SlideShare uma empresa Scribd logo
1 de 10
Rules, Guidelines and
Expectations
0What is the acceptable and appropriate
use of internet in schools?
0What is to be expected?
0What boundaries are already in place
and what needs to be changed in order
to make a legal, safe and ethical online
environment?
Cyber Ethics
0IKeepSafe (2013) states that students must
do/be the following to be legally and ethically
safe. “Students recognize and practice
responsible and appropriate use while accessing,
using, collaborating, and creating technology,
technology systems, digital media and
information technology. Students demonstrate
an understanding of current ethical and legal
standards, rights and restrictions governing
technology, technology systems, digital media
and information technology within the context of
today’s society.”
What do we, as educators,
need to do?
0 Provide guidance for students and “teach our students
to safely and ethically use their digital devices in the
classroom–and throughout their communities”
(IKeepSafe, 2013).
0 Exhibit Ethical, Safe and Legal behaviour as role
models for our students.
0 Inform students and continue to support them on
their journey to understanding their new roles in the
classroom and community.
IkeepSafe offers a new game for students
to learn about issues such as music piracy.
“Faux Paw the Websurfing Techno Cat series has been created by a team of leading child
psychologists, educators, and law enforcement. This engaging curriculum—complete with
books, animated DVDs, and lesson plans—will captivate the attention of your students
and teach them how to appropriately conduct themselves online and in the digital space.“
(IKeepSafe, 2013).
Children’s Internet
Protection Act (CIPA)
0 The Children's Internet Protection Act (CIPA) is a federal law
that addresses concerns about access in schools and libraries
to the Internet and other information.
0 “The Children’s Internet Protection Act (CIPA) was enacted by
Congress in 2000 to address concerns about children’s access
to obscene or harmful content over the Internet. CIPA imposes
certain requirements on schools or libraries that receive
discounts for Internet access or internal connections through
the E-rate program – a program that makes certain
communications services and products more affordable for
eligible schools and libraries” (F.C.C., 2013)
Websense
0 Websense helps schools to comply with the CIPA through:
0 “Obscenity and Pornography Filtering – Allows schools and libraries
to manage Internet access to over 90 URL categories including Racism
and Hate, Adult Material, Hacking and other topics pertinent to CIPA.
0 Best-of-Breed Web Filtering – The most accurate and up-to-date
filtering database with over 36 million URLs.
0 Filtering of Search Engine Images – Use safe-search to filter
inappropriate images that can be found in search engine query results.
0 Blocking of Spyware, Malicious Mobile Code, and Other Security
Threats – Sites with worms, spyware, phishing, and other threats can
be blocked, helping to meet The CIPA requirements for protection of a
minor's personal information.
0 Monitoring – Reporting Tools offer many different ways to monitor and
report on the online activities of minors.
0 Policy Management Per User or Per Group – Schools and libraries
can customize their Internet policies based on users or groups, so
policies can be set based on age or needs. “
What do we, as educations,
need to do?
0 We need to do some simple research. It’s not hard.
0 We need to follow everything in the CIPA’s rules and guidelines.
We need to follow the school’s policy and enforce it for
students.
0 WHAT CAN WE DO?
0 We can use resources such as games! We can get the students
to reserch internet safety and the ethical use of the internet.
They can do up their own presentations and present them to
the class, maybe even work in groups
0 MAKE IT FUN!
References
0 Federal Communications Commission, 2013, ‘Children’s
Internet Protection Act’, ONLINE, Available at:
http://www.fcc.gov/guides/childrens-internet-protection-
act, Accessed 22/08/13.
0 IKeepSafe, 2013, Cyber-Ethics, ONLINE, Available at:
http://www.ikeepsafe.org/, Accessed 22/08/13.
0 Websense, Education K-12, 2013, ONLINE, Available at:
http://www.websense.com/content/Regional/Australia/347
5.aspx, Accessed 22/08/13.

Mais conteúdo relacionado

Mais procurados

Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
sappingtonkr
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
Mrs.Faust
 
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULESSAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
NethBataller1
 

Mais procurados (20)

Understanding the Basic Concept in ICT
Understanding the Basic Concept in ICTUnderstanding the Basic Concept in ICT
Understanding the Basic Concept in ICT
 
ICT in Education
ICT in EducationICT in Education
ICT in Education
 
THE FLEXIBLE LEARNING ENVIRONMENT: Part I
THE FLEXIBLE LEARNING ENVIRONMENT: Part ITHE FLEXIBLE LEARNING ENVIRONMENT: Part I
THE FLEXIBLE LEARNING ENVIRONMENT: Part I
 
Technology in Teaching and Learning
Technology in Teaching and LearningTechnology in Teaching and Learning
Technology in Teaching and Learning
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
TTL-1 Module 2 lesson 1
TTL-1 Module 2  lesson 1TTL-1 Module 2  lesson 1
TTL-1 Module 2 lesson 1
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
The Teaching Profession
The Teaching ProfessionThe Teaching Profession
The Teaching Profession
 
Ict and assessment of learning
Ict and assessment of learningIct and assessment of learning
Ict and assessment of learning
 
Chapter 1 Teachers and Students in the Digital Age
Chapter 1   Teachers and Students in the Digital Age Chapter 1   Teachers and Students in the Digital Age
Chapter 1 Teachers and Students in the Digital Age
 
Unit III: Theories and principles in the use of design of technology driven l...
Unit III: Theories and principles in the use of design of technology driven l...Unit III: Theories and principles in the use of design of technology driven l...
Unit III: Theories and principles in the use of design of technology driven l...
 
Affective Assessment
Affective AssessmentAffective Assessment
Affective Assessment
 
Assessment of learning 1
Assessment of learning 1Assessment of learning 1
Assessment of learning 1
 
Online resources, educational sites, and portals
Online resources, educational sites, and portalsOnline resources, educational sites, and portals
Online resources, educational sites, and portals
 
Select and Use ICT Tools for Teaching and Learning
Select and Use ICT Tools for Teaching and LearningSelect and Use ICT Tools for Teaching and Learning
Select and Use ICT Tools for Teaching and Learning
 
Understanding the basic concepts in ict
Understanding the basic concepts in ictUnderstanding the basic concepts in ict
Understanding the basic concepts in ict
 
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULESSAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
 
Module 2 lesson 2
Module 2 lesson 2Module 2 lesson 2
Module 2 lesson 2
 
Digital Literacy Skills in the 21st Century
Digital Literacy Skills in the 21st Century Digital Literacy Skills in the 21st Century
Digital Literacy Skills in the 21st Century
 
Lesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher educationLesson 1 ict competency standards for philippine pre-service teacher education
Lesson 1 ict competency standards for philippine pre-service teacher education
 

Destaque (7)

Safe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point finalSafe and ethical use of technology in the classroom power point final
Safe and ethical use of technology in the classroom power point final
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
Software theft
Software theftSoftware theft
Software theft
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Four Steps to a Perfect Assignment/ Oral
Four Steps to a Perfect Assignment/ OralFour Steps to a Perfect Assignment/ Oral
Four Steps to a Perfect Assignment/ Oral
 
Assistive Technology
Assistive TechnologyAssistive Technology
Assistive Technology
 
Evaluation of educational technology and its current application
Evaluation of educational technology and its current applicationEvaluation of educational technology and its current application
Evaluation of educational technology and its current application
 

Semelhante a The legal, safe and ethical use of technology in the classroom

Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
gblessin
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
ggfg123
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
Johan Koren
 

Semelhante a The legal, safe and ethical use of technology in the classroom (20)

Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Group5 ka part vi
Group5 ka part viGroup5 ka part vi
Group5 ka part vi
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331Section VI: Stakeholders FRIT 7331
Section VI: Stakeholders FRIT 7331
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
Policies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social WebPolicies 2.0: Rules for the Social Web
Policies 2.0: Rules for the Social Web
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Resources
ResourcesResources
Resources
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

The legal, safe and ethical use of technology in the classroom

  • 1.
  • 2. Rules, Guidelines and Expectations 0What is the acceptable and appropriate use of internet in schools? 0What is to be expected? 0What boundaries are already in place and what needs to be changed in order to make a legal, safe and ethical online environment?
  • 3. Cyber Ethics 0IKeepSafe (2013) states that students must do/be the following to be legally and ethically safe. “Students recognize and practice responsible and appropriate use while accessing, using, collaborating, and creating technology, technology systems, digital media and information technology. Students demonstrate an understanding of current ethical and legal standards, rights and restrictions governing technology, technology systems, digital media and information technology within the context of today’s society.”
  • 4. What do we, as educators, need to do? 0 Provide guidance for students and “teach our students to safely and ethically use their digital devices in the classroom–and throughout their communities” (IKeepSafe, 2013). 0 Exhibit Ethical, Safe and Legal behaviour as role models for our students. 0 Inform students and continue to support them on their journey to understanding their new roles in the classroom and community.
  • 5. IkeepSafe offers a new game for students to learn about issues such as music piracy. “Faux Paw the Websurfing Techno Cat series has been created by a team of leading child psychologists, educators, and law enforcement. This engaging curriculum—complete with books, animated DVDs, and lesson plans—will captivate the attention of your students and teach them how to appropriately conduct themselves online and in the digital space.“ (IKeepSafe, 2013).
  • 6. Children’s Internet Protection Act (CIPA) 0 The Children's Internet Protection Act (CIPA) is a federal law that addresses concerns about access in schools and libraries to the Internet and other information. 0 “The Children’s Internet Protection Act (CIPA) was enacted by Congress in 2000 to address concerns about children’s access to obscene or harmful content over the Internet. CIPA imposes certain requirements on schools or libraries that receive discounts for Internet access or internal connections through the E-rate program – a program that makes certain communications services and products more affordable for eligible schools and libraries” (F.C.C., 2013)
  • 7.
  • 8. Websense 0 Websense helps schools to comply with the CIPA through: 0 “Obscenity and Pornography Filtering – Allows schools and libraries to manage Internet access to over 90 URL categories including Racism and Hate, Adult Material, Hacking and other topics pertinent to CIPA. 0 Best-of-Breed Web Filtering – The most accurate and up-to-date filtering database with over 36 million URLs. 0 Filtering of Search Engine Images – Use safe-search to filter inappropriate images that can be found in search engine query results. 0 Blocking of Spyware, Malicious Mobile Code, and Other Security Threats – Sites with worms, spyware, phishing, and other threats can be blocked, helping to meet The CIPA requirements for protection of a minor's personal information. 0 Monitoring – Reporting Tools offer many different ways to monitor and report on the online activities of minors. 0 Policy Management Per User or Per Group – Schools and libraries can customize their Internet policies based on users or groups, so policies can be set based on age or needs. “
  • 9. What do we, as educations, need to do? 0 We need to do some simple research. It’s not hard. 0 We need to follow everything in the CIPA’s rules and guidelines. We need to follow the school’s policy and enforce it for students. 0 WHAT CAN WE DO? 0 We can use resources such as games! We can get the students to reserch internet safety and the ethical use of the internet. They can do up their own presentations and present them to the class, maybe even work in groups 0 MAKE IT FUN!
  • 10. References 0 Federal Communications Commission, 2013, ‘Children’s Internet Protection Act’, ONLINE, Available at: http://www.fcc.gov/guides/childrens-internet-protection- act, Accessed 22/08/13. 0 IKeepSafe, 2013, Cyber-Ethics, ONLINE, Available at: http://www.ikeepsafe.org/, Accessed 22/08/13. 0 Websense, Education K-12, 2013, ONLINE, Available at: http://www.websense.com/content/Regional/Australia/347 5.aspx, Accessed 22/08/13.