Acceptable Use Policy
What would you do?
- A peer asks to use your password/username because they forgot theirs.
- A peer sends you an email that may offend some people, but you think it is funny and want to forward it.
- Your peer that sits next to you spends the whole class period playing games on the computer.
An affective Acceptable Use Policy should address these scenarios and more.
Identity Safety
Tips for students
- Don't give out personal information unless you have permission from parents
- Don't post current whereabouts
- Never agree to meet anybody you meet on the web
- Change passwords often
Identity Safety
Whenever a person is on the Internet, it is important they keep their personal information private and secure. It is important to know who has access to your information.
- Make sure safeguards are in place
- Use challenging passwords
- Explain the importance of anti-virus software
- Include identity safety tips in lesson plans
- Teach students not to download information from untrusted sources
Acceptable Use Policy
Cyber-predators
The Acceptable Use Policy outlines appropriate use of school technologies for students and educators and puts procedures in place to safeguard access to students' personal information (Roblyer & Doering, 2013).
- School's responsibility to supervise student usage of the Internet.
- Parent and student sign form stating conditions of Internet usage.
A cyber-predator uses the Internet to hunt for victims to take advantage of in any way including sexually, emotionally, psychologically, or financially (Cyber Predators Revealed, 2010).
- The Internet has become the most common way for predators to find their victims
- Predators browse personal profiles
- Predators frequent chat rooms
- Little or no parental supervision
Inappropriate content can include violence, child abuse, extreme political views, adult content, and much more.
- Children may not intentionally seek out inappropriate content (Cyber Issues, 2014)
- Filters, labels, and safe zones enable parents to reduce risk of exposure (Cyber Issues, 2014)
- Limit internet access to certain times of the day to ensure proper supervision
Piracy, Plagiarism
Piracy refers to the unauthorized duplication of copyrighted content that is then sold at substantially lower prices in the 'grey' market (The Economic Times, 2014).
- Piracy involves DVDs, music, videocassettes, software, etc...
- An increasing number of sites offer ways to download copies of software or other media without paying for them (Roblyer & Doering, 2013)
- Results in billions of dollars of loss each year
CyberSafety
How do children access content?
- Unexpected results from online searches
- Clicking on unknown links within websites or emails
- Incorrectly typing a web address or clicking on a pop up add
- Clicking on online game content or prize offers
Acceptable Use Policy
These policies describe what the school system deems 'acceptable use' of technology for educational purposes.
Cyberbullying
Cyberbullying happens when kids bully each other through electronic technology.
Cyber-predators
A cyber-predator uses the internet to hunt for victims to take advantage of.
Identity Safety
Identity safe classrooms are classrooms that ensure students that their social identities are an asset rather than a barrier to success in the classroom.
Inappropriate Content
This includes content that falls into the categories of child abuse, pornography, nudity, violence, etc...
Piracy, Plagiarism
Piracy is the illegal copying of software to share within a group or for resale purposes. Plagiarism is stealing and passing off ideas or words of another as one's own.
Piracy, Plagiarism
Cyber-predator
Plagiarism is defined as the practice of taking someone else's work or ideas and passing them off as one's own.
- Teach students what plagiarism is, why it is wrong, what is permitted, and what is not (Roblyer & Doering, 2013)
- If site is clearly copyrighted, request permission
- If site is not copyrighted, reference site by URL and owner name (Roblyer & Doering, 2013)
- Use sites to check for and prevent plagiarism
Statistics
- 1 in 25 young people using the Internet had been approached by predators (Roblyer & Doering, 2013).
- Online predators tend to fall between the ages of 18 & 55. Their targets tend to be between the ages of 11 & 15 (Cyber Predators Revealed, 2010).
- 73% of children who have offline sexual encounters with offenders do so more than once (Cyber Predators Revealed, 2010).
- 16% of teens considered meeting someone they've only talked to online and 8% have actually met someone they only knew online (Cyber Predators Revealed, 2010).
Strategies for Implementation
- Regular communication with staff, parents, and students about the school strategy (School Strategies, 2014)
- Establish a culture of inclusion and respect (School Strategies, 2014)
- Encourage staff to keep an eye out for bullying (School Strategies, 2014)
- Create clear processes and practices to manage classroom and online behavior and respond to any incidents that may arise (School Strategies, 2014)
- Prepare curriculum plans that explicitly teach safe, responsible and ethical online behaviors (School Strategies, 2014)
Cyberbullying
Prevention
- Know what students are doing online
- Inform students you may monitor usage
- Know the sites students frequent
- Encourage students to report cyberbullying
- Do not respond to bullying attempts
- Block the person who is cyberbullying
Cyberbullying
Cyberbullying is bullying that takes place using electric technology.
- Mean text messages or emails
- Rumors sent by email
- Rumors posted on social networking sites
- Embarrassing pictures
- Fake profiles
http://www.stopbullying.gov/cyberbullying/
CyberSafety
by
Kenneth McKee
References
Roblyer, M., & Doering, A. (2013). Integrating educational technology into teaching(6th ed.). Boston: Pearson/Allyn and Bacon.
School Strategies. (n.d.). Retrieved November 17, 2014, from http://www.education.vic.gov.au/about/programs/bullystoppers/Pages/prinstrat.aspx
Cyber issues. (n.d.). Retrieved November 17, 2014, from http://www.cybersmart.gov.au/Parents/Cyber issues/Offensive or illegal content.aspx
Cyber Predators. (n.d.). Retrieved November 17, 2014, from http://cybersafetycsusm.weebly.com/cyber-predators.html
Piracy Definition | Piracy Meaning - The Economic Times. (n.d.). Retrieved November 17, 2014, from http://economictimes.indiatimes.com/definition/piracy