This Justin Beiber fan site has been penalized more than $100,000 for collecting emails of minors under 13 without parental permission. COPPA compliance is more important than ever. I find it ironic that kids under 13 aren't even supposed to be able to have emails in the first place on many websites.
"The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics. But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent. According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it."
It is legal for a prospective employer during a job interview to ask you to log into your facebook page and click through your friends only posts, photos, and messages. This is a very important topic for digital citizens to understand.
Excellent livebinder on copyright for those working with global collaboration.
This incredible article from the Atlantic talks about who is tracking you and how to understand it. It is very balanced and informative and a great post to share with students as you discuss privacy.
"As users, we move through our Internet experiences unaware of the churning subterranean machines powering our web pages with their cookies and pixels trackers, their tracking code and databases. We shop for wedding caterers and suddenly see ring ads appear on random web pages we're visiting. We sometimes think the ads following us around the Internet are "creepy." We sometimes feel watched. Does it matter? We don't really know what to think."
Internet crime prevention tips. Will be used with digiteen this year.
ARticle on copyright infringement lawas and how this is being interpreted in Ireland.
"Among younger people, so much has the habit grown up of downloading copyright material from the internet that a claim of entitlement seems to have arisen to have what is not theirs for free."
UK's Digital Economy Act - that internet access is a 'fundamental human right', and that copyright enforcement infringes privacy.
After 28 days and two letters, the ISP may serve a 14-day disconnection notice during which time the user may appeal or promise to stop for good.
Plagiarism facts, free tools, and statistics.
To me, this example is over the line but anything that takes away from your ability to teach is considered a problem and reason to fire you. I think this is no acceptable when the teacher had everything marked as private and did not allow parents nor admins on her facebook page - again, facebook is not secure.
An excellent article to make the case for digital citizenship education, I love the quote at the end that the law "can't take the place of good manners, social norms, and etiquette." Do we think that students just develop good manners on their own? Perhaps manners, norms, and etiquette would much better evolve with multiple generations and ages working together as we discuss and grapple with such issues.
This is another excellent article about the changing state of the law and the Internet and includes the precedent that anonymous doesn't really mean anonymous any more - particularly if the anonymous person breaks the law.
Love posted allegedly derogatory and false comments about the designer -- among them that she had a "history of dealing cocaine" -- on her now-discontinued Twitter feed.
it's typically difficult to predict or anticipate technology innovations.
Is the Web a unique, separate space or is it really an extension of real space?
"We really haven't thought about this much because there haven't been many generations of users with copious digital assets to even trigger the need to think about what happens if they pass away," Matwyshyn said.
Cohen sued Google to learn the name of the anonymous blogger on the grounds that the post was defamatory and libelous. A New York Supreme Court judge ordered Google to reveal the anonymous blogger's name, and Google complied.
The case provided insight into the debate between the competing values of privacy and free speech, said Jeffrey Toobin, CNN's senior legal analyst.
In 2006, Stacy Snyder was a 25-year-old single mother hoping to begin a career as an educator. She had finished her coursework and was a student teacher. Yet Millersville University, located in Pennsylvania, wouldn't give her a degree.
the school provided alternative reasons for denying Snyder a degree
"It can't take the place of good manners, social norms and etiquette -- the kind of thing that has always governed negotiations about face-to-face behavior.
"We should never expect that the judges are going to save us from our own worst impulses."
Lisa thuman blogged about the recent changes to the Children Internet Protection Act (CIPA) -- to those people who have rejected social networking and chats -- you're required to "educate minors on appropriate online safety including cyberbulling and interacting with others on social networking sites and in chat rooms."
How are you going to do this without using safe alternatives and then coach them on it? This is REQUIRED in the US if you get erate funds.
Get out there and get busy -- time for pushback. Lisa Thuman's article on this is an excellent read.
Excellent article on cyberbullying and an example of a girl who was harrassed online and killed herself. This sort of thing is tragic and we should consider what we think aboutinternet harrassment penalties, particularly against children.
There are mention of several websites including one I'd never heard of called CyberBully Alert.
An ex-friend’s mother faces charges in federal court as a result, and Missouri has made Internet harassment a crime.
Cyberbullies often commandeer e-mail accounts and social-networking profiles, attacking kids while pretending to be someone they trust, like a best friend. They use cell phones and the Web to spread embarrassing and cruel material, and they can harass their victims well beyond the schoolyard -- even when they're "safe" at home.
85 percent of 5,000 middle-school students surveyed said they had been cyberbullied. Only 5 percent of them said they’d tell someone about it.
she went to a mental-health clinic
Fake profiles and anonymous screen names are used in 65 percent of cyberbully attacks,
assuming that if they haven’t received a death threat or had a picture of their face posted on a naked body on the Internet, they haven’t been bullied.
They think that’s just part of online life,
Aftab said she knows of three other teens who have committed suicide after cyberbullying attacks, and that the problem is on the rise.
4th graders are especially into blackmail and threatening to tell friends, parents or teachers if the victim doesn’t cooperate.
Cyberbullying peaks in 4th and 7th grade
The most outrageous recent way is through theft of a cell phone for a few minutes," Aftab said. "If your kids leave their cell phone unattended or accessible in their backpack, the cyberbully will take it and send a bunch of bad text messages or reprogram it.”
“This whole password thing freaks people out ... but a good password doesn’t have to be hard to remember, just hard to guess,” Criddle said. “Friends don’t ask friends for passwords.
October as National Cyber Security Awareness Month,
One of the best wikis on the digiteen project, this wiki covering digital law is marvelous and was put together by 9 students from my classroom here in the US, Qatar, and Austria. This is an excellent wiki on Digital Law and has made my wiki hall of fame for this year! Wow!
Considering the posting of photos and what should be shared is something all teenagers should consider. This is a blog post from a teenager on the digiteen project about the difficulty lawmakers have in prosecuting "digital blackmail" cases. Certainly harm was done, but legislation has not been passed protecting photographs posted on one's Facebook page and shared with friends. This is hard for students to understand but is an important case study to read about.
Certainly having teenagers research and report their findings is a great way to help them understand the implications of what they are doing.
Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
[A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
here was no basis for them to search the text and voice mail messages stored on the phone.
unlawful access to the stored voice mail and text message communications.
(2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization.
(3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
- ad4dcss (4)
- case_studies (2)
- cyberbullying (2)
- digital_access (2)
- digital_communications (3)
- digital_safety (2)
- digiteen (3)
- education (10)
- facebook (2)
- flatclass (2)
- high_school (1)
- hzmeta (1)
- integrity (3)
- learning (3)
- middle_school (1)
- mobile (1)
- social_entrepreneurship (1)
- worldonline (1)
- www_world (1)
Click in to find related links.