SlideShare une entreprise Scribd logo
1  sur  10
Rules, Guidelines and
Expectations
0What is the acceptable and appropriate
use of internet in schools?
0What is to be expected?
0What boundaries are already in place
and what needs to be changed in order
to make a legal, safe and ethical online
environment?
Cyber Ethics
0IKeepSafe (2013) states that students must
do/be the following to be legally and ethically
safe. “Students recognize and practice
responsible and appropriate use while accessing,
using, collaborating, and creating technology,
technology systems, digital media and
information technology. Students demonstrate
an understanding of current ethical and legal
standards, rights and restrictions governing
technology, technology systems, digital media
and information technology within the context of
today’s society.”
What do we, as educators,
need to do?
0 Provide guidance for students and “teach our students
to safely and ethically use their digital devices in the
classroom–and throughout their communities”
(IKeepSafe, 2013).
0 Exhibit Ethical, Safe and Legal behaviour as role
models for our students.
0 Inform students and continue to support them on
their journey to understanding their new roles in the
classroom and community.
IkeepSafe offers a new game for students
to learn about issues such as music piracy.
“Faux Paw the Websurfing Techno Cat series has been created by a team of leading child
psychologists, educators, and law enforcement. This engaging curriculum—complete with
books, animated DVDs, and lesson plans—will captivate the attention of your students
and teach them how to appropriately conduct themselves online and in the digital space.“
(IKeepSafe, 2013).
Children’s Internet
Protection Act (CIPA)
0 The Children's Internet Protection Act (CIPA) is a federal law
that addresses concerns about access in schools and libraries
to the Internet and other information.
0 “The Children’s Internet Protection Act (CIPA) was enacted by
Congress in 2000 to address concerns about children’s access
to obscene or harmful content over the Internet. CIPA imposes
certain requirements on schools or libraries that receive
discounts for Internet access or internal connections through
the E-rate program – a program that makes certain
communications services and products more affordable for
eligible schools and libraries” (F.C.C., 2013)
Websense
0 Websense helps schools to comply with the CIPA through:
0 “Obscenity and Pornography Filtering – Allows schools and libraries
to manage Internet access to over 90 URL categories including Racism
and Hate, Adult Material, Hacking and other topics pertinent to CIPA.
0 Best-of-Breed Web Filtering – The most accurate and up-to-date
filtering database with over 36 million URLs.
0 Filtering of Search Engine Images – Use safe-search to filter
inappropriate images that can be found in search engine query results.
0 Blocking of Spyware, Malicious Mobile Code, and Other Security
Threats – Sites with worms, spyware, phishing, and other threats can
be blocked, helping to meet The CIPA requirements for protection of a
minor's personal information.
0 Monitoring – Reporting Tools offer many different ways to monitor and
report on the online activities of minors.
0 Policy Management Per User or Per Group – Schools and libraries
can customize their Internet policies based on users or groups, so
policies can be set based on age or needs. “
What do we, as educations,
need to do?
0 We need to do some simple research. It’s not hard.
0 We need to follow everything in the CIPA’s rules and guidelines.
We need to follow the school’s policy and enforce it for
students.
0 WHAT CAN WE DO?
0 We can use resources such as games! We can get the students
to reserch internet safety and the ethical use of the internet.
They can do up their own presentations and present them to
the class, maybe even work in groups
0 MAKE IT FUN!
References
0 Federal Communications Commission, 2013, ‘Children’s
Internet Protection Act’, ONLINE, Available at:
http://www.fcc.gov/guides/childrens-internet-protection-
act, Accessed 22/08/13.
0 IKeepSafe, 2013, Cyber-Ethics, ONLINE, Available at:
http://www.ikeepsafe.org/, Accessed 22/08/13.
0 Websense, Education K-12, 2013, ONLINE, Available at:
http://www.websense.com/content/Regional/Australia/347
5.aspx, Accessed 22/08/13.

Contenu connexe

Tendances

Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations121487
 
Tpack as a framework for technology driven teaching and
Tpack as a framework for technology driven teaching andTpack as a framework for technology driven teaching and
Tpack as a framework for technology driven teaching anderwin marlon sario
 
Basic Principles of Teaching and Educational Technology (4, 5, 6)
Basic Principles of Teaching and Educational Technology (4, 5, 6)Basic Principles of Teaching and Educational Technology (4, 5, 6)
Basic Principles of Teaching and Educational Technology (4, 5, 6)Patrickpaulmanalansan
 
Intellectual Property Rights on the Development and Use of Digital Materials
Intellectual Property Rights on the Development and Use of Digital MaterialsIntellectual Property Rights on the Development and Use of Digital Materials
Intellectual Property Rights on the Development and Use of Digital MaterialsIra Sagu
 
ICT and Assessment of Learning
ICT and Assessment of LearningICT and Assessment of Learning
ICT and Assessment of LearningIra Sagu
 
The ASSURE Model
The ASSURE ModelThe ASSURE Model
The ASSURE ModelIra Sagu
 
Lesson 6 cone of experience
Lesson 6   cone of experienceLesson 6   cone of experience
Lesson 6 cone of experienceLeeboy Morales
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipJOE3210
 
Media, technology, and learning
Media, technology, and learningMedia, technology, and learning
Media, technology, and learningArgie Mabag
 
Unit III: Theories and principles in the use of design of technology driven l...
Unit III: Theories and principles in the use of design of technology driven l...Unit III: Theories and principles in the use of design of technology driven l...
Unit III: Theories and principles in the use of design of technology driven l...CzarinaBercarce1
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpointJannahAboulhassan
 
TPACK as a Framework for Technology Driven Teaching and Learning
TPACK as a Framework for Technology Driven Teaching and LearningTPACK as a Framework for Technology Driven Teaching and Learning
TPACK as a Framework for Technology Driven Teaching and LearningIra Sagu
 
ICT Policies and Issues.pdf
ICT Policies and Issues.pdfICT Policies and Issues.pdf
ICT Policies and Issues.pdfShieAnneGarcia
 
Lesson 2: Technology; Boon or bane
Lesson 2: Technology; Boon or baneLesson 2: Technology; Boon or bane
Lesson 2: Technology; Boon or banerenalyn espinola
 
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxLesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxJermaine Mendoza
 

Tendances (20)

Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations
 
Tpack as a framework for technology driven teaching and
Tpack as a framework for technology driven teaching andTpack as a framework for technology driven teaching and
Tpack as a framework for technology driven teaching and
 
Basic Principles of Teaching and Educational Technology (4, 5, 6)
Basic Principles of Teaching and Educational Technology (4, 5, 6)Basic Principles of Teaching and Educational Technology (4, 5, 6)
Basic Principles of Teaching and Educational Technology (4, 5, 6)
 
ASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINTASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINT
 
Intellectual Property Rights on the Development and Use of Digital Materials
Intellectual Property Rights on the Development and Use of Digital MaterialsIntellectual Property Rights on the Development and Use of Digital Materials
Intellectual Property Rights on the Development and Use of Digital Materials
 
ICT and Assessment of Learning
ICT and Assessment of LearningICT and Assessment of Learning
ICT and Assessment of Learning
 
The ASSURE Model
The ASSURE ModelThe ASSURE Model
The ASSURE Model
 
Lesson 6 cone of experience
Lesson 6   cone of experienceLesson 6   cone of experience
Lesson 6 cone of experience
 
Tpack model
Tpack modelTpack model
Tpack model
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
SAMR Model
SAMR ModelSAMR Model
SAMR Model
 
Educational technology 1
Educational technology 1Educational technology 1
Educational technology 1
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Media, technology, and learning
Media, technology, and learningMedia, technology, and learning
Media, technology, and learning
 
Unit III: Theories and principles in the use of design of technology driven l...
Unit III: Theories and principles in the use of design of technology driven l...Unit III: Theories and principles in the use of design of technology driven l...
Unit III: Theories and principles in the use of design of technology driven l...
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
TPACK as a Framework for Technology Driven Teaching and Learning
TPACK as a Framework for Technology Driven Teaching and LearningTPACK as a Framework for Technology Driven Teaching and Learning
TPACK as a Framework for Technology Driven Teaching and Learning
 
ICT Policies and Issues.pdf
ICT Policies and Issues.pdfICT Policies and Issues.pdf
ICT Policies and Issues.pdf
 
Lesson 2: Technology; Boon or bane
Lesson 2: Technology; Boon or baneLesson 2: Technology; Boon or bane
Lesson 2: Technology; Boon or bane
 
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxLesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
 

En vedette

Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalejl2
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Four Steps to a Perfect Assignment/ Oral
Four Steps to a Perfect Assignment/ OralFour Steps to a Perfect Assignment/ Oral
Four Steps to a Perfect Assignment/ OralGabriella Maree Wheeler
 
Evaluation of educational technology and its current application
Evaluation of educational technology and its current applicationEvaluation of educational technology and its current application
Evaluation of educational technology and its current applicationRhoda malazarte
 

En vedette (6)

Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point final
 
Software theft
Software theftSoftware theft
Software theft
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Four Steps to a Perfect Assignment/ Oral
Four Steps to a Perfect Assignment/ OralFour Steps to a Perfect Assignment/ Oral
Four Steps to a Perfect Assignment/ Oral
 
Assistive Technology
Assistive TechnologyAssistive Technology
Assistive Technology
 
Evaluation of educational technology and its current application
Evaluation of educational technology and its current applicationEvaluation of educational technology and its current application
Evaluation of educational technology and its current application
 

Similaire à The legal, safe and ethical use of technology in the classroom

Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331Dana Nunnery
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizensStaci Trekles
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your schoolJune Wall
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentationgblessin
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipggfg123
 
Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Webteach42
 
Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Jerry Sakala
 

Similaire à The legal, safe and ethical use of technology in the classroom (20)

Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Group5 ka part vi
Group5 ka part viGroup5 ka part vi
Group5 ka part vi
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Web
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Resources
ResourcesResources
Resources
 

Dernier

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Dernier (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

The legal, safe and ethical use of technology in the classroom

  • 1.
  • 2. Rules, Guidelines and Expectations 0What is the acceptable and appropriate use of internet in schools? 0What is to be expected? 0What boundaries are already in place and what needs to be changed in order to make a legal, safe and ethical online environment?
  • 3. Cyber Ethics 0IKeepSafe (2013) states that students must do/be the following to be legally and ethically safe. “Students recognize and practice responsible and appropriate use while accessing, using, collaborating, and creating technology, technology systems, digital media and information technology. Students demonstrate an understanding of current ethical and legal standards, rights and restrictions governing technology, technology systems, digital media and information technology within the context of today’s society.”
  • 4. What do we, as educators, need to do? 0 Provide guidance for students and “teach our students to safely and ethically use their digital devices in the classroom–and throughout their communities” (IKeepSafe, 2013). 0 Exhibit Ethical, Safe and Legal behaviour as role models for our students. 0 Inform students and continue to support them on their journey to understanding their new roles in the classroom and community.
  • 5. IkeepSafe offers a new game for students to learn about issues such as music piracy. “Faux Paw the Websurfing Techno Cat series has been created by a team of leading child psychologists, educators, and law enforcement. This engaging curriculum—complete with books, animated DVDs, and lesson plans—will captivate the attention of your students and teach them how to appropriately conduct themselves online and in the digital space.“ (IKeepSafe, 2013).
  • 6. Children’s Internet Protection Act (CIPA) 0 The Children's Internet Protection Act (CIPA) is a federal law that addresses concerns about access in schools and libraries to the Internet and other information. 0 “The Children’s Internet Protection Act (CIPA) was enacted by Congress in 2000 to address concerns about children’s access to obscene or harmful content over the Internet. CIPA imposes certain requirements on schools or libraries that receive discounts for Internet access or internal connections through the E-rate program – a program that makes certain communications services and products more affordable for eligible schools and libraries” (F.C.C., 2013)
  • 7.
  • 8. Websense 0 Websense helps schools to comply with the CIPA through: 0 “Obscenity and Pornography Filtering – Allows schools and libraries to manage Internet access to over 90 URL categories including Racism and Hate, Adult Material, Hacking and other topics pertinent to CIPA. 0 Best-of-Breed Web Filtering – The most accurate and up-to-date filtering database with over 36 million URLs. 0 Filtering of Search Engine Images – Use safe-search to filter inappropriate images that can be found in search engine query results. 0 Blocking of Spyware, Malicious Mobile Code, and Other Security Threats – Sites with worms, spyware, phishing, and other threats can be blocked, helping to meet The CIPA requirements for protection of a minor's personal information. 0 Monitoring – Reporting Tools offer many different ways to monitor and report on the online activities of minors. 0 Policy Management Per User or Per Group – Schools and libraries can customize their Internet policies based on users or groups, so policies can be set based on age or needs. “
  • 9. What do we, as educations, need to do? 0 We need to do some simple research. It’s not hard. 0 We need to follow everything in the CIPA’s rules and guidelines. We need to follow the school’s policy and enforce it for students. 0 WHAT CAN WE DO? 0 We can use resources such as games! We can get the students to reserch internet safety and the ethical use of the internet. They can do up their own presentations and present them to the class, maybe even work in groups 0 MAKE IT FUN!
  • 10. References 0 Federal Communications Commission, 2013, ‘Children’s Internet Protection Act’, ONLINE, Available at: http://www.fcc.gov/guides/childrens-internet-protection- act, Accessed 22/08/13. 0 IKeepSafe, 2013, Cyber-Ethics, ONLINE, Available at: http://www.ikeepsafe.org/, Accessed 22/08/13. 0 Websense, Education K-12, 2013, ONLINE, Available at: http://www.websense.com/content/Regional/Australia/347 5.aspx, Accessed 22/08/13.