31
Common Sense Technology Policy Balancing Security and Access

Common sense technology policy2

Embed Size (px)

DESCRIPTION

Presentation given at NYCATE Summer Leadership Conference.

Citation preview

Page 1: Common sense technology policy2

Common Sense Technology Policy

Balancing Security and Access

Page 2: Common sense technology policy2
Page 3: Common sense technology policy2
Page 4: Common sense technology policy2
Page 5: Common sense technology policy2

Access vs. Safety

Page 6: Common sense technology policy2

The Big 6 Concerns?Inappropriate Content

Predators

Misuse of Mobile Communications Devices

Cyberbullying

Network Security

Copyright Infringement

Page 7: Common sense technology policy2

Inappropriate Content

Page 8: Common sense technology policy2

Misperceptions About Inappropriate Content

Web Content Can Be Completely Controlled

Page 9: Common sense technology policy2

Misperceptions About Inappropriate Content

Intentional Viewing of Objectionable Content by Students

Page 10: Common sense technology policy2

Inappropriate Content: The Reality

CIPAFERPA

HIPA

Legal Issues Funding Issues

State Law

Local Policy

Page 11: Common sense technology policy2

Internet Predators

Page 12: Common sense technology policy2

Misperceptions Internet Predators

Adult male posing online to lure very young children into places where they can be kidnapped and assaulted

Page 13: Common sense technology policy2

Misperceptions Internet Predators

Young children being lured by predators into giving personal information that leads to them being harmed.

Page 14: Common sense technology policy2

Predators: The Reality

• Most predation and ensnarement crimes involve adolescents.

• Predators play to teens need to connect, need for info about sex, their search for romance.

• Teens usually do not respond to predator’s solicitations and dismiss them as “litter” on the information superhighway.

Page 15: Common sense technology policy2

Misuse of Mobile Communications Devices

Students recording other students and school staff and postinghttp://dangerouslyirrelevant.org/2008/03/cell-phone-came.html

Page 16: Common sense technology policy2

Misuse of Mobile Communications Devices

Sexting

Page 17: Common sense technology policy2

Misuse of Mobile Communications Devices

Cheating on School Tests and Assignments

Page 18: Common sense technology policy2

Misuse of Mobile Communications Devices

Sending threatening messages or bullying.

Page 19: Common sense technology policy2

Cyberbullying

Page 20: Common sense technology policy2

Pew Research Center Research on Cyberbullying

• 1 in 3 online teens have experienced online harassment.

• Girls are more likely to be victims.• Teens say they are more likely to be

bullied offline than online.• Teens who share their identities and

thoughts online are more likely to be targets than those who lead less active online lives.

Page 21: Common sense technology policy2

Pew Research Center Research on Cyberbullying

• 1 in 6 teens said someone had forwarded or posted communication they assumed was private.

• 13% said someone had spread a rumor about them online.

• 13% said someone had sent them a threatening or aggressive email.

• 67% said bullying happens more offline than online

Page 22: Common sense technology policy2

Network Security

Data Theft and Identity Theft

Page 23: Common sense technology policy2

Network Security

Disabled, Hacked or Vandalized Networks

Page 24: Common sense technology policy2

Network Security

Virus and other Malicious Network Attacks

Page 25: Common sense technology policy2

Dealing with Inappropriate Content

• Focus on teaching students Internet literacy, safety and responsibility.

• Enforcement of reasonable AUPs.• Teachers should monitor students while

online.• Use history folders and other

technological measures to monitor students.

Page 26: Common sense technology policy2

Dealing with Internet Predators

• Establish open communications between adults and young people.

• Parents and professional educators must take responsibility for learning about technologies and how to monitor their young people.

• Adults must engage young people in conversations about the problem of adults posing online for the purpose of engaging in sexual activity.

Page 27: Common sense technology policy2

Dealing with the Misuse of Mobile Communications Devices

• Teach students proper and constructive uses of MCDs rather than banning them.

• Directly teach students when to use the devices appropriately.

Page 28: Common sense technology policy2

Dealing with Cyberbullying

• Provide students, parents, and all educators with information regarding the prevention of cyberbullying.

• Be aware of all laws and policies regarding cyberbullying.

Page 29: Common sense technology policy2

Dealing with Network Security: Data/Virus/Malicious Threats

• Have a network rights strategy.• Make sure desktop is secure but not at

expense of instructional needs.• Balancing security with server space

and network use.• Use solutions to monitor student use.• Use good firewalls.• Complete periodic security

assessments.

Page 30: Common sense technology policy2

My Educational Technology Gottas

• Least restrictive technology environment as possible.

• Encourage the use of technology in as many ways possible.

• Get teachers involved in security.• Approach administration of technology

with students and teachers are customer mindset.

Page 31: Common sense technology policy2

Questions and Discussion