1 / 26

By: Ashley EStep , Alysia George, and Ashley Moffett

Internet Safety. By: Ashley EStep , Alysia George, and Ashley Moffett. 1. Internet Safety In Schools 2. Laws and Rules to Assure Internet Safety 3. Our Suggestions 4. Digital Citizenship Education. Internet Safety in Schools. Cyber bullying Illegal Downloading

selene
Télécharger la présentation

By: Ashley EStep , Alysia George, and Ashley Moffett

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Safety By: Ashley EStep, Alysia George, and Ashley Moffett

  2. 1. Internet Safety In Schools2. Laws and Rules to Assure Internet Safety3. Our Suggestions4. Digital Citizenship Education

  3. Internet Safety in Schools • Cyber bullying • Illegal Downloading • Identity Theft • Viruses • Privacy

  4. Cyber bullying • Sending hurtful messages, posts, photos, or conversations online or on cell phones. • Occurs in cyberspace so it can be hard to detect • http://www.youtube.com/watch?v=S03Br1dwJR8

  5. Illegal Downloading • Easier to do now with the ease of access online with computers • Issue of not paying people for their work • IT IS ILLEGAL! It is a form of theft • Know the difference between legitimate sites and sites that are illegal

  6. Identity Theft • Impersonating someone, usually for financial gain (School CIO) • Password Protection • Don’t give out too much information • Do not post important information

  7. Viruses • Use an up-to-date antivirus program • Scan your computers regularly with the program to help prevent viruses • Do not open emails or attachments from unknown senders • Do not download information from unknown sites

  8. Privacy • As technology's power increases, the ability to keep your information private gets harder to do. • Everything you put online is available to the public! • Control privacy settings on social networking sites and other websites for school use • Everything you post online allows you to leave a “digital footprint”

  9. Laws and Rules to Assure Internet Safety • The Communications Decency Act (CDA) • The Child Online Protection Act (COPA) • The Children’s Internet Protection Act (CIPA) • Sexual Predator Laws • Laws Relating to Filtering, Blocking and Usage Policies in Schools and Libraries for • Pennsylvania

  10. The Communications Decency Act (CDA) • Passed in 1996, the CDA represents Congress’s first attempt to regulate children’s access to sexually explicit material on the Internet. The CDA made it illegal to put “indecent” content on the Internet where kids could find it. However, the Supreme Court unanimously declared the CDA unconstitutional in 1997 in Reno v. ACLU for “broad suppression of speech addressed to adults”; the term “indecent” was found to be too vague.

  11. The Child Online Protection Act (COPA) • In 1998 a narrower version of the CDA required commercial Web sites to verify proof of age before giving users access to sexually explicit material considered obscene for minors. COPA was immediately challenged by the ACLU and other civil liberty organizations, and in 1999 a permanent injunction was ordered against its enforcement. On May 13, 2002, in ACLU v. Ashcroft, the Supreme Court directed a lower court to reexamine its ruling that COPA was unconstitutional. On March 7, 2003, the court again found that COPA was unconstitutional. On June 29, 2004 the Supreme Court kept in place the 1999 lower-court ruling against the enforcement of COPA, but ordered the lower court to consider whether recent advancements in filtering technologies could protect children more or less effectively than the criminal sanctions specified in COPA.

  12. The Children’s Internet Protection Act (CIPA) • In 2000, Congress enacted CIPA, which took effect in April 2001, requiring schools and libraries receiving federal technology funds to install pornography-blocking software on their computers. The American Library Association filed suit alleging that the library portion of CIPA was unconstitutional on its face. On May 31, 2002, the U.S. District Court for the Eastern District of Pennsylvania agreed. The U.S government appealed that decision, and on June 23, 2003, the Supreme Court overturned the district court’s ruling. (The school portion of CIPA has not yet been challenged, so its constitutionality remains untested.)

  13. Sexual Predator Laws • Federal laws have been enacted to protect children from people who lure or attempt to lure them into an offline meeting for the purpose of performing illegal sexual acts or coercing them to provide sexually explicit photos of themselves.In April 2003, Congress passed a law that provides wiretapping authority for seven sexual offenses, including child pornography and the sexual exploitation of children. Part of a broader child-protection bill entitled the Protect Act of 2003, which also mandates the Amber Alert system for abducted children, this law expands federal law-enforcement agencies’ wiretapping authority to catch online predators before they strike.

  14. Laws Relating to Filtering, Blockingand Usage Policies in Schools and Libraries in Pennsylvania • 24 P.S. 4604 – 4612 • Requires school boards and publicly-funded libraries to adopt and enforce acceptable use policies for Internet access that include the (1) use of software programs reasonably designed to block access to visual depictions of obscenity, child pornography or material that is harmful to minors; or (2) selection of online servers that block access to visual depictions of obscenity, child pornography or material that is harmful to minors. • http://www.ncsl.org/default.aspx?tabid=13491#states

  15. Our Suggestions • Visibility • Search Safely • Stranger Danger

  16. Visibility • Place your computer in a centralized place in your classroom so that you are aware with what is being searched and viewed. • Especially important for observing children’s activity online

  17. Search Safely • Place security restrictions • Use age appropriate websites • Use filtering software • Helps to filter our inappropriate content

  18. Stranger Danger • Do not open emails from unknown people • Could contain: • Inappropriate Content • Viruses

  19. Digital Citizenship Education • Think before you post • Give credit when credit is due • Cheating is still cheating online • Privacy Counts • Responsibility

  20. Think Before You Post • Think before you post something or even send a text message • It is virtually permanent • Cannot be erased

  21. Give Credit When Credit Is Due • Respect others’ work • Give credit when using others’ work • Cutting and pasting without credit is plagiarizing

  22. Cheating is Still Cheating Online • Use your self-pride • Do not download illegally • Do not use technology to cheat in school • Do not plagiarize

  23. Privacy Counts • Nothing is as private as you think • Check your privacy settings • Do not post anything that you do not anyone else to see

  24. Responsibility • Be responsible about sites you visit and things you post • You are responsible for what you put online • Use the internet WISELY

  25. Works Cited • http://www.commonsensemedia.org • http://www.schoolcio.com/showarticle/880 • http://www.theitlibrary.com/computertips/virus_tips.html • http://www.ncsl.org/default.aspx?tabid=13491#states

  26. Template Provided By www.animationfactory.com 500,000 Downloadable PowerPoint Templates, Animated Clip Art, Backgrounds and Videos

More Related