SlideShare a Scribd company logo
1 of 8
Cyber Safety
      Megan Harrold
           LTMS615
Who is talking to your child?
CIPA


The Children’s Internet Protection Act (CIPA) is a federal law
enacted by Congress to address concerns about access to offensive
content over the Internet on school and library computers. CIPA
imposes certain types of requirements on any school or library that
receives funding for Internet access or internal connections from
the E-rate program – a program that makes certain communications
technology more affordable for eligible schools and libraries. In
early 2001, the FCC issued rules implementing CIPA.
Why?
Erate funding
 The protection measures must
block or filter Internet access to
pictures that are: (a) obscene;
(b) child pornography; or (c)
harmful to minors (for computers
that are accessed by minors).
Dover
Bluecoat filter
iSafe Curriculum
Information that is private
Internet is a great resource!
Webonauts
http://pbskids.org/webonauts/
Video to watch and discuss with your child

More Related Content

What's hot

information and comunication technologies
information and comunication technologiesinformation and comunication technologies
information and comunication technologiesselamat permono
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomGabriella Maree Wheeler
 
Legal Issues In Applied Technology
Legal Issues In Applied Technology Legal Issues In Applied Technology
Legal Issues In Applied Technology TruckBCH
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technologypeav1n0
 
Mobile Phones in Classrooms
Mobile Phones in ClassroomsMobile Phones in Classrooms
Mobile Phones in Classroomstonitones
 
Digital inequality in the state of idaho
Digital inequality in the state of idahoDigital inequality in the state of idaho
Digital inequality in the state of idahoLynetteMcD
 
Intro Networks Webinar With Reggie Smith April 2009
Intro Networks Webinar With Reggie Smith   April 2009Intro Networks Webinar With Reggie Smith   April 2009
Intro Networks Webinar With Reggie Smith April 2009introNetworks.com
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Joel D'souza
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 Bjboulanger
 
Suggestions for state allocations of technology funds
Suggestions for state allocations of technology fundsSuggestions for state allocations of technology funds
Suggestions for state allocations of technology fundsntropi
 
Information policy issue9
Information policy issue9Information policy issue9
Information policy issue9pherbie
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Should Government Control the Internet and its contents
Should Government Control the Internet and its contentsShould Government Control the Internet and its contents
Should Government Control the Internet and its contentsAnirban Roy
 
Lesson 1 introduction to ict
Lesson 1   introduction to ictLesson 1   introduction to ict
Lesson 1 introduction to ictACLC Antipolo
 

What's hot (20)

information and comunication technologies
information and comunication technologiesinformation and comunication technologies
information and comunication technologies
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Legal Issues In Applied Technology
Legal Issues In Applied Technology Legal Issues In Applied Technology
Legal Issues In Applied Technology
 
Legal & ethical issues when implementing technology
Legal & ethical issues when implementing technologyLegal & ethical issues when implementing technology
Legal & ethical issues when implementing technology
 
Mobile Phones in Classrooms
Mobile Phones in ClassroomsMobile Phones in Classrooms
Mobile Phones in Classrooms
 
Digital inequality in the state of idaho
Digital inequality in the state of idahoDigital inequality in the state of idaho
Digital inequality in the state of idaho
 
Intro Networks Webinar With Reggie Smith April 2009
Intro Networks Webinar With Reggie Smith   April 2009Intro Networks Webinar With Reggie Smith   April 2009
Intro Networks Webinar With Reggie Smith April 2009
 
Ict (technology)
Ict (technology)Ict (technology)
Ict (technology)
 
Group5 ka part vi
Group5 ka part viGroup5 ka part vi
Group5 ka part vi
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
ais 150
ais 150ais 150
ais 150
 
Suggestions for state allocations of technology funds
Suggestions for state allocations of technology fundsSuggestions for state allocations of technology funds
Suggestions for state allocations of technology funds
 
Information policy issue9
Information policy issue9Information policy issue9
Information policy issue9
 
1st presentation
1st presentation 1st presentation
1st presentation
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Should Government Control the Internet and its contents
Should Government Control the Internet and its contentsShould Government Control the Internet and its contents
Should Government Control the Internet and its contents
 
ICT and Citizenship
ICT and CitizenshipICT and Citizenship
ICT and Citizenship
 
Lesson 1 introduction to ict
Lesson 1   introduction to ictLesson 1   introduction to ict
Lesson 1 introduction to ict
 

Similar to Cyber Safety: Who is Talking to Your Child

Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schoolsadawidziuk
 
Fear of filtering the reality of internet content management cipa fcc consu...
Fear of filtering the reality of internet content management   cipa fcc consu...Fear of filtering the reality of internet content management   cipa fcc consu...
Fear of filtering the reality of internet content management cipa fcc consu...Nebraska Library Commission
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety edtecher
 
A Substitute for Conscience?
A Substitute for Conscience?A Substitute for Conscience?
A Substitute for Conscience?CASL
 
Finding things out on the Web
Finding things out on the WebFinding things out on the Web
Finding things out on the WebMiles Berry
 
Fear of filtering the reality of internet content management (burns)
Fear of filtering the reality of internet content management (burns)Fear of filtering the reality of internet content management (burns)
Fear of filtering the reality of internet content management (burns)Nebraska Library Commission
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionKrishna De
 
Its the law
Its the lawIts the law
Its the lawnsharoff
 
Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331Dana Nunnery
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentationgreti79
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentationgreti79
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentationgreti79
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety TalkOllie Bray
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsGener Luis Morada
 

Similar to Cyber Safety: Who is Talking to Your Child (20)

DeepNines CIPA Whitepaper
DeepNines CIPA WhitepaperDeepNines CIPA Whitepaper
DeepNines CIPA Whitepaper
 
Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schools
 
Fear of filtering the reality of internet content management cipa fcc consu...
Fear of filtering the reality of internet content management   cipa fcc consu...Fear of filtering the reality of internet content management   cipa fcc consu...
Fear of filtering the reality of internet content management cipa fcc consu...
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
PAN CIPA Requirements
PAN CIPA RequirementsPAN CIPA Requirements
PAN CIPA Requirements
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety
 
A Substitute for Conscience?
A Substitute for Conscience?A Substitute for Conscience?
A Substitute for Conscience?
 
Finding things out on the Web
Finding things out on the WebFinding things out on the Web
Finding things out on the Web
 
Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Fear of filtering the reality of internet content management (burns)
Fear of filtering the reality of internet content management (burns)Fear of filtering the reality of internet content management (burns)
Fear of filtering the reality of internet content management (burns)
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
 
Its the law
Its the lawIts the law
Its the law
 
Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentation
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentation
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentation
 
Isidroteam.pptx
Isidroteam.pptxIsidroteam.pptx
Isidroteam.pptx
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
 

More from Megan

Teaudlswd
TeaudlswdTeaudlswd
TeaudlswdMegan
 
Stars application software
Stars application softwareStars application software
Stars application softwareMegan
 
Access devices netbooks
Access devices netbooksAccess devices netbooks
Access devices netbooksMegan
 
514 final project presentation
514 final project presentation514 final project presentation
514 final project presentationMegan
 
Ltms 500 final project
Ltms 500 final projectLtms 500 final project
Ltms 500 final projectMegan
 
Learn to swim
Learn to swimLearn to swim
Learn to swimMegan
 

More from Megan (8)

Teaudlswd
TeaudlswdTeaudlswd
Teaudlswd
 
Stars application software
Stars application softwareStars application software
Stars application software
 
Access devices netbooks
Access devices netbooksAccess devices netbooks
Access devices netbooks
 
514 final project presentation
514 final project presentation514 final project presentation
514 final project presentation
 
Ltms 500 final project
Ltms 500 final projectLtms 500 final project
Ltms 500 final project
 
Learn to swim
Learn to swimLearn to swim
Learn to swim
 
Blogs
BlogsBlogs
Blogs
 
Blogs
BlogsBlogs
Blogs
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Cyber Safety: Who is Talking to Your Child

  • 1. Cyber Safety Megan Harrold LTMS615
  • 2. Who is talking to your child?
  • 3. CIPA The Children’s Internet Protection Act (CIPA) is a federal law enacted by Congress to address concerns about access to offensive content over the Internet on school and library computers. CIPA imposes certain types of requirements on any school or library that receives funding for Internet access or internal connections from the E-rate program – a program that makes certain communications technology more affordable for eligible schools and libraries. In early 2001, the FCC issued rules implementing CIPA.
  • 4. Why? Erate funding The protection measures must block or filter Internet access to pictures that are: (a) obscene; (b) child pornography; or (c) harmful to minors (for computers that are accessed by minors). Dover Bluecoat filter iSafe Curriculum
  • 6. Internet is a great resource!
  • 8. Video to watch and discuss with your child