Welcome Staff Objective: Apply internet safety and security practices in the classroom and at home Introduction: based on parents and teachers concerns of safety, security, and website blocking; this information has been brought to you to help inform and empower teachers about these 21 st Century realities.
Family Education Rights & Privacy Act (FERPA) Guidelines for access and privacy of student information. Schools are required to notify parents of their rights. Groups permitted access Permitted to share information Directory Information Not considered to be restricted Parents may choose to opt out US Dept of Ed -- FERPA
Childrens Internet Protection Act (CIPA) Guidelines concerning protection of children (through blocking and filtering) from harmful internet content. Did you know (Pińa, 2011) : 260 porn sites are launched a day. 12% of all websites are pornographic in nature. Online porn produces $3 billion in annual revenue. Schools that receive E-Rate funding from the Dept. of Education are required to follow CIPA guidelines. Pińa, A. (2011). Part 2: Open source and cloud computing. [PowerPoint slides]. Retrieved from https://aceels.epiclms.net/Learn/Player.aspx?enrollmentid=1732718https://aceels.epiclms.net/Learn/Player.aspx?enrollmentid=1732718
Childrens Internet Protection Act (CIPA) According to CIPA, teachers may be permitted to bypass website blocking; however, HLS has not made this possible at this point. Provide saf e communication tools Install a firewall to safeguard student information Monitor online activity and website requests Provide internet safety information to parents FCC.gov -- CIPA
Teachers Monitoring Filtering software is not perfect. Computer monitors within view. Inform students of internet monitoring. Educate students of their responsibility for internet safety.
A teachers security and safety at home is a serious concern. Common Dangers
Phishing Scams Unsolicited e-mails asking for personal information Know the Tactics – dont get sucked in Compromised bank account needs reset Full e-mail account will be deleted Winning a contest or lottery How do they do it? (Piper, 2011) Counterfeit website Man in the Middle Spear Phishing NO LEGITIMATE AGENCY will ask for personal information by phone or e-mail Go directly to the website or call on the phone. Dont even open e-mails from strangers Do not click on links Do not open attachments Piper, P. (2007). Phis pharming. Searcher, 15(9), Retrieved from http://proquest.umi.com/pqdweb?did=1360127361&sid=9&Fmt=3&clientId=7285 1&RQT=309&VName=PQD http://proquest.umi.com/pqdweb?did=1360127361&sid=9&Fmt=3&clientId=7285 1&RQT=309&VName=PQD
Identity Theft Always maintain safe technology practices Set security settings conservatively on social networking sites. Avoid using personal information on social networking sites. Secure your passwords Do not write them down anywhere Choose something unrelated to you or your family & that is not guessable Strong passwords use a combination of letters, numbers, and symbols Change your password periodically