common sense technology policy2
DESCRIPTION
Presentation given at NYCATE Summer Leadership Conference.TRANSCRIPT
![Page 1: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/1.jpg)
Common Sense Technology Policy
Balancing Security and Access
![Page 2: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/2.jpg)
![Page 3: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/3.jpg)
![Page 4: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/4.jpg)
![Page 5: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/5.jpg)
Access vs. Safety
![Page 6: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/6.jpg)
The Big 6 Concerns?Inappropriate Content
Predators
Misuse of Mobile Communications Devices
Cyberbullying
Network Security
Copyright Infringement
![Page 7: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/7.jpg)
Inappropriate Content
![Page 8: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/8.jpg)
Misperceptions About Inappropriate Content
Web Content Can Be Completely Controlled
![Page 9: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/9.jpg)
Misperceptions About Inappropriate Content
Intentional Viewing of Objectionable Content by Students
![Page 10: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/10.jpg)
Inappropriate Content: The Reality
CIPAFERPA
HIPA
Legal Issues Funding Issues
State Law
Local Policy
![Page 11: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/11.jpg)
Internet Predators
![Page 12: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/12.jpg)
Misperceptions Internet Predators
Adult male posing online to lure very young children into places where they can be kidnapped and assaulted
![Page 13: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/13.jpg)
Misperceptions Internet Predators
Young children being lured by predators into giving personal information that leads to them being harmed.
![Page 14: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/14.jpg)
Predators: The Reality
• Most predation and ensnarement crimes involve adolescents.
• Predators play to teens need to connect, need for info about sex, their search for romance.
• Teens usually do not respond to predator’s solicitations and dismiss them as “litter” on the information superhighway.
![Page 15: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/15.jpg)
Misuse of Mobile Communications Devices
Students recording other students and school staff and postinghttp://dangerouslyirrelevant.org/2008/03/cell-phone-came.html
![Page 16: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/16.jpg)
Misuse of Mobile Communications Devices
Sexting
![Page 17: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/17.jpg)
Misuse of Mobile Communications Devices
Cheating on School Tests and Assignments
![Page 18: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/18.jpg)
Misuse of Mobile Communications Devices
Sending threatening messages or bullying.
![Page 19: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/19.jpg)
Cyberbullying
![Page 20: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/20.jpg)
Pew Research Center Research on Cyberbullying
• 1 in 3 online teens have experienced online harassment.
• Girls are more likely to be victims.• Teens say they are more likely to be
bullied offline than online.• Teens who share their identities and
thoughts online are more likely to be targets than those who lead less active online lives.
![Page 21: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/21.jpg)
Pew Research Center Research on Cyberbullying
• 1 in 6 teens said someone had forwarded or posted communication they assumed was private.
• 13% said someone had spread a rumor about them online.
• 13% said someone had sent them a threatening or aggressive email.
• 67% said bullying happens more offline than online
![Page 22: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/22.jpg)
Network Security
Data Theft and Identity Theft
![Page 23: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/23.jpg)
Network Security
Disabled, Hacked or Vandalized Networks
![Page 24: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/24.jpg)
Network Security
Virus and other Malicious Network Attacks
![Page 25: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/25.jpg)
Dealing with Inappropriate Content
• Focus on teaching students Internet literacy, safety and responsibility.
• Enforcement of reasonable AUPs.• Teachers should monitor students while
online.• Use history folders and other
technological measures to monitor students.
![Page 26: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/26.jpg)
Dealing with Internet Predators
• Establish open communications between adults and young people.
• Parents and professional educators must take responsibility for learning about technologies and how to monitor their young people.
• Adults must engage young people in conversations about the problem of adults posing online for the purpose of engaging in sexual activity.
![Page 27: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/27.jpg)
Dealing with the Misuse of Mobile Communications Devices
• Teach students proper and constructive uses of MCDs rather than banning them.
• Directly teach students when to use the devices appropriately.
![Page 28: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/28.jpg)
Dealing with Cyberbullying
• Provide students, parents, and all educators with information regarding the prevention of cyberbullying.
• Be aware of all laws and policies regarding cyberbullying.
![Page 29: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/29.jpg)
Dealing with Network Security: Data/Virus/Malicious Threats
• Have a network rights strategy.• Make sure desktop is secure but not at
expense of instructional needs.• Balancing security with server space
and network use.• Use solutions to monitor student use.• Use good firewalls.• Complete periodic security
assessments.
![Page 30: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/30.jpg)
My Educational Technology Gottas
• Least restrictive technology environment as possible.
• Encourage the use of technology in as many ways possible.
• Get teachers involved in security.• Approach administration of technology
with students and teachers are customer mindset.
![Page 31: Common sense technology policy2](https://reader033.vdocuments.us/reader033/viewer/2022052823/5554db4eb4c9051b6e8b5040/html5/thumbnails/31.jpg)
Questions and Discussion