Technology has out-paced the legal system in issues related to cyberbullying in the schools. When a cyberbullying incident happens at your school, how will you handle it? What board policies will protect you? What is appropriate discipline? What kind of documentation do you need? How will you assure a safe environment for your students? Learn from national experts who have studied court decisions in this areas.
From the Center for Intellectual Property, University of Maryland. The Center for Intellectual Property provides education, research, and resources for the higher education community on copyright, academic integrity, and the emerging digital environment. The Center accomplishes its mission through the delivery of workshops and conferences, online training, consultations on campus, and electronic and print publications, and it provides continuous updates on legislative developments at the local, state, national, and international level.
Except for the occasional plagiarized passage or unattributed reference in student research papers, most veteran K-12 educators have had little experience dealing with copyright issues in their classrooms. With the advent of the Internet, however, their need to know about copyright law and to understand its implications for such activities as Internet research, downloading programs and documents, creating class Web sites, and installing software on school networks has increased dramatically.
Defend your virtual home. Some pretty bad folks are trying to break into your computer all the time. But you can make it a lot harder for them.
From the Technology Information Center for Administrator Leadership (TICAL)/Radio TICAL audiocast: First they showed up in every driver’s hand. Now, your second graders are bringing them to school. Yep, cell phones have become as ubiquitous on campus as they are on the roads, and they force us to consider new rules and policies in each context. In this episode, TICAL cadre members Bob Blackney and Kelly Calhoun share their perspectives on the kinds of things we need to consider in crafting campus cell phone policies.
In this audio/visual presentation from TICAL, Harvey Barnett describes why you should have an Acceptable Use Policy and what it should contain.
Professor Eric Faden of Bucknell University created this humorous, yet informative, review of copyright principles delivered through the words of the very folks we can thank for nearly endless copyright terms. View as streaming video, download as an MP4 file or watch it on YouTube.
Professor Eric Faden of Bucknell University created this humorous, yet informative, review of copyright principles delivered through the words of the very folks we can thank for nearly endless copyright terms. View as streaming video, download as an MP4 file or watch it on YouTube.
An effective school-based strategy to address the issue of online safety should include these six key components:<br><b>EDUCATIONAL USE</b> - Schools must ensure that when students use the Internet, their activities have an educational purpose -- class assignments, extra credit work, and perhaps some high quality enrichment activities as a reward<br><b>SUPERVISION AND MONITORING</B> Schools must shift focus from reliance on filtering to better supervision and monitoring. <br><b>MEANINGFUL CONSEQUENCES </B> Misuse of the Internet must lead to a meaningful consequence -- but it should be recognized that suspension of Internet access privileges just causes more work for teachers. Requiring a service contribution to the school and establishing "close monitoring status" for all Internet use are preferable consequences. <br><b>ACCIDENTAL ACCESS TO PORN</b> - All students and staff must know that if inappropriate material appears, they should quickly turn off the monitor or turn it so it can't be seen, and then report it. Following any incident or discovery, there must be a responsible assessment of culpability. <br><B>INAPPROPRIATE BLOCKING</B> Selected staff in every school building must have the authority and ability to quickly override the filter to provide other staff or students access to sites that have been inappropriately blocked<br><B>INTERNET SAFETY AND RESPONSIBLE USE EDUCATION</b> Schools must provide effective Web 2.0 Internet safety and responsible use education to students and parents. <br><br>
Made a mistake? Own it, Fix it, Learn from it." Learn how this teacher handled the consequences of computer hacking attempts by her students.
Rising concern about computer security. The San Jose Mercury News recently ran a three-part series focusing on everything from phishing schemes and identity theft to student safety on the Internet. In many districts, technology directors are finding they have to do more and more to insure that data is not compromised and to see that students are not using school networks to access inappropriate content. Part I: How online crooks put us all at risk <br>\nPart II: How well are we protecting ourselves?<br>\nPart III: U.S. targets terrorists as online thieves run amok
This Online Code was established by the Discovery Team at Cresthill Middle School. It creates an online working environment that is:<br>\n\nWithout fear (of insult, of reprisal, of dishonesty).<br>\nScholastic</br>\nBased upon protection (of personal information, of identity, of unique thoughts). <br>\nCreative, non-restrictive, tolerant, and sensitive <br><br>\n
Chances are your district’s acceptable use policy is outdated. With the proliferation of Web 2.0 tools, multifunction cell phones and handheld computers, to name just three, it’s obvious that keeping AUPs up to date requires constant attention.
Presentation at the K-12HSN Conference Online by Joseph Bires. A discussion of how the use of Web 2.0 technologies has challenged and changed the concept of acceptable use. The presenter suggests ways to balance protecting students, teachers, and schools from the dangers of the Internet, while still integrating Web 2.0 technologies into the K-12 curriculum. Also, philosophical issues of acceptable use are discussed such as identity and transparency. Finally, practical suggestions are shared to help every teacher and administrator. This talk is available as an MP3 audio file and an audiofile blog.
With the proliferation of Web 2.0 tools, rapidly emerging technologies and portable electronic devices, your school or district's Acceptable Use Policy (AUP) may need frequent updating. In this section of the CTAP CyberSafety Project web site, you'll find helpful resources for all areas of consideration, including cell phone policies.
New web site started by David Warlick to consider new Web 2.0 media and digital communications that must be considered when drawing up school and district AUPs.
New rules make eMail, instant messages subject to legal review. According to new federal rules that went into effect Dec. 1, schools, businesses, and other organizations are required to keep tabs on all eMail, instant messages (IM), and other digital communications produced by their employees.