SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
Whitepaper
Children’s Internet Protection Act




          Real-time Network Defense
Table of Contents
                          4    Overview
                          4        Web of Risks

                          4        Web of Risks Facts

                               4      Web Security Paradigm Shift

                          6    Dynamic Inspection
                          6        Accuracy

                          7        Scalability

                          7        Multilingual Filtering

                          8    Security vs. Productivity
                          8        Acceptable Use

                          8        Web Management

                          9    Summary




Real-tim e Netwo rk Defen se                                        3
Childrens’ Internet Protection Act
                     CIPA Guide
                     Background
                     The Children’s Internet Protection Act (CIPA) is a federal law enacted by Congress to
                     address concerns about access to offensive content over the Internet on school and library
                     computers. CIPA imposes certain types of requirements on any school or library that
                     receives funding for Internet access or internal connections from the E-rate program –
                     a program that makes certain communications technology more affordable for eligible
                     schools and libraries.

                     The Schools and Libraries Program of the Universal Service Fund, commonly known as
                     "E-Rate," is administered by the Universal Service Administrative Company (USAC) under
                     the direction of the Federal Communications Commission (FCC), and provides discounts
                     to assist most schools and libraries in the United States to obtain affordable
                     telecommunications and Internet access. It is one of four support programs funded
                     through a Universal Service fee charged to companies that provide interstate and/or
                     international telecommunications services.

                     The Schools and Libraries Program supports connectivity - the conduit or pipeline for
                     communications using telecommunications services and/or the Internet. Funding is
                     requested under four categories of service: telecommunications services, Internet access,
                     internal connections, and basic maintenance of internal connections. Discounts for support
                     depend on the level of poverty and the urban/rural status of the population served and
                     range from 20% to 90% of the costs of eligible services. Eligible schools, school districts and
                     libraries may apply individually or as part of a consortium.

                     Applicants must provide additional resources including end-user equipment (e.g.,
                     computers, telephones, etc.), software, professional development, and the other elements
                     that are necessary to utilize the connectivity funded by the Schools and Libraries Program.

                     Executive Summary
                     In homes, schools, and libraries across the nation, the Internet has become a valuable and
                     even critical tool for our children's success. Access to the Internet furnishes children with
                     new resources with which to learn, new avenues for expression, and new skills to obtain
                     quality jobs. Our children's access to the Internet, however, can put them in contact with
                     inappropriate and potentially harmful material. Some children inadvertently confront
                     pornography, indecent material, hate sites, and sites promoting violence, while other
                     children actively seek out inappropriate content. Additionally, through participation in chat
                     rooms and other interactive dialogues over the Internet, children can be vulnerable to online
                     predators.




Real-time Netwo rk Defense                                                                                           4
Parents and educators have access to a variety of tools that can help protect children from
                      these dangers. In October 2000, Congress passed the Children's Internet Protection Act
                      (CIPA), which requires schools and libraries that receive federal funds for discounted
                      telecommunications, Internet access, or internal connections services to adopt an Internet
                      safety policy and employ technological protections that block or filter certain visual
                      depictions deemed obscene, pornographic, or harmful to minors. Congress also requested
                      the Department of Commerce's National Telecommunications and Information
                      Administration (NTIA) to (1) evaluate whether the technology measures currently available
                      adequately address the needs of educational institutions, and (2) evaluate the development
                      and effectiveness of local Internet safety policies. Congress also invited any
                      recommendations from NTIA as to how to foster the development of measures that meet
                      these needs. This report sets forth NTIA's public outreach, including comments received
                      through a Request for Comment, its evaluation, and recommendations.

                      With respect to whether the technology measures currently available address the needs of
                      educational institutions, the commenters identified the following needs of educational
                      institutions:

                               •      balancing the importance of allowing children to use the Internet with the
                                      importance of protecting children from inappropriate material;

                               •   accessing online educational materials with a minimum level of relevant content
                               being blocked;
                               •      deciding on the local level how best to protect children from Internet dangers;

                               •      understanding how to fully utilize Internet protection technology measures;

                               •      considering a variety of technical, educational, and economic factors when
                                      selecting technology protection measures; and

                               •      adopting an Internet safety strategy that includes technology, human
                                      monitoring, and education.


                      Accordingly, NTIA makes the following two recommendations to Congress on how to foster
                      the use of technology protection measures to better meet the needs of educational
                      institutions:

                               •   Technology vendors should offer training services to educational institutions on
                               the specific features of their products.

                               •      CIPA's definition of "technology protection measure" should be expanded to
                                      include more than just blocking and filtering technology in order to encompass
                                      a vast array of current technological measures that protect children from
                                      inappropriate content.




Real-tim e Netwo rk Defen se                                                                                        5
What CIPA Requires
                             •    Schools and libraries subject to CIPA may not receive the discounts offered by
                                  the E-rate program unless they certify that they have an Internet safety policy
                                  that includes technology protection measures. The protection measures must
                                  block or filter Internet access to pictures that are: (a) obscene, (b) child
                                  pornography, or (c) harmful to minors (for computers that are accessed by
                                  minors). Before adopting this Internet safety policy, schools and libraries must
                                  provide reasonable notice and hold at least one public hearing or meeting to
                                  address the proposal.

                             •    Schools subject to CIPA are required to adopt and enforce a policy to monitor
                                  online activities of minors.

                             •   Schools and libraries subject to CIPA are required to adopt and implement an
                                 Internet safety policy addressing: (a) access by minors to inappropriate matter
                                 on the Internet; (b) the safety and security of minors when using electronic
                                 mail, chat rooms, and other forms of direct electronic communications; (c)
                                 unauthorized access, including so-called “hacking,” and other unlawful activities
                             by minors online; (d) unauthorized disclosure, use, and dissemination of
                             personal information regarding minors; and (e) measures restricting minors’
                                 access to materials harmful to them.

                             •    Schools and libraries are required to certify that they have their safety policies
                                  and technology in place before receiving E-rate funding.

                             •    CIPA does not affect E-rate funding for schools and libraries receiving
                                  discounts only for telecommunications, such as telephone service.

                             •    An authorized person may disable the blocking or filtering measure during any
                                  use by an adult to enable access for bona fide research or other lawful
                                  purposes.

                             •    CIPA does not require the tracking of Internet use by minors or adults.

                     Technology Protection Measure
                     The term “technology protection measure'' means a specific technology that blocks or
                     filters Internet access to visual depictions that;

                             A    obscene, as that term is defined in section 1460 of title 18, United States Code;
                                  http://www.fcc.gov/cgb/consumerfacts/cipa.html

                             B    child pornography, as that term is defined in section 2256 of title 18, United
                                  States Code; or

                             B    harmful to minors(for computers that are accessed by minors, under 17
                                  years of age).

                                  a.   Defined as any picture, image, graphic image file, or other visual depiction that
                                       i. taken as a whole and with respect to minors, appeals to a prurient
                                           interest in nudity, sex, or excretion;

                                       ii.   depicts, describes, or represents, in a patently offensive way with
                                             respect to what is suitable for minors, an actual or simulated sexual act
                                             or sexual contact, actual or simulated normal or perverted sexual acts,
                                             or a lewd exhibition of the genitals; and

                                       iii. taken as a whole, lacks serious literary, artistic, political, or scientific
                                            value as to minors.

Real-time Netwo rk Defense                                                                                                 6
Internet Safety Policy
                      The adoption of an “Internet Safety Policy” that addresses obscene, as that term is defined
                      in section 1460 of title 18, United States Code;

                               A   Technology protection measures (mentioned above.)

                               B   Access by minors to inappropriate matter, as determined by the school board,
                                   library board or administration.

                               C   The safety and security of minors when using electronic mail, chat rooms, and
                                   other forms of direct electronic communications.

                               D   Unauthorized access, including so-called “hacking,” and other unlawful activities
                                   by minors online.
                               E   Unauthorized disclosure, use, and dissemination of personal information
                                   regarding minors.
                               F   Restricting minors’ access to materials harmful to them (as defined above in
                                   Technology Protection Measure.)
                               G   Educating minors of appropriate online behavior, including cyberbullying
                                   awareness and response and interacting with other individuals on social
                                   networking sites and in chat rooms.
                               H   For schools only, a policy to monitor online activities of minors. This does not
                                   include the actual online tracking of Internet use by minors or adults.


                      CIPA Requirements Enabled by DeepNines Secure Web Gateway
                      DeepNines Secure Web Gateway enables organizations to easily protect, control and
                      manage Web applications and traffic with complete in-line visibility across all ports,
                      protocols and user identities. By unifying patented firewall, intrusion prevention, unified
                      threat prevention, and identity-based Web content and application security in a single
                      product, Secure Web Gateway solves the challenges of the Web by providing both
                      best-in-class security and performance. The Secure Web Gateway appliance uniquely
                      provides identity-based application control, proxy blocking, threat prevention, intrusion
                      prevention, bandwidth management, content filtering and data loss prevention across all
                      ports and protocols that performs at gigabit speeds. With all-inclusive and high-
                      performance Web security, Secure Web Gateway customers enjoy the lowest total cost of
                      ownership (TCO) in the industry by reducing hardware sprawl, point security products,
                      and bandwidth overhead. The Secure Web Gateway appliance provides powerful and
                      advanced administrative, monitoring and reporting tools in an easy-to-use user interface
                      that includes complete visibility of the entire network.




Real-tim e Netwo rk Defen se                                                                                        7
CIPA Requirement          Description                              Secure Web Gateway Solution
                     1 (a)(b)(c), 3(a)(c)(e)   Content filtering database of millions
                                                                                                    
                                               of URLs broken into categories


                                                                                                    
                     2                         Identification of where threats are
                                               coming from, both internally
                                               and externally

                                                                                                    
                     1(a)(b)(c), 3(a)(c)(e)    URL Whitelisting and Blacklisting
                                               options

                     1(c), 2, 3(a)(c)(e)       File Type blocking                                   

                                                                                                    
                     3 (b)                     Spam and Content filtering of
                                               email traffic

                     3(c)(d)                   Prevents keystroke logging and
                                                                                                    
                                               identity theft

                                                                                                    
                     1 (a)(b)(c), 3(a)(d)(e)   Monitoring Web traffic for malware
                                               and spyware

                                                                                                    
                     1 (a)(b)(c), 3(a)(d)(e)   Inspect traffic for malicious
                                               spyware activity

                                                                                                    
                     3 (c)(e)                  Examine inbound and outbound
                                               Spyware and Web browsing activities

                     3 (c)(e)                  Prevent new Spyware infections                       

                                                                                                    
                     3 (c)(e)                  Desktop/Server cleanup of Spyware
                                               /Malware infections

                                                                                                    
                     3 (c)(e)                  Block hacked, hijacked or otherwise
                                               compromised systems




Real-time Network Defense                                                                                         8
DeepNines Secure Web Gateway Key Features and Benefits
                        Feature                Benefit
                        Identity-based         Complete visibility and control of all Web users and Web usage
                        management

                        Virus and malware      Protection from today’s Web-based threats of viruses, phishing
                        protection             attacks, and all forms of malicious code

                        Content filtering      Granular policy enforcement for all websites and users with
                                               over 60 URL categories that enables organizations to allow or
                                               block access to websites for individuals, user groups, or globally

                        Integrated intrusion   Real-time identification and protection from complex attacks
                        prevention             by uniting behavioral and signature-based intrusion prevention
                                               (IPS) with deep packet inspection (DPI) across all ports and
                                               protocols

                        Web application        Identifies and classifies all Web applications for granular control of
                        control                Web-based tools and applications by user and policy to allow,
                                               block, limit or prioritize access to any Web application by user
                                               and/or group

                        Network bandwidth      Monitors and manages network traffic across all ports and
                        management             protocols enabling you to make informed decisions on access and
                                               control through traffic shaping, regulating applications, and
                                               consumption prioritization

                        Proxy blocking         Detects and prevents Web proxies and anonymizers that
                                               circumvent filtering and security solutions and make Web activity
                                               untraceable and vulnerable to attacks in real-time

                        Data loss prevention   Power to identify and protect against data leakage regardless of
                                               application, port or protocol in real-time with near-zero latency
                                               ensuring sensitive information, confidential assets, and
                                               inappropriate content remains private to eliminate violations with
                                               compliancy regulations, security practices and privacy policies
                        Centralized reporting Comprehensive, easy-to-use console for the DeepNines Secure and
                        administration        Web Gateway product that enables administrators to report and
                                              manage the system

                        Seamless integration   Effortlessly incorporate directory services including eDirectory, with
                        other solutions        Active Directory and Open Directory for the identification and
                                               management of users within the DeepNines Secure Web Gateway




Real-tim e Netwo rk Defen se                                                                                            9
References

                              •     FCC - Children’s Internet Protection Act
                                    http://www.fcc.gov/cgb/consumerfacts/cipa.html

                              •     You can find out more about CIPA or apply for E-rate funding by contacting
                                    the Universal Service Administrative Company’s (USAC) Schools and
                                    Libraries Division (SLD) at www.sl.universalservice.org.

                              •     CIPA Authorizing Legislation, CIPA Sec. 1703, page 457.
                                    Federal Register Notice.

                              •     Report to Congress, CIPA: Study of Technology Protection Measures in
                                    Section 1703, NTIA (Aug. 2003)

                              •     FCC Consumer Fact Sheet on CIPA
                                    http://www.fcc.gov/cgb/consumerfacts/cipa.html

                              •     USAC Discussion of CIPA Requirement
                                    http://www.usac.org/sl/applicants/step10/cipa.aspx

                              •     USAC CIPA FAQ http://www.sl.universalservice.org/reference/CIPAfaq.asp

                              •     Full CIPA Text http://ifea.net/cipa.html

                       Disclaimer
                       This document is intended to assist educators and administrators in education on CIPA
                       information. DeepNines Technologies, Inc. does not offer legal advice and cannot
                       guarantee the accuracy of this document. You should consult with an attorney
                       whenever you think it necessary.




Real-time Network Defense                                                                                    10
DeepNines_ProBlock_0909




14 6 4 3 Da lla s P ar k wa y , S ui te 15 0 |   D all as , T X 7 5 2 5 4 - 8 8 0 1 | t e l 2 1 4 .2 7 3 .6 996 |   e m ai l s al es @d e e p ni ne s . co m |   we b d ee p n ine s. c om

Copyright © 2009 DeepNines Technologies, Inc. All rights reserved. DeepNines, the DeepNines logo and DeepNines products of DeepNines Secure Web Gateway and DeepNines
features, technologies and product-lines are registered trademarks of DeepNines Technologies, Inc. All other trademarks are the property of DeepNines Technologies, Inc. or their
respective owners. While every effort is made to ensure the information given is accurate, DeepNines does not accept liability for any errors or mistakes which may arise.
Specifications and other information in this document may be subject to change without notice. DeepNines Data Sheet released 09, 2009. DeepNines is protected by US
Patents 6,930,978, 7,058,976 and 7,380,272.

Mais conteúdo relacionado

Mais procurados

Digital Citizenship and Its Applications in ELT
Digital Citizenship and Its Applications in ELTDigital Citizenship and Its Applications in ELT
Digital Citizenship and Its Applications in ELTasli lidice gokturk saglam
 
E Learning National Presentation Latest 25 Nov#2
E Learning National Presentation Latest  25 Nov#2E Learning National Presentation Latest  25 Nov#2
E Learning National Presentation Latest 25 Nov#2Godfrey Mwewa
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachNzeih Chukwuemeka
 
Responsible use of ict brief project report - feb 2011
Responsible use of ict   brief project report - feb 2011Responsible use of ict   brief project report - feb 2011
Responsible use of ict brief project report - feb 2011Mel Tan
 
Mobile Learning - City of Glasgow College - June2014
Mobile Learning - City of Glasgow College - June2014Mobile Learning - City of Glasgow College - June2014
Mobile Learning - City of Glasgow College - June2014Jisc Scotland
 
Dr bakari presentation
Dr bakari  presentationDr bakari  presentation
Dr bakari presentationmojtahedi
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomGabriella Maree Wheeler
 
Being safe online guidelines
Being safe online guidelinesBeing safe online guidelines
Being safe online guidelinesAVINASHRANJAN49
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterMark Moran
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentationgreti79
 
Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000nielson900
 
Identity, Ownership & Mobility - Graham Brown-Martin
Identity, Ownership & Mobility - Graham Brown-MartinIdentity, Ownership & Mobility - Graham Brown-Martin
Identity, Ownership & Mobility - Graham Brown-MartinHandheldLearning
 
Ict resource development
Ict resource developmentIct resource development
Ict resource developmentNisha Singh
 
Information and communication technology
Information and communication technologyInformation and communication technology
Information and communication technologyTamojit Das
 
Ict – information & communication technology
Ict – information & communication technologyIct – information & communication technology
Ict – information & communication technologyDerek Ramdatt
 

Mais procurados (18)

Digital Citizenship and Its Applications in ELT
Digital Citizenship and Its Applications in ELTDigital Citizenship and Its Applications in ELT
Digital Citizenship and Its Applications in ELT
 
E Learning National Presentation Latest 25 Nov#2
E Learning National Presentation Latest  25 Nov#2E Learning National Presentation Latest  25 Nov#2
E Learning National Presentation Latest 25 Nov#2
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
 
Responsible use of ict brief project report - feb 2011
Responsible use of ict   brief project report - feb 2011Responsible use of ict   brief project report - feb 2011
Responsible use of ict brief project report - feb 2011
 
Mobile Learning - City of Glasgow College - June2014
Mobile Learning - City of Glasgow College - June2014Mobile Learning - City of Glasgow College - June2014
Mobile Learning - City of Glasgow College - June2014
 
Cognitive Tools-qais
Cognitive Tools-qaisCognitive Tools-qais
Cognitive Tools-qais
 
Dr bakari presentation
Dr bakari  presentationDr bakari  presentation
Dr bakari presentation
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Ict Issues
Ict IssuesIct Issues
Ict Issues
 
Being safe online guidelines
Being safe online guidelinesBeing safe online guidelines
Being safe online guidelines
 
ICT Unit 1
ICT Unit 1ICT Unit 1
ICT Unit 1
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentation
 
Cipa history 2000
Cipa history 2000Cipa history 2000
Cipa history 2000
 
Identity, Ownership & Mobility - Graham Brown-Martin
Identity, Ownership & Mobility - Graham Brown-MartinIdentity, Ownership & Mobility - Graham Brown-Martin
Identity, Ownership & Mobility - Graham Brown-Martin
 
Ict resource development
Ict resource developmentIct resource development
Ict resource development
 
Information and communication technology
Information and communication technologyInformation and communication technology
Information and communication technology
 
Ict – information & communication technology
Ict – information & communication technologyIct – information & communication technology
Ict – information & communication technology
 

Destaque

Protection of children over the internet
Protection of children over the internetProtection of children over the internet
Protection of children over the internetCiaran Moran
 
Cyber safety m harrold
Cyber safety m harroldCyber safety m harrold
Cyber safety m harroldMegan
 
Fear of filtering the reality of internet content management cipa fcc consu...
Fear of filtering the reality of internet content management   cipa fcc consu...Fear of filtering the reality of internet content management   cipa fcc consu...
Fear of filtering the reality of internet content management cipa fcc consu...Nebraska Library Commission
 
Reliance on Social Media
Reliance on Social MediaReliance on Social Media
Reliance on Social MediaBlake Davies
 
Child Protection Policy & Bullying
Child Protection Policy & BullyingChild Protection Policy & Bullying
Child Protection Policy & BullyingRaffy Paller
 
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and RulesThe Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and RulesBPACofficial
 

Destaque (9)

Protection of children over the internet
Protection of children over the internetProtection of children over the internet
Protection of children over the internet
 
Cyber safety m harrold
Cyber safety m harroldCyber safety m harrold
Cyber safety m harrold
 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
 
Fear of filtering the reality of internet content management cipa fcc consu...
Fear of filtering the reality of internet content management   cipa fcc consu...Fear of filtering the reality of internet content management   cipa fcc consu...
Fear of filtering the reality of internet content management cipa fcc consu...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Reliance on Social Media
Reliance on Social MediaReliance on Social Media
Reliance on Social Media
 
Child Protection Policy & Bullying
Child Protection Policy & BullyingChild Protection Policy & Bullying
Child Protection Policy & Bullying
 
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and RulesThe Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
The Protection of Children from Sexual Offences (POCSO) Act, 2012 and Rules
 
Child protection policy
Child protection policyChild protection policy
Child protection policy
 

Semelhante a DeepNines CIPA Whitepaper

CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance InformationTũi Wichets
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionKrishna De
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in EducationBloxx
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBloxx
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in EducationBloxx
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyCTIC Technology Centre
 
ACOP - Safer Cyber Space for Children - final
ACOP - Safer Cyber Space for Children - finalACOP - Safer Cyber Space for Children - final
ACOP - Safer Cyber Space for Children - finalMercy Wanjau
 
Final project CMT- digital learning program for children in Kenya
Final project   CMT- digital learning program for children in KenyaFinal project   CMT- digital learning program for children in Kenya
Final project CMT- digital learning program for children in KenyaSarah Osiemo
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your schoolJune Wall
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
 

Semelhante a DeepNines CIPA Whitepaper (20)

CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance Information
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
GROUP-1 (1).pdf
GROUP-1 (1).pdfGROUP-1 (1).pdf
GROUP-1 (1).pdf
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
Pat manson
Pat mansonPat manson
Pat manson
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
 
ACOP - Safer Cyber Space for Children - final
ACOP - Safer Cyber Space for Children - finalACOP - Safer Cyber Space for Children - final
ACOP - Safer Cyber Space for Children - final
 
Final project CMT- digital learning program for children in Kenya
Final project   CMT- digital learning program for children in KenyaFinal project   CMT- digital learning program for children in Kenya
Final project CMT- digital learning program for children in Kenya
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 

Último

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Último (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

DeepNines CIPA Whitepaper

  • 1. Whitepaper Children’s Internet Protection Act Real-time Network Defense
  • 2. Table of Contents 4 Overview 4 Web of Risks 4 Web of Risks Facts 4 Web Security Paradigm Shift 6 Dynamic Inspection 6 Accuracy 7 Scalability 7 Multilingual Filtering 8 Security vs. Productivity 8 Acceptable Use 8 Web Management 9 Summary Real-tim e Netwo rk Defen se 3
  • 3. Childrens’ Internet Protection Act CIPA Guide Background The Children’s Internet Protection Act (CIPA) is a federal law enacted by Congress to address concerns about access to offensive content over the Internet on school and library computers. CIPA imposes certain types of requirements on any school or library that receives funding for Internet access or internal connections from the E-rate program – a program that makes certain communications technology more affordable for eligible schools and libraries. The Schools and Libraries Program of the Universal Service Fund, commonly known as "E-Rate," is administered by the Universal Service Administrative Company (USAC) under the direction of the Federal Communications Commission (FCC), and provides discounts to assist most schools and libraries in the United States to obtain affordable telecommunications and Internet access. It is one of four support programs funded through a Universal Service fee charged to companies that provide interstate and/or international telecommunications services. The Schools and Libraries Program supports connectivity - the conduit or pipeline for communications using telecommunications services and/or the Internet. Funding is requested under four categories of service: telecommunications services, Internet access, internal connections, and basic maintenance of internal connections. Discounts for support depend on the level of poverty and the urban/rural status of the population served and range from 20% to 90% of the costs of eligible services. Eligible schools, school districts and libraries may apply individually or as part of a consortium. Applicants must provide additional resources including end-user equipment (e.g., computers, telephones, etc.), software, professional development, and the other elements that are necessary to utilize the connectivity funded by the Schools and Libraries Program. Executive Summary In homes, schools, and libraries across the nation, the Internet has become a valuable and even critical tool for our children's success. Access to the Internet furnishes children with new resources with which to learn, new avenues for expression, and new skills to obtain quality jobs. Our children's access to the Internet, however, can put them in contact with inappropriate and potentially harmful material. Some children inadvertently confront pornography, indecent material, hate sites, and sites promoting violence, while other children actively seek out inappropriate content. Additionally, through participation in chat rooms and other interactive dialogues over the Internet, children can be vulnerable to online predators. Real-time Netwo rk Defense 4
  • 4. Parents and educators have access to a variety of tools that can help protect children from these dangers. In October 2000, Congress passed the Children's Internet Protection Act (CIPA), which requires schools and libraries that receive federal funds for discounted telecommunications, Internet access, or internal connections services to adopt an Internet safety policy and employ technological protections that block or filter certain visual depictions deemed obscene, pornographic, or harmful to minors. Congress also requested the Department of Commerce's National Telecommunications and Information Administration (NTIA) to (1) evaluate whether the technology measures currently available adequately address the needs of educational institutions, and (2) evaluate the development and effectiveness of local Internet safety policies. Congress also invited any recommendations from NTIA as to how to foster the development of measures that meet these needs. This report sets forth NTIA's public outreach, including comments received through a Request for Comment, its evaluation, and recommendations. With respect to whether the technology measures currently available address the needs of educational institutions, the commenters identified the following needs of educational institutions: • balancing the importance of allowing children to use the Internet with the importance of protecting children from inappropriate material; • accessing online educational materials with a minimum level of relevant content being blocked; • deciding on the local level how best to protect children from Internet dangers; • understanding how to fully utilize Internet protection technology measures; • considering a variety of technical, educational, and economic factors when selecting technology protection measures; and • adopting an Internet safety strategy that includes technology, human monitoring, and education. Accordingly, NTIA makes the following two recommendations to Congress on how to foster the use of technology protection measures to better meet the needs of educational institutions: • Technology vendors should offer training services to educational institutions on the specific features of their products. • CIPA's definition of "technology protection measure" should be expanded to include more than just blocking and filtering technology in order to encompass a vast array of current technological measures that protect children from inappropriate content. Real-tim e Netwo rk Defen se 5
  • 5. What CIPA Requires • Schools and libraries subject to CIPA may not receive the discounts offered by the E-rate program unless they certify that they have an Internet safety policy that includes technology protection measures. The protection measures must block or filter Internet access to pictures that are: (a) obscene, (b) child pornography, or (c) harmful to minors (for computers that are accessed by minors). Before adopting this Internet safety policy, schools and libraries must provide reasonable notice and hold at least one public hearing or meeting to address the proposal. • Schools subject to CIPA are required to adopt and enforce a policy to monitor online activities of minors. • Schools and libraries subject to CIPA are required to adopt and implement an Internet safety policy addressing: (a) access by minors to inappropriate matter on the Internet; (b) the safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications; (c) unauthorized access, including so-called “hacking,” and other unlawful activities by minors online; (d) unauthorized disclosure, use, and dissemination of personal information regarding minors; and (e) measures restricting minors’ access to materials harmful to them. • Schools and libraries are required to certify that they have their safety policies and technology in place before receiving E-rate funding. • CIPA does not affect E-rate funding for schools and libraries receiving discounts only for telecommunications, such as telephone service. • An authorized person may disable the blocking or filtering measure during any use by an adult to enable access for bona fide research or other lawful purposes. • CIPA does not require the tracking of Internet use by minors or adults. Technology Protection Measure The term “technology protection measure'' means a specific technology that blocks or filters Internet access to visual depictions that; A obscene, as that term is defined in section 1460 of title 18, United States Code; http://www.fcc.gov/cgb/consumerfacts/cipa.html B child pornography, as that term is defined in section 2256 of title 18, United States Code; or B harmful to minors(for computers that are accessed by minors, under 17 years of age). a. Defined as any picture, image, graphic image file, or other visual depiction that i. taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion; ii. depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; and iii. taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors. Real-time Netwo rk Defense 6
  • 6. Internet Safety Policy The adoption of an “Internet Safety Policy” that addresses obscene, as that term is defined in section 1460 of title 18, United States Code; A Technology protection measures (mentioned above.) B Access by minors to inappropriate matter, as determined by the school board, library board or administration. C The safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications. D Unauthorized access, including so-called “hacking,” and other unlawful activities by minors online. E Unauthorized disclosure, use, and dissemination of personal information regarding minors. F Restricting minors’ access to materials harmful to them (as defined above in Technology Protection Measure.) G Educating minors of appropriate online behavior, including cyberbullying awareness and response and interacting with other individuals on social networking sites and in chat rooms. H For schools only, a policy to monitor online activities of minors. This does not include the actual online tracking of Internet use by minors or adults. CIPA Requirements Enabled by DeepNines Secure Web Gateway DeepNines Secure Web Gateway enables organizations to easily protect, control and manage Web applications and traffic with complete in-line visibility across all ports, protocols and user identities. By unifying patented firewall, intrusion prevention, unified threat prevention, and identity-based Web content and application security in a single product, Secure Web Gateway solves the challenges of the Web by providing both best-in-class security and performance. The Secure Web Gateway appliance uniquely provides identity-based application control, proxy blocking, threat prevention, intrusion prevention, bandwidth management, content filtering and data loss prevention across all ports and protocols that performs at gigabit speeds. With all-inclusive and high- performance Web security, Secure Web Gateway customers enjoy the lowest total cost of ownership (TCO) in the industry by reducing hardware sprawl, point security products, and bandwidth overhead. The Secure Web Gateway appliance provides powerful and advanced administrative, monitoring and reporting tools in an easy-to-use user interface that includes complete visibility of the entire network. Real-tim e Netwo rk Defen se 7
  • 7. CIPA Requirement Description Secure Web Gateway Solution 1 (a)(b)(c), 3(a)(c)(e) Content filtering database of millions of URLs broken into categories 2 Identification of where threats are coming from, both internally and externally 1(a)(b)(c), 3(a)(c)(e) URL Whitelisting and Blacklisting options 1(c), 2, 3(a)(c)(e) File Type blocking 3 (b) Spam and Content filtering of email traffic 3(c)(d) Prevents keystroke logging and identity theft 1 (a)(b)(c), 3(a)(d)(e) Monitoring Web traffic for malware and spyware 1 (a)(b)(c), 3(a)(d)(e) Inspect traffic for malicious spyware activity 3 (c)(e) Examine inbound and outbound Spyware and Web browsing activities 3 (c)(e) Prevent new Spyware infections 3 (c)(e) Desktop/Server cleanup of Spyware /Malware infections 3 (c)(e) Block hacked, hijacked or otherwise compromised systems Real-time Network Defense 8
  • 8. DeepNines Secure Web Gateway Key Features and Benefits Feature Benefit Identity-based Complete visibility and control of all Web users and Web usage management Virus and malware Protection from today’s Web-based threats of viruses, phishing protection attacks, and all forms of malicious code Content filtering Granular policy enforcement for all websites and users with over 60 URL categories that enables organizations to allow or block access to websites for individuals, user groups, or globally Integrated intrusion Real-time identification and protection from complex attacks prevention by uniting behavioral and signature-based intrusion prevention (IPS) with deep packet inspection (DPI) across all ports and protocols Web application Identifies and classifies all Web applications for granular control of control Web-based tools and applications by user and policy to allow, block, limit or prioritize access to any Web application by user and/or group Network bandwidth Monitors and manages network traffic across all ports and management protocols enabling you to make informed decisions on access and control through traffic shaping, regulating applications, and consumption prioritization Proxy blocking Detects and prevents Web proxies and anonymizers that circumvent filtering and security solutions and make Web activity untraceable and vulnerable to attacks in real-time Data loss prevention Power to identify and protect against data leakage regardless of application, port or protocol in real-time with near-zero latency ensuring sensitive information, confidential assets, and inappropriate content remains private to eliminate violations with compliancy regulations, security practices and privacy policies Centralized reporting Comprehensive, easy-to-use console for the DeepNines Secure and administration Web Gateway product that enables administrators to report and manage the system Seamless integration Effortlessly incorporate directory services including eDirectory, with other solutions Active Directory and Open Directory for the identification and management of users within the DeepNines Secure Web Gateway Real-tim e Netwo rk Defen se 9
  • 9. References • FCC - Children’s Internet Protection Act http://www.fcc.gov/cgb/consumerfacts/cipa.html • You can find out more about CIPA or apply for E-rate funding by contacting the Universal Service Administrative Company’s (USAC) Schools and Libraries Division (SLD) at www.sl.universalservice.org. • CIPA Authorizing Legislation, CIPA Sec. 1703, page 457. Federal Register Notice. • Report to Congress, CIPA: Study of Technology Protection Measures in Section 1703, NTIA (Aug. 2003) • FCC Consumer Fact Sheet on CIPA http://www.fcc.gov/cgb/consumerfacts/cipa.html • USAC Discussion of CIPA Requirement http://www.usac.org/sl/applicants/step10/cipa.aspx • USAC CIPA FAQ http://www.sl.universalservice.org/reference/CIPAfaq.asp • Full CIPA Text http://ifea.net/cipa.html Disclaimer This document is intended to assist educators and administrators in education on CIPA information. DeepNines Technologies, Inc. does not offer legal advice and cannot guarantee the accuracy of this document. You should consult with an attorney whenever you think it necessary. Real-time Network Defense 10
  • 10. DeepNines_ProBlock_0909 14 6 4 3 Da lla s P ar k wa y , S ui te 15 0 | D all as , T X 7 5 2 5 4 - 8 8 0 1 | t e l 2 1 4 .2 7 3 .6 996 | e m ai l s al es @d e e p ni ne s . co m | we b d ee p n ine s. c om Copyright © 2009 DeepNines Technologies, Inc. All rights reserved. DeepNines, the DeepNines logo and DeepNines products of DeepNines Secure Web Gateway and DeepNines features, technologies and product-lines are registered trademarks of DeepNines Technologies, Inc. All other trademarks are the property of DeepNines Technologies, Inc. or their respective owners. While every effort is made to ensure the information given is accurate, DeepNines does not accept liability for any errors or mistakes which may arise. Specifications and other information in this document may be subject to change without notice. DeepNines Data Sheet released 09, 2009. DeepNines is protected by US Patents 6,930,978, 7,058,976 and 7,380,272.