hansen, D. L., & Richardson, C. R. (2004). Calculating error
                          rates for filtering software. Communications of the ACM, 47(9), 67-71.

                          47 U.S.C. 254(h)(5)(B)
Protecting our students
         g

•   TIER 2: Indirect Supervision
      Technology personnel will periodically
      T h l                  l ill    i di ll
      monitor online activities through live Internet
      t ffi reports and firewall transaction l
      traffic       t    d fi w ll t       ti logs.
      Filter transaction logs will be provided to
      b ilding level administrators periodicall
      building le el                 periodically.


                                       47 U.S.C. 254(h)(5)(B)
Protecting our students
         g


•   TIER 3: Internet Content Filter
      A CIPA compliant fil i appliance will
                    li     filtering    li ill
      attempt to prevent student access to
      inappropriate I
      i          i     Internet content.




                                    47 U.S.C. 254(h)(5)(B), (C)
What do I look for?
 Electronic Mail
   Hotmail, Gmail, AOL
 Instant Messaging
              g g
   MSN, Yahoo, or AOL Instant Messengers, Google Talk
 Chatrooms
   Chathouse, Teenchat
 Social Networking
   Myspace, Facebook, Xanga, Friendster, Orkut
 Cell Phones
What do I say?
            y
 When discussing online activities with students, tell
 them:
   Never respond to messages or emails that seem strange
             p             g                            g
   or unusual.
   Never give out their name, address, telephone, school
   name, parent’s name or any other personal information.
   Never send pictures of themselves to anyone they do
   not know offline.
     tk        ffli
   Never agree to meet face to face with someone they
   have met online
             online.
Overriding the filter
         g
There are several categories that cannot be overridden:
          Adware
          Child Pornography
          Pornography/Adult C
          P          h /Ad l Content
          Peer-to-Peer/File Sharing
          Security - which includes the following sub categories:
               Malicious Code/Virus
               Phishing
               Bad Reputation Domains
               Bot Net
               Hacking
               Spyware
               Web-Based Proxies/Anonymizers
Overriding the filter
         g
 Do not override the filter for student use.

 Do not give out your override account information
                                       information.

 Do     h       id
 D use the override account f b
                            for bona fid research.
                                     fide       h

 Do contact technology immediately if you think your
 override account has been compromised.
Melissa ISD C b Safety
M l         Cyber S f

Melissa ISD will be the district that all others in Texas and beyond will emulate.

More Related Content

What's hot

Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay
 
Digital citizenship project[1]
Digital citizenship project[1]Digital citizenship project[1]
Digital citizenship project[1]
lackl
 
Cyber Dangers
Cyber DangersCyber Dangers
Cyber Dangers
Nikki Sorrell
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
Muhammad Rawaha Saleem
 
cyber crime
cyber crime cyber crime
cyber crime
Midhun Suresh
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
Jonathan Bacon
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
NehaRohtagi1
 
Cybercrime
CybercrimeCybercrime
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
Mohamed Omar
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
jboulanger
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Geoffrey Lowe
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
Sairam
 
Cybercrime
CybercrimeCybercrime
Cybercrime
ecommerce
 
File000145
File000145File000145
File000145
Desmond Devendran
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
Rochelle Nato
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
John Bosco Javellana, MAEd.
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
mribera87
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Dr. TJ Wolfe
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Uday Bhaskarwar
 

What's hot (20)

Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Digital citizenship project[1]
Digital citizenship project[1]Digital citizenship project[1]
Digital citizenship project[1]
 
Cyber Dangers
Cyber DangersCyber Dangers
Cyber Dangers
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
cyber crime
cyber crime cyber crime
cyber crime
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
File000145
File000145File000145
File000145
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 

Viewers also liked

DIBUJAMOS BANDERAS
DIBUJAMOS BANDERASDIBUJAMOS BANDERAS
DIBUJAMOS BANDERAS
profmarinafq
 
聚社互动传媒
聚社互动传媒聚社互动传媒
聚社互动传媒Yongzhi Li
 
WM
WMWM
Presentación2
Presentación2Presentación2
Presentación2
profmarinafq
 
Presentation Ketnet Kick - Imagion IAMCR
Presentation Ketnet Kick - Imagion IAMCRPresentation Ketnet Kick - Imagion IAMCR
Presentation Ketnet Kick - Imagion IAMCR
VanLier
 
Ese Cádiz Oé!!
Ese Cádiz Oé!!Ese Cádiz Oé!!
Ese Cádiz Oé!!
Edgar2
 
Prueba
PruebaPrueba
Prueba
profmarinafq
 
Lift Off Port & Coast Guard Trip
Lift Off Port & Coast Guard TripLift Off Port & Coast Guard Trip
Lift Off Port & Coast Guard Trip
liftoff
 

Viewers also liked (9)

DIBUJAMOS BANDERAS
DIBUJAMOS BANDERASDIBUJAMOS BANDERAS
DIBUJAMOS BANDERAS
 
聚社互动传媒
聚社互动传媒聚社互动传媒
聚社互动传媒
 
WM
WMWM
WM
 
Presentación2
Presentación2Presentación2
Presentación2
 
Presentation Ketnet Kick - Imagion IAMCR
Presentation Ketnet Kick - Imagion IAMCRPresentation Ketnet Kick - Imagion IAMCR
Presentation Ketnet Kick - Imagion IAMCR
 
Agua Publicidades
Agua PublicidadesAgua Publicidades
Agua Publicidades
 
Ese Cádiz Oé!!
Ese Cádiz Oé!!Ese Cádiz Oé!!
Ese Cádiz Oé!!
 
Prueba
PruebaPrueba
Prueba
 
Lift Off Port & Coast Guard Trip
Lift Off Port & Coast Guard TripLift Off Port & Coast Guard Trip
Lift Off Port & Coast Guard Trip
 

Similar to MISD Cyber Safety

A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
amandaschilling75
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Mi Ra Lavandelo
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
BurkeV
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
leslieannpt
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
tdsparks3
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
mulingoh
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance Information
Tũi Wichets
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
ITIIIndustries
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati
 
E safety training
E safety trainingE safety training
E safety training
nwhc-library
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Kodok Ngorex
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
rainrjcahili
 
Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schools
adawidziuk
 
Parent meeting
Parent meetingParent meeting
Parent meeting
lightb
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Ayush Chopra
 
empowerment technology for stem and gas .pdf
empowerment technology for stem and gas .pdfempowerment technology for stem and gas .pdf
empowerment technology for stem and gas .pdf
ChristianZapico1
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
Al Rowell
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Assignment Help
 

Similar to MISD Cyber Safety (20)

A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance Information
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
E safety training
E safety trainingE safety training
E safety training
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
 
Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schools
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
empowerment technology for stem and gas .pdf
empowerment technology for stem and gas .pdfempowerment technology for stem and gas .pdf
empowerment technology for stem and gas .pdf
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
 

Recently uploaded

Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
GraceKohler1
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
SabaaSudozai
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
Any kyc Account
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
The latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from NewentideThe latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from Newentide
JoeYangGreatMachiner
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
MJ Global
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
Stephen Cashman
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 

Recently uploaded (20)

Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
 
The Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb PlatformThe Genesis of BriansClub.cm Famous Dark WEb Platform
The Genesis of BriansClub.cm Famous Dark WEb Platform
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
The latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from NewentideThe latest Heat Pump Manual from Newentide
The latest Heat Pump Manual from Newentide
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 

MISD Cyber Safety

  • 1. Cyber Safety Legal Responsibilities y y g p
  • 2. History Lesson y Communication Decency Act (1996) partially overturned in 1997 Child Online Protection Act (1998) An injunction was placed on this law in 1998. The injunction has been upheld in 1999, 2004, and 2007. Children’s Online Privacy Protection Act (1998) Children’s Internet Protection Act (2000)
  • 3. Children’s Internet Protection Act CIPA only effects entities that receive Federal E- Rate f nds funds. Effected schools and libraries must: provide protection measures that block access to d h bl k adult-oriented materials on the Internet for minors adopt and enact a policy that monitors the online activities of minors minors. adopt and enforce a policy addressing minors access to the Internet including electronic mail, chat rooms, and other forms of direct electronic communication. The policy must also prevent access to “hacking” information and other unlawful content. http://www.fcc.gov/cgb/consumerfacts/cipa.html
  • 4. Melissa ISD Board Policy (Internet Safety) The Superintendent or designee shall develop and e Supe e de o des g ee s a deve op a d implement an Internet safety plan to: 1. Control students’ access to inappropriate materials, as well as to materials that are harmful to minors; 2. Ensure student safety and security when using electronic communications; i i 3. Prevent unauthorized access, including hacking and other unlawful activities; and 4. Restrict unauthorized disclosure, use, and dissemination of personally identifiable information regarding p y g g students.
  • 5. Melissa ISD Board Policy ( y (Filtering) g) Each District co pu e w Internet access shall have a ac s c computer with e e s a ave filtering device or software that blocks access to visual depictions that are obscene, pornographic, inappropriate for d f students, or harmful to minors, as defined by the h f l d f db h federal Children’s Internet Protection Act and as determined by the Superintendent or designee. The Superintendent or designee shall enforce the use of such filtering devices. Upon approval from the Superintendent or designee, an administrator, supervisor, or other authorized person may disable the filtering device de ice for bona fide research or other lawful p rpose lawf l purpose.
  • 6. Melissa ISD CIPA Implementation p Melissa ISD has adopted a multi-tiered method of protecting our students: TIER 1: Direct Supervision p TIER 2: Indirect Supervision TIER 3: Internet Content Filter
  • 7. Protecting our students g • TIER 1: Direct Supervision Faculty b i F l members monitor the online activities h li i ii of their students. This is one of the most effective methods of preventing student ff i h d f i d access to inappropriate content on the Internet. Resnick, P. J., Hansen, D. L., & Richardson, C. R. (2004). Calculating error rates for filtering software. Communications of the ACM, 47(9), 67-71. 47 U.S.C. 254(h)(5)(B)
  • 8. Protecting our students g • TIER 2: Indirect Supervision Technology personnel will periodically T h l l ill i di ll monitor online activities through live Internet t ffi reports and firewall transaction l traffic t d fi w ll t ti logs. Filter transaction logs will be provided to b ilding level administrators periodicall building le el periodically. 47 U.S.C. 254(h)(5)(B)
  • 9. Protecting our students g • TIER 3: Internet Content Filter A CIPA compliant fil i appliance will li filtering li ill attempt to prevent student access to inappropriate I i i Internet content. 47 U.S.C. 254(h)(5)(B), (C)
  • 10. What do I look for? Electronic Mail Hotmail, Gmail, AOL Instant Messaging g g MSN, Yahoo, or AOL Instant Messengers, Google Talk Chatrooms Chathouse, Teenchat Social Networking Myspace, Facebook, Xanga, Friendster, Orkut Cell Phones
  • 11. What do I say? y When discussing online activities with students, tell them: Never respond to messages or emails that seem strange p g g or unusual. Never give out their name, address, telephone, school name, parent’s name or any other personal information. Never send pictures of themselves to anyone they do not know offline. tk ffli Never agree to meet face to face with someone they have met online online.
  • 12. Overriding the filter g There are several categories that cannot be overridden: Adware Child Pornography Pornography/Adult C P h /Ad l Content Peer-to-Peer/File Sharing Security - which includes the following sub categories: Malicious Code/Virus Phishing Bad Reputation Domains Bot Net Hacking Spyware Web-Based Proxies/Anonymizers
  • 13. Overriding the filter g Do not override the filter for student use. Do not give out your override account information information. Do h id D use the override account f b for bona fid research. fide h Do contact technology immediately if you think your override account has been compromised.
  • 14. Melissa ISD C b Safety M l Cyber S f Melissa ISD will be the district that all others in Texas and beyond will emulate.