SlideShare ist ein Scribd-Unternehmen logo
1 von 31
TECHNOLOGY IN THE CLASSROOM:
BUILDING A FOUNDATION FOR
SUCCESS
Nancy Gifford
Senior Director of Law & Policy
The Internet Keep Safe Coalition
About iKeepSafe
• a nonprofit, international alliance of
more than 100 policy leaders, educators,
law enforcement members, technology
experts, public health experts and
advocates.
• Leader in research and tracking global
trends and issues surrounding connected
technology and their effect on children.
iKeepSafe’s Mission
To see generations of the world’s
children grow up safely using
technology and the internet.
Technology in the Classroom:
Building a Foundation for Success
• Policies and Administrative
Considerations to protect the
privacy of student data
• Core competencies for ethically
and responsibly engaging with
technology
Elements of a
Comprehensive Student
Data Privacy Program
• Identify and minimize risks of mishaps
• Have clear polices that are kept up to
date
• Create an incident response plan
• Train employees
• Educate students and parents
Identify Risks
• Privacy Assessment
• Establish an e-safety committee (or a
subcommittee of your safety
committee)
• Dedicate a privacy point person (for
offline and online information
distribution)
Elements of a
Comprehensive Student
Data Privacy Program
• Identify and minimize risks of mishaps
• Have clear polices that are kept up to
date
• Create an incident response plan
• Train employees
• Educate staff, students and parents
CLEAR POLICIES AND
PROCEDURES
• Notice
• Confidentiality and Disclosures
• Security
• Changes
• Training
Privacy Policies
• Sharing personal data with 3rd
parties
• Use of technology:
• School administrators use
• Educator use
• School websites
Is my school compliant with all
of the regulations around data
sharing?
• FERPA
• COPAA
• CIPA
• PPRA
• HIPPA
• Applicable state laws
• District Policies
Family Educational Rights and
Privacy Act
• FERPA
• mandates that schools must keep
educational records confidential
and that student data can only be
used for educational purposes.
Using student data to sell or
market products is prohibited.
• Changes are being considered (Sen.
Markey)
Children’s Online Privacy
Protection Act
• COPPA
• Mandates operators of websites or
online services directed to children
obtain verifiable parental consent
before collecting, using or
disclosing personal info of children
under 13
• School may provide consent in
some circumstances
Child Internet Protection Act
• CIPA
• Requires schools that use software
or technology to block access to
inappropriate materials
• Safety education requirement
• Tied to e-Rate Funding
The Protection of Pupil Rights
Act
• PPRA
• Protects the privacy of students in
surveys, medical exams and
marketing.
• Has Opt-in and Opt-out
requirements that schools must
comply with.
Elements of a
Comprehensive Student
Data Privacy Program
• Identify and minimize risks of mishaps
• Have clear polices that are kept up to
date
• Create an incident response plan
• Train employees
• Educate students and parents
Incident Response Plan
– Digital incident response plan
• Cyberbullying
• Sexting
• Harassment
– Data security breach response plan
• Hacking
• Accidental or negligent disclosures
Civil Liberties
The First Amendment
• Balancing a robust expression of ideas
while restricting those
communications that invade others’
privacy, are defamatory, contribute to
a hostile environment or otherwise
cause harm.
Civil Liberties
The Fourth Amendment
• Searching & seizing electronic
Devices
• BYOD, school-provided devices, cell
phones, laptops, e-readers
• What are your school policies
around electronic devices?
Elements of a
Comprehensive Student
Data Privacy Program
• Identify and minimize risks of mishaps
• Have clear polices that are kept up to
date
• Create an incident response plan
• Train employees
• Educate students and parents
Training
Elements of a training program:
• Basic privacy awareness
• Privacy rights & responsibilities
• Data security
• Online communication & social media
• Electronic searches, surveillance, & access
Elements of a
Comprehensive Student
Data Privacy Program
• Identify and minimize risks of mishaps
• Have clear polices that are kept up to
date
• Create an incident response plan
• Train employees
• Educate students and parents
Educate Students and Parents
• Clear policies
• Clear process
ROADMAP
Download the Roadmap for Schools at:
iKeepSafe.org/roadmap
Or email: info@ikeepsafe.org
Digital Citizenship
At what age does cyberbullying start? . . . digital
piracy (illegally downloading movies and music)?
BE a PRO
The Free App for Parents

Weitere ähnliche Inhalte

Was ist angesagt?

Education Privacy Presentation
Education Privacy Presentation Education Privacy Presentation
Education Privacy Presentation emilyensign
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect
 
internetsafety
internetsafetyinternetsafety
internetsafetyawadly
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBloxx
 
Considerations for ICT in Learning
Considerations for ICT in Learning Considerations for ICT in Learning
Considerations for ICT in Learning Louise Jones
 
Making the Most out of Social Media!
Making the Most out of Social Media!Making the Most out of Social Media!
Making the Most out of Social Media!Louise Jones
 
A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseLouise Jones
 
Legal and Ethical Issues in Adult Learning
Legal and Ethical Issues in Adult LearningLegal and Ethical Issues in Adult Learning
Legal and Ethical Issues in Adult Learningmason9108
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipggfg123
 
Tec 516 online environmental issue presentation aubrey hall
Tec 516 online environmental issue presentation   aubrey hall Tec 516 online environmental issue presentation   aubrey hall
Tec 516 online environmental issue presentation aubrey hall AubreyHall5
 
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Reji Mae Sunot
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymegbg
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentationspaul6414
 
Black Coffee Texarkana
Black Coffee TexarkanaBlack Coffee Texarkana
Black Coffee TexarkanaDavid Jakes
 
CLA YA MTG2010
CLA YA MTG2010CLA YA MTG2010
CLA YA MTG2010GeriDiorio
 

Was ist angesagt? (19)

Education Privacy Presentation
Education Privacy Presentation Education Privacy Presentation
Education Privacy Presentation
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
internetsafety
internetsafetyinternetsafety
internetsafety
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
Considerations for ICT in Learning
Considerations for ICT in Learning Considerations for ICT in Learning
Considerations for ICT in Learning
 
Making the Most out of Social Media!
Making the Most out of Social Media!Making the Most out of Social Media!
Making the Most out of Social Media!
 
A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible Use
 
Legal and Ethical Issues in Adult Learning
Legal and Ethical Issues in Adult LearningLegal and Ethical Issues in Adult Learning
Legal and Ethical Issues in Adult Learning
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Tec 516 online environmental issue presentation aubrey hall
Tec 516 online environmental issue presentation   aubrey hall Tec 516 online environmental issue presentation   aubrey hall
Tec 516 online environmental issue presentation aubrey hall
 
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
Social, Ethical and Legal Responsibilities in the Use of Technology Tools and...
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Ict maria h
Ict maria hIct maria h
Ict maria h
 
Resources
ResourcesResources
Resources
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
Aup Video
Aup VideoAup Video
Aup Video
 
Black Coffee Texarkana
Black Coffee TexarkanaBlack Coffee Texarkana
Black Coffee Texarkana
 
CLA YA MTG2010
CLA YA MTG2010CLA YA MTG2010
CLA YA MTG2010
 

Ähnlich wie NAESP Conference - July 12, 2014

Demystifying Student Data Privacy
Demystifying Student Data PrivacyDemystifying Student Data Privacy
Demystifying Student Data PrivacyNaviance
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningMalinka Ivanova
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningGabriela Grosseck
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentationJisc
 
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014Rebecca Avery
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Rebecca Avery
 
Electronic Security Issues for Schools
Electronic Security Issues for SchoolsElectronic Security Issues for Schools
Electronic Security Issues for SchoolsBrett Napier, MBA
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015bellla33
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policyiamprosperous
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Esafety for Ofsted
Esafety for OfstedEsafety for Ofsted
Esafety for Ofstedbellla33
 
NCE Presentation, Feb. 2015
NCE Presentation, Feb. 2015 NCE Presentation, Feb. 2015
NCE Presentation, Feb. 2015 emilyensign
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kittrtkaren
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Diana Benner
 
Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Diana Benner
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Diana Benner
 

Ähnlich wie NAESP Conference - July 12, 2014 (20)

Demystifying Student Data Privacy
Demystifying Student Data PrivacyDemystifying Student Data Privacy
Demystifying Student Data Privacy
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentation
 
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum
 
Electronic Security Issues for Schools
Electronic Security Issues for SchoolsElectronic Security Issues for Schools
Electronic Security Issues for Schools
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Esafety for Ofsted
Esafety for OfstedEsafety for Ofsted
Esafety for Ofsted
 
NCE Presentation, Feb. 2015
NCE Presentation, Feb. 2015 NCE Presentation, Feb. 2015
NCE Presentation, Feb. 2015
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kit
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016
 
Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15
 
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
 

Mehr von emilyensign

Wise Tech Choices June 27th Event
Wise Tech Choices June 27th EventWise Tech Choices June 27th Event
Wise Tech Choices June 27th Eventemilyensign
 
Building a Positive Online Reputation
Building a Positive Online ReputationBuilding a Positive Online Reputation
Building a Positive Online Reputationemilyensign
 
CETPA Presentation: Building A Successful BYOD Program
CETPA Presentation: Building A Successful BYOD ProgramCETPA Presentation: Building A Successful BYOD Program
CETPA Presentation: Building A Successful BYOD Programemilyensign
 
National Conference on Youth Cyber Safety
National Conference on Youth Cyber SafetyNational Conference on Youth Cyber Safety
National Conference on Youth Cyber Safetyemilyensign
 
Take Charge of Your Digital Life
Take Charge of Your Digital LifeTake Charge of Your Digital Life
Take Charge of Your Digital Lifeemilyensign
 
2nd Grade Class Presentation
2nd Grade Class Presentation 2nd Grade Class Presentation
2nd Grade Class Presentation emilyensign
 

Mehr von emilyensign (6)

Wise Tech Choices June 27th Event
Wise Tech Choices June 27th EventWise Tech Choices June 27th Event
Wise Tech Choices June 27th Event
 
Building a Positive Online Reputation
Building a Positive Online ReputationBuilding a Positive Online Reputation
Building a Positive Online Reputation
 
CETPA Presentation: Building A Successful BYOD Program
CETPA Presentation: Building A Successful BYOD ProgramCETPA Presentation: Building A Successful BYOD Program
CETPA Presentation: Building A Successful BYOD Program
 
National Conference on Youth Cyber Safety
National Conference on Youth Cyber SafetyNational Conference on Youth Cyber Safety
National Conference on Youth Cyber Safety
 
Take Charge of Your Digital Life
Take Charge of Your Digital LifeTake Charge of Your Digital Life
Take Charge of Your Digital Life
 
2nd Grade Class Presentation
2nd Grade Class Presentation 2nd Grade Class Presentation
2nd Grade Class Presentation
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

NAESP Conference - July 12, 2014

  • 1. TECHNOLOGY IN THE CLASSROOM: BUILDING A FOUNDATION FOR SUCCESS Nancy Gifford Senior Director of Law & Policy The Internet Keep Safe Coalition
  • 2. About iKeepSafe • a nonprofit, international alliance of more than 100 policy leaders, educators, law enforcement members, technology experts, public health experts and advocates. • Leader in research and tracking global trends and issues surrounding connected technology and their effect on children.
  • 3. iKeepSafe’s Mission To see generations of the world’s children grow up safely using technology and the internet.
  • 4. Technology in the Classroom: Building a Foundation for Success • Policies and Administrative Considerations to protect the privacy of student data • Core competencies for ethically and responsibly engaging with technology
  • 5. Elements of a Comprehensive Student Data Privacy Program • Identify and minimize risks of mishaps • Have clear polices that are kept up to date • Create an incident response plan • Train employees • Educate students and parents
  • 6. Identify Risks • Privacy Assessment • Establish an e-safety committee (or a subcommittee of your safety committee) • Dedicate a privacy point person (for offline and online information distribution)
  • 7. Elements of a Comprehensive Student Data Privacy Program • Identify and minimize risks of mishaps • Have clear polices that are kept up to date • Create an incident response plan • Train employees • Educate staff, students and parents
  • 8. CLEAR POLICIES AND PROCEDURES • Notice • Confidentiality and Disclosures • Security • Changes • Training
  • 9. Privacy Policies • Sharing personal data with 3rd parties • Use of technology: • School administrators use • Educator use • School websites
  • 10. Is my school compliant with all of the regulations around data sharing? • FERPA • COPAA • CIPA • PPRA • HIPPA • Applicable state laws • District Policies
  • 11. Family Educational Rights and Privacy Act • FERPA • mandates that schools must keep educational records confidential and that student data can only be used for educational purposes. Using student data to sell or market products is prohibited. • Changes are being considered (Sen. Markey)
  • 12. Children’s Online Privacy Protection Act • COPPA • Mandates operators of websites or online services directed to children obtain verifiable parental consent before collecting, using or disclosing personal info of children under 13 • School may provide consent in some circumstances
  • 13. Child Internet Protection Act • CIPA • Requires schools that use software or technology to block access to inappropriate materials • Safety education requirement • Tied to e-Rate Funding
  • 14. The Protection of Pupil Rights Act • PPRA • Protects the privacy of students in surveys, medical exams and marketing. • Has Opt-in and Opt-out requirements that schools must comply with.
  • 15. Elements of a Comprehensive Student Data Privacy Program • Identify and minimize risks of mishaps • Have clear polices that are kept up to date • Create an incident response plan • Train employees • Educate students and parents
  • 16. Incident Response Plan – Digital incident response plan • Cyberbullying • Sexting • Harassment – Data security breach response plan • Hacking • Accidental or negligent disclosures
  • 17. Civil Liberties The First Amendment • Balancing a robust expression of ideas while restricting those communications that invade others’ privacy, are defamatory, contribute to a hostile environment or otherwise cause harm.
  • 18. Civil Liberties The Fourth Amendment • Searching & seizing electronic Devices • BYOD, school-provided devices, cell phones, laptops, e-readers • What are your school policies around electronic devices?
  • 19. Elements of a Comprehensive Student Data Privacy Program • Identify and minimize risks of mishaps • Have clear polices that are kept up to date • Create an incident response plan • Train employees • Educate students and parents
  • 20. Training Elements of a training program: • Basic privacy awareness • Privacy rights & responsibilities • Data security • Online communication & social media • Electronic searches, surveillance, & access
  • 21. Elements of a Comprehensive Student Data Privacy Program • Identify and minimize risks of mishaps • Have clear polices that are kept up to date • Create an incident response plan • Train employees • Educate students and parents
  • 22. Educate Students and Parents • Clear policies • Clear process
  • 23. ROADMAP Download the Roadmap for Schools at: iKeepSafe.org/roadmap Or email: info@ikeepsafe.org
  • 25.
  • 26. At what age does cyberbullying start? . . . digital piracy (illegally downloading movies and music)?
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. BE a PRO The Free App for Parents

Hinweis der Redaktion

  1. Learning how to balance the time spent online and connected with all of life’s other activities a challenge in the digital age. But, it is important – spending too much time online can take away from real world experiences. Kids spend more time engaged with media than they do in any activity other than sleeping. Recent studies indicate, for instance, that 8 year olds spend as many hours engaged with various screens as they do in school and pre-schoolers are spending about 4 hours per day on media (TV, tablets, etc) The American Academy of Pediatrics (AAP) recommends limiting screen time to two hours per day and creating an “electronic media free” environment in children’s bedrooms. Setting limits and discussing the benefits of screen-free time is important. But equally important is the way adults behave. Research shows that adult behavior affects how youth conduct their online lives. So, it is important for us to be mindful of the message we are sending – are we looking at our phone while our kids are talking to us or while we are at the dinner table, for example. Achieving a healthy balance between all of our activities
  2. The online world is full of ethical decisions Should I upload or forward this unflattering picture of my friend; should I download this music even though I haven’t paid for it; While these questions are challenging for adults, imagine how tricky they are for young people who are still developing the cognitive skills required for ethical decision-making. By talking together with youth about plagiarism, piracy, hacking, being an up stander, we can help young people understand that consequences of decisions they make in the online environment.
  3. Understanding what personal information is safe to share online and what is not is a critical component of being digitally literate. 79% of teens think their friends share too much personal info online. (CSM STUDY) At an early age, it is important to discuss the difference between personal and public information As the child gets older, reinforcing that message is important along with explaining the nuances between public and private sharing. For example, starting the conversation in simple, nonjudgmental contexts (such as, “what is the best way to express to someone that you have a great vacation? Let’s talk about why someone might not want you to put that message (even when done with the best intentions) on their Facebook page. How about sending them a text? Or speaking with them on the phone?) Understanding the relationship between technology, personal privacy and being a responsible steward of information is extremely important.
  4. Today, young people connect emotionally on their digital devices. Any parent with a phone bill knows this is true – Teens send an average of 3400 texts per month! The really good news is that 70 percent of people worldwide say that the internet has improved their relationships. In addition, the vast majority of kids’ online relationships are with people they already know and in general, time spent online does not mean they are spending less face to face time with their friends. Social media, it turns out, actually facilitates offline interactions. But, occasionally unhealthy or even dangerous relationships can develop. In addition, the potential access to sexually explicit content can affect youths’ ability to form and maintain healthy relationships. Communicating with youth about how to use their digital communications to enhance their relationships while avoiding the risks.
  5. Everything we post online and everything that others post about us contributes to a digital reputation. It is important to help kids understand that everything online is persistent, searchable, replicable and can be viewed far beyond the intended audience. Helping youth understand that being vigilant about our online interactions is instrumental to developing a positive or negative reputation. And your online reputation matters. One study indicated that 70% of human resource professionals have rejected an applicant based on something they found online. One piece of advice we’ve found is that it is also important to not simply eschew digital technology because, that means any information about you is what others are saying. We want youth to be empowered to take control of their reputation. Want to be viewed as a serious academic? Blog about a math problem you are working on or a book you are reading; Want to be viewed as creative? Post your art; Take online art classes IKS wants to empower youth to take control of their reputation