1 / 28

Counselor

Counselor. Tech. 2012. A quick commercial. I am looking for veteran counselor educators (15+ years in education overall, including teaching, counseling, etc) to interview for my dissertation study. Please e-mail me at echancy@wcpss.net or text or call me at 919-418-4402.

harvey
Télécharger la présentation

Counselor

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Counselor Tech 2012

  2. A quick commercial I am looking for veteran counselor educators (15+ years in education overall, including teaching, counseling, etc) to interview for my dissertation study. Please e-mail me at echancy@wcpss.net or text or call me at 919-418-4402

  3. How it all started… E N I A C 60,000 pounds 18,000 vacuum tubes

  4. And then… A L T A I R 8 8 0 0

  5. Remember these? 80 KB 360 KB 1.44 MB

  6. And now? 128 GB

  7. Before we talk about digital usage • Let’s clarify when we should and should not. • Is your data secure? Do you leave your hallway logged in to your email, NCWise, other confidential information sources? • Do you work from home? If so, is your router open or protected, or do you know?

  8. Challenge • Law has not caught up with technology. • School districts must operate according to statutes and case law that do not contemplate modern technology. • Slide is from Cyber Ethics: From Policy to Practice, Kentucky Kentucky Association of School Administrators Education Law & Policy Symposium, June 7, 2012, Peter K. Fagen, Managing Partner, Fagen Friedman & Fulfrost, LLP

  9. North Carolina Law Session Law 2009-551, House Bill 1261 "§ 14-458.1. Cyber-bullying; penalty. (a) Except as otherwise made unlawful by this Article, it shall be unlawful for any person to use a computer or computer network to do any of the following: (1) With the intent to intimidate or torment a minor: a. Build a fake profile or Web site; b. Pose as a minor in: 1. An Internet chat room; 2. An electronic mail message; or 3. An instant message; c. Follow a minor online or into an Internet chat room; or

  10. c. Follow a minor online or into an Internet chat room; or d. Post or encourage others to post on the Internet private, personal, orsexual information pertaining to a minor. (2) With the intent to intimidate or torment a minor or the minor's parent or guardian: a. Post a real or doctored image of a minor on the Internet; b. Access, alter, or erase any computer network, computer data, computer program, or computer software, including breaking into a password protected account or stealing or otherwise accessing passwords; or c. Use a computer system for repeated, continuing, or sustained electronic communications, including electronic mail or other transmissions, to a minor. (3) Plant any statement, whether true or false, tending to provoke or that actually provokes any third party to stalk or harass a minor.

  11. (4) Copy and disseminate, or cause to be made, an unauthorized copy of any data pertaining to a minor for the purpose of intimidating or tormenting that minor (in any form, including, but not limited to, any printed or electronic form of computer data, computer programs, or computer software residing in, communicated by, or produced by a computer or computer network). (5) Sign up a minor for a pornographic Internet site. (6) Without authorization of the minor or the minor's parent or guardian, sign up a minor for electronic mailing lists or to receive junk electronic messages and instant messages, resulting in intimidation or torment of the minor.

  12. Vital understanding • “Private” accounts are not private unless they are owned by a private individual. • Not one account on Facebook or Twitter or Gmail is “owned” by the individual. • Not one account or character or avatar on an online game is “owned” by the individual. • These things that students claim are private are on public web pages, and subject to other people’s rules.

  13. What’s your district’s social networking policy? • Do not access social networking sites from school computers, on school networks, or during work hours. Reference Board policy 3013 and the associated R&P for more details about the appropriate use school system technologies. • Do not “friend” students or their parents. Unlike traditional forms of communication, postings on social networking sites are transmitted simultaneously to large numbers of people. When you “friend” a student, that student will have automatic access to many postings by you and others, some of which may not be appropriate for children. In addition, all employees are expected to maintain a high degree of professionalism in their interactions with students and their parents. Treating children as “friends” rather than as students is unprofessional and may interfere with our educational mission. • Think before you post. Remember that anything you post on the Internet can be shared with others and may be seen by students, parents, and other members of the community. Remember also that posts or comments may be archived instantly or disseminated by others before you have the chance to “take it back.” • Do not post any material that would be inappropriate for school-aged children and do not allow any such material to be posted by others who have access to your site. Remember also that you are ultimately responsible for anything that appears on websites you control or maintain.

  14.  Refrain from using school system-owned technologies to bully, harass, or sexually harass coworkers or students. These duties apply in cyberspace no less than in the classroom or work environment. Reference Board policies 3035 and 3038 for details. • Take steps to ensure that your social networking site is as private as possible, including the use of secure passwords, and do not allow students or their parents to gain access to your site. Do not assume, however, that anything you post on the Internet will always remain “private.” • Do not post comments of any kind on the websites of students or any minor children, either within or outside of the school system. • Do not post confidential information about yourself, your coworkers, or students on any Internet site. The disclosure of information about students, in particular, may violate state and federal confidentiality laws, even if the intent is to praise or encourage the students. • Do not post anything that could lead others to believe that your website, or anything on it, is sponsored or endorsed by the school system. • Do not make any comments to others in cyberspace that you would not make face-to-face. In particular, do not demean, harass, insult, or intimidate others. • Remember that under Board policy 3005 and the associated R&P you are expected to serve as an example and role model to students, and conduct yourself accordingly at all times.

  15. Google • Share docs for collaborative work • Data collection made easy • “Hangout!”

  16. Facebook • Should only be used by your friends to embarrass you…

  17. …but can be used as a great tool for information dissemination, provided you are comfortable with the settings, and can actually access it.

  18. Twitter • https://twitter.com/ApexCounselors • Vital to being able to actually stay in 140 characters or less: • bitly

  19. What Can’t You Learn? • Information sharing is at an all time high. In the last three years, I have learned online how to: • Change my brakes and rotors and transmission fluid and gaskets • Make solar panels from scratch • Change a washing machine gasket • Fix a broken laptop screen • Usually when someone calls me for tech support, I go online.

  20. Kahn Academy A free world-class education for anyone anywhere. The Khan Academy is an organization on a mission. We're a not-for-profit with the goal of changing education for the better by providing a free world-class education for anyone anywhere. All of the site's resources are available to anyone. It doesn't matter if you are a student, teacher, home-schooler, principal, adult returning to the classroom after 20 years, or a friendly alien just trying to get a leg up in earthly biology. The Khan Academy's materials and resources are available to you completely free of charge. http://www.khanacademy.org/about

  21. College courses online FREE!!! • http://www.openculture.com/freeonlinecourses • https://www.coursera.org/ • http://ocw.mit.edu/index.htm • iTunesU

  22. What about your site? • http://apexcounselors.weebly.com/ • counselortech2012.weebly.com • How does your site help you? Does it empower your parents and students to locate information on their own, or does it create confusion? Does it promote more advanced conversation, or require a clarification of the original information?

  23. SPAN / SAM • SAM – School Assistant Module • SPAN – Student Parent Access Network • Coming soon to a server near you: • PEARSON POWERSCHOOL

  24. Make your own media! • Have content you want to personalize for your school? You can use a flipcam or a webcam to capture the video, then drop it into your own movie! • How to Ruin Your Life Online • http://bit.ly/bhgFSZ • What about a podcast? Audio recording, straight from your desk, your thoughts on the week?

  25. The tools used to make computers accessible to those with disabilites… • Can be used by everyone. • Speech to text • Most versions of Windows have speech to text built in, but you have to train it. • Enlarging the screen • Text to speech • Free already in Adobe Acrobat Reader, and you can download other free programs. • RFB (Recording for the Blind) – Audiobooks online

  26. It’s the simple things… • Easily replicable documents are important. So is saving paper, toner reducing wear on copy machines. • We’ve gone to an electronic form for record keeping: FRC checksheet • FRC checksheet.docx

  27. Dropbox • Mobile application for use in viewing and editing documents • Drop it into your dropbox folder at home • See it on the go! • Share it with others

  28. Keepass • Tired of trying to remember all those passwords? • Keepass allows you to keep one master password, and weblinks to those sites. One right click for each gets you logged in.

More Related