Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Jerry Sakala
This is the document Jerry Sakala used to facilitate Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders. Inspired by The Alberta Digital Policy development guide.
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Jerry Sakala
This is the document Jerry Sakala used to facilitate Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders. Inspired by The Alberta Digital Policy development guide.
Discuss legal and ethical issues such as intellectual property, copyright, fair use and privacy policies that an organization must address when implementing a modernized system.
GAMABrief: What Every School Needs to Know About Copyright LawChristina Gagnier
Technology in the classroom is nothing new, but with the rise of smartphones, smart boards and tablet computing, the way teachers and students use and engage with media continues to grow and evolve. Any time educational content is used, shared or created, whether by teachers or by students, IP laws and, specifically, copyright laws, are implicated. Administrators, teachers and students must all be aware of what activity is freely permissible under U.S. Copyright Law, and what sort of activities might run afoul of the law.
On this revision, I added some images and removed the clipart that it had. I also added a funny image to get the attention of my audience. I also changed the background color.
The complete guide on how to prevent an IT security breach.
Some of the tips include:
♦ Why keeping a clean desk matters
♦ How to avoid email threats, including five ways to block phishing attack
♦ How your employees can secure their mobile devices
♦ Website browsing best practices.
Discuss legal and ethical issues such as intellectual property, copyright, fair use and privacy policies that an organization must address when implementing a modernized system.
GAMABrief: What Every School Needs to Know About Copyright LawChristina Gagnier
Technology in the classroom is nothing new, but with the rise of smartphones, smart boards and tablet computing, the way teachers and students use and engage with media continues to grow and evolve. Any time educational content is used, shared or created, whether by teachers or by students, IP laws and, specifically, copyright laws, are implicated. Administrators, teachers and students must all be aware of what activity is freely permissible under U.S. Copyright Law, and what sort of activities might run afoul of the law.
On this revision, I added some images and removed the clipart that it had. I also added a funny image to get the attention of my audience. I also changed the background color.
The complete guide on how to prevent an IT security breach.
Some of the tips include:
♦ Why keeping a clean desk matters
♦ How to avoid email threats, including five ways to block phishing attack
♦ How your employees can secure their mobile devices
♦ Website browsing best practices.
By: Muhammad Jusuf*
My mom and my dad ever told me one time, that I was born in premature. My mother still seven months pregnant and I were born on Friday, April 10, 1959 in Military Hospitals in Balikpapan city, East Borneo.
My mom said that I should stayed in Hospital incubator around six months, and when my younger brother Rachmat Edy was born in the same Hospitals in two yeas later, I still could not walk yet. ‘’You can walk normally when you was three years old, other kids, event your Sister and Brothers do not needs more than two years to stand and walk alone.
Later, My Parents have ten kids, five man and five women. I am a second kid. My Father , Agusno who was passed a way in June, 2004 at 73 years old, was told me that in the past as an Sergeant army officer, his offices do not have a family planning program. So, that was why My Father every months got around 100 kg of rice from his offices to feed their family.
My Father is only single kids of my Grant Parents names Diran Wirotiyoso, a Javanese from Klaten, Central Java who was killed by Japanese marine group when the Japan and Netherland marine broke the war in Australian sea border. My Grant Parents is a Netherlands marine sergeant who joint with Netherland military corp. in 1930’s. He was joined in Netherlands Sub Marine Corps who was involved in Sea Battle in Australian sea border, close to Papua islands in 1940’s.
My Grant Mother, Inah, is a ‘’Dayak Paser’’ ethnic from Tanah Grogot, Paser Regencies, East Kalimantan. My Mother, Temah, 80’s is also a “Dayak Paser’’. My Grant Mother from my mom side is also Dayak Paser, but his husband was from Selayar Island, South Sulawesi. My Grand Father names from my mom side are Baco Benu, Bugis Ethnic names. So, Ethnically, I have three mixes in ethnicity, Dayak, Bugis and Javanese.
From my birth to around 1968, I stayed in Sentosa Dua, closed to the Prapatan Market areas. Sentosa II is a Military base dormitory and Military Real Estate. Around 1969, my Father build their own houses, two storey, about 300 m2, bigger than the one when we stayed in Military Dormitory, only size 60m2.
My Father build a big houses in ‘’Kampung Baru Tengah’’ (New Central Village), South of Balikpapan city, around 25 km from Sentosa II areas. The newly locations is more comfortable, because we have a house which upper the neat of beach. ‘’So, when my school was in the afternoon, around 12.00, before I attended the elementary school, I fish back to my houses. I usually catch the crab and other kind of fish, so my mother can save their money to buy fish or crab. I used small boat, or small kayak to fish the crab. When my school times were in the morning, I took to fish at around 16.00 local times’’.
My father decided to build their own houses, because my parents has already have 8 kids, four man and four women, because two other brothers and sisters, Yuni Suryaningsih and Wahyu Eko Buwono were born in Jakarta later.
So, when we stayed in Balikpapan, I have my Older sister, Sri Marginingsih, my younger brother Rachmat Edy, Agus Santoso, Bambang Widodo, and my younger sister Sri Mulyani, who right now more than 20 years living in San Diego, California, the United States. Sri Mulyani got married with American zitizens Umar Abdul Madjid. Umar is a new name since he converted to Islam 30 years ago when he attended at Law School in San Diego. My other younger sister was Titin Fatimah, and Yuni Suryaningsih.
Rachmat Edy and Agus Santoso were like me, working as a Journalist. Sri Mulyani, Erni Rahayu, and Yuni Suryaningsing are a Teacher in profession.
I remembered that in Ramadhan fasting months times, in 1960’s, My grand mother always took me to her houses in the Borneo Jungle, we call it Wain river areas, 50 km from Balikpapan city, East Kalimantan. In the past, the school holidays always match with Ramadhan times, either in December, November, or October or other Gregorian months. Usually, Ramadhan holidays w
Over 10 years experience in all facets of brand strategy and design. Observe cultural trends and intuitively apply those insights to naming, positioning, and visual identity. Thrive on big picture thinking with an equal passion for overseeing all the final, executional details.
Dark Clouds and Rainy Days, the Bad Side of Cloud ComputingDavid Rogers
This presentation was given at the Informa Cloud Mobility event in Amsterdam on the 21st of September. As with a lot of things in the technology world, things move quickly and events have superseded a couple of things in the slides. The idea of the presentation was to give an alternative view to the conference. The attendees and presenters struggled even to define "cloud"; a marketing term, which is part of the problem of this topic.
Please note, there are no slide notes to this presentation.
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India
Due to COVID-19, schools and colleges are non-operational across India, physically. Although there is no immediate disruption to education and teaching, learning has almost moved entirely from physical to virtual. This presents an added responsibility and stress for parents to keep their children safe from cyber criminals who could be trying to leverage this opportunity to lure online users to click on malicious links and files. The IET’s Cybersecurity Working Group has put together some best practices to be followed to safeguard children from becoming targets of malware and thus, to protect them cyber threats.
Ola Wittenby - Hotlandskapet på Internet IBM Sverige
Att bekämpa brott på internet blir för de flesta företag inte lättare med tiden. Cyberbrottslingar ökar hela tiden takt och sinnrikhet i deras attacker. Tekniken och tillvägagångssätten förbättras stadigt och attackerna blir ännu svårare att hitta och hindra.
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
Law firms that establish a secure browsing environment without compromising data security, work culture or productivity gain a competitive advantage. This paper shows how successful law firms are optimizing on both axes: data security and user satisfaction.
Cyberoam: il futuro della network security!Team Sistemi
Team Sistemi è Cyberoam SILVER Partner e in ventanni di attività ha sviluppato una forte competenze nel mondo della security informatica.
Per altre informazioni sulle appliance Cyberoam vai su http://www.teamsistemi.com/soluzioni/sicurezza-informatica/firewall-e-appliance-cyberoam.html
Oppure contattaci al Numero Verde gratuito 800-011630 o scrivici a info@teamsistemi.com.
1000+ Apps are released on Google Play and Appstore every day!
The most popular ones are downloaded
75 000 times a day.
There are many success factors that must be met for your app to be successful and one of these are trust
IET India cybersecurity advisory: security practices for remote workingIET India
We are living in a heightened time of cyber risk. Organisations are still operational by allowing their employees to work from home. Cybercriminals have started taking advantage of public fear to generate coronavirus themed phishing attacks. We should be aware of COVID-19 tagged emails with misleading links or attachments. The IET’s Cybersecurity working group has put together some best practices to be followed at this crucial time to safeguard employees and as well as organisations that are navigating the new order of remote working.
Read ahead to know steps that both organisations and individual employees can undertake to do their bit to secure their enterprise data.
Here Are 7 Importance of Cybersecurity: 1. Technological lock and key 2. Protecting intellectual property 3. Trust building 4. Spreads awareness about digital literacy 5. Adapting to evolving threats
Presentation given at the Berkhamsted School IT Open Day on February 28th 2012.
Presented by Peter Nicholls, Vice Principal (Business Operations), exploring how the school has saved thousands by taking away printers and replacing them with MFDs.
eLearning - how to persuade staff to use technologyVictoria College
A review of how staff at Berkhamsted School have been empowered to engage and use eLearning.
Presented as part of the Open to IT event hosted at Berkhamsted School on February 28th 2012.
IPD Heads of Sixth Form conference - ICT & independent learning (30th Nov 2011)Victoria College
Presentation made to Heads of Sixth Form as part of an IPD organised conference.
Contains videos of students and teachers at Berkhamsted School, explaining how they that used digital technologies to create powerful learning resources.
Heads in the Cloud, Students in the Driving SeatVictoria College
Presentation at the Greenwich University 2011 Technology Enhanced Learning conference.
The presentation is called "Heads in the Cloud, Students in the Driving Seat.'
Haileybury Group Directors of Studies Presentation June 2011 Victoria College
A presentation and digital guide, used in a talk to Directors of Studies from the Haileybury & St Albans Group, on June 20th 2011.
The presentation looks at theories of using technology enhanced learning, and shows how Berkhamsted School has done this using Google Apps for Education plus Moodle.
It features a range of videos: from other academic sources, plus interviews with teachers and students at school.
Presentation given at the IPD conference held at Berkhamsted School, England, on November 17th, 2010.
The theme of the conference was: Digital natives - engaging libraries in their learning.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
Smoothwall presentation feb open day
1. Staff and Schools
Protecting Students,
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
2. The Big Three in Education Web Security
Acceptable Usage Policy (AUP)
A clear communicable policy of ‘Who, Where, What and When’ is acceptable
Dynamic Web Content Filtering
A systems that delivers the AUP and provides control, monitoring and reporting
Malware Protection
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Constantly updated software that protects your users and your network at the web
gateway (as opposed to individually at the PC) from malware threats
3. So what can possibly go wrong?
(In approximate order of likelihood);
Malware Infection
Student / Employee / Guest Misuse
Data Loss / Damage
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Data Protection Breach
Operational Continuity Failures
Criminal / Civil Law Infringement
4. Malware Infection
Spamming, Denial of Service attacks, identity theft, email
spoofing, storage of illegal data/images, damage/erasure/theft
of data, ad serving, scareware (cryptovirology), SEO abuse, DNS
poisoning, phishing, bypassing security and authentication,
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
software licence theft …
Via >>>
Botnets (‘zombie computers’), rootkits, trojans, worms,
backdoors, droppers, keystroke loggers, spyware, adware,
dialers …
5. Student Misuse
Accessing inappropriate content
Inappropriate behaviour and bullying
Social Media abuse/misuse
Illegal file sharing / copyright theft (music, video and software)
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Identity theft
Excessive bandwidth consumption (media)
6. Employee Misuse
Time Wasting (Social Networking/Shopping/Surfing)
Harassment / bullying / inappropriate social behaviour
Accessing and distributing inappropriate content
Illegal file sharing / copyright theft (music, video and software)
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Excessive bandwidth consumption (media)
Data loss / theft
Breaches of Data Protection Act
Breaches of Confidentiality and Trust
7. Network ‘Guest’ Misuse
Responsibility for guests on-line Health & Safety lies with the
host
Inappropriate guest activity on a school’s network could become
the responsibility of the host
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Malware infection
Excessive bandwidth consumption (media)
8. Data Loss
Malware
- Data Theft / Deletion
- Cyptovirologic Extortion
Data is encrypted by a virus then a payment is extorted for the decryption codes
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Identity Theft
Breaches of Data Protection Act
Data and Information Theft by Employees/Contractors
9. Operational Continuity Failures
Loss of earnings through ‘downtime’
Time, energy and money wasted in restoring status quo
Network disinfection post malware attack
Human and emotional costs
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Restoration of damaged reputation
Servers and computers seized in criminal investigations
Potentially huge legal bills
10. Criminal / Civil Law Infringement
Health and Safety – the behaviour of your employees and students can
impact on their mental and physical health
Vicarious Liability – you can be liable for things your employees and
students do on-line even though you haven’t sanctioned them
Negligence – if you fail to take reasonable and appropriate steps to protect
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
others you could be considered negligent
Data Protection – you are required by law to conform to the DP Act
Copyright Infringement – anybody sharing music/movies on your network?
Paedophilic Material – it is a recognised fact that work place computers
are used to store illegal material
11. What can you do about it?
Remember that web security doesn’t only belong to the
IT department
Create a web security policy, implement it and constantly review it
Have a robust, well communicated and effectively policed
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Acceptable Usage Policy
Continuing education of all your users to the threats on the web
Use effective control and reporting tools
13. E-Safety Law in Independent Schools
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
14. E-Safety Law
Usage of the web should risk assessed in the same way
as any other school environment e.g. gym or science lab
The law makes clear distinctions as to who is responsible for
delivering e-safety at work (and in the school environment)
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
The Head Teacher and Board of Trustees/Governors cannot
delegate it
Using appropriate processes and technology can significantly
reduce the threshold of legal liability and most importantly
protect students and staff
15. Web Access Policies
Building Flexible Filtering and
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
16. Designing Flexible Policies
For students:
- age, year, subject and location specific
- differentiate work time and personal time
For staff:
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
- work time, personal time and role specific
- teacher control of web content in the classroom
For guests:
- what is acceptable under your ethos and culture?
17. Mobile Device Integration &
Bring Your Own Device Schemes
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
18. Mobile Device Integration
iOS (iPad) and Android devices present new challenges –
especially multi-flavoured Android
‘Locked down’ browsers are currently the most effective method
of ensuring content is controlled
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
19. BYOD Schemes
The use of personal mobile tech in schools is inevitable
Easy access to fast school filtered Wi-Fi will help reduce 3G
network use
Protecting from malware at the gateway is currently the most
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
effective strategy
Continuous education to students, staff and parents about on-
line threats is the best approach
21. Helping Teachers to Teach
Each web page should be dynamically scanned for inappropriate
content based on the policy set for the user or group
Uncategorised web content can be unblocked by teachers in the
classroom (not IT) without overriding ‘red-line’ policies
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
Resources like YouTube and Google search can be safely used in
the classroom
Full visibility of on-line activity and accountability can be
maintained without constant IT interaction
22. Managing Social Media & Content
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
23. YouTube.com/education
A hugely valuable resource of ‘safe’ educational material
Schools can add their own approved content to their ‘channel’
and restrict access to the rest of YouTube
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
24. Managing Social Media
‘Read Only’ Facebook – a policy driven ‘look but don’t touch’
approach allows Facebook to be integrated positively into the
school environment
Instant Messaging Management and Censoring – enables useful
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
communication tools to be properly managed and users fully
accountable
26. Our Crystal Ball …
Integration with social media and content platforms
Mobile device filtering to include 3G
Improved sharing of approved / whitelisted content
between teachers and schools
Copyright Smoothwall Ltd & Smoothwall Inc 2001 – 2011 | All Rights Reserved.
"Mariposa" botnet, which infected more than 12.7 million computers, including half of the companies in the Fortune 1,000 list.'Coreflood Botnet': 'Zombie' Army May Have Infected 2 Million Computers, Stolen Hundreds of Millions of Dollarshttp://abcnews.go.com/Technology/feds-crush-coreflood-botnet-infected-million-computers-stole/story?id=13369529&page=2Serious crime unit flags Virgin botnet infectionshttp://www.pcpro.co.uk/news/security/368125/serious-crime-unit-flags-virgin-botnet-infectionsMicrosoft’s Rustock botnet takedown has reduced infections by over 50%The Rustock botnet was the largest source of spam in the world, consisting of around 150,000 machines sending around 30 billion spam messages a day. http://www.winrumors.com/microsofts-rustock-botnet-takedown-has-reduced-infections-by-over-50/
Responsibility for guests on-line Health & Safety lies with the hostLaw relating to Occupiers’ Liability – network providers have a duty to protect their usersInappropriate guest activity on a school’s network could become the responsibility of the hostIP trackingAccess to inappropriate content and services