Upload
carmel-sanders
View
216
Download
2
Embed Size (px)
Citation preview
FREE LECTURE!!FREE LECTURE!!Come and Learn
about Free Speech in the K-12 Classroom
Lecture Lecture InformationInformation
• WhoWho: All are welcome!• WhatWhat: One hour lecture that covers many issues
dealing with internet security in today’s academic institutions.
• WhereWhere: The Civic Center in Phoenix, Arizona.• WhenWhen: Wednesday, April 7th, 2004 starting
promptly at 7:00 pm.• WhyWhy: To learn about the key issues that help
combat the problems of the internet and it’s misuse by children.
Keynote SpeakerKeynote Speaker:
DONNA RICE DONNA RICE HUGHESHUGHES
•Internationally known Internet safety expert and advocate.
•Proposed and led the Internet Online Summit’s adoption of an industry “ZERO Tolerance” policy against child pornography, which was endorsed by the White House and the Justice Department.
•Volunteer president of Enough Is Enough
•National Law Center for Children and Families Annual Appreciation Award and the “Protector of Children Award” from the National Abstinence Clearinghouse Recipient.
•Co-wrote the story for the season finale episode of Touched By An Angel
Click here for Ms. Hughes’s Website
Key Issue: IntranetWhat is an intranet?
How is it different than the internet?
What are the benefits to using an intranet based system?
What are some disadvantages with this type of security?
Ms. Hughes’s detailed lecture will provide you with the most current information on Intranet Systems. Computers will be set up around the room so you can actually see these systems in
action!!
Key Issue: Responsibility
Have you ever wondered, “What can I do myself that can keep my child’s internet experience in his or her best interests?” Or perhaps asked yourself, “What can my school do?” Ms. Hughes’s will suggest helpful tips in the following areas:
School/home responsibilities
Staff responsibilities Student responsibilities
Key Issue: Firewalls
Understand why these systems are imperative in today’s schools and homes.
Learn about the variety of Firewalls that are currently available and how they work.
Discover the abilities of these filters
Examine the cons of such systems.
The following sites were used to make this Multimedia possible.
http://tech.irt.org/articles/js137/
http://www.cio.com/research/intranet/
http://www.cio.com/archive/webbusiness/100198_hbs.html
http://scrtec-ne.unl.edu/SCRTECNE/Support/intranet.html
http://www.in2edu.com/school_internet_intranet
/ http://www.fno.org/fnomay95.html
http://lrs.ed.uiuc.edu/wp/crime/security.htm
http://talou.net/firewall/
http://safety.ngfl.gov.uk/schools/document.php3?D=d68
Sponsored By:
Please feel free to email with any questions, comments or concerns, by clicking the icon here.