View
214
Download
0
Tags:
Embed Size (px)
Citation preview
for Isle of Wight CountyMiddle and High School Teachers
for Isle of Wight CountyMiddle and High School Teachers
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
What does VDOE say about Internet Safety?
House Bill 58 states that school divisions “include a component on internet safety for students that is integrated in a division’s instructional program.”
School systems are allowed to create their own curriculum that encompass what students should know as well as what teachers and parents should know.
Why should I care about care about Internet Safety?
VDOE new state requirements2006 Guidelines and Resources published2007 Curriculum & Implementation Plan
IOWC School Board approved curriculum
Principals are accountable for school-wide implementation
What does IWCS say about Internet Safety?
Newly approved curriculum, compiled by the CRSs, must be implemented yearly
Middle School Plan:6-8 students will participate in an Internet Safety unit taught in Health and PE classes.Teachers will receive an overview of the curriculum and learn their responsibilities for ensuring Internet safety all year longParents will be issued documentation and will have access to resource on school web sites
High School Plan:9th Grade students will participate in the internet safety curriculum incorporated into Health and PE classes.10-12 grade students will participate in the internet safety curriculum that will be incorporated into English classes.Parents will be issued documentation and will have access to resource on school web sites
Internet Safety Integration
for Isle of Wight County Schools
Grades K-8 - CyberSmart Curriculum
(Integrated into Library and Health Courses)
SafetyManners
Grades 9-12 - Webwise Kids,
Educause, Berkerly(Integrated into Health and English Courses)
SafetyEthicsResearch
QuickTime™ and aTIFF (Uncompressed) decompressor
are needed to see this picture.
Classroom Internet use can be exciting, rewarding, and challenging.
QuickTime™ and aTIFF (Uncompressed) decompressor
are needed to see this picture.
Filters are not fail proof! (Google Images)Students will probably know ways to get around the firewall.
Example: www.otunnel.comTeachers should keep an eye on students when they are on the Internet just as
they would as if they were on a field trip!Students’ Internet use should be tailored to their agesRandom Internet browsing should NOT be allowed! Students on the Internet
should have a specific purpose for being there!Teachers should check the history of visited sites as much as possible, especially
if there is suspicion of students going to inappropriate sites.It is the teacher’s responsibility to be familiar with the division’s AUP (Acceptable
Use Policy)
Monitoring is
Technological Interactions Can Effect Everyone!
Sharing Personal Information
Privacy IssuesProducer
Identity TheftConsumer
Cyberbullying
FYI: Online, people are not always who they claim to be!
http://online.wsj.com/public/resources/images/PJ-AJ538A_pjCYB_20070123203254.jpg
Copyright protects “original works of authorship” that are fixed in a tangible form of expression.(Copyright Office, 2007)
Musical works, including accompanying wordsDramatic works, including any accompanying musicPictorial, graphic, and sculptural worksMotion pictures and other audiovisual worksSound recordingsArchitectural works
QuickTime™ and aTIFF (Uncompressed) decompressor
are needed to see this picture.
Proposed Multi-Media Guidelines for Teachers and Students:
Motion Media - Up to 10% or 3 Minutes--whichever is less
Text - Up to 10% or 1000 words, whichever is less
Music, Lyrics, & Music Videos - up to 10% but not more than 30 seconds from an individual work
Illustrations & Photographs - Single artist, up to 5 images - Collection, up to 10% or 15 images, whichever is less
Database & Data table - up to 10% or 2500 field entries, whichever is less
The safest course is always to get permission from the copyright owner before using copyrighted material.
Be Smart…Make and POST Them…
Examples:Rule 1 - School computers are for school use ONLY. Students are only to use the computers for school-related research, project completion, or teacher-directed activities.Rule 2 - A warning will be given to the student upon the first infraction of Rule #1.Rule 3 - Computer privileges will be revoked and a referral will be written upon a second infraction.Rule 4 - Honor Copyright Law
REVIEW RULES OFTEN WITH STUDENTS!
Publishing on the Internet
Content must be school-relatedStudents should not fill out forms or post information that reveals “private identity” informationIdentify students with a restriction on photo consent forms.Check AUP returns
If you are a teacher that is going to use email in your classroom, it is a good practice to have students create email accounts for this sole purpose. It is a good practice to keep all student email account information accessible. This includes Username AND Password
information. Let students know that you will check email accounts periodically to ensure information that is posted is school-related.
Social Networking SitesMyspace.com (middle and high)Facebook.com
Text MessagingInstant Messaging (IM)Chat RoomsGamingMusic Sites (iTunes)Video Sites (You Tube, Google Videos)
QuickTime™ and aTIFF (Uncompressed) decompressor
are needed to see this picture.
QuickTime™ and aTIFF (Uncompressed) decompressor
are needed to see this picture.
A Parent’s Guide to Online SafetyOnline Risks (Netsmartz)How To (staysafe.org)Cyberbullying (Cyberbullying.org)Social Networking and SchoolsRisks by Technology: EmailYoung People, Music, and the InternetKids’ Rules for Online SafetyCommon Sense Rules Can Protect Kids on the Net
Copyright Office (2007). Retrieved on June 14, 2007 from http://www.copyright.gov/circs/circ1.html#wci
Cyberbullying Image. Retrieved on January 10, 2007 from http://online.wsj.com/public/resources/images/PJ-AJ538A_pjCYB_20070123203254.jpg
Frost, Randall (2003). Retrieved on January 10, 2007 from http://gerstmanandmeyers.com/features_effect.asp?pf_id=177
Swinth, Farnham, and Davis. Sharing Personal Information in Online Community Member Profiles. Retrieved on January 12, 2007 from http://research.microsoft.com/scg/papers/sharing%20personal%20information%20in%20online%20community%20member%20profiles%20-%20with%20names.pdf
University of Michigan. Protecting Against Misrepresentation and Identity Theft. Retrieved on January 12, 2007 from http://identityweb.umich.edu/computing-tips.html
VDOE Guidelines and Resources for Internet Safety in Schools (2006).
Waxer, B. and Baum, M. (2007). Copyright on the Internet.
WiredKids, Inc. (2007). Retrieved on June 14, 2007 from http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html