judson isd internet safety and filtering hearing november 16th, 2009
TRANSCRIPT
11/12/2009
1
Judson ISD ERC, November 16Judson ISD ERC, November 16thth, 6:00pm, 6:00pm
Steve Young, CTO, Technology Services, [email protected] Walker, Director of Desktop Services, [email protected] Ahr, Director of Instructional Technology, [email protected]
11/12/2009
2
• It’s the law. • Judson ISD must comply with Children’s Internet • Judson ISD must comply with Children s Internet Protection Act (CIPA)
• Requirement of Federal eRate program, which Requirement of Federal eRate program, which funds a lot or technology and network access for Judson ISD
• While Judson ISD staff monitors students, the filter servers as extra eyes, especially as the
b f i t t d i lif t numbers of internet devices proliferate
11/12/2009
3
• Judson ISD Board Policy CQ sets out rules for Electronic Communication and Data Management at Judson ISDJudson ISD
• These were last update and adopted by the Board on 10/9/2006 (CQ Local)CQ L l “Th Di i h ll id fil i • CQ Local says: “The District shall provide a filtering service that attempts to block access to…..”
• CQ Legal says “…as a prerequisite to receiving these CQ Legal says …as a prerequisite to receiving these funds, implement certain Internet safety measures…”CQ Legal says “ the District must educate minors • CQ Legal says “…the District must educate minors about appropriate online behavior, including interacting with other individuals on social
t ki W b it d i h t d networking Web sites and in chat rooms and cyberbullying awareness and response.”
11/12/2009
4
Are the most detailed guidelines at JISD for use of computers and network for all JISD userscomputers and network for all JISD users.C2 addresses: conduct, security, system access, password security confidentiality data password security, confidentiality, data protection, asset protection, email, email retention, copyright, filtering, monitoring, retention, copyright, filtering, monitoring, vandalism, and consequences.Last updated and signed by CTO and Last updated and signed by CTO and Superintendent in May 7, 2009.
11/12/2009
5
• Every year they receive a student handbook, which contains JISD Board of Trustee Approved which contains JISD Board of Trustee Approved verbiage (including student code of conduct)
• Handbook includes “Acceptable Use of • Handbook includes Acceptable Use of Internet/Computer facilities” and“Computer/Internet Use Offenses& Conseq ”• Computer/Internet Use –Offenses& Conseq.
• Parents & students must sign acknowledgement form earlform yearly.
11/12/2009
6
• All Internet requests are filtered through q gLightSpeed Systems filter
• Specific known users (staff) may have more l d f l f h h b d f hrelaxed filter if they have been approved for the
access based on job need. ( reference JISD procedure C2 must use Form C2 3 “Request for procedure C2 – must use Form C2‐3 Request for Unfiltered Internet Access”
• Unknown users are restricted to most limited Unknown users are restricted to most limited Internet access, which is student access
11/12/2009
7
Filtering is never 100% perfectSome bad sites can slip throughPeople will try to circumvent the systemSome acceptable sites will get blocked
11/12/2009
8
• Porn and adult content • Security RisksPorn and adult content• Drugs & Alcohol• Weapons
Vi l & H
Security Risks• Hacking• Proxies
• Violence & Hate• Gambling• Dating
Proxies• Spyware• VirusDating
• Social Networking• Instant Messaging
l h
Virus• Plagiarism• Shopping
• Peer 2 Peer File Sharing• Forums, Newsgroups &
Blogs
pp g• Auctions• Musicg
• Email & Chat • Games
11/12/2009
9
On April 28, 2008 JISD implemented Ad i i t ti P d C “C b B ll i ”Administrative Procedure C‐7 “Cyber Bullying”
Seeks to make staff & students aware of internet safety guidelinessafety guidelinesRaise awareness so that victims feel comfortable reporting incidentsp gEstablishes guidelines for administrative handling of incidentsStaff & students will undergo annual training
11/12/2009
10
St ffAction Steps Time Line Resources StaffResponsible Evidence of Attainment
Research topicLocate and categorize resources
Feb.-March, 2009
InternetInternet Safety Video Tape
Instructional Technology Staff Research folder
PowerPoint 2007Create PowerPoint Presentation and Training Script
June-Aug., 2009
PowerPoint 2007Blank CDCopy Paper
Instructional Technology Staff
CD of presentation and hardcopy of training script
Present to Technology Services/Curriculum & Instruction Nov-Dec.,
2009Copies of Script for each participant
Instructional Technology StaffStudent Services
Meeting scheduled and sign in sheets of
Departments for feedback 2009 each participant Student Services Staff attendance
Revise Presentation Dec., 2009 Digital copies of presentation and script
Instructional Technology Staff
Revised CD of presentation and revised hardcopy of training script
P t t Ad i i t t D 2009 Date of principal Instructional M ti A dPresent to Administrators Dec., 2009 p pmeetings Technology Staff Meeting Agenda
Train Counselors, Social Workers, CITs, Librarians Jan., 2009
Meeting roomCDs and Script for each participantSign-in sheets
Instructional Technology Staff Sign in sheets
Evaluation Forms
Train all Teachers on Internet Safety and Cyber Bullying Feb.-May 2010
CD and script for trainerSign in sheetsEvaluation forms
Counselors, Social Worker, Librarians and CITs
Sign in sheets
Train all Students in K 12 on Internet CD and script forTrain all Students in K-12 on Internet SafetyTrain all Students in 3-12 on Cyber Bullying
Feb.-May 2010
CD and script for trainerSign in sheetsEvaluation forms
Counselors, Social Worker, Librarians and CITs
Sign in sheets
11/12/2009
11
Internet at Judson I.S.D.Acceptable Use PolicyGood Neighborhoods, Bad NeighborhoodsSocial Networking SitesYour Words and Pictures in CyberspaceNetiquetteO li Sh iOnline Shopping
11/12/2009
12
1. Explain the main points of the JISD acceptable use policy Li l f “b d i hb h d” b i2. List examples of “bad neighborhood” websites
3. Tell how to protect oneself when using a social network site.4 Tell why one should reconsider before placing potentially 4. Tell why one should reconsider before placing potentially
embarrassing pictures or information online5. List rules to follow when blogging, writing instant messages,
ili d i i i h emailing and visiting chat rooms 6. Explain the dangers of revealing too much personal information to
an online acquaintance.q7. Tell what to do if an online acquaintance says something personal
that makes you uncomfortable or asks to meet.
11/12/2009
13
JISD Philosophy Student JISD PhilosophyDefinitionRationale/Legal
Student ResponsibilitiesReprisal or Rationale/Legal
StatisticsPrevention
Reprisal or RetaliationDiscipline and Prevention
Warning SignsReporting
pConsequences
ReportingInvestigatingExamplesExamplesStaff Responsibilities
11/12/2009
14
1. Define cyber bullying and explain why it can be very dangerous.
2. Give 2 examples of cyber bullying.3. Explain what to do if you receive a threatening
cyber bully message.
11/12/2009
15
Thanks for attending this meeting.