common sense technology policy2

Post on 15-May-2015

477 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

Presentation given at NYCATE Summer Leadership Conference.

TRANSCRIPT

Common Sense Technology Policy

Balancing Security and Access

Access vs. Safety

The Big 6 Concerns?Inappropriate Content

Predators

Misuse of Mobile Communications Devices

Cyberbullying

Network Security

Copyright Infringement

Inappropriate Content

Misperceptions About Inappropriate Content

Web Content Can Be Completely Controlled

Misperceptions About Inappropriate Content

Intentional Viewing of Objectionable Content by Students

Inappropriate Content: The Reality

CIPAFERPA

HIPA

Legal Issues Funding Issues

State Law

Local Policy

Internet Predators

Misperceptions Internet Predators

Adult male posing online to lure very young children into places where they can be kidnapped and assaulted

Misperceptions Internet Predators

Young children being lured by predators into giving personal information that leads to them being harmed.

Predators: The Reality

• Most predation and ensnarement crimes involve adolescents.

• Predators play to teens need to connect, need for info about sex, their search for romance.

• Teens usually do not respond to predator’s solicitations and dismiss them as “litter” on the information superhighway.

Misuse of Mobile Communications Devices

Students recording other students and school staff and postinghttp://dangerouslyirrelevant.org/2008/03/cell-phone-came.html

Misuse of Mobile Communications Devices

Sexting

Misuse of Mobile Communications Devices

Cheating on School Tests and Assignments

Misuse of Mobile Communications Devices

Sending threatening messages or bullying.

Cyberbullying

Pew Research Center Research on Cyberbullying

• 1 in 3 online teens have experienced online harassment.

• Girls are more likely to be victims.• Teens say they are more likely to be

bullied offline than online.• Teens who share their identities and

thoughts online are more likely to be targets than those who lead less active online lives.

Pew Research Center Research on Cyberbullying

• 1 in 6 teens said someone had forwarded or posted communication they assumed was private.

• 13% said someone had spread a rumor about them online.

• 13% said someone had sent them a threatening or aggressive email.

• 67% said bullying happens more offline than online

Network Security

Data Theft and Identity Theft

Network Security

Disabled, Hacked or Vandalized Networks

Network Security

Virus and other Malicious Network Attacks

Dealing with Inappropriate Content

• Focus on teaching students Internet literacy, safety and responsibility.

• Enforcement of reasonable AUPs.• Teachers should monitor students while

online.• Use history folders and other

technological measures to monitor students.

Dealing with Internet Predators

• Establish open communications between adults and young people.

• Parents and professional educators must take responsibility for learning about technologies and how to monitor their young people.

• Adults must engage young people in conversations about the problem of adults posing online for the purpose of engaging in sexual activity.

Dealing with the Misuse of Mobile Communications Devices

• Teach students proper and constructive uses of MCDs rather than banning them.

• Directly teach students when to use the devices appropriately.

Dealing with Cyberbullying

• Provide students, parents, and all educators with information regarding the prevention of cyberbullying.

• Be aware of all laws and policies regarding cyberbullying.

Dealing with Network Security: Data/Virus/Malicious Threats

• Have a network rights strategy.• Make sure desktop is secure but not at

expense of instructional needs.• Balancing security with server space

and network use.• Use solutions to monitor student use.• Use good firewalls.• Complete periodic security

assessments.

My Educational Technology Gottas

• Least restrictive technology environment as possible.

• Encourage the use of technology in as many ways possible.

• Get teachers involved in security.• Approach administration of technology

with students and teachers are customer mindset.

Questions and Discussion

top related