SlideShare une entreprise Scribd logo
1  sur  31
Common Sense Technology Policy Balancing Security and Access
Access vs. Safety
The Big 6 Concerns? Inappropriate Content Predators Misuse of Mobile Communications Devices Cyberbullying Network Security Copyright Infringement
Inappropriate Content
Web Content Can Be Completely Controlled Misperceptions About Inappropriate Content
Misperceptions About Inappropriate Content Intentional Viewing of Objectionable Content by Students
Inappropriate Content: The Reality Legal Issues Funding Issues CIPA FERPA HIPA State Law Local Policy
Internet Predators
Adult male posing online to lure very young children into places where they can be kidnapped and assaulted Misperceptions Internet Predators
Misperceptions Internet Predators Young children being lured by predators into giving personal information that leads to them being harmed.
Predators: The Reality ,[object Object]
Predators play to teens need to connect, need for info about sex, their search for romance.
Teens usually do not respond to predator’s solicitations and dismiss them as “litter” on the information superhighway.,[object Object]
Sexting Misuse of Mobile Communications Devices
Misuse of Mobile Communications Devices Cheating on School Tests and Assignments
Sending threatening messages or bullying. Misuse of Mobile Communications Devices
Cyberbullying
Pew Research Center Research on Cyberbullying ,[object Object]
Girls are more likely to be victims.
Teens say they are more likely to be bullied offline than online.
Teens who share their identities and thoughts online are more likely to be targets than those who lead less active online lives.,[object Object]
Network Security Data Theft and Identity Theft
Network Security Disabled, Hacked or Vandalized Networks
Network Security Virus and other Malicious Network Attacks
Dealing with Inappropriate Content Focus on teaching students Internet literacy, safety and responsibility. Enforcement of reasonable AUPs. Teachers should monitor students while online. Use history folders and other technological measures to monitor students.
Dealing with Internet Predators Establish open communications between adults and young people. Parents and professional educators must take responsibility for learning about technologies and how to monitor their young people. Adults must engage young people in conversations about the problem of adults posing online for the purpose of engaging in sexual activity.
Dealing with the Misuse of Mobile Communications Devices Teach students proper and constructive uses of MCDs rather than banning them. Directly teach students when to use the devices appropriately.
Dealing with Cyberbullying Provide students, parents, and all educators with information regarding the prevention of cyberbullying. Be aware of all laws and policies regarding cyberbullying.

Contenu connexe

Tendances

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Mattercaitystew
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habitssharoncindrich
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazardsdgieseler1
 
Internet safety cyberbullying
Internet safety cyberbullyingInternet safety cyberbullying
Internet safety cyberbullyingJMFarkas
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Onlinedgieseler1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and CyberbullyingLouise Jones
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
Risks Presentation 2
Risks Presentation 2Risks Presentation 2
Risks Presentation 2jperkowski
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1YanelysRuiz1
 
Cyber safety, technology and the church
Cyber safety, technology and the churchCyber safety, technology and the church
Cyber safety, technology and the churchPaul OBriant
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 

Tendances (20)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Matter
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazards
 
Internet safety cyberbullying
Internet safety cyberbullyingInternet safety cyberbullying
Internet safety cyberbullying
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Risks Presentation 2
Risks Presentation 2Risks Presentation 2
Risks Presentation 2
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1
 
Cyber safety, technology and the church
Cyber safety, technology and the churchCyber safety, technology and the church
Cyber safety, technology and the church
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 

En vedette

Report on the sky x technology.
Report on the sky x technology.Report on the sky x technology.
Report on the sky x technology.Udirmaan Deka
 
Sky X Tech PPT by Manoj Datt
Sky X Tech PPT by Manoj DattSky X Tech PPT by Manoj Datt
Sky X Tech PPT by Manoj DattManoj Datt
 
Barcode Technology
Barcode TechnologyBarcode Technology
Barcode TechnologyARUN SUNNY
 
Sky x technology
Sky x technologySky x technology
Sky x technologykedar1993
 
Sky x technology
Sky x technologySky x technology
Sky x technologymaulik610
 
android technology presentation
android technology presentationandroid technology presentation
android technology presentationNishul Tomar
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpointguested929b
 

En vedette (12)

6 th sense technology
6 th sense technology6 th sense technology
6 th sense technology
 
Report on the sky x technology.
Report on the sky x technology.Report on the sky x technology.
Report on the sky x technology.
 
Sky X Tech PPT by Manoj Datt
Sky X Tech PPT by Manoj DattSky X Tech PPT by Manoj Datt
Sky X Tech PPT by Manoj Datt
 
SKY X TECHNOLOGY
SKY X TECHNOLOGYSKY X TECHNOLOGY
SKY X TECHNOLOGY
 
Sky x Technology (Pranav)
Sky  x Technology (Pranav)Sky  x Technology (Pranav)
Sky x Technology (Pranav)
 
Barcode Technology
Barcode TechnologyBarcode Technology
Barcode Technology
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
android technology presentation
android technology presentationandroid technology presentation
android technology presentation
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 

Similaire à Common sense technology policy2

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?Anne Collier
 
Murphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our SchoolsMurphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our SchoolsKevin Murphy
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwptsooy10
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwptsooy10
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxchiragcdbc92
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 

Similaire à Common sense technology policy2 (20)

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
How Safe Are Our Kids Online?
How Safe Are Our Kids Online?How Safe Are Our Kids Online?
How Safe Are Our Kids Online?
 
Murphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our SchoolsMurphy Ppt.Digital Citizenship In Our Schools
Murphy Ppt.Digital Citizenship In Our Schools
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptx
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Formative
FormativeFormative
Formative
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 

Plus de John Robinson

Web tools for busy administrator
Web tools for busy administratorWeb tools for busy administrator
Web tools for busy administratorJohn Robinson
 
Becoming a 21st century leader
Becoming a 21st century leaderBecoming a 21st century leader
Becoming a 21st century leaderJohn Robinson
 
Blogging for administrators and teachers
Blogging for administrators and teachersBlogging for administrators and teachers
Blogging for administrators and teachersJohn Robinson
 
Getting administrators connected
Getting administrators connectedGetting administrators connected
Getting administrators connectedJohn Robinson
 
Getting administrators connected
Getting administrators connectedGetting administrators connected
Getting administrators connectedJohn Robinson
 
Managing your calendar
Managing your calendarManaging your calendar
Managing your calendarJohn Robinson
 
Managing multiple tasks
Managing multiple tasksManaging multiple tasks
Managing multiple tasksJohn Robinson
 
Keeping the inbox empty
Keeping the inbox emptyKeeping the inbox empty
Keeping the inbox emptyJohn Robinson
 

Plus de John Robinson (9)

Web tools for busy administrator
Web tools for busy administratorWeb tools for busy administrator
Web tools for busy administrator
 
Becoming a 21st century leader
Becoming a 21st century leaderBecoming a 21st century leader
Becoming a 21st century leader
 
Blogging for administrators and teachers
Blogging for administrators and teachersBlogging for administrators and teachers
Blogging for administrators and teachers
 
Getting administrators connected
Getting administrators connectedGetting administrators connected
Getting administrators connected
 
Getting administrators connected
Getting administrators connectedGetting administrators connected
Getting administrators connected
 
Managing your calendar
Managing your calendarManaging your calendar
Managing your calendar
 
Managing multiple tasks
Managing multiple tasksManaging multiple tasks
Managing multiple tasks
 
Making tasks easier
Making tasks easierMaking tasks easier
Making tasks easier
 
Keeping the inbox empty
Keeping the inbox emptyKeeping the inbox empty
Keeping the inbox empty
 

Common sense technology policy2

  • 1. Common Sense Technology Policy Balancing Security and Access
  • 2.
  • 3.
  • 4.
  • 6. The Big 6 Concerns? Inappropriate Content Predators Misuse of Mobile Communications Devices Cyberbullying Network Security Copyright Infringement
  • 8. Web Content Can Be Completely Controlled Misperceptions About Inappropriate Content
  • 9. Misperceptions About Inappropriate Content Intentional Viewing of Objectionable Content by Students
  • 10. Inappropriate Content: The Reality Legal Issues Funding Issues CIPA FERPA HIPA State Law Local Policy
  • 12. Adult male posing online to lure very young children into places where they can be kidnapped and assaulted Misperceptions Internet Predators
  • 13. Misperceptions Internet Predators Young children being lured by predators into giving personal information that leads to them being harmed.
  • 14.
  • 15. Predators play to teens need to connect, need for info about sex, their search for romance.
  • 16.
  • 17. Sexting Misuse of Mobile Communications Devices
  • 18. Misuse of Mobile Communications Devices Cheating on School Tests and Assignments
  • 19. Sending threatening messages or bullying. Misuse of Mobile Communications Devices
  • 21.
  • 22. Girls are more likely to be victims.
  • 23. Teens say they are more likely to be bullied offline than online.
  • 24.
  • 25. Network Security Data Theft and Identity Theft
  • 26. Network Security Disabled, Hacked or Vandalized Networks
  • 27. Network Security Virus and other Malicious Network Attacks
  • 28. Dealing with Inappropriate Content Focus on teaching students Internet literacy, safety and responsibility. Enforcement of reasonable AUPs. Teachers should monitor students while online. Use history folders and other technological measures to monitor students.
  • 29. Dealing with Internet Predators Establish open communications between adults and young people. Parents and professional educators must take responsibility for learning about technologies and how to monitor their young people. Adults must engage young people in conversations about the problem of adults posing online for the purpose of engaging in sexual activity.
  • 30. Dealing with the Misuse of Mobile Communications Devices Teach students proper and constructive uses of MCDs rather than banning them. Directly teach students when to use the devices appropriately.
  • 31. Dealing with Cyberbullying Provide students, parents, and all educators with information regarding the prevention of cyberbullying. Be aware of all laws and policies regarding cyberbullying.
  • 32. Dealing with Network Security: Data/Virus/Malicious Threats Have a network rights strategy. Make sure desktop is secure but not at expense of instructional needs. Balancing security with server space and network use. Use solutions to monitor student use. Use good firewalls. Complete periodic security assessments.
  • 33. My Educational Technology Gottas Least restrictive technology environment as possible. Encourage the use of technology in as many ways possible. Get teachers involved in security. Approach administration of technology with students and teachers are customer mindset.