Download presentation
Presentation is loading. Please wait.
1
for Isle of Wight County Middle and High School Teachers for Isle of Wight County Middle and High School Teachers
2
What does VDOE say about Internet Safety? House Bill 58 states that school divisions “include a component on internet safety for students that is integrated in a division’s instructional program.” School systems are allowed to create their own curriculum that encompass what students should know as well as what teachers and parents should know.
3
Why should I care about care about Internet Safety? VDOE new state requirements 2006 Guidelines and Resources published 2007 Curriculum & Implementation Plan IOWC School Board approved curriculum Principals are accountable for school-wide implementation
4
What does IWCS say about Internet Safety? Newly approved curriculum, compiled by the CRSs, must be implemented yearly Middle School Plan: 6-8 students will participate in an Internet Safety unit taught in Health and PE classes. Teachers will receive an overview of the curriculum and learn their responsibilities for ensuring Internet safety all year long Parents will be issued documentation and will have access to resource on school web sites High School Plan: 9th Grade students will participate in the internet safety curriculum incorporated into Health and PE classes. 10-12 grade students will participate in the internet safety curriculum that will be incorporated into English classes. Parents will be issued documentation and will have access to resource on school web sites
5
Internet Safety Integration for Isle of Wight County Schools Grades K-8 - CyberSmart Curriculum (Integrated into Library and Health Courses) Safety Manners Grades 9-12 - Webwise Kids, Educause, Berkerly (Integrated into Health and English Courses) Safety Ethics Research
6
Classroom Internet use can be exciting, rewarding, and challenging. Filters are not fail proof! (Google Images) Students will probably know ways to get around the firewall. Example: www.otunnel.comwww.otunnel.com Teachers should keep an eye on students when they are on the Internet just as they would as if they were on a field trip! Students’ Internet use should be tailored to their ages Random Internet browsing should NOT be allowed! Students on the Internet should have a specific purpose for being there! Teachers should check the history of visited sites as much as possible, especially if there is suspicion of students going to inappropriate sites. It is the teacher’s responsibility to be familiar with the division’s AUP (Acceptable Use Policy) Monitoring is
7
Technological Interactions Can Effect Everyone! Sharing Personal Information Privacy Issues Producer Identity Theft Consumer Cyberbullying FYI: Online, people are not always who they claim to be! http://online.wsj.com/public/resources/images/PJ- AJ538A_pjCYB_20070123203254.jpg
8
CopyrightCopyright protects “original works of authorship” that are fixed in a tangible form of expression. (Copyright Office, 2007) Musical works, including accompanying words Dramatic works, including any accompanying music Pictorial, graphic, and sculptural works Motion pictures and other audiovisual works Sound recordings Architectural works Proposed Multi-Media Guidelines for Teachers and Students: Motion Media - Up to 10% or 3 Minutes--whichever is less Text - Up to 10% or 1000 words, whichever is less Music, Lyrics, & Music Videos - up to 10% but not more than 30 seconds from an individual work Illustrations & Photographs - Single artist, up to 5 images - Collection, up to 10% or 15 images, whichever is less Database & Data table - up to 10% or 2500 field entries, whichever is less The safest course is always to get permission from the copyright owner before using copyrighted material.
9
Be Smart…Make and POST Them… Examples: Rule 1 - School computers are for school use ONLY. Students are only to use the computers for school-related research, project completion, or teacher-directed activities. Rule 2 - A warning will be given to the student upon the first infraction of Rule #1. Rule 3 - Computer privileges will be revoked and a referral will be written upon a second infraction. Rule 4 - Honor Copyright Law REVIEW RULES OFTEN WITH STUDENTS!
10
Publishing on the Internet Content must be school-related Students should not fill out forms or post information that reveals “private identity” information Identify students with a restriction on photo consent forms. Check AUP returns If you are a teacher that is going to use email in your classroom, it is a good practice to have students create email accounts for this sole purpose. It is a good practice to keep all student email account information accessible. This includes Username AND Password information. Let students know that you will check email accounts periodically to ensure information that is posted is school-related.
11
Social Networking Sites Myspace.com (middle and high) Facebook.com Text Messaging Instant Messaging (IM) Chat Rooms Gaming Music Sites (iTunes) Video Sites (You Tube, Google Videos)
12
A Parent’s Guide to Online Safety Online Risks (Netsmartz) How To (staysafe.org) Cyberbullying (Cyberbullying.org) Social Networking and Schools Risks by Technology: Email Young People, Music, and the Internet Kids’ Rules for Online Safety Common Sense Rules Can Protect Kids on the Net
13
Copyright Office (2007). Retrieved on June 14, 2007 from http://www.copyright.gov/circs/circ1.html#wcihttp://www.copyright.gov/circs/circ1.html#wci Cyberbullying Image. Retrieved on January 10, 2007 from http://online.wsj.com/public/resources/images/PJ- AJ538A_pjCYB_20070123203254.jpg http://online.wsj.com/public/resources/images/PJ- AJ538A_pjCYB_20070123203254.jpg Frost, Randall (2003). Retrieved on January 10, 2007 from http://gerstmanandmeyers.com/features_effect.asp?pf_id=177 http://gerstmanandmeyers.com/features_effect.asp?pf_id=177 Swinth, Farnham, and Davis. Sharing Personal Information in Online Community Member Profiles. Retrieved on January 12, 2007 from http://research.microsoft.com/scg/papers/sharing%20personal%20information%20in%20online%20community%20member%20profile s%20-%20with%20names.pdf http://research.microsoft.com/scg/papers/sharing%20personal%20information%20in%20online%20community%20member%20profile s%20-%20with%20names.pdf University of Michigan. Protecting Against Misrepresentation and Identity Theft. Retrieved on January 12, 2007 from http://identityweb.umich.edu/computing-tips.html http://identityweb.umich.edu/computing-tips.html VDOE Guidelines and Resources for Internet Safety in Schools (2006). Waxer, B. and Baum, M. (2007). Copyright on the Internet. WiredKids, Inc. (2007). Retrieved on June 14, 2007 from http://www.stopcyberbullying.org/what_is_cyberbullying_exactly.htmlhttp://www.stopcyberbullying.org/what_is_cyberbullying_exactly.html
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.