Danielle Hildebrant
Acceptable Use Policies ◦ document stating the use and limits of the network or internet Cyberbullying ◦ Bullying that takes place on online Cyberpredators ◦ Sexual predators that use the internet, especially chat rooms to lure children Identity Safety ◦ Protecting online identity Inappropriate Content ◦ Content that doesn’t fit a norm or standard for children Piracy & Plagiarism ◦ Unauthorized use or copying and/or distribution of copyrighted material
Effective AUP Effective AUP ◦ A preamble ◦ A definition section ◦ A policy statement ◦ An acceptable uses section ◦ An unacceptable uses section ◦ A volitions/sanctions section Student and parents sign
Developing an acceptable use policy ◦ Not in a vacuum (Educational World) ◦ Based on philosophy Balance freedom and responsibility Students must be aware before being allowed to use the computer network or internet
Bulling that takes place thru the internet ◦ Instant Messaging ◦ Social Networking sites ◦ Cell phones Target any time and at any time Forms (National Center “cyberbullying”) Forms ◦ Flaming & tolling ◦ Happy Slapping ◦ Identity Theft/Impersonation ◦ Photoshopping ◦ Physical Threats ◦ Rumor Spreading
◦ Avoidance of the computer, cell phone ◦ Stressed when receiving and , instant message or text message ◦ Withdraws from family and friends ◦ Acts reluctant to attend school or social activities ◦ Avoids conversations about computer use ◦ Low self-esteem Depression Fear ◦ Poor eating and/or sleeping habits ◦ Declining grades
Think before you post anything Think before you post anything Nothing is private ◦ Sexting ◦ Explicit photos CyberPredators (FBI) ◦ Any age ◦ Any sex ◦ No general look such as the dirty old man
Are your children at Risk? ◦ Large amount of time online Especially in chat rooms or games that include chat Most of the time at night ◦ Someone sends pornography pictures ◦ Receiving phone calls from strangers
Refers to the practices and precautions observed to ensure safe internet use FCC leaves it up to each school district Broadband Data Improvement Act (Gurus of Cyber Safety) ◦ 2008 ◦ Protect students in 21 st century Sharing information can put you at risk (CyberSafety Team Education)
Sharing puts you at risk for: Identity theft Scams Spam Physical or emotional harm Checking credit reports frequently Protecting Children from ID Theft Protecting Children from ID Theft
Not all content online is appropriate for every child Appropriate and inappropriate content – equally accessible Sexually explicit Material Sexually explicit Material Other content (National Center “Inappropriate Content”) ◦ Graphic material ◦ Glorify risky and illegal behaviors
Video Games ◦ Violent content and/or images ◦ More and more realist What was once cartoon like or unrealistic is becoming very realistic Never give children a video game without first going thru it Never assume because the first one wasn’t violent that the new one wont be
Passing work off as your own that isn’t Hurts the student ◦ Doesn’t learn Note taking Evaluating source Selecting appropriate quotes Paraphrasing Citation 6 major consequences 6 major consequences
Piracy ◦ Unauthorized copying and/or distribution of copyrighted material Does include license infringement (BSA)license infringement ◦ Multiple computers – one license ◦ Sharing license information with others Civil and criminal penalties (BSA) Malware, ransom ware, spyware & viruses
Reporting pirated software Reporting pirated software Keep the computer in a common room Teach polite communication online ◦ Rude s, messages or comments Talk about sexual victimization and potential on-line danger Parental controls Protect the computer with antivirus software
Baylor School Consequences of plagiarism (n.d) Retrieved October 25, 2014 from BSA The Software Alliance Compliance & Enforcement (2014). Retrieved October 25, 2014 from CyberSafety Team Education Identity Safety (n.d) Retrieved October 25, 2014 from Edtecher. Think before you post #2. (2009) retrieved October 25, 2014 from Education World. Getting Started on the Internet: Developing an Acceptable Use Policy (AUP) ( ) Retrieved October 25, 2014 from Federal Bureau of Investigation A Parents Guide to Internet Safety (n.d). Retrieved October 25, 2014 from Guru’s of Cyber Safety identity Safety (n.d) Retrieved October 25, 2014 from iThenticate 6 Consequences of Plagiarism ( ). Retrieved October 25, 2014 from National Center for Missing & Exploited Children Cyberbullying ( ). Retrieved October 25, 2014 from National Center for Missing & Exploited Children Inappropriate Content ( ). Retrieved October 25, 2014 from Zoeller, Greg. Protecting Children from ID Theft. (2010). Retrieved October 25, 2014 from