Download presentation
Presentation is loading. Please wait.
Published byMadeline Foster Modified over 9 years ago
2
Online Safety and Security Group 6 Ms. Jill Hare Ms. Kara Randall Mr. Robbie Cantrell Chapter 7
3
Introduction Legal Requirements Copyright & Intellectual Property Security Solutions Knotty Problems Other Alternatives
4
Legal Requirements Children’s Internet Protection Act (CIPA) District MUST: Install filtering or blocking technology Implement Internet Safety Policy Conduct public meetings on the Internet safety policies and the control measures they have in place Children’s Online Privacy Protection Act (COPPA)
5
Copyright & Intellectual Property Copyright Law Link: http://www.copyright.gov/title17/http://www.copyright.gov/title17/ Fair Use Doctrine Link: http://www.copyright.gov/fls/fl102.htmlhttp://www.copyright.gov/fls/fl102.html Avoiding Copyright Problems (p.139) Create and implement a technology policy Review policy with educational community Appoint a technology manager Teach ethical and legal behavior Thank employees and students Creative Commons www.creativecommons.org
6
Awareness Programs National Cyber Security Alliance Student Involvement Acceptable Use Policies Warlick’s Four Steps (p. 144) Ethical Behavior Adopt Code of Ethics Security Solutions
7
Administrative Restrictions Parental Involvement Blocking Security Solutions
8
Instant Messaging Social Networking Image Sharing Knotty Problems
9
Links http://classblogmeister.com http://classblogmeister.com http://www.elgg.org http://www.elgg.org Useful Websites http://cybersmartcurriculum.org/safetysecurity/ http://cybersmartcurriculum.org/safetysecurity/ http://newbay.ebookhost.net/tl/lightspeed/2/ http://newbay.ebookhost.net/tl/lightspeed/2/ http://www.slideshare.net/Bernajean/ne-3440462 http://www.slideshare.net/Bernajean/ne-3440462 http://www.microsoft.com/protect/default.aspx http://www.microsoft.com/protect/default.aspx http://www.secure-enterprise20.org/files/Top%20Web%202%200%20Security%20Threats.pdf http://www.secure-enterprise20.org/files/Top%20Web%202%200%20Security%20Threats.pdf http://www.pff.org/issues-pubs/pops/2009/pop16.13-five-online-safety-task-forces-agree.pdf http://www.pff.org/issues-pubs/pops/2009/pop16.13-five-online-safety-task-forces-agree.pdf Other Alternatives
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.