Judson ISD Internet Safety and Filtering Hearing November 16th, 2009
1. 11/12/2009
Judson ISD ERC, November 16th, 6:00pm
Steve Young, CTO, Technology Services, syoung@judsonisd.org
Doretta Walker, Director of Desktop Services, dwalker@judsonisd.org
Beverly Ahr, Director of Instructional Technology, bahr@judsonisd.org
1
2. 11/12/2009
• It’s the law.
• Judson ISD must comply with Children s Internet
Judson ISD must comply with Children’s Internet
Protection Act (CIPA)
• Requirement of Federal eRate program, which
funds a lot or technology and network access for
Judson ISD
• While Judson ISD staff monitors students, the
filter servers as extra eyes, especially as the
numbers of internet devices proliferate
b f i t t d i lif t
2
3. 11/12/2009
• Judson ISD Board Policy CQ sets out rules for
Electronic Communication and Data Management at
Judson ISD
• These were last update and adopted by the Board on
10/9/2006 (CQ Local)
• CQ Local says: “The District shall provide a filtering
CQ L l “Th Di i h ll id fil i
service that attempts to block access to…..”
• CQ Legal says …as a prerequisite to receiving these
CQ Legal says “…as a prerequisite to receiving these
funds, implement certain Internet safety
measures…”
• CQ Legal says “…the District must educate minors
CQ Legal says “ the District must educate minors
about appropriate online behavior, including
interacting with other individuals on social
networking Web sites and in chat rooms and
t ki W b it d i h t d
cyberbullying awareness and response.”
3
5. 11/12/2009
• Every year they receive a student handbook,
which contains JISD Board of Trustee Approved
verbiage (including student code of conduct)
• Handbook includes Acceptable Use of
Handbook includes “Acceptable Use of
Internet/Computer facilities” and
• “Computer/Internet Use Offenses& Conseq ”
Computer/Internet Use – Offenses& Conseq.
• Parents & students must sign acknowledgement
form yearly.
form earl
5
6. 11/12/2009
• All Internet requests are filtered through
q g
LightSpeed Systems filter
• Specific known users (staff) may have more
relaxed filter if they have been approved for the
l dfl f h h b df h
access based on job need. ( reference JISD
procedure C2 – must use Form C2‐3 Request for
procedure C2 must use Form C2 3 “Request for
Unfiltered Internet Access”
• Unknown users are restricted to most limited
Internet access, which is student access
6
10. 11/12/2009
Staff
St ff
Action Steps Time Line Resources Evidence of Attainment
Responsible
Internet
Research topic Feb.-March, Instructional
Internet Safety Video Research folder
Locate and categorize resources 2009 Technology Staff
Tape
PowerPoint 2007
Create PowerPoint Presentation and June-Aug., Instructional CD of presentation and
Blank CD
Training Script 2009 Technology Staff hardcopy of training script
Copy Paper
Instructional
Present to Technology Meeting scheduled and
Nov-Dec., Copies of Script for Technology Staff
Services/Curriculum & Instruction sign in sheets of
2009 each participant Student Services
Departments for feedback attendance
Staff
Revised CD of
Digital copies of Instructional
Revise Presentation Dec., 2009 presentation and revised
presentation and script Technology Staff
hardcopy of training script
Date of principal
p p Instructional
Present to Administrators
P t t Ad i i t t Dec., 2009
D Meeting A
M ti Agenda
d
meetings Technology Staff
Meeting room
CDs and Script for
Train Counselors, Social Workers, Instructional
Jan., 2009 each participant Sign in sheets
CITs, Librarians Technology Staff
Sign-in sheets
Evaluation Forms
CD and script for
Counselors, Social
Train all Teachers on Internet Safety trainer
Feb.-May 2010 Worker, Librarians Sign in sheets
and Cyber Bullying Sign in sheets
and CITs
Evaluation forms
Train all Students in K 12 on Internet
K-12 CD and script for
Counselors, Social
Safety trainer
Feb.-May 2010 Worker, Librarians Sign in sheets
Train all Students in 3-12 on Cyber Sign in sheets
and CITs
Bullying Evaluation forms
10
12. 11/12/2009
1. Explain the main points of the JISD acceptable use policy
2. List examples of “bad neighborhood” websites
Li l f “b d i hb h d” b i
3. Tell how to protect oneself when using a social network site.
4. Tell why one should reconsider before placing potentially
4 Tell why one should reconsider before placing potentially
embarrassing pictures or information online
5. List rules to follow when blogging, writing instant messages,
emailing and visiting chat rooms
ili d i i i h
6. Explain the dangers of revealing too much personal information to
an online acquaintance.
q
7. Tell what to do if an online acquaintance says something personal
that makes you uncomfortable or asks to meet.
12
13. 11/12/2009
JISD Philosophy Student
Definition Responsibilities
Rationale/Legal Reprisal or
Statistics Retaliation
Prevention Discipline and
p
Consequences
Warning Signs
Reporting
Investigating
Examples
Staff Responsibilities
13