By Tori Gordon.  Protecting Students and Technology Resources  Outlets  Dust  Air circulation  Wireless technologies  Smaller, lighter, more portable.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Northside I.S.D. Acceptable Use Policy
Let’s Talk About Cyber Security
Ying Wang EDN 303 Fall Objectives Identify security risks that threaten home and school computers Describe how computer viruses and malicious software.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Boyertown Area School District Acceptable Use Policy.
Security Issues and Ethics in Education
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
VISD Acceptable Use Policy
Security Issues and Ethics in Education
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 6 th Edition Security Issues, Ethics, and Emerging Technologies.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
A Guide to Digital Citizenship
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Viewing the Copyright Presentation The following presentation was created to help you learn more about copyright. To navigate through the presentation.
Donette Mullinix ED 505 UWA Clipart:
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
1 Safety, Copyright, and Fair Use Professional Communication: Copyright © Texas Education Agency, All rights reserved. Images and other multimedia.
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Digital Citizenship Created By: Kelli Stinson June 2011.
Digital Citizenship Project By Allen Naylor Ed 505.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
SAFE AND ETHICAL USE OF TECHNOLOGY By Dorreth Bailey-Oldacre 12/14/14 Professor: Dr. Barbara Gruber, PhD, CETL.
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Cassidy Culligan Digital Citizenship Project ED 505.
Hanscom Middle School Acceptable Use Policy and Computer Lab Rules By Mónica Albuixech Instructional Technology Specialist 2011.
By. Sierra Gillette. Acceptable Use  Abiding by the policies and procedures of other networks that are accessed  Being polite and using appropriate.
Legal, Social, and Ethical Issues By Patt Angell.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 5 th Edition Chapter 8 Security Issues, Ethics, and Emerging Technologies.
Digital Citizenship By Lori Gray.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Digital Citizenship Project
Digital Citizen Project By: Frances Murphey Technology and Education.
Ch. 9&10 RAP SarahBeth Walker. Ergonomics  The study of and development of furniture, tools, & systems that promote productivity in a safe & hearlthy.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
 Ergonomics – is the study of and development of furniture, tools, and systems that promote productivity in a safe and healthy way.  Use Ergonomic Checklist.
Understand Malware LESSON Security Fundamentals.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
1 Safety, Copyright, and Fair Use Professional Communication: Copyright © Texas Education Agency, All rights reserved. Images and other multimedia.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Security and Ethics Safeguards and Codes of Conduct.
Laws and Rules That Govern Internet Safety Ashley Martin.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Security Issues & Ethics in Education By Maud Mushayamunda.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Computer Safety and Ethics
Managing Windows Security
DIGITAL CITIZENSHIP What You Should Know!.
Fair Use in the Classroom
Teaching Internet Safety
Copyright.
The Issues with Technology in education
Student User Agreement and Policy 2022
Presentation transcript:

By Tori Gordon

 Protecting Students and Technology Resources  Outlets  Dust  Air circulation  Wireless technologies  Smaller, lighter, more portable hardware  Computer placement – monitoring students use without being distracting

 Technology-Related Health Practices  Ergonomics: the study of and development of furniture, tools, and systems that promote productivity in a safe and healthy way. ▪ Monitor placement, chair adjustment, desk height, keyboard and mouse placement  Repetitive Strain Injuries: occur during computer use due to the sensitive nature of tissues, tendons, muscles, and nerves of the hand that are subject to repeated motions, awkward positions, or force. ▪ Tendonitis, Carpal Tunnel Syndrome  Visual concerns: ▪ Text presented with dots of light, constantly being redrawn, lower resolution that printed material ▪ Computer Vision Syndrome: inability of eyes to maintain focus on items on screen. Computer glasses or glare screens may help.

 A document that clearly outlines what is and is not acceptable behavior, as well the consequences of unacceptable behaviors.  Can cover use of all resources available for teaching and learning in school setting.  Common elements  Overview, glossary, purpose, rights and responsibilities, examples, consequences, copyright, issues of academic integrity, Internet use

 Law that governs the right to use information  Most current: Copyright Law 1976  If material does not explicitly state that is in the public domain, you may be violating copyright law when you use it  Digital Millennium Copyright Act 1998  Placed strict restrictions on materials that could be used online for instructions.  Technology, Education, and Copyright Harmonization Act 2002 (TEACH Act)  Clarified use of copyright protected materials and outlined required actions on part of school.

 As a teacher you must ensure copyright- protected material is:  Directly related to and is an integral part of instruction  Available only to registered students  Available during a time limited to instructional needs  Used in digital format, if available  Nondramatic, in nature, or a limited portion of a dramatic work

 Fair use refers to the part of US copyright law that allows limited use of a copyrighted material without requiring permission from the copyright holder  The purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes  The nature of the copyrighted work  The amount and substantially of the portion used in relation to the copyrighted work as a whole  the effect of the use upon the potential market for, or value of, the copyrighted work  Public domain materials may be freely used and distributed.  Copyright has expired or work created by the US government

 To stay within the guidelines for amount of work, do not use more than  10 percent or three minutes of a video, whichever is less.  10 percent or 1,000 words of text, whichever is less.  10 percent or 30 seconds of a musical work  Five images from an artist or photographer  10 percent or 15 images from a collection, whichever is less  Two copies of a multimedia project

 Prevention of Plagiarism  Help students understand how to correctly use and cite source material  Design activities in ways that avoid the need for heavy reliance on material that easily can be appropriated from other sources  Develop skills related to finding, analyzing, synthesizing, and reporting information  Prevention of Cheating  Simple observation  Design assessments that encourage high-order and critical thinking  Keeping Data Secure  Family Educational Rights and Privacy Act (FERPA)  Directory information may be disclosed without consent ▪ Name, address, telephone, date and place of birth, major field of study, weight and height  Password Security  Change passwords frequently  Use a mnemonic device such as an acronym  Use 8 characters  Mix upper and lower case, numbers, and special characters

 Children’s Online Privacy Protection Act 1998  Websites that target children under 13 must follow specific guidelines regarding the collection of personal information  Children’s Internet Protection Act 2000  (Filtering Mandate) Blocks access to obscene, pornographic, or harmful to minors ▪ Schools must prove they comply with CIPA ▪ By installing a technology-based solution to block material deemed objectionable as outlined in the act ▪ By adopting policies to monitor Internet use by students (minors)  Access to inappropriate matter on the Internet  Safety and security when using forms of direct communications  Unauthorized access  Unauthorized disclosure, use, and dissemination of personal information  Restricting minors’ access to materials harmful to them

 Malicious software  Spam: unwanted messages across many technologies ▪ Phishing, carding, or spoofing asks for sensitive personal information ▪ Malware can cause significant harm to one or more computers as well as a computer network. ▪ Virus- software program that can attach itself to another program, replicate itself, and cause damage to software or data. ▪ Worm – replicate themselves and can more easily spread themselves across a network and can install a backdoor. ▪ Trojan horse – can delete all of the data stored on the computer or can cause the computer to turn itself off immediately after booting up.

 Malware  Spyware – may record your usage patterns or collect sensitive information you transmit using your computer  Adware – incorporates that presentation of advertisements as a condition for operating the software  Steganography – malware that is hidden in text files or pictures

 Firewall – hardware and/or software that can prevent unwanted persons, messages, or software from entering a network or computer  Virus-protection software – scans files introduced to a computer or for periodic scanning of all files on a computer

 Cyberbullying – the use of technologies to harass, defame, or intentionally harm another student or group of students  Messaging; creating a website; pictures, videos, and other recordings; impersonation  Cyberstalking – the inappropriate online interactions involve adults, engaging with a predator

 Be yourself  Say hello  Describe your message  Be polite  Is it important?  It’s not that funny  Make sure you mean it  To attach or not to attach  Say goodbye  Clean up after yourself

 Trusted Digital Resources  Acceptable and valid materials on the Internet: subscription services, web-based textbooks, long-standing print or media websites  Filtering Software  Designed to help prevent students from coming into contact with inappropriate material when using the Internet  Proxy Servers  Software applications that perform several functions, including filtering and storing Internet content  Portable Web Pages  You and your students can visit websites and store them on a local computer for future use

 Develop short lessons on the appropriate and inappropriate uses of different digital resources.  Involve parents in training sessions.  Organize classroom so that students are guided to use Internet resources appropriately.  Demonstrate successful search strategies and review responsible use practices.  Incorporate appropriate citation strategies.