SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Rules, Guidelines and
Expectations
0What is the acceptable and appropriate
use of internet in schools?
0What is to be expected?
0What boundaries are already in place
and what needs to be changed in order
to make a legal, safe and ethical online
environment?
Cyber Ethics
0IKeepSafe (2013) states that students must
do/be the following to be legally and ethically
safe. “Students recognize and practice
responsible and appropriate use while accessing,
using, collaborating, and creating technology,
technology systems, digital media and
information technology. Students demonstrate
an understanding of current ethical and legal
standards, rights and restrictions governing
technology, technology systems, digital media
and information technology within the context of
today’s society.”
What do we, as educators,
need to do?
0 Provide guidance for students and “teach our students
to safely and ethically use their digital devices in the
classroom–and throughout their communities”
(IKeepSafe, 2013).
0 Exhibit Ethical, Safe and Legal behaviour as role
models for our students.
0 Inform students and continue to support them on
their journey to understanding their new roles in the
classroom and community.
IkeepSafe offers a new game for students
to learn about issues such as music piracy.
“Faux Paw the Websurfing Techno Cat series has been created by a team of leading child
psychologists, educators, and law enforcement. This engaging curriculum—complete with
books, animated DVDs, and lesson plans—will captivate the attention of your students
and teach them how to appropriately conduct themselves online and in the digital space.“
(IKeepSafe, 2013).
Children’s Internet
Protection Act (CIPA)
0 The Children's Internet Protection Act (CIPA) is a federal law
that addresses concerns about access in schools and libraries
to the Internet and other information.
0 “The Children’s Internet Protection Act (CIPA) was enacted by
Congress in 2000 to address concerns about children’s access
to obscene or harmful content over the Internet. CIPA imposes
certain requirements on schools or libraries that receive
discounts for Internet access or internal connections through
the E-rate program – a program that makes certain
communications services and products more affordable for
eligible schools and libraries” (F.C.C., 2013)
Websense
0 Websense helps schools to comply with the CIPA through:
0 “Obscenity and Pornography Filtering – Allows schools and libraries
to manage Internet access to over 90 URL categories including Racism
and Hate, Adult Material, Hacking and other topics pertinent to CIPA.
0 Best-of-Breed Web Filtering – The most accurate and up-to-date
filtering database with over 36 million URLs.
0 Filtering of Search Engine Images – Use safe-search to filter
inappropriate images that can be found in search engine query results.
0 Blocking of Spyware, Malicious Mobile Code, and Other Security
Threats – Sites with worms, spyware, phishing, and other threats can
be blocked, helping to meet The CIPA requirements for protection of a
minor's personal information.
0 Monitoring – Reporting Tools offer many different ways to monitor and
report on the online activities of minors.
0 Policy Management Per User or Per Group – Schools and libraries
can customize their Internet policies based on users or groups, so
policies can be set based on age or needs. “
What do we, as educations,
need to do?
0 We need to do some simple research. It’s not hard.
0 We need to follow everything in the CIPA’s rules and guidelines.
We need to follow the school’s policy and enforce it for
students.
0 WHAT CAN WE DO?
0 We can use resources such as games! We can get the students
to reserch internet safety and the ethical use of the internet.
They can do up their own presentations and present them to
the class, maybe even work in groups
0 MAKE IT FUN!
References
0 Federal Communications Commission, 2013, ‘Children’s
Internet Protection Act’, ONLINE, Available at:
http://www.fcc.gov/guides/childrens-internet-protection-
act, Accessed 22/08/13.
0 IKeepSafe, 2013, Cyber-Ethics, ONLINE, Available at:
http://www.ikeepsafe.org/, Accessed 22/08/13.
0 Websense, Education K-12, 2013, ONLINE, Available at:
http://www.websense.com/content/Regional/Australia/347
5.aspx, Accessed 22/08/13.

Weitere ähnliche Inhalte

Was ist angesagt?

Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations121487
 
Tpack as a framework for technology driven teaching and
Tpack as a framework for technology driven teaching andTpack as a framework for technology driven teaching and
Tpack as a framework for technology driven teaching anderwin marlon sario
 
Basic Principles of Teaching and Educational Technology (4, 5, 6)
Basic Principles of Teaching and Educational Technology (4, 5, 6)Basic Principles of Teaching and Educational Technology (4, 5, 6)
Basic Principles of Teaching and Educational Technology (4, 5, 6)Patrickpaulmanalansan
 
Intellectual Property Rights on the Development and Use of Digital Materials
Intellectual Property Rights on the Development and Use of Digital MaterialsIntellectual Property Rights on the Development and Use of Digital Materials
Intellectual Property Rights on the Development and Use of Digital MaterialsIra Sagu
 
ICT and Assessment of Learning
ICT and Assessment of LearningICT and Assessment of Learning
ICT and Assessment of LearningIra Sagu
 
The ASSURE Model
The ASSURE ModelThe ASSURE Model
The ASSURE ModelIra Sagu
 
Lesson 6 cone of experience
Lesson 6   cone of experienceLesson 6   cone of experience
Lesson 6 cone of experienceLeeboy Morales
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipJOE3210
 
Media, technology, and learning
Media, technology, and learningMedia, technology, and learning
Media, technology, and learningArgie Mabag
 
Unit III: Theories and principles in the use of design of technology driven l...
Unit III: Theories and principles in the use of design of technology driven l...Unit III: Theories and principles in the use of design of technology driven l...
Unit III: Theories and principles in the use of design of technology driven l...CzarinaBercarce1
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpointJannahAboulhassan
 
TPACK as a Framework for Technology Driven Teaching and Learning
TPACK as a Framework for Technology Driven Teaching and LearningTPACK as a Framework for Technology Driven Teaching and Learning
TPACK as a Framework for Technology Driven Teaching and LearningIra Sagu
 
ICT Policies and Issues.pdf
ICT Policies and Issues.pdfICT Policies and Issues.pdf
ICT Policies and Issues.pdfShieAnneGarcia
 
Lesson 2: Technology; Boon or bane
Lesson 2: Technology; Boon or baneLesson 2: Technology; Boon or bane
Lesson 2: Technology; Boon or banerenalyn espinola
 
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxLesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxJermaine Mendoza
 

Was ist angesagt? (20)

Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations
 
Tpack as a framework for technology driven teaching and
Tpack as a framework for technology driven teaching andTpack as a framework for technology driven teaching and
Tpack as a framework for technology driven teaching and
 
Basic Principles of Teaching and Educational Technology (4, 5, 6)
Basic Principles of Teaching and Educational Technology (4, 5, 6)Basic Principles of Teaching and Educational Technology (4, 5, 6)
Basic Principles of Teaching and Educational Technology (4, 5, 6)
 
ASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINTASSURE MODEL POWERPOINT
ASSURE MODEL POWERPOINT
 
Intellectual Property Rights on the Development and Use of Digital Materials
Intellectual Property Rights on the Development and Use of Digital MaterialsIntellectual Property Rights on the Development and Use of Digital Materials
Intellectual Property Rights on the Development and Use of Digital Materials
 
ICT and Assessment of Learning
ICT and Assessment of LearningICT and Assessment of Learning
ICT and Assessment of Learning
 
The ASSURE Model
The ASSURE ModelThe ASSURE Model
The ASSURE Model
 
Lesson 6 cone of experience
Lesson 6   cone of experienceLesson 6   cone of experience
Lesson 6 cone of experience
 
Tpack model
Tpack modelTpack model
Tpack model
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
SAMR Model
SAMR ModelSAMR Model
SAMR Model
 
Educational technology 1
Educational technology 1Educational technology 1
Educational technology 1
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Media, technology, and learning
Media, technology, and learningMedia, technology, and learning
Media, technology, and learning
 
Unit III: Theories and principles in the use of design of technology driven l...
Unit III: Theories and principles in the use of design of technology driven l...Unit III: Theories and principles in the use of design of technology driven l...
Unit III: Theories and principles in the use of design of technology driven l...
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
TPACK as a Framework for Technology Driven Teaching and Learning
TPACK as a Framework for Technology Driven Teaching and LearningTPACK as a Framework for Technology Driven Teaching and Learning
TPACK as a Framework for Technology Driven Teaching and Learning
 
ICT Policies and Issues.pdf
ICT Policies and Issues.pdfICT Policies and Issues.pdf
ICT Policies and Issues.pdf
 
Lesson 2: Technology; Boon or bane
Lesson 2: Technology; Boon or baneLesson 2: Technology; Boon or bane
Lesson 2: Technology; Boon or bane
 
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptxLesson 1 - Introduction to Technology for Teaching and Learning.pptx
Lesson 1 - Introduction to Technology for Teaching and Learning.pptx
 

Andere mochten auch

Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalejl2
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Four Steps to a Perfect Assignment/ Oral
Four Steps to a Perfect Assignment/ OralFour Steps to a Perfect Assignment/ Oral
Four Steps to a Perfect Assignment/ OralGabriella Maree Wheeler
 
Evaluation of educational technology and its current application
Evaluation of educational technology and its current applicationEvaluation of educational technology and its current application
Evaluation of educational technology and its current applicationRhoda malazarte
 

Andere mochten auch (6)

Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point final
 
Software theft
Software theftSoftware theft
Software theft
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Four Steps to a Perfect Assignment/ Oral
Four Steps to a Perfect Assignment/ OralFour Steps to a Perfect Assignment/ Oral
Four Steps to a Perfect Assignment/ Oral
 
Assistive Technology
Assistive TechnologyAssistive Technology
Assistive Technology
 
Evaluation of educational technology and its current application
Evaluation of educational technology and its current applicationEvaluation of educational technology and its current application
Evaluation of educational technology and its current application
 

Ähnlich wie The legal, safe and ethical use of technology in the classroom

Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331Dana Nunnery
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizensStaci Trekles
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your schoolJune Wall
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentationgblessin
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipggfg123
 
Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Webteach42
 
Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Jerry Sakala
 

Ähnlich wie The legal, safe and ethical use of technology in the classroom (20)

Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Group5 ka part vi
Group5 ka part viGroup5 ka part vi
Group5 ka part vi
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Web
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Resources
ResourcesResources
Resources
 

Kürzlich hochgeladen

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

The legal, safe and ethical use of technology in the classroom

  • 1.
  • 2. Rules, Guidelines and Expectations 0What is the acceptable and appropriate use of internet in schools? 0What is to be expected? 0What boundaries are already in place and what needs to be changed in order to make a legal, safe and ethical online environment?
  • 3. Cyber Ethics 0IKeepSafe (2013) states that students must do/be the following to be legally and ethically safe. “Students recognize and practice responsible and appropriate use while accessing, using, collaborating, and creating technology, technology systems, digital media and information technology. Students demonstrate an understanding of current ethical and legal standards, rights and restrictions governing technology, technology systems, digital media and information technology within the context of today’s society.”
  • 4. What do we, as educators, need to do? 0 Provide guidance for students and “teach our students to safely and ethically use their digital devices in the classroom–and throughout their communities” (IKeepSafe, 2013). 0 Exhibit Ethical, Safe and Legal behaviour as role models for our students. 0 Inform students and continue to support them on their journey to understanding their new roles in the classroom and community.
  • 5. IkeepSafe offers a new game for students to learn about issues such as music piracy. “Faux Paw the Websurfing Techno Cat series has been created by a team of leading child psychologists, educators, and law enforcement. This engaging curriculum—complete with books, animated DVDs, and lesson plans—will captivate the attention of your students and teach them how to appropriately conduct themselves online and in the digital space.“ (IKeepSafe, 2013).
  • 6. Children’s Internet Protection Act (CIPA) 0 The Children's Internet Protection Act (CIPA) is a federal law that addresses concerns about access in schools and libraries to the Internet and other information. 0 “The Children’s Internet Protection Act (CIPA) was enacted by Congress in 2000 to address concerns about children’s access to obscene or harmful content over the Internet. CIPA imposes certain requirements on schools or libraries that receive discounts for Internet access or internal connections through the E-rate program – a program that makes certain communications services and products more affordable for eligible schools and libraries” (F.C.C., 2013)
  • 7.
  • 8. Websense 0 Websense helps schools to comply with the CIPA through: 0 “Obscenity and Pornography Filtering – Allows schools and libraries to manage Internet access to over 90 URL categories including Racism and Hate, Adult Material, Hacking and other topics pertinent to CIPA. 0 Best-of-Breed Web Filtering – The most accurate and up-to-date filtering database with over 36 million URLs. 0 Filtering of Search Engine Images – Use safe-search to filter inappropriate images that can be found in search engine query results. 0 Blocking of Spyware, Malicious Mobile Code, and Other Security Threats – Sites with worms, spyware, phishing, and other threats can be blocked, helping to meet The CIPA requirements for protection of a minor's personal information. 0 Monitoring – Reporting Tools offer many different ways to monitor and report on the online activities of minors. 0 Policy Management Per User or Per Group – Schools and libraries can customize their Internet policies based on users or groups, so policies can be set based on age or needs. “
  • 9. What do we, as educations, need to do? 0 We need to do some simple research. It’s not hard. 0 We need to follow everything in the CIPA’s rules and guidelines. We need to follow the school’s policy and enforce it for students. 0 WHAT CAN WE DO? 0 We can use resources such as games! We can get the students to reserch internet safety and the ethical use of the internet. They can do up their own presentations and present them to the class, maybe even work in groups 0 MAKE IT FUN!
  • 10. References 0 Federal Communications Commission, 2013, ‘Children’s Internet Protection Act’, ONLINE, Available at: http://www.fcc.gov/guides/childrens-internet-protection- act, Accessed 22/08/13. 0 IKeepSafe, 2013, Cyber-Ethics, ONLINE, Available at: http://www.ikeepsafe.org/, Accessed 22/08/13. 0 Websense, Education K-12, 2013, ONLINE, Available at: http://www.websense.com/content/Regional/Australia/347 5.aspx, Accessed 22/08/13.