SlideShare a Scribd company logo
1 of 6
Velvet Ferrari

FRIT 7132

February 20, 2011



                                Acceptable Internet Use In Schools

       The internet is a vast, global network, that links computers at schools, colleges, homes,

and other sites. Through the internet, one can communicate with people all over the world

through interactive websites, blogs, video conferencing, podcasts, email, etc which offer authen-

tic opportunities for students to express and share information. In addition, many educationally

valuable files may be accessed through the Internet. Because of its enormous size and resources,

the Internet’s educational potential is boundless. There is also potential for access to materials

unacceptable for student use. Some material accessible on the Internet may contain items that

are illegal, defamatory, inaccurate, or potentially offensive to some people.

       Bringing technology into the classroom can be a powerful, if not frightening, process.

Along with all the wonderful resources available on the Internet there are some things parents

and teachers may not want their children and students to experience. As a resource for teachers it

is astonishing. Lesson plans by subject area, reproducible worksheets, and online activities at a

click of a button are all available. Obviously, students also have a vast resource in the Internet -

they can develop their computer skills, take online field trips, do research, or correspond.

       By using the Internet in the classroom, students now have access to information not avail-

able in most school libraries. Students’ horizons are expanded without ever leaving the confines

of the classroom.
With the positives comes the negatives. The Internet has its dangers. There are online

predators, cyber harassment and bullying to worry about. Not to mention the sites that can be

objectionable for racial, sexist, political, sexual, or other reasons. The Internet is accessible to

the public. Unfortunately, this includes people who may want to communicate with students for

inappropriate purposes or under false pretenses. Students must be cautious and prudent about

supplying personal information. In particular, students should never arrange a personal meeting

with a person whom they meet on-line.

       Most people do not realize that the Internet is an international linking of networks that is

impossible to 100% censor. Thus schools, parents, and educators must rely on other means to

safely use the Internet as an educational tool.

       Many communities are implementing policies that guide student, teacher, and staff use of

technological resources so as to limit liability and restrict access to those resources that are

deemed “appropriate” for educational use. One option is to limit access to sites through filtering

or blocking software. Unfortunately, students who are growing up in the computer age often

have the skills and means to bypass such software. Restricting access to resources brings up

concerns of censorship. Additionally, many educators find filtering and blocking annoying as

educationally legitimate sites are often blocked due to image or text content.

       Instead of banning or blocking, many schools are turning to another method - that of

proactive education. By teaching students responsible behavior, asking them to sign an agree-

ment, and providing written descriptions of the consequences for wrongful action, students de-

velop a sense of ownership for their online experiences. These type of agreements are called Ac-

ceptable Use Policies - otherwise known as AUPs.
At the school level, an AUP acts as a written contract between administrators, teachers,

parents, and students. It outlines the terms and conditions for acceptable Internet use by defining

access privileges, rules of online behavior, and the consequences for violating those rules. The

AUP can also be a helpful tool for teachers offering guidance on how to best integrate the Inter-

net into their classrooms. Georgia schools are required to create and implement “acceptable-use

policies” in regards to Internet use. Any Georgia school that does not submit an approved policy

to the school board, and implement it, will have all state funds revoked.

       The focus of the AUP should be on the responsible use of computer networks. Such net-

works include both the Internet (the World Wide Web, external e-mail, and so on) and any In-

tranets (classroom networks, communications between classes within a school or district, library

catalogue and database access, etc.).

       In order to ensure greater ownership of the AUP and its successful implementation, it is

important that staff, parents, governors and pupils are all involved in discussions about what

should be included in it.

       According to the the US Department of Education’s online Alphabet Superhighway,

AUPs should include:

  •“A description of the instructional philosophies, strategies and goals to be supported by Inter-
  net access in schools

  •An explanation of the availability of computer networks to students and staff members in
  your school or district

  •A statement about the educational uses and advantages of the Internet

  •An explanation of the responsibilities of educators and parents for students' use of the Internet

  •A code of conduct governing behavior on the Internet
•An outline of the consequences of violating the AUP

  •A description of what constitutes acceptable and unacceptable use of the Internet

  •A description of the rights of individuals using the networks in your school/district (such as
  the right to free speech, right to privacy, and so on)

  •A disclaimer absolving the school district from responsibility, under certain circumstances

  •An acknowledgement that the AUP complies with provincial and national telecommunication
  rules and regulations

  •A form for teachers, parents and students to sign, indicating that they agree to abide by the
  AUP

In addition, an AUP should:

  •Serve as a legal document.
  The school board's legal counsel should approve the AUP before it is distributed.

  •Be complete.
  An AUP should include not just rules of behavior, but also a statement about the school's posi-
  tion on Internet use.

  •Be adaptable.
  Since the Internet is constantly evolving, an AUP cannot anticipate every possible situation. It
  should address this fact, and be capable of modifications to cover circumstances not outlined.
  You may need to update the AUP as new issues arise.

  •Be unique to your school.
  Every school or district is different - both in terms of the technology available, and in terms of
  who has access to the network; who maintains the network; and who teaches school personnel
  and/or students how to use the network.

  •Protect students.
  If students follow the AUP's rules, their exposure to questionable material should be mini-
  mized. The AUP can also protect them from dangerous online behavior, such as giving out
  their names and addresses to strangers.

  •Inform parents.
An AUP outlines to parents how their children will learn on the Internet, and how they will be
  supervised while on it.”

       A downside of AUPs is that because they emphasize surveillance and control rather than

supervision and guidance, they imply an absence of trust in students. But when AUPs are prop-

erly designed and implemented, they respect the rights of both child and school.




                                           References
B E C Ta , . ( 2 0 0 1 , D e c e m b e r ) . A c c e p t a b l e u s e o f t h e i n t e r n e t i n
schools. Retrieved from
h t t p : / / w w w . s e e l b . o r g . u k / d a t a _ p r o t e c t i o n / P D F s / B E C TA _ G u i d a n c e _ o n _
Acceptable_Use_of_the_Interne_in%20Schools_(Dec.2001).pdf

Shankel, N. (2010, July 1). Internet safety & georgia law. Retrieved
f r o m h t t p : / / w w w. e h o w. c o m / p r i n t / a b o u t _ 6 6 8 4 4 6 4 _ i n t e r n e t - s a f e t y -
g e o r g i a - l a w. h t m l

A c c e p t a b l e U s e P o l i c y. ( 2 0 1 1 ) . W i k i p e d i a . R e t r i e v e d F e b r u a r y 1 8 ,
2011, from http :// en.wikiped ia.org/w/ind ex.php?
title=Acceptable_use_policy&printable=yes

K l e i n e r, An n e , & F a r r i s , E l i z a b e t h . U .S . D e p a r t m e n t o f E d u c a t i o n ,
Office of Educational Research and Improvement. (2002). Internet
access in u.s. public schools and classrooms: 1994-2001 (NCES
2 0 0 2 - 0 1 8 ) . Wa s h i n g t o n , D C : 2 0 0 2 : G o v e r n m e n t P r i n t i n g O f f i c e . R e -
trieved from http://nces.ed.gov/pubs2002/2002018.pdf

S c h r a d e r, A l v i n . ( 1 9 9 9 ) . I n t e r n e t c e n s o r s h i p : i s s u e s f o r t e a c h e r- l i -
b r a r i a n s . Te a c h e r L i b r a r i a n : T h e j o u r n a l f o r s c h o o l l i b r a r y p r o f e s -
s i o n a l s , R e t r i e v e d f r o m h t t p : / / w w w. m e d i a - a w a r e n e s s . c a / e n g l i s h / r e -
sources/special_initiatives/wa_resources/wa_shared/backgrounders/in
t e r n e t _ c e n s o r s h i p _ s c h r a d e r. c f m

I n t e r n e t C e n s o r s h i p : i ss u e s f o r t e a c h e r- l i b r a r i a n s . ( 2 0 11 ) . Wi k i p e d i a .
Retr ieved February 9, 2011, from http: //en.wik ipedia.org /wiki/In ter-
net_censorship

More Related Content

What's hot

Charter cellphones
Charter cellphones Charter cellphones
Charter cellphones elizkeren
 
Social Networking and Chilton
Social Networking and ChiltonSocial Networking and Chilton
Social Networking and Chiltonelizkeren
 
Edu current issues
Edu current issuesEdu current issues
Edu current issuesbradl2jm
 
Connecting Caribbean Classrooms and Communities - CTEC 2016
Connecting Caribbean Classrooms and Communities - CTEC 2016Connecting Caribbean Classrooms and Communities - CTEC 2016
Connecting Caribbean Classrooms and Communities - CTEC 2016Cheryl Peltier-Davis
 
Macul2011 text
Macul2011 textMacul2011 text
Macul2011 textelizkeren
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingDr. Conrath
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?Securly
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueMichael Barbour
 
Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
Marc hoit University Campus - Microcosm of the future
Marc hoit   University Campus - Microcosm of the futureMarc hoit   University Campus - Microcosm of the future
Marc hoit University Campus - Microcosm of the futureTravis Barnes
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentationgreti79
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomjlknight
 

What's hot (17)

Charter cellphones
Charter cellphones Charter cellphones
Charter cellphones
 
Social Networking and Chilton
Social Networking and ChiltonSocial Networking and Chilton
Social Networking and Chilton
 
Mississippi State University Adams
Mississippi State University AdamsMississippi State University Adams
Mississippi State University Adams
 
Edu current issues
Edu current issuesEdu current issues
Edu current issues
 
Connecting Caribbean Classrooms and Communities - CTEC 2016
Connecting Caribbean Classrooms and Communities - CTEC 2016Connecting Caribbean Classrooms and Communities - CTEC 2016
Connecting Caribbean Classrooms and Communities - CTEC 2016
 
Macul2011 text
Macul2011 textMacul2011 text
Macul2011 text
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
 
Manistee
ManisteeManistee
Manistee
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Marc hoit University Campus - Microcosm of the future
Marc hoit   University Campus - Microcosm of the futureMarc hoit   University Campus - Microcosm of the future
Marc hoit University Campus - Microcosm of the future
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentation
 
WORST ACADEMIC WRITING
WORST ACADEMIC WRITING WORST ACADEMIC WRITING
WORST ACADEMIC WRITING
 
Internet Use and Academic Performance of the Students
Internet Use and Academic Performance of the StudentsInternet Use and Academic Performance of the Students
Internet Use and Academic Performance of the Students
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 

Similar to Acceptable Internet Use In Schools

Lagrama Essay
Lagrama EssayLagrama Essay
Lagrama Essayjenalyn
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policyBadaiaEnglish
 
1 to 1 parent handbook 2015 - Policy and Guidelines
1 to 1 parent handbook 2015 - Policy and Guidelines1 to 1 parent handbook 2015 - Policy and Guidelines
1 to 1 parent handbook 2015 - Policy and GuidelinesMaria Mead
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doerscathtech
 
Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil DoersJazayer
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomMrs.Faust
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issuesdligg002
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldNaace Naace
 
The revised draft (RD2) is the culminating assignment of our second
The revised draft (RD2) is the culminating assignment of our second The revised draft (RD2) is the culminating assignment of our second
The revised draft (RD2) is the culminating assignment of our second jacvzpline
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying ResourcesAndy Jeter
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroomguestb1be291
 
Technology Ideas.
Technology Ideas.  Technology Ideas.
Technology Ideas. mgsctech
 
Students in a Teacher College of Education Develop Educational Programs and A...
Students in a Teacher College of Education Develop Educational Programs and A...Students in a Teacher College of Education Develop Educational Programs and A...
Students in a Teacher College of Education Develop Educational Programs and A...oritzeichner
 
Privacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalPrivacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalthsieh
 

Similar to Acceptable Internet Use In Schools (20)

Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
ETEC635 Paper
ETEC635 PaperETEC635 Paper
ETEC635 Paper
 
Lagrama Essay
Lagrama EssayLagrama Essay
Lagrama Essay
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policy
 
1 to 1 parent handbook 2015 - Policy and Guidelines
1 to 1 parent handbook 2015 - Policy and Guidelines1 to 1 parent handbook 2015 - Policy and Guidelines
1 to 1 parent handbook 2015 - Policy and Guidelines
 
Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doers
 
Web Filters And Other Evil Doers
Web Filters And Other Evil DoersWeb Filters And Other Evil Doers
Web Filters And Other Evil Doers
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
Legal and Ethical Issues
Legal and Ethical IssuesLegal and Ethical Issues
Legal and Ethical Issues
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
The revised draft (RD2) is the culminating assignment of our second
The revised draft (RD2) is the culminating assignment of our second The revised draft (RD2) is the culminating assignment of our second
The revised draft (RD2) is the culminating assignment of our second
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
 
Computers in the Classroom
Computers in the ClassroomComputers in the Classroom
Computers in the Classroom
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
Technology Ideas.
Technology Ideas.  Technology Ideas.
Technology Ideas.
 
E safety for governors & carers
E safety for governors & carersE safety for governors & carers
E safety for governors & carers
 
Students in a Teacher College of Education Develop Educational Programs and A...
Students in a Teacher College of Education Develop Educational Programs and A...Students in a Teacher College of Education Develop Educational Programs and A...
Students in a Teacher College of Education Develop Educational Programs and A...
 
Privacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation finalPrivacy, copyright, ip and safe use presentation final
Privacy, copyright, ip and safe use presentation final
 

More from vlferrari

Information literacy lesson plan
Information literacy lesson planInformation literacy lesson plan
Information literacy lesson planvlferrari
 
Acceptable internet use in schools
Acceptable internet use in schoolsAcceptable internet use in schools
Acceptable internet use in schoolsvlferrari
 
Collection and development plan
Collection and development planCollection and development plan
Collection and development planvlferrari
 
Facilities plan
Facilities planFacilities plan
Facilities planvlferrari
 
Facilities plan
Facilities planFacilities plan
Facilities planvlferrari
 
Facilities plan
Facilities planFacilities plan
Facilities planvlferrari
 
Facilities plan
Facilities planFacilities plan
Facilities planvlferrari
 
Facilities Plan
Facilities PlanFacilities Plan
Facilities Planvlferrari
 
Ferrari v policy
Ferrari v policyFerrari v policy
Ferrari v policyvlferrari
 

More from vlferrari (9)

Information literacy lesson plan
Information literacy lesson planInformation literacy lesson plan
Information literacy lesson plan
 
Acceptable internet use in schools
Acceptable internet use in schoolsAcceptable internet use in schools
Acceptable internet use in schools
 
Collection and development plan
Collection and development planCollection and development plan
Collection and development plan
 
Facilities plan
Facilities planFacilities plan
Facilities plan
 
Facilities plan
Facilities planFacilities plan
Facilities plan
 
Facilities plan
Facilities planFacilities plan
Facilities plan
 
Facilities plan
Facilities planFacilities plan
Facilities plan
 
Facilities Plan
Facilities PlanFacilities Plan
Facilities Plan
 
Ferrari v policy
Ferrari v policyFerrari v policy
Ferrari v policy
 

Acceptable Internet Use In Schools

  • 1. Velvet Ferrari FRIT 7132 February 20, 2011 Acceptable Internet Use In Schools The internet is a vast, global network, that links computers at schools, colleges, homes, and other sites. Through the internet, one can communicate with people all over the world through interactive websites, blogs, video conferencing, podcasts, email, etc which offer authen- tic opportunities for students to express and share information. In addition, many educationally valuable files may be accessed through the Internet. Because of its enormous size and resources, the Internet’s educational potential is boundless. There is also potential for access to materials unacceptable for student use. Some material accessible on the Internet may contain items that are illegal, defamatory, inaccurate, or potentially offensive to some people. Bringing technology into the classroom can be a powerful, if not frightening, process. Along with all the wonderful resources available on the Internet there are some things parents and teachers may not want their children and students to experience. As a resource for teachers it is astonishing. Lesson plans by subject area, reproducible worksheets, and online activities at a click of a button are all available. Obviously, students also have a vast resource in the Internet - they can develop their computer skills, take online field trips, do research, or correspond. By using the Internet in the classroom, students now have access to information not avail- able in most school libraries. Students’ horizons are expanded without ever leaving the confines of the classroom.
  • 2. With the positives comes the negatives. The Internet has its dangers. There are online predators, cyber harassment and bullying to worry about. Not to mention the sites that can be objectionable for racial, sexist, political, sexual, or other reasons. The Internet is accessible to the public. Unfortunately, this includes people who may want to communicate with students for inappropriate purposes or under false pretenses. Students must be cautious and prudent about supplying personal information. In particular, students should never arrange a personal meeting with a person whom they meet on-line. Most people do not realize that the Internet is an international linking of networks that is impossible to 100% censor. Thus schools, parents, and educators must rely on other means to safely use the Internet as an educational tool. Many communities are implementing policies that guide student, teacher, and staff use of technological resources so as to limit liability and restrict access to those resources that are deemed “appropriate” for educational use. One option is to limit access to sites through filtering or blocking software. Unfortunately, students who are growing up in the computer age often have the skills and means to bypass such software. Restricting access to resources brings up concerns of censorship. Additionally, many educators find filtering and blocking annoying as educationally legitimate sites are often blocked due to image or text content. Instead of banning or blocking, many schools are turning to another method - that of proactive education. By teaching students responsible behavior, asking them to sign an agree- ment, and providing written descriptions of the consequences for wrongful action, students de- velop a sense of ownership for their online experiences. These type of agreements are called Ac- ceptable Use Policies - otherwise known as AUPs.
  • 3. At the school level, an AUP acts as a written contract between administrators, teachers, parents, and students. It outlines the terms and conditions for acceptable Internet use by defining access privileges, rules of online behavior, and the consequences for violating those rules. The AUP can also be a helpful tool for teachers offering guidance on how to best integrate the Inter- net into their classrooms. Georgia schools are required to create and implement “acceptable-use policies” in regards to Internet use. Any Georgia school that does not submit an approved policy to the school board, and implement it, will have all state funds revoked. The focus of the AUP should be on the responsible use of computer networks. Such net- works include both the Internet (the World Wide Web, external e-mail, and so on) and any In- tranets (classroom networks, communications between classes within a school or district, library catalogue and database access, etc.). In order to ensure greater ownership of the AUP and its successful implementation, it is important that staff, parents, governors and pupils are all involved in discussions about what should be included in it. According to the the US Department of Education’s online Alphabet Superhighway, AUPs should include: •“A description of the instructional philosophies, strategies and goals to be supported by Inter- net access in schools •An explanation of the availability of computer networks to students and staff members in your school or district •A statement about the educational uses and advantages of the Internet •An explanation of the responsibilities of educators and parents for students' use of the Internet •A code of conduct governing behavior on the Internet
  • 4. •An outline of the consequences of violating the AUP •A description of what constitutes acceptable and unacceptable use of the Internet •A description of the rights of individuals using the networks in your school/district (such as the right to free speech, right to privacy, and so on) •A disclaimer absolving the school district from responsibility, under certain circumstances •An acknowledgement that the AUP complies with provincial and national telecommunication rules and regulations •A form for teachers, parents and students to sign, indicating that they agree to abide by the AUP In addition, an AUP should: •Serve as a legal document. The school board's legal counsel should approve the AUP before it is distributed. •Be complete. An AUP should include not just rules of behavior, but also a statement about the school's posi- tion on Internet use. •Be adaptable. Since the Internet is constantly evolving, an AUP cannot anticipate every possible situation. It should address this fact, and be capable of modifications to cover circumstances not outlined. You may need to update the AUP as new issues arise. •Be unique to your school. Every school or district is different - both in terms of the technology available, and in terms of who has access to the network; who maintains the network; and who teaches school personnel and/or students how to use the network. •Protect students. If students follow the AUP's rules, their exposure to questionable material should be mini- mized. The AUP can also protect them from dangerous online behavior, such as giving out their names and addresses to strangers. •Inform parents.
  • 5. An AUP outlines to parents how their children will learn on the Internet, and how they will be supervised while on it.” A downside of AUPs is that because they emphasize surveillance and control rather than supervision and guidance, they imply an absence of trust in students. But when AUPs are prop- erly designed and implemented, they respect the rights of both child and school. References
  • 6. B E C Ta , . ( 2 0 0 1 , D e c e m b e r ) . A c c e p t a b l e u s e o f t h e i n t e r n e t i n schools. Retrieved from h t t p : / / w w w . s e e l b . o r g . u k / d a t a _ p r o t e c t i o n / P D F s / B E C TA _ G u i d a n c e _ o n _ Acceptable_Use_of_the_Interne_in%20Schools_(Dec.2001).pdf Shankel, N. (2010, July 1). Internet safety & georgia law. Retrieved f r o m h t t p : / / w w w. e h o w. c o m / p r i n t / a b o u t _ 6 6 8 4 4 6 4 _ i n t e r n e t - s a f e t y - g e o r g i a - l a w. h t m l A c c e p t a b l e U s e P o l i c y. ( 2 0 1 1 ) . W i k i p e d i a . R e t r i e v e d F e b r u a r y 1 8 , 2011, from http :// en.wikiped ia.org/w/ind ex.php? title=Acceptable_use_policy&printable=yes K l e i n e r, An n e , & F a r r i s , E l i z a b e t h . U .S . D e p a r t m e n t o f E d u c a t i o n , Office of Educational Research and Improvement. (2002). Internet access in u.s. public schools and classrooms: 1994-2001 (NCES 2 0 0 2 - 0 1 8 ) . Wa s h i n g t o n , D C : 2 0 0 2 : G o v e r n m e n t P r i n t i n g O f f i c e . R e - trieved from http://nces.ed.gov/pubs2002/2002018.pdf S c h r a d e r, A l v i n . ( 1 9 9 9 ) . I n t e r n e t c e n s o r s h i p : i s s u e s f o r t e a c h e r- l i - b r a r i a n s . Te a c h e r L i b r a r i a n : T h e j o u r n a l f o r s c h o o l l i b r a r y p r o f e s - s i o n a l s , R e t r i e v e d f r o m h t t p : / / w w w. m e d i a - a w a r e n e s s . c a / e n g l i s h / r e - sources/special_initiatives/wa_resources/wa_shared/backgrounders/in t e r n e t _ c e n s o r s h i p _ s c h r a d e r. c f m I n t e r n e t C e n s o r s h i p : i ss u e s f o r t e a c h e r- l i b r a r i a n s . ( 2 0 11 ) . Wi k i p e d i a . Retr ieved February 9, 2011, from http: //en.wik ipedia.org /wiki/In ter- net_censorship