Date post: | 25-Jan-2015 |
Category: |
Education |
Upload: | mander5208 |
View: | 1,357 times |
Download: | 2 times |
Staff Training SessionInternet Safety for High School
Students
Amanda Hillman
American College of Education
ET5083 Educational Technology Systems Management
Lesson GoalsGain information on protecting the digital rights
and identify of students.Retain knowledge in the ethical and legal use of
internet within school environment.Comprehend internet filtering according to the
Children’s Internet Protection Act.Identify potential threats to school safety.Identify appropriate firewalls and protecting
computers with secure username and passwords.Monitor internet browsing with proper software
capabilities.
ObjectivesLearn to properly protect the digital rights
and identities of their students within the confines of the classroom.
Model ethical and legal use of the internet and digital tools for their students.
Demonstrate digital responsibility by retaining information in how to filter internet resources according to the Children’s Internet Protection Act.
Locate potential internet threats to students and classroom safety.
Objectives (continued)Learn how to monitor internet browser
utilizing appropriate educational software uses and capabilities to protect student autonomy.
Getting Started…As teachers, we have the opportunity to shape
the mind of the future generation to ensure
students gain the knowledge and skills
required to develop into responsible and
capable members of society. Protecting the
individuality and digital rights of our students
is one of the sole technological
responsibilities of any educator.
However, not all teachers are aware of the specific components in how to
demonstrate legal and ethical usage of internet and digital technology tools for
school environments.
We must learn to communicate and model the legal use of internet for our students
and colleagues.
By learning how to properly protect student’s
autonomy, model legal and ethical use of internet
resources, gauging internet filtering according to
grade level and subject, identifying possible
threats to student safety, and actively monitoring
student internet usage and browsing, instructors
may meet the school district’s commitment to
academic excellence in all educational endeavors.
Are the student protected?In order to determine if your students’ digital
rights are protected according to your school’s internet usage, ensure all staff members understand cyber security to
protect student digital citizenship.
Internet policy in place? The school’s internet safety policy protects
all students from seemingly harmful cyber behavior towards one another in the school environment.
Do all students, teachers, administrators, and school district employees follow the internet policy current in place? Have all students and teachers signed an agreement?
Acceptable Use PolicyAny school’s Acceptable Use Policy of
technology should be in place to deem appropriate material for students to view within schools.
Teachers should ensure students and parents are aware of the school’s Acceptable Use Policy for internet usage before gaining computer and internet access.
The Palm Beach County School District mandates at the beginning of the school year, every employee and student will sign a Code of Conduct agreeing to follow school internet usage.
According to the Children’s Internet Protection Act, school must develop an internet safety policy to limit student access to destructive or inappropriate material.
Retrieved from https://lh5.googleusercontent.com/zCBu2e8Bbeo3ISIT7hUHX_fAl-ky6oDUDtgS8kNlqqjKIaMr4BJs1RPKhsxu9-r2y8S18TV3VQYhXFyjCsezHUDLS2_OyFk5wjs9alu6Kz2MOac8kHw
CIPA also regulates..Ensuring all capabilities of email, chat, and discussion
board usage is monitored through teacher and firewall protection.
Staff and student email is protected by logging into the school’s database with a username and password to protect unauthorized access to personal information.
Student records such as grades and personal information are protected under the school district policy.
All online activities will be monitored utilizing the school’s firewall for student, teacher, staff members, and administrators.
See the attached links to examine CIPA in further detail
http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=3902&context=flr
http://www.cisco.com/web/strategy/docs/gov/screen.pdf
However, to properly maintain student privacy…Personal emails or telephone numbers should
not be released to any other student or teacher.
Teachers should have the understanding that district email is monitored and not private.
Students and teachers should utilize only their own username and passwords when logging into school technological equipment or resources.
Students and teachers should not post any personally harmful or untrue information on internet profiles or social networks
More protection..Network firewalls should monitor
incoming and outgoing information to ensure students’ privacy is protected. Firewalls
should ensure no student receives potentially harmful
viruses, spam, as well as dangerous software dangerous
for school property.
Internet browsing will be monitored by school network to ensure no
inappropriate or obscene information or graphics
are displayed for minors’ access.
Certain factors are used to maintain student privacy
Personal emails or telephone numbers should
not be released to any other student or teacher.
Teachers should have the understanding that
district email is monitored and not private.
Students and teachers should utilize only their
own username and passwords when logging into
school technological equipment or resources.
Students and teachers should not post any
personally harmful or untrue information on
internet profiles or social networks.
See the link below to examine a
general Code of Computer Ethicshttp://lrs.ed.uiuc.edu/students/mickley/ethicsnew.htm
One of the best ways to monitor student computer usage is through
real-time software
Real-time software should have the ability to:Monitor student internet use.Observe all websites minimized on
screens.Control in opening and closing all
browsers.Record browsing history on every
computer station.Prevent harmful websites or programs
from loading on student computers.Maintain district-approved websites are
accessed only on student computers.
See the links below to compare several popular real-time programshttp://www.netsupportschool.com/index.asp
http://www.compuguardian.com/
http://www.spector360.com/Education/
Dual responsibilities…Both educator and students right are equally important in order to create a safe and well-balanced
educational environment encountered by all who
experience it.
In conclusion…As teachers, we claim an ownership in
cultivating the minds of the future
generation of adolescents who
deserve a safe atmosphere to learn
and academically flourish in utilizing
their technology use.
References Retrieved from
https://lh5.googleusercontent.com/zCBu2e8Bbeo3ISIT7hUHX_fAl-ky6oDUDtgS8kNlqqjKIaMr4BJs1RPKhsxu9-r2y8S18TV3VQYhXFyjCsezHUDLS2_OyFk5wjs9alu6Kz2MOac8kHw
Cisco (2012). http://www.cisco.com/web/strategy/docs/gov/screen.pdf. Retrieved December 12, 2013, from http://www.cisco.com/web/strategy/docs/gov/screen.pdf
Fordham Law Review (2003). fordham.edu. Retrieved December 12, 2013, from http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=3902&context=flr
Uiuc.edu (n.d.). Code of Computer Ethics for Educators. Retrieved December 12, 2013, from http://lrs.ed.uiuc.edu/students/mickley/ethicsnew.htm
Compguardian.com (2013). School Computer Monitoring Software, Student Internet Filtering Program, Keylogger. Retrieved December 12, 2013, from http://www.compuguardian.com/
Netsupportschool.com (2013). NetSupport School - Classroom Management Software. Retrieved December 12, 2013, from http://www.netsupportschool.com/index.asp
SpectorSoft (2013). Spector360 for Education. Retrieved December 12, 2013, from http://www.spector360.com/Education/