Download presentation
Presentation is loading. Please wait.
Published byAriel Shelton Modified over 9 years ago
1
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety
2
1. Internet Safety In Schools 2. Laws and Rules to Assure Internet Safety 3. Our Suggestions 4. Digital Citizenship Education
3
Internet Safety in Schools ©Cyber bullying ©Illegal Downloading ©Identity Theft ©Viruses ©Privacy
4
Cyber bullying Sending hurtful messages, posts, photos, or conversations online or on cell phones. Occurs in cyberspace so it can be hard to detect http://www.youtube.com/watch?v=S 03Br1dwJR8http://www.youtube.com/watch?v=S 03Br1dwJR8
5
Illegal Downloading Easier to do now with the ease of access online with computers Issue of not paying people for their work IT IS ILLEGAL! It is a form of theft Know the difference between legitimate sites and sites that are illegal
6
Identity Theft Impersonating someone, usually for financial gain (School CIO) Password Protection Don’t give out too much information Do not post important information
7
Viruses Use an up-to-date antivirus program Scan your computers regularly with the program to help prevent viruses Do not open emails or attachments from unknown senders Do not download information from unknown sites
8
Privacy As technology's power increases, the ability to keep your information private gets harder to do. Everything you put online is available to the public! Control privacy settings on social networking sites and other websites for school use Everything you post online allows you to leave a “digital footprint”
9
Laws and Rules to Assure Internet Safety ©The Communications Decency Act (CDA) ©The Child Online Protection Act (COPA) ©The Children’s Internet Protection Act (CIPA) ©Sexual Predator Laws ©Laws Relating to Filtering, Blocking and Usage Policies in Schools and Libraries for Pennsylvania
10
The Communications Decency Act (CDA) Passed in 1996, the CDA represents Congress’s first attempt to regulate children’s access to sexually explicit material on the Internet. The CDA made it illegal to put “indecent” content on the Internet where kids could find it. However, the Supreme Court unanimously declared the CDA unconstitutional in 1997 in Reno v. ACLU for “broad suppression of speech addressed to adults”; the term “indecent” was found to be too vague.
11
The Child Online Protection Act (COPA) In 1998 a narrower version of the CDA required commercial Web sites to verify proof of age before giving users access to sexually explicit material considered obscene for minors. COPA was immediately challenged by the ACLU and other civil liberty organizations, and in 1999 a permanent injunction was ordered against its enforcement. On May 13, 2002, in ACLU v. Ashcroft, the Supreme Court directed a lower court to reexamine its ruling that COPA was unconstitutional. On March 7, 2003, the court again found that COPA was unconstitutional. On June 29, 2004 the Supreme Court kept in place the 1999 lower- court ruling against the enforcement of COPA, but ordered the lower court to consider whether recent advancements in filtering technologies could protect children more or less effectively than the criminal sanctions specified in COPA.
12
The Children’s Internet Protection Act (CIPA) In 2000, Congress enacted CIPA, which took effect in April 2001, requiring schools and libraries receiving federal technology funds to install pornography-blocking software on their computers. The American Library Association filed suit alleging that the library portion of CIPA was unconstitutional on its face. On May 31, 2002, the U.S. District Court for the Eastern District of Pennsylvania agreed. The U.S government appealed that decision, and on June 23, 2003, the Supreme Court overturned the district court’s ruling. (The school portion of CIPA has not yet been challenged, so its constitutionality remains untested.)
13
Sexual Predator Laws Federal laws have been enacted to protect children from people who lure or attempt to lure them into an offline meeting for the purpose of performing illegal sexual acts or coercing them to provide sexually explicit photos of themselves. In April 2003, Congress passed a law that provides wiretapping authority for seven sexual offenses, including child pornography and the sexual exploitation of children. Part of a broader child-protection bill entitled the Protect Act of 2003, which also mandates the Amber Alert system for abducted children, this law expands federal law-enforcement agencies’ wiretapping authority to catch online predators before they strike.
14
Laws Relating to Filtering, Blocking and Usage Policies in Schools and Libraries in Pennsylvania 24 P.S. 4604 – 4612 Requires school boards and publicly- funded libraries to adopt and enforce acceptable use policies for Internet access that include the (1) use of software programs reasonably designed to block access to visual depictions of obscenity, child pornography or material that is harmful to minors; or (2) selection of online servers that block access to visual depictions of obscenity, child pornography or material that is harmful to minors. http://www.ncsl.org/default.aspx?tabid=13 491#stateshttp://www.ncsl.org/default.aspx?tabid=13 491#states
15
Our Suggestions ©Visibility ©Search Safely ©Stranger Danger
16
Visibility Place your computer in a centralized place in your classroom so that you are aware with what is being searched and viewed. –Especially important for observing children’s activity online
17
Search Safely Place security restrictions Use age appropriate websites Use filtering software –Helps to filter our inappropriate content
18
Stranger Danger Do not open emails from unknown people –Could contain: Inappropriate Content Viruses
19
Digital Citizenship Education ©Think before you post ©Give credit when credit is due ©Cheating is still cheating online ©Privacy Counts ©Responsibility
20
Think Before You Post Think before you post something or even send a text message It is virtually permanent Cannot be erased
21
Give Credit When Credit Is Due Respect others’ work Give credit when using others’ work Cutting and pasting without credit is plagiarizing
22
Cheating is Still Cheating Online Use your self-pride –Do not download illegally –Do not use technology to cheat in school –Do not plagiarize
23
Privacy Counts Nothing is as private as you think Check your privacy settings Do not post anything that you do not anyone else to see
24
Responsibility Be responsible about sites you visit and things you post You are responsible for what you put online Use the internet WISELY
25
Works Cited http://www.commonsensemedia.org http://www.schoolcio.com/showartic le/880http://www.schoolcio.com/showartic le/880 http://www.theitlibrary.com/comput ertips/virus_tips.htmlhttp://www.theitlibrary.com/comput ertips/virus_tips.html http://www.ncsl.org/default.aspx?ta bid=13491#stateshttp://www.ncsl.org/default.aspx?ta bid=13491#states
26
Template Provided By www.animationfactory.com 500,000 Downloadable PowerPoint Templates, Animated Clip Art, Backgrounds and Videos
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.