policies, safety and social networking what to do about what you may be ignoring

Post on 28-Mar-2015

219 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Policies, Safety and Social Networking

What to do about what you may be ignoring.

A Vision of Students Today

http://tinyurl.com/2uzyrr http://tinyurl.com/2uzyrr

http://tinyurl.com/2uzyrr

How do you keep your students safe?

Education: A filter that will follow them.

90% Districts have students sign AUP98% of schools use filters

80% have rules against chat and IM60% have rules against bulletin boards or

blogs60% rules against sending and receiving

emailOver 50% prohibit social networking

Filters: Fact and Fiction

Photo Credit http://tinyurl.com/3atnks

“I didn’t see this.”

They can’t block what they don’t know about

“I can think of nothing that is meaningful that does not involve others.”

Tim Tyson

We’d buy into Social networking if…

Emphasis on collaborative and planned activities

Tools for student expression

Bring different students together

Adult Monitoring

Chat and IM were

prohibited

NSBA Report on Social Networking http://tinyurl.com/3yzslq

CIPA

Children’s Internet Protection Act • Schools and libraries must use computer filtering

software programs to prevent the on-screen depiction of obscenity, child pornography or material that is harmful to minors.

• Required to adopt and implement a policy addressing: – (a) access by minors to inappropriate matter on the Internet;– (b) the safety and security of minors when using electronic mail,

chat rooms, and other forms of direct electronic communications;– (c) unauthorized access, including so-called “hacking,” and other

unlawful activities by minors online;– (d) unauthorized disclosure, use, and dissemination of personal

information regarding minors; an– (e) restricting minors’ access to materials harmful to them.

http://www.fcc.gov/cgb/consumerfacts/cipa.html

Check your state laws http://tinyurl.com/2bzw5dPennsylvania - “Requires libraries receiving state aid to adopt policies regarding access by minors to the Internet

and online sites that contain explicit sexual materials. “

Technology is exposing issues that have always been there. This is a grand opportunity to explore the issues and to hear the message. Let’s learn whatever lessons need to be learned. Let’s not turn the technology off. Let’s turn teaching and learning on.

Peter Reillyhttp://tinyurl.com/2ysnyq

Scott Mcleodhttp://tinyurl.com/362dvq

http://tinyurl.com/2om9np

How do we get there?

Building a profileCommenting on a blogPosting on a blogPublishing their own

blogCollaborating on a wikiNetworking via TwitterBroadcasting using

uStreamAiring a podcastSharing photos via

FlickrReleasing a digital

story on YouTubePublishing

presentation on Slideshare

$84,000,000 of protection

…cracked in 30 minutes

“Filters aren't addressing the bigger issues anyway.

Cyber bullying, educating children on how to protect themselves and their privacy are the first problems I'd fix.

They really need to develop a youth-involved forum to discuss some of these problems and ideas for fixing them.”

Tom Wood, 16

Develop an informative program or seminar for students on the dangers of online predators.

Explain the permanent connectedness of the Internet.

Give a good reason for why web sites are blocked.

If you monitor students' social networking profiles, don't try to hide it.

Kevin Walter, 12th Grader

The Admin Pages: http://tinyurl.com/3dgdy8

Examples

Horizon Project

5 Classrooms58 Students

3 WeeksBlogger, Eduspaces, Wikispaces, YouTube,

TeacherTube, Skype, Del.icio.us, Google Notebook, Facebook, MySpace, Firefox, Meebo,

Flickr, Camstudio, Twitter, SecondLife, SlideShare, Elluminate, Grazr, Clustermap,

Aireset, Skypechat, Gcast, Prettymay, Flash, Photostory, Moviemaker, Odeo

Horizon Project

Tools used:Blogger, Eduspaces, Wikispaces, YouTube, TeacherTube, Skype,

Del.icio.us, Google Notebook, Facebook, MySpace, Firefox, Meebo, Flickr, Camstudio, Twitter, SecondLife, SlideShare, Elluminate, Grazr,

Clustermap, Aireset, Skypechat, Gcast, Prettymay, Flash, Photostory,

Moviemaker, Odeo

Central Bucks Collaborative Simulation

Central Bucks Collaborative Simulation

http://onlineconnections.wikispaces.com/onlinepermissions

SLA Acceptable Use Policy

We live in a changing world, where we have more and faster access to information than ever before. Students now can be both consumers and producers of information …. With access to these new technologies, students will have opportunities to learn and create like never before, but with those opportunities do come new responsibilities.

• The use of blogs is considered an extension of your classroom.

• Blogs are used primarily as learning tools

• Blogs are about ideas• Try not to generalize • Blogs are public • Blog safely

• Personal blogs on Blogger must follow these guidelines

• Never link to something without reading the entire article

• Cite the source of quotes• Make images are

appropriate for use in school and copyright laws are followed

…The smartphone devices also have the potential to connect to any available, unsecured wireless network, and these may not have any form of Internet filtering, firewall or virus protection. It is important therefore to only connect to trusted wireless networks that you are sure have appropriate Internet filtering, virus protection and suitable firewalls installed.

It is ultimately the responsibility of the parent to ensure their child does not access inappropriate content via any other network.

http://flickr.com/guidelines.gne

Other Resources

http://k12wiki.wikispaces.com/Social+Networking+Acceptable+Use

http://movingforward.wikispaces.com/

http://supportblogging.com/

http://www.budtheteacher.com/wiki

http://edubuzz.pbwiki.com/socialmediapupil

http://teachdigital.pbwiki.com/internetsafety

What do you do?

Steve DemboSDembo@Gmail.com

Community.DiscoveryEducation.comTeach42.com

top related