SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
June 2, 2005



CIPA COMPLIANCE REQUIREMENT FOR SYSTEM TECHNOLOGY PLAN

           http://www.sl.universalservice.org/whatsnew/misc/cipa051801.asp


OVERVIEW OF CIPA

The Children's Internet Protection Act (CIPA) was signed into law on December 21,
2000. Under CIPA, no school or library may receive discounts unless it certifies that it is
enforcing a policy of Internet safety that includes the use of filtering or blocking
technology (see below). This Internet Safety Policy must protect against access, through
computers with Internet access, to visual depictions that are obscene, child pornography,
or (in the case of use by minors) harmful to minors. The school or library must also
certify that it is enforcing the operation of such filtering or blocking technology during
any use of such computers by minors. Schools and libraries receiving only
Telecommunications Services are excluded from the requirements of CIPA.

Applicants must certify on their Form 486 either that they are in compliance with CIPA,
or that they are undertaking actions to put into place an Internet Safety Policy and to
procure the filtering or blocking technology in order to receive universal service
discounts.


APPROPRIATE DOCUMENTATION FOR “UNDERTAKING ACTIONS”

Pursuant to the Children's Internet Protection Act, as codified at 47 U.S.C. § 254(h) and
(l), the (system name) is undertaking such actions, including any necessary procurement
procedures, to comply with the requirements of CIPA.



COMPLIANCE WITH THE REQUIREMENTS OF CIPA

"Undertaking such actions" refers to actions related to implementation of the CIPA
requirements that should be in place. The requirements are:

1. Technology Protection Measure

A Technology Protection Measure is a specific technology that blocks or filters Internet
access. It must protect against access by adults and minors to visual depictions that are
obscene, child pornography, or - with respect to use of computers with Internet access by
minors - harmful to minors. It may be disabled for adults engaged in bona fide research
or other lawful purposes. For schools, the policy must also include monitoring the online
activities of minors.

2. Internet Safety Policy

The Internet Safety Policy must address the following issues:
June 2, 2005


   a. access by minors to inappropriate matter on the Internet and World Wide Web;
   b. the safety and security of minors when using electronic mail, chat rooms, and
      other forms of direct electronic communications;
   c. unauthorized access, including so-called "hacking," and other unlawful activities
      by minors online;
   d. unauthorized disclosure, use, and dissemination of personal information regarding
      minors; and
   e. measures designed to restrict minors' access to materials harmful to minors.

3. Public Notice and Hearing

The authority with responsibility for administration of the school or library must provide
reasonable public notice and hold at least one public hearing to address a proposed
Technology Protection Measure and Internet Safety Policy.

Following are a few examples of documentation that could demonstrate that a school
or library is "undertaking actions" to comply with CIPA. This list is not meant to be
exhaustive.

   a. A published or circulated school or library board agenda with CIPA compliance
      cited as a topic.
   b. A circulated staff meeting agenda with CIPA compliance cited as a topic.
   c. A Service Provider quote requested and received by a recipient of service or
      Billed Entity which contains information on a Technology Protection Measure.
   d. A draft of an RFP or other procurement procedure to solicit bids for the purchase
      or provision of a Technology Protection Measure.
   e. An agenda or minutes from a meeting open to the public at which an Internet
      Safety Policy was discussed.
   f. An agenda or minutes from a public or nonpublic meeting of a school or library
      board at which procurement issues relating to the acquisition of a Technology
      Protection Measure were discussed.
   g. A memo to an administrative authority of a school or library from a staff member
      outlining the CIPA issues not addressed by an Acceptable Use Policy currently in
      place.
   h. A memo or report to an administrative authority of a school or library from a staff
      member describing research on available Technology Protection Measures.
   i. A memo or report to an administrative authority of a school or library from a staff
      member which discusses and analyzes Internet Safety Policies in effect at other
      schools and libraries.


INTERNET SAFETY POLICIES AND CIPA:

Sample CIPA policy came from:
http://www.e-ratecentral.com/CIPA/cipa_policy_sample.pdf
June 2, 2005


                                 APPENDIX A
                    Sample CIPA-Compliant Internet Safety Policy

Note: The following Internet safety policy was developed by E-Rate Central solely to
address the basic policy compliance requirements of CIPA and NCIPA for E-rate
funding. Schools and libraries adopting new or revised Internet policies may wish to
expand or modify the sample policy language.

INTERNET SAFETY POLICY
For <School or Library>

Introduction

It is the policy of <School or Library> to: (a) prevent user access over its computer
network to, or transmission of, inappropriate material via Internet, electronic mail, or
other forms of direct electronic communications; (b) prevent unauthorized access and
other unlawful online activity; (c) prevent unauthorized online disclosure, use, or
dissemination of personal identification information of minors; and (d) comply with the
Children’s Internet Protection Act [Pub. L. No. 106-554 and 47 USC 254(h)].

Definitions
                                                                      ∗
Key terms are as defined in the Children’s Internet Protection Act.

Access to Inappropriate Material

To the extent practical, technology protection measures (or “Internet filters”) shall be
used to block or filter Internet, or other forms of electronic communications, access to
inappropriate information.

Specifically, as required by the Children’s Internet Protection Act, blocking shall be
applied to visual depictions of material deemed obscene or child pornography, or to any
material deemed harmful to minors.

Subject to staff supervision, technology protection measures may be disabled or, in the
case of minors, minimized only for bona fide research or other lawful purposes.

Inappropriate Network Usage

To the extent practical, steps shall be taken to promote the safety and security of users of
the <School or Library> online computer network when using electronic mail, chat
rooms, instant messaging, and other forms of direct electronic communications.

Specifically, as required by the Children’s Internet Protection Act, prevention of
inappropriate network usage includes: (a) unauthorized access, including so-called
‘hacking,’ and other unlawful activities; and (b) unauthorized disclosure, use, and
dissemination of personal identification information regarding minors.

Supervision and Monitoring
June 2, 2005


It shall be the responsibility of all members of the <School or Library> staff to supervise
and monitor usage of the online computer network and access to the Internet in
accordance with this policy and the Children’s Internet protection Act.

Procedures for the disabling or otherwise modifying any technology protection measures
shall be the responsibility of <Title> or designated representatives.

Adoption

This Internet Safety Policy was adopted by the Board of <School or Library> at a public
meeting, following normal public notice, on <Month, Day, Year>.


CIPA DEFINITION OF TERMS:

TECHNOLOGY PROTECTION MEASURE. The term ``technology protection
measure'' means a specific technology that blocks or filters Internet access to visual
depictions that are:
        1. OBSCENE, as that term is defined in section 1460 of title 18, United States
        Code;
        2. CHILD PORNOGRAPHY, as that term is defined in section 2256 of title 18,
        United States Code; or
        3. Harmful to minors.

HARMFUL TO MINORS. The term ``harmful to minors'' means any picture, image,
graphic image file, or other visual depiction that:
       1. Taken as a whole and with respect to minors, appeals to a prurient interest in
       nudity, sex, or excretion;
       2. Depicts, describes, or represents, in a patently offensive way with respect to
       what is suitable for minors, an actual or simulated sexual act or sexual contact,
       actual or simulated normal or perverted sexual acts, or a lewd exhibition of the
       genitals; and
       3. Taken as a whole, lacks serious literary, artistic, political, or scientific value as
       to minors.

SEXUAL ACT; SEXUAL CONTACT. The terms ``sexual act'' and ``sexual contact''
have the meanings given such terms in section 2246 of title 18, United States Code.
June 2, 2005


                                  APPENDIX B
                  Internet Links for Additional Information on
                        CIPA and Internet Safety Policies

CIPA BACKGROUND

  Full text of the Children’s Internet Protection Act
  http://www.fcc.gov/ccb/universal_service/chipact.doc

  FCC regulations implementing CIPA; FCC 01-120
  http://www.fcc.gov/Bureaus/Common_Carrier/Orders/2001/fcc01120.doc

  SLD’s FAQ on E-rate certification procedures and timing
  http://www.sl.universalservice.org/reference/CIPAfaq.asp

Weitere ähnliche Inhalte

Was ist angesagt?

ACOP - Safer Cyber Space for Children - final
ACOP - Safer Cyber Space for Children - finalACOP - Safer Cyber Space for Children - final
ACOP - Safer Cyber Space for Children - finalMercy Wanjau
 
Suggestions for state allocations of technology funds
Suggestions for state allocations of technology fundsSuggestions for state allocations of technology funds
Suggestions for state allocations of technology fundsntropi
 
Responsible use of ict brief project report - feb 2011
Responsible use of ict   brief project report - feb 2011Responsible use of ict   brief project report - feb 2011
Responsible use of ict brief project report - feb 2011Mel Tan
 
Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesKushmi Anuththara
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issuesrgermosen
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buettisegughana
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carrsegughana
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Glorisosegughana
 
internetsafety
internetsafetyinternetsafety
internetsafetyawadly
 
Legal and ethical issues modern technologies
Legal and ethical issues                            modern technologiesLegal and ethical issues                            modern technologies
Legal and ethical issues modern technologiesrgermosen
 
University of the Highlands & Islands - e-Safety & e-Safeguarding
University of the Highlands & Islands - e-Safety & e-SafeguardingUniversity of the Highlands & Islands - e-Safety & e-Safeguarding
University of the Highlands & Islands - e-Safety & e-SafeguardingJoan Walker
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxAmandaWeaver21
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technologyAditya
 

Was ist angesagt? (19)

OCR cybersecurity
OCR cybersecurityOCR cybersecurity
OCR cybersecurity
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
ACOP - Safer Cyber Space for Children - final
ACOP - Safer Cyber Space for Children - finalACOP - Safer Cyber Space for Children - final
ACOP - Safer Cyber Space for Children - final
 
Suggestions for state allocations of technology funds
Suggestions for state allocations of technology fundsSuggestions for state allocations of technology funds
Suggestions for state allocations of technology funds
 
Responsible use of ict brief project report - feb 2011
Responsible use of ict   brief project report - feb 2011Responsible use of ict   brief project report - feb 2011
Responsible use of ict brief project report - feb 2011
 
Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employees
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issues
 
CS-LRC-0114
CS-LRC-0114CS-LRC-0114
CS-LRC-0114
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buetti
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
Ict Issues
Ict IssuesIct Issues
Ict Issues
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
Nigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crimeNigerian students, technology education and cyber crime
Nigerian students, technology education and cyber crime
 
internetsafety
internetsafetyinternetsafety
internetsafety
 
Legal and ethical issues modern technologies
Legal and ethical issues                            modern technologiesLegal and ethical issues                            modern technologies
Legal and ethical issues modern technologies
 
University of the Highlands & Islands - e-Safety & e-Safeguarding
University of the Highlands & Islands - e-Safety & e-SafeguardingUniversity of the Highlands & Islands - e-Safety & e-Safeguarding
University of the Highlands & Islands - e-Safety & e-Safeguarding
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptx
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 

Ähnlich wie CIPA Compliance Information

Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schoolsadawidziuk
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety edtecher
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]leslieannpt
 
Fear of filtering the reality of internet content management (burns)
Fear of filtering the reality of internet content management (burns)Fear of filtering the reality of internet content management (burns)
Fear of filtering the reality of internet content management (burns)Nebraska Library Commission
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813jennifer_lawrence
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy donekgrosvenor
 
Fear of filtering the reality of internet content management cipa law (burns)
Fear of filtering the reality of internet content management   cipa law (burns)Fear of filtering the reality of internet content management   cipa law (burns)
Fear of filtering the reality of internet content management cipa law (burns)Nebraska Library Commission
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceAlireza Ghahrood
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterMark Moran
 
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptxem-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptxNonSy1
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Benjamin Ang
 
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGAllan Lloyd Martinez
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
University Personal Devices (BYOD) Policy
University Personal Devices (BYOD) PolicyUniversity Personal Devices (BYOD) Policy
University Personal Devices (BYOD) Policykeyashaj
 

Ähnlich wie CIPA Compliance Information (20)

Internet filtering in schools
Internet filtering in schoolsInternet filtering in schools
Internet filtering in schools
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety
 
Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Fear of filtering the reality of internet content management (burns)
Fear of filtering the reality of internet content management (burns)Fear of filtering the reality of internet content management (burns)
Fear of filtering the reality of internet content management (burns)
 
Communities online policy 190813
Communities online policy 190813Communities online policy 190813
Communities online policy 190813
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
PAN CIPA Requirements
PAN CIPA RequirementsPAN CIPA Requirements
PAN CIPA Requirements
 
Ch.8[1]
Ch.8[1]Ch.8[1]
Ch.8[1]
 
E saftey policy done
E saftey policy   doneE saftey policy   done
E saftey policy done
 
Isidroteam.pptx
Isidroteam.pptxIsidroteam.pptx
Isidroteam.pptx
 
Fear of filtering the reality of internet content management cipa law (burns)
Fear of filtering the reality of internet content management   cipa law (burns)Fear of filtering the reality of internet content management   cipa law (burns)
Fear of filtering the reality of internet content management cipa law (burns)
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptxem-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
em-tech pptscvvcvcvcvcvcvvcvvvvbvcb.pptx
 
Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)Cybersecurity legislation in Singapore (2017)
Cybersecurity legislation in Singapore (2017)
 
Week 4 - 6.pdf
Week 4 - 6.pdfWeek 4 - 6.pdf
Week 4 - 6.pdf
 
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNINGICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
ICT POLICIES, ICT SAFETY ISSUES AND USES OF ICT IN TEACHING AND LEARNING
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
University Personal Devices (BYOD) Policy
University Personal Devices (BYOD) PolicyUniversity Personal Devices (BYOD) Policy
University Personal Devices (BYOD) Policy
 

Mehr von Tũi Wichets

อัตรา Rain Rate ในแถบ East-Asia
อัตรา Rain Rate ในแถบ East-Asia อัตรา Rain Rate ในแถบ East-Asia
อัตรา Rain Rate ในแถบ East-Asia Tũi Wichets
 
ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...
ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...
ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...Tũi Wichets
 
การคอนฟิกส์ OSPF บน Ubiquiti Edge Router
การคอนฟิกส์ OSPF บน Ubiquiti Edge Routerการคอนฟิกส์ OSPF บน Ubiquiti Edge Router
การคอนฟิกส์ OSPF บน Ubiquiti Edge RouterTũi Wichets
 
MTCNA Training outline, Certified Network Associate (MTCNA)
MTCNA Training outline, Certified Network Associate (MTCNA)MTCNA Training outline, Certified Network Associate (MTCNA)
MTCNA Training outline, Certified Network Associate (MTCNA)Tũi Wichets
 
MTCWE Training outline, Course prerequisites – MTCNA certificate
MTCWE Training outline, Course prerequisites – MTCNA certificateMTCWE Training outline, Course prerequisites – MTCNA certificate
MTCWE Training outline, Course prerequisites – MTCNA certificateTũi Wichets
 
MTCRE Training outline, Course prerequisites – MTCNA certificate
MTCRE Training outline, Course prerequisites – MTCNA certificateMTCRE Training outline, Course prerequisites – MTCNA certificate
MTCRE Training outline, Course prerequisites – MTCNA certificateTũi Wichets
 
MTCINE training outline, Course prerequisites – MTCNA and MTCRE certificates
MTCINE training outline, Course prerequisites – MTCNA and MTCRE certificatesMTCINE training outline, Course prerequisites – MTCNA and MTCRE certificates
MTCINE training outline, Course prerequisites – MTCNA and MTCRE certificatesTũi Wichets
 
บล๊อกเวปไซท์ บน Open WRT หรือ บน Ubiquiti NanoStation M5 หรือ บน airOS
บล๊อกเวปไซท์ บน Open WRT หรือ บน  Ubiquiti NanoStation M5 หรือ บน airOSบล๊อกเวปไซท์ บน Open WRT หรือ บน  Ubiquiti NanoStation M5 หรือ บน airOS
บล๊อกเวปไซท์ บน Open WRT หรือ บน Ubiquiti NanoStation M5 หรือ บน airOSTũi Wichets
 
Introduction to Data Centre 3.0
Introduction to Data Centre 3.0Introduction to Data Centre 3.0
Introduction to Data Centre 3.0Tũi Wichets
 
Windows Server 2012 R2 products & editions comparison
Windows Server 2012 R2 products & editions comparisonWindows Server 2012 R2 products & editions comparison
Windows Server 2012 R2 products & editions comparisonTũi Wichets
 
Settings MikroTik Router and Access Point to schedule AP radio on off via script
Settings MikroTik Router and Access Point to schedule AP radio on off via scriptSettings MikroTik Router and Access Point to schedule AP radio on off via script
Settings MikroTik Router and Access Point to schedule AP radio on off via scriptTũi Wichets
 
แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...
แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...
แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...Tũi Wichets
 
How to link public addresses (real ip) to private ip or lan ip
How to link public addresses (real ip) to private ip or lan ipHow to link public addresses (real ip) to private ip or lan ip
How to link public addresses (real ip) to private ip or lan ipTũi Wichets
 
FAQ - Rogue AP - What is Rogue Access Point?
FAQ - Rogue AP - What is Rogue Access Point?FAQ - Rogue AP - What is Rogue Access Point?
FAQ - Rogue AP - What is Rogue Access Point?Tũi Wichets
 
เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...
เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...
เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...Tũi Wichets
 
Windows server 2012 r2 Hyper-v Component architecture
Windows server 2012 r2 Hyper-v Component architecture Windows server 2012 r2 Hyper-v Component architecture
Windows server 2012 r2 Hyper-v Component architecture Tũi Wichets
 
Gigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In DepthGigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In DepthTũi Wichets
 
ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)
ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)
ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)Tũi Wichets
 
SwOS (MikroTik Switch OS) Administration Guide
SwOS (MikroTik Switch OS) Administration GuideSwOS (MikroTik Switch OS) Administration Guide
SwOS (MikroTik Switch OS) Administration GuideTũi Wichets
 

Mehr von Tũi Wichets (20)

RouterOS Commands
RouterOS CommandsRouterOS Commands
RouterOS Commands
 
อัตรา Rain Rate ในแถบ East-Asia
อัตรา Rain Rate ในแถบ East-Asia อัตรา Rain Rate ในแถบ East-Asia
อัตรา Rain Rate ในแถบ East-Asia
 
ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...
ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...
ขั้นตอนการปรับตำแหน่งจาน Mikrotik mANT 30dBi 5Ghz MIMO ให้ feed สัญญาณ Slant ...
 
การคอนฟิกส์ OSPF บน Ubiquiti Edge Router
การคอนฟิกส์ OSPF บน Ubiquiti Edge Routerการคอนฟิกส์ OSPF บน Ubiquiti Edge Router
การคอนฟิกส์ OSPF บน Ubiquiti Edge Router
 
MTCNA Training outline, Certified Network Associate (MTCNA)
MTCNA Training outline, Certified Network Associate (MTCNA)MTCNA Training outline, Certified Network Associate (MTCNA)
MTCNA Training outline, Certified Network Associate (MTCNA)
 
MTCWE Training outline, Course prerequisites – MTCNA certificate
MTCWE Training outline, Course prerequisites – MTCNA certificateMTCWE Training outline, Course prerequisites – MTCNA certificate
MTCWE Training outline, Course prerequisites – MTCNA certificate
 
MTCRE Training outline, Course prerequisites – MTCNA certificate
MTCRE Training outline, Course prerequisites – MTCNA certificateMTCRE Training outline, Course prerequisites – MTCNA certificate
MTCRE Training outline, Course prerequisites – MTCNA certificate
 
MTCINE training outline, Course prerequisites – MTCNA and MTCRE certificates
MTCINE training outline, Course prerequisites – MTCNA and MTCRE certificatesMTCINE training outline, Course prerequisites – MTCNA and MTCRE certificates
MTCINE training outline, Course prerequisites – MTCNA and MTCRE certificates
 
บล๊อกเวปไซท์ บน Open WRT หรือ บน Ubiquiti NanoStation M5 หรือ บน airOS
บล๊อกเวปไซท์ บน Open WRT หรือ บน  Ubiquiti NanoStation M5 หรือ บน airOSบล๊อกเวปไซท์ บน Open WRT หรือ บน  Ubiquiti NanoStation M5 หรือ บน airOS
บล๊อกเวปไซท์ บน Open WRT หรือ บน Ubiquiti NanoStation M5 หรือ บน airOS
 
Introduction to Data Centre 3.0
Introduction to Data Centre 3.0Introduction to Data Centre 3.0
Introduction to Data Centre 3.0
 
Windows Server 2012 R2 products & editions comparison
Windows Server 2012 R2 products & editions comparisonWindows Server 2012 R2 products & editions comparison
Windows Server 2012 R2 products & editions comparison
 
Settings MikroTik Router and Access Point to schedule AP radio on off via script
Settings MikroTik Router and Access Point to schedule AP radio on off via scriptSettings MikroTik Router and Access Point to schedule AP radio on off via script
Settings MikroTik Router and Access Point to schedule AP radio on off via script
 
แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...
แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...
แนะนำแนวทางการออกแบบ การปรับแต่ง การรับส่งสัญญาณ airFiber 24 - airFiber Desig...
 
How to link public addresses (real ip) to private ip or lan ip
How to link public addresses (real ip) to private ip or lan ipHow to link public addresses (real ip) to private ip or lan ip
How to link public addresses (real ip) to private ip or lan ip
 
FAQ - Rogue AP - What is Rogue Access Point?
FAQ - Rogue AP - What is Rogue Access Point?FAQ - Rogue AP - What is Rogue Access Point?
FAQ - Rogue AP - What is Rogue Access Point?
 
เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...
เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...
เอกสาร แนวทาง การอินติเกรท Mac OS X เข้ากับ ระบบ Active Directory อย่างไร Bes...
 
Windows server 2012 r2 Hyper-v Component architecture
Windows server 2012 r2 Hyper-v Component architecture Windows server 2012 r2 Hyper-v Component architecture
Windows server 2012 r2 Hyper-v Component architecture
 
Gigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In DepthGigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In Depth
 
ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)
ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)
ค่า Tx Power Mode ใน Ubiquiti และ Mikrotik (RF Tx Power Mode Settings)
 
SwOS (MikroTik Switch OS) Administration Guide
SwOS (MikroTik Switch OS) Administration GuideSwOS (MikroTik Switch OS) Administration Guide
SwOS (MikroTik Switch OS) Administration Guide
 

CIPA Compliance Information

  • 1. June 2, 2005 CIPA COMPLIANCE REQUIREMENT FOR SYSTEM TECHNOLOGY PLAN http://www.sl.universalservice.org/whatsnew/misc/cipa051801.asp OVERVIEW OF CIPA The Children's Internet Protection Act (CIPA) was signed into law on December 21, 2000. Under CIPA, no school or library may receive discounts unless it certifies that it is enforcing a policy of Internet safety that includes the use of filtering or blocking technology (see below). This Internet Safety Policy must protect against access, through computers with Internet access, to visual depictions that are obscene, child pornography, or (in the case of use by minors) harmful to minors. The school or library must also certify that it is enforcing the operation of such filtering or blocking technology during any use of such computers by minors. Schools and libraries receiving only Telecommunications Services are excluded from the requirements of CIPA. Applicants must certify on their Form 486 either that they are in compliance with CIPA, or that they are undertaking actions to put into place an Internet Safety Policy and to procure the filtering or blocking technology in order to receive universal service discounts. APPROPRIATE DOCUMENTATION FOR “UNDERTAKING ACTIONS” Pursuant to the Children's Internet Protection Act, as codified at 47 U.S.C. § 254(h) and (l), the (system name) is undertaking such actions, including any necessary procurement procedures, to comply with the requirements of CIPA. COMPLIANCE WITH THE REQUIREMENTS OF CIPA "Undertaking such actions" refers to actions related to implementation of the CIPA requirements that should be in place. The requirements are: 1. Technology Protection Measure A Technology Protection Measure is a specific technology that blocks or filters Internet access. It must protect against access by adults and minors to visual depictions that are obscene, child pornography, or - with respect to use of computers with Internet access by minors - harmful to minors. It may be disabled for adults engaged in bona fide research or other lawful purposes. For schools, the policy must also include monitoring the online activities of minors. 2. Internet Safety Policy The Internet Safety Policy must address the following issues:
  • 2. June 2, 2005 a. access by minors to inappropriate matter on the Internet and World Wide Web; b. the safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications; c. unauthorized access, including so-called "hacking," and other unlawful activities by minors online; d. unauthorized disclosure, use, and dissemination of personal information regarding minors; and e. measures designed to restrict minors' access to materials harmful to minors. 3. Public Notice and Hearing The authority with responsibility for administration of the school or library must provide reasonable public notice and hold at least one public hearing to address a proposed Technology Protection Measure and Internet Safety Policy. Following are a few examples of documentation that could demonstrate that a school or library is "undertaking actions" to comply with CIPA. This list is not meant to be exhaustive. a. A published or circulated school or library board agenda with CIPA compliance cited as a topic. b. A circulated staff meeting agenda with CIPA compliance cited as a topic. c. A Service Provider quote requested and received by a recipient of service or Billed Entity which contains information on a Technology Protection Measure. d. A draft of an RFP or other procurement procedure to solicit bids for the purchase or provision of a Technology Protection Measure. e. An agenda or minutes from a meeting open to the public at which an Internet Safety Policy was discussed. f. An agenda or minutes from a public or nonpublic meeting of a school or library board at which procurement issues relating to the acquisition of a Technology Protection Measure were discussed. g. A memo to an administrative authority of a school or library from a staff member outlining the CIPA issues not addressed by an Acceptable Use Policy currently in place. h. A memo or report to an administrative authority of a school or library from a staff member describing research on available Technology Protection Measures. i. A memo or report to an administrative authority of a school or library from a staff member which discusses and analyzes Internet Safety Policies in effect at other schools and libraries. INTERNET SAFETY POLICIES AND CIPA: Sample CIPA policy came from: http://www.e-ratecentral.com/CIPA/cipa_policy_sample.pdf
  • 3. June 2, 2005 APPENDIX A Sample CIPA-Compliant Internet Safety Policy Note: The following Internet safety policy was developed by E-Rate Central solely to address the basic policy compliance requirements of CIPA and NCIPA for E-rate funding. Schools and libraries adopting new or revised Internet policies may wish to expand or modify the sample policy language. INTERNET SAFETY POLICY For <School or Library> Introduction It is the policy of <School or Library> to: (a) prevent user access over its computer network to, or transmission of, inappropriate material via Internet, electronic mail, or other forms of direct electronic communications; (b) prevent unauthorized access and other unlawful online activity; (c) prevent unauthorized online disclosure, use, or dissemination of personal identification information of minors; and (d) comply with the Children’s Internet Protection Act [Pub. L. No. 106-554 and 47 USC 254(h)]. Definitions ∗ Key terms are as defined in the Children’s Internet Protection Act. Access to Inappropriate Material To the extent practical, technology protection measures (or “Internet filters”) shall be used to block or filter Internet, or other forms of electronic communications, access to inappropriate information. Specifically, as required by the Children’s Internet Protection Act, blocking shall be applied to visual depictions of material deemed obscene or child pornography, or to any material deemed harmful to minors. Subject to staff supervision, technology protection measures may be disabled or, in the case of minors, minimized only for bona fide research or other lawful purposes. Inappropriate Network Usage To the extent practical, steps shall be taken to promote the safety and security of users of the <School or Library> online computer network when using electronic mail, chat rooms, instant messaging, and other forms of direct electronic communications. Specifically, as required by the Children’s Internet Protection Act, prevention of inappropriate network usage includes: (a) unauthorized access, including so-called ‘hacking,’ and other unlawful activities; and (b) unauthorized disclosure, use, and dissemination of personal identification information regarding minors. Supervision and Monitoring
  • 4. June 2, 2005 It shall be the responsibility of all members of the <School or Library> staff to supervise and monitor usage of the online computer network and access to the Internet in accordance with this policy and the Children’s Internet protection Act. Procedures for the disabling or otherwise modifying any technology protection measures shall be the responsibility of <Title> or designated representatives. Adoption This Internet Safety Policy was adopted by the Board of <School or Library> at a public meeting, following normal public notice, on <Month, Day, Year>. CIPA DEFINITION OF TERMS: TECHNOLOGY PROTECTION MEASURE. The term ``technology protection measure'' means a specific technology that blocks or filters Internet access to visual depictions that are: 1. OBSCENE, as that term is defined in section 1460 of title 18, United States Code; 2. CHILD PORNOGRAPHY, as that term is defined in section 2256 of title 18, United States Code; or 3. Harmful to minors. HARMFUL TO MINORS. The term ``harmful to minors'' means any picture, image, graphic image file, or other visual depiction that: 1. Taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion; 2. Depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; and 3. Taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors. SEXUAL ACT; SEXUAL CONTACT. The terms ``sexual act'' and ``sexual contact'' have the meanings given such terms in section 2246 of title 18, United States Code.
  • 5. June 2, 2005 APPENDIX B Internet Links for Additional Information on CIPA and Internet Safety Policies CIPA BACKGROUND Full text of the Children’s Internet Protection Act http://www.fcc.gov/ccb/universal_service/chipact.doc FCC regulations implementing CIPA; FCC 01-120 http://www.fcc.gov/Bureaus/Common_Carrier/Orders/2001/fcc01120.doc SLD’s FAQ on E-rate certification procedures and timing http://www.sl.universalservice.org/reference/CIPAfaq.asp