SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Rules, Guidelines and
Expectations
0What is the acceptable and appropriate
use of internet in schools?
0What is to be expected?
0What boundaries are already in place
and what needs to be changed in order
to make a legal, safe and ethical online
environment?
Cyber Ethics
0IKeepSafe (2013) states that students must
do/be the following to be legally and ethically
safe. “Students recognize and practice
responsible and appropriate use while accessing,
using, collaborating, and creating technology,
technology systems, digital media and
information technology. Students demonstrate
an understanding of current ethical and legal
standards, rights and restrictions governing
technology, technology systems, digital media
and information technology within the context of
today’s society.”
What do we, as educators,
need to do?
0 Provide guidance for students and “teach our students
to safely and ethically use their digital devices in the
classroom–and throughout their communities”
(IKeepSafe, 2013).
0 Exhibit Ethical, Safe and Legal behaviour as role
models for our students.
0 Inform students and continue to support them on
their journey to understanding their new roles in the
classroom and community.
IkeepSafe offers a new game for students
to learn about issues such as music piracy.
“Faux Paw the Websurfing Techno Cat series has been created by a team of leading child
psychologists, educators, and law enforcement. This engaging curriculum—complete with
books, animated DVDs, and lesson plans—will captivate the attention of your students
and teach them how to appropriately conduct themselves online and in the digital space.“
(IKeepSafe, 2013).
Children’s Internet
Protection Act (CIPA)
0 The Children's Internet Protection Act (CIPA) is a federal law
that addresses concerns about access in schools and libraries
to the Internet and other information.
0 “The Children’s Internet Protection Act (CIPA) was enacted by
Congress in 2000 to address concerns about children’s access
to obscene or harmful content over the Internet. CIPA imposes
certain requirements on schools or libraries that receive
discounts for Internet access or internal connections through
the E-rate program – a program that makes certain
communications services and products more affordable for
eligible schools and libraries” (F.C.C., 2013)
Websense
0 Websense helps schools to comply with the CIPA through:
0 “Obscenity and Pornography Filtering – Allows schools and libraries
to manage Internet access to over 90 URL categories including Racism
and Hate, Adult Material, Hacking and other topics pertinent to CIPA.
0 Best-of-Breed Web Filtering – The most accurate and up-to-date
filtering database with over 36 million URLs.
0 Filtering of Search Engine Images – Use safe-search to filter
inappropriate images that can be found in search engine query results.
0 Blocking of Spyware, Malicious Mobile Code, and Other Security
Threats – Sites with worms, spyware, phishing, and other threats can
be blocked, helping to meet The CIPA requirements for protection of a
minor's personal information.
0 Monitoring – Reporting Tools offer many different ways to monitor and
report on the online activities of minors.
0 Policy Management Per User or Per Group – Schools and libraries
can customize their Internet policies based on users or groups, so
policies can be set based on age or needs. “
What do we, as educations,
need to do?
0 We need to do some simple research. It’s not hard.
0 We need to follow everything in the CIPA’s rules and guidelines.
We need to follow the school’s policy and enforce it for
students.
0 WHAT CAN WE DO?
0 We can use resources such as games! We can get the students
to reserch internet safety and the ethical use of the internet.
They can do up their own presentations and present them to
the class, maybe even work in groups
0 MAKE IT FUN!
References
0 Federal Communications Commission, 2013, ‘Children’s
Internet Protection Act’, ONLINE, Available at:
http://www.fcc.gov/guides/childrens-internet-protection-
act, Accessed 22/08/13.
0 IKeepSafe, 2013, Cyber-Ethics, ONLINE, Available at:
http://www.ikeepsafe.org/, Accessed 22/08/13.
0 Websense, Education K-12, 2013, ONLINE, Available at:
http://www.websense.com/content/Regional/Australia/347
5.aspx, Accessed 22/08/13.

Weitere ähnliche Inhalte

Was ist angesagt?

Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxLesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
Jermaine Mendoza
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
sappingtonkr
 

Was ist angesagt? (20)

Module 1 lesson 3 - Role of Technology for teaching and learning
Module 1 lesson 3 - Role of Technology for teaching and learningModule 1 lesson 3 - Role of Technology for teaching and learning
Module 1 lesson 3 - Role of Technology for teaching and learning
 
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
 
Module 2 ICT Policies.pptx
Module 2 ICT Policies.pptxModule 2 ICT Policies.pptx
Module 2 ICT Policies.pptx
 
Unit III: Theories and principles in the use of design of technology driven l...
Unit III: Theories and principles in the use of design of technology driven l...Unit III: Theories and principles in the use of design of technology driven l...
Unit III: Theories and principles in the use of design of technology driven l...
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxLesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
ICT Integrated Instruction: A Teaching Strategy
ICT Integrated Instruction: A Teaching StrategyICT Integrated Instruction: A Teaching Strategy
ICT Integrated Instruction: A Teaching Strategy
 
Cyber or Digital Literacy
Cyber or Digital LiteracyCyber or Digital Literacy
Cyber or Digital Literacy
 
The 9 Elements of Digital Citizenship
The 9 Elements of Digital CitizenshipThe 9 Elements of Digital Citizenship
The 9 Elements of Digital Citizenship
 
Ict policies and issues
Ict policies and issuesIct policies and issues
Ict policies and issues
 
Technology Enhanced Learning
Technology Enhanced LearningTechnology Enhanced Learning
Technology Enhanced Learning
 
Select and Use ICT Tools for Teaching and Learning
Select and Use ICT Tools for Teaching and LearningSelect and Use ICT Tools for Teaching and Learning
Select and Use ICT Tools for Teaching and Learning
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Understanding the Basic Concept in ICT
Understanding the Basic Concept in ICTUnderstanding the Basic Concept in ICT
Understanding the Basic Concept in ICT
 
Lesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher educationLesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher education
 
ASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINTASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINT
 
Technology in Teaching and Learning
Technology in Teaching and LearningTechnology in Teaching and Learning
Technology in Teaching and Learning
 
Digital literacy skills in the 21st century
Digital literacy skills in the 21st centuryDigital literacy skills in the 21st century
Digital literacy skills in the 21st century
 
Digital Citizenship vs Global Citizenship
Digital Citizenship vs Global CitizenshipDigital Citizenship vs Global Citizenship
Digital Citizenship vs Global Citizenship
 

Andere mochten auch (7)

Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point final
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Software theft
Software theftSoftware theft
Software theft
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Four Steps to a Perfect Assignment/ Oral
Four Steps to a Perfect Assignment/ OralFour Steps to a Perfect Assignment/ Oral
Four Steps to a Perfect Assignment/ Oral
 
Assistive Technology
Assistive TechnologyAssistive Technology
Assistive Technology
 
Evaluation of educational technology and its current application
Evaluation of educational technology and its current applicationEvaluation of educational technology and its current application
Evaluation of educational technology and its current application
 

Ähnlich wie The legal, safe and ethical use of technology in the classroom

Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
gblessin
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
ggfg123
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
Johan Koren
 

Ähnlich wie The legal, safe and ethical use of technology in the classroom (20)

Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Group5 ka part vi
Group5 ka part viGroup5 ka part vi
Group5 ka part vi
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Web
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Resources
ResourcesResources
Resources
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

The legal, safe and ethical use of technology in the classroom

  • 1.
  • 2. Rules, Guidelines and Expectations 0What is the acceptable and appropriate use of internet in schools? 0What is to be expected? 0What boundaries are already in place and what needs to be changed in order to make a legal, safe and ethical online environment?
  • 3. Cyber Ethics 0IKeepSafe (2013) states that students must do/be the following to be legally and ethically safe. “Students recognize and practice responsible and appropriate use while accessing, using, collaborating, and creating technology, technology systems, digital media and information technology. Students demonstrate an understanding of current ethical and legal standards, rights and restrictions governing technology, technology systems, digital media and information technology within the context of today’s society.”
  • 4. What do we, as educators, need to do? 0 Provide guidance for students and “teach our students to safely and ethically use their digital devices in the classroom–and throughout their communities” (IKeepSafe, 2013). 0 Exhibit Ethical, Safe and Legal behaviour as role models for our students. 0 Inform students and continue to support them on their journey to understanding their new roles in the classroom and community.
  • 5. IkeepSafe offers a new game for students to learn about issues such as music piracy. “Faux Paw the Websurfing Techno Cat series has been created by a team of leading child psychologists, educators, and law enforcement. This engaging curriculum—complete with books, animated DVDs, and lesson plans—will captivate the attention of your students and teach them how to appropriately conduct themselves online and in the digital space.“ (IKeepSafe, 2013).
  • 6. Children’s Internet Protection Act (CIPA) 0 The Children's Internet Protection Act (CIPA) is a federal law that addresses concerns about access in schools and libraries to the Internet and other information. 0 “The Children’s Internet Protection Act (CIPA) was enacted by Congress in 2000 to address concerns about children’s access to obscene or harmful content over the Internet. CIPA imposes certain requirements on schools or libraries that receive discounts for Internet access or internal connections through the E-rate program – a program that makes certain communications services and products more affordable for eligible schools and libraries” (F.C.C., 2013)
  • 7.
  • 8. Websense 0 Websense helps schools to comply with the CIPA through: 0 “Obscenity and Pornography Filtering – Allows schools and libraries to manage Internet access to over 90 URL categories including Racism and Hate, Adult Material, Hacking and other topics pertinent to CIPA. 0 Best-of-Breed Web Filtering – The most accurate and up-to-date filtering database with over 36 million URLs. 0 Filtering of Search Engine Images – Use safe-search to filter inappropriate images that can be found in search engine query results. 0 Blocking of Spyware, Malicious Mobile Code, and Other Security Threats – Sites with worms, spyware, phishing, and other threats can be blocked, helping to meet The CIPA requirements for protection of a minor's personal information. 0 Monitoring – Reporting Tools offer many different ways to monitor and report on the online activities of minors. 0 Policy Management Per User or Per Group – Schools and libraries can customize their Internet policies based on users or groups, so policies can be set based on age or needs. “
  • 9. What do we, as educations, need to do? 0 We need to do some simple research. It’s not hard. 0 We need to follow everything in the CIPA’s rules and guidelines. We need to follow the school’s policy and enforce it for students. 0 WHAT CAN WE DO? 0 We can use resources such as games! We can get the students to reserch internet safety and the ethical use of the internet. They can do up their own presentations and present them to the class, maybe even work in groups 0 MAKE IT FUN!
  • 10. References 0 Federal Communications Commission, 2013, ‘Children’s Internet Protection Act’, ONLINE, Available at: http://www.fcc.gov/guides/childrens-internet-protection- act, Accessed 22/08/13. 0 IKeepSafe, 2013, Cyber-Ethics, ONLINE, Available at: http://www.ikeepsafe.org/, Accessed 22/08/13. 0 Websense, Education K-12, 2013, ONLINE, Available at: http://www.websense.com/content/Regional/Australia/347 5.aspx, Accessed 22/08/13.