Privileges, Privacy, and Protection of Youth Bloggers in the Social Studies Classroom

Size: px
Start display at page:

Download "Privileges, Privacy, and Protection of Youth Bloggers in the Social Studies Classroom"

Transcription

1 Social Education 70(3), pg National Council for the Social Studies Connect with Technology Privileges, Privacy, and Protection of Youth Bloggers in the Social Studies Classroom Ilene R. Berson and Michael J. Berson Internet users continue to develop new ways of communicating online and disseminating information; one of these methods, the blog, also known as web log, has become a significant cultural phenomenon. Blogs offer an interactive medium for internet users to create and contribute content to the web. Initially introduced as online journals in the mid-1990s, user-friendly blogging software has made online publishing much more accessible and widespread. 1 The popularity of blogs evolved in response to the September 11 terrorist attacks, as people sought new ways of exchanging information; the technology proliferated when users realized the power of blogging to reach a worldwide audience. Now even novice users can post material on web pages, comment on others sites, and establish links to a variety of blogs. Most blogs represent content in a journal format. Recent figures estimate that a new blog is created every second. 2 The blog phenomenon has impacted not only the nature of online communities, but also created new political and social spheres of influence. 3 Blogs may attempt to sway public opinion about political issues, share commentaries by professional and citizen journalists on major news events, or serve as social networking tools for young people. They range from the mundane to the outrageous. Some blogs have established reputations for accurate reporting and have a worldwide following, while others remain obscure and limited to a small, connected group of friends or associates. Regardless of their influence, blogs are a form of mass communication that augment existing dissemination strategies and facilitate online debate and dialogue. Youth Bloggers The blogosphere (or community of web logs) of young people primarily centers around social networking sites, such as MySpace, Xanga, and Facebook. Young people use this forum to publish their creative works, photos, stories, videos, comments, and other online content. These sites allow teens to express themselves, share their interests and passions, and get feedback from others. They facilitate connections with other students who share common interests and help maintain bonds within a peer group. As stipulated by the Children s Online Privacy Protection Act, most of these sites are open only to children aged 13 or older. 4 However, most sites do not use age verification tools, and there are many younger blog users who lie about their birthdates when setting up their own personal blogs. 5 Between March and August of 2005, the number of blogs nearly doubled in size, increasing from 7.8 million to 14.2 million. 6 Researchers from the Children s Digital Media Center at Georgetown University have reported that more than half of all blogs are run by 13- to 19-year-olds. 7 In a Pew Internet study, among the 21 million teenagers who use the internet, 57 percent have contributed content to the web, and 19 percent have created their own blog. 8 Nearly 40 percent read blogs with older adolescent girls being the most avid users of this forum. Most restrict their blog activities to a network of peers with whom they have prior association, and use interactive communication tools to enhance their social connection with friends. This allows teens to network with others, share their interests, and express their thoughts. They assemble galleries of friends, and the size of friends lists can be a status symbol among peers. Blogs in Education An increasing number of schools have integrated blogs into instruction to enhance communication and promote more engaged learning. Blogs are be- 124

2 ing used to keep parents informed of classroom activities, to engage students in reflective journaling, to enhance students summarizing and writing skills, and to promote safe, constructive blogging. 9 Teachers may post the day s activities, assignments, handouts, or class grades. Some school blogs include an interactive component in which teachers respond to questions from students. Students may also post entries about daily class activities, providing regular updates to keep parents informed. 10 These blogs promote a transparent classroom environment in which parents feel connected and involved in their child s education, and teachers enhance their responsiveness to students while fostering a sense of community. In some social studies classrooms, teachers are using blogs to supplement classroom instruction and facilitate discussion among students. Through classroom blogging, students can grow accustomed to sharing creative ideas, chronicling experiences, and articulating points of view. They can reflect on current events or interact with other students in distant schools to share views on a range of topics, such as racism, citizenship, poverty, and politics. Copies of Handbook for Bloggers and Cyber-Dissidents are displayed at the Apple Expo computer show in Paris, September 22, The Reporters Without Borders handbook is partly financed by the French government and includes technical advice on how to remain anonymous online. (AP Photo/Christophe Ena) Blogs have become valuable resources for the social studies classroom. 11 News service blogs, in particular, enrich regularly accessible print, radio, or television news coverage. There are also blog sites that relate to specific social studies content. For example, the American Presidents blog was created by Michael Lorenzen, a librarian at Central Michigan University, and explores interesting facts about Ameri- can presidents and the presidency. In a March 6, 2006 post, on Lorenzen highlights two entries from other blogs on Abraham Lincoln and George Washington: The first is Anniversary of Lincoln s first assassination attempt [collectingmythoughts.blogspot. com]. It is from 2005 and it is by Norma Bruce. It has information on Lincoln s first assassination attempt, which was foiled by a librarian who was his bodyguard. Got to love those hero librarians like William T. Coggeshall. The second is by elementa ryhistoryteacher. It is George, We Hardly Knew Ye! [historyiselementary.blogspot.com] It deals with how she teaches elementary school students about President Washington including dispelling myths about him. (What, no wooden teeth!) 12 Schools also serve as an organizing structure for youth bloggers whose content and profiles are often determined by school identification. Many blog spaces offer search functions that allow students to be located based on A p r i l

3 geographic region, school association, and age. Some schools have responded to the proliferation of blogging by prohibiting the use of blogs on school computers; 13 however, students are often adept at circumventing such bans, or they simply continue their blogging activities outside of school. Assorted Stuff.com, selected by eschool News as the Best Classroom Blog for Teachers, had a post in early March about the fear that increasingly exists around blogging: Fear of blogging has been a regular theme around here lately. The focus, unfortunately, has been on how nervous administrators and teachers are about the irresponsible posts created by students. Barbara Ganley, however, posts a wonderful and thoughtful look at fear from another angle [mt.middlebury.edu/middblogs/ganley/bgblogging/]. Over the past year I ve posted several entries on what student blogging means for the teacher the fear of change the fear of free-falling, of moving away from the known, of relinquishing control and of the impact on our time and the resulting pressure on how we train our teachers. It s one thing to talk about subjectcentered, collaborative-centered, connected learning (via blogs or not); it s another thing altogether to make it truly a reality in classrooms employing blogs in ways many edubloggers write about, including me. She pulls in the ideas of several others who are writing about blogging with students to create an essay that offers much to think about. This is an example of the kind of opportunity to network and discuss we should be offering our students. 14 Privacy and Protection Although blogging can be an enjoyable way to express oneself, the posting of stories, videos, and photos online can place individuals at risk for identity theft, stalking, harassment, and other privacy infringements. Teens commonly make the mistake of sharing personal information, such as their names, birthdays, school names, phone numbers, sports teams, or other private details. One of the features that makes blogs so attractive to young people is that individuals can share their intimate feelings in a context that offers the illusion of anonymity. 15 With the false sense of trust created in a digital environment, children can be more easily victimized by individuals who are savvy about young people s vulnerability and willingness to disclose personal and private reflections to an understanding stranger. Moreover, the teen blogosphere fosters disinhibition. 16 It is enticing for youth to have a place in which they can fully disclose their thoughts and personal information with perceived impunity. Emotionally vulnerable young people may engage in self destructive behavior, including sexual exploits, drug experimentation, and criminal activity, and share these dangerous escapades with their online social networks. In a free wheeling setting that seems to be devoid of rules and ripe for experimentation, some young people are oblivious to the reality that their communication is taking place in a public context. Postings, both text and photos, can spread far beyond their intended immediate circle, since blogs are part of a global and public forum. According to Pew study results, nearly 80 percent of teens believe that their peers engage in reckless behavior online. 17 Education officials have also expressed concern about blogs being used to abuse, harass, or disclose inappropriate material about teachers, staff, the school in general, or other students. Some schools have banned blogs to curtail bullying and inappropriate online communication that could have repercussions for the school. 18 However, even in these restricted settings, blogs can continue to be used as a tool by teachers to share information with parents and students. In addition to libelous information being published on blogs, disclosure of personal data can be extremely dangerous. 19 Predators locate young bloggers, establish relationships, and subsequently arrange face-to-face meetings. Alarm about child predators using personal information found in blogs has intensified after recent reports of teenage girls who were molested by men they met on social networking sites. 20 A predator can easily identify vulnerable young people and locate them with the phone numbers, school information, and photographs that are made readily available in these forums. In some cases, students disclose or even promote the use of alcohol, drugs, or other self-harming behaviors on their blogs. In some secondary schools around the country, students are facing disciplinary action after posting photos that capture underage alcohol consumption at parties. The police are also monitoring blogs to investigate cases, sometimes uncovering confessions of crimes as young people boast about their illicit activities. 21 Of course, as parents become increasingly savvy, they also can search out their child s blog postings. Students do not realize the repercussions. As they prepare to go on to the next stage of their lives, college recruiters and prospective employers may refer to these forums as part of routine background checks. Preparing Students for Safe Blogging Some teachers are embracing blogs as a learning tool. 22 These teachers use the opportunity blogs offer to teach about the safe and appropriate use of technol- 126

4 ogy. In social studies classrooms this can include exploring and debating the legal issues associated with student blogging. The Electronic Frontier Foundation (EFF) has developed a Bloggers FAQ on student blogging that details students rights and responsibilities. The constitutional right to freedom of speech or expression is discussed in the context of school-hosted blogs, as well as personal blogs. The following EFF guidelines for avoiding situations that could result in disciplinary action could make discussion points: 23 Don t post anything that someone at school is likely to take as a direct physical threat against school staff or students. Don t advocate for the immediate violation of any laws or school rules. Review the Bloggers Legal Guide to understand your rights and make sure you aren t publishing anything illegal. Just as you have First Amendment rights like other bloggers, you re also subject to all the same legal responsibilities. Don t use any school resources to publish or view your blog. Don t encourage other students to read or post comments to your blog while at school tell them to wait until they are off campus. If you see comments on your blog posted by other students during school hours, consider deleting them. Make sure it s clear to readers that the blog isn t sponsored by or affiliated with the school. In order to create a more protective blogging experience, many teachers actively manage postings prior to publication on the web. Some educators choose to use password-protected blogs, therefore restricting access to a limited audience. Privacy protections, such as blogging under a pseudonym, using only the child s first name, or including just initials as an identifier, are other strategies to help students avoid the risk for victimization. Integrating cybersafety into the curriculum and offering training sessions to educate families and students on safeguards are also important strategies for protecting young people from embarrassment or harm. The following guidelines provide a framework for managing the challenges associated with young people and blogging: 24 The posting of personally identifiable information, including the full name, school name, sports teams, friends, hangouts, etc., should be avoided since even small clues can be linked to reveal the location of a young person online. Moreover, it is important for young people to know that their online activity is never truly anonymous, and law enforcement can work with Internet Service Providers and blog hosts to disclose the identity of users engaged in illegal activities. Blog postings are public, permanent, and available worldwide. Search tools like Google s Blogsearch can make it easy to access an individual s blogs, as well as blogs on any specified topic. Even deleted blog entries may become archived by individuals who have downloaded and saved the information on their hard drives, or through tools such as the Internet Wayback Machine. Therefore, young people should be encouraged to activate privacy preferences, use password-protected blogs, and restrict access to their blogs to their network of trusted friends and family. A blogger is responsible for the comments and material that appear in his or her blog. Therefore, threatening or offensive messages that could embarrass or be harmful to others should A p r i l be deleted. Photos also should be carefully selected so that the young person is not easily identifiable, and the photo should be a responsible and appropriate representation of the individual. Since anyone can download images from the web, photos could end up in anyone s possession. Blogs have to abide by copyright rules and regulations. Despite the overall challenges, blogs offer a medium in which students can engage with academic content, as well as advance their skills for constructing narratives, facilitating dialogue, and exchanging ideas with diverse groups of people. Simultaneously, blogs can be used as part of young people s self-discovery processes as they explore different personas or expand their friendship networks online. Social studies educators have the opportunity to support their students as they develop skills as citizens in a digital age. 25 By using this tool that gives young people the sense that their voice and opinions have value, the social studies can advance youth engagement, promote students capacity to challenge their own thinking as well as the thinking of others, and subsequently foster deeper and more meaningful interactions among our most active cybercitizens. Notes 1. Laura J. Gurak, Smiljana Antonijevic, Laurie Johnson, Clancy Ratliff, and Jessica Reyman, Introduction: Weblogs, Rhetoric, Community, and Culture, Into the Blogosphere: Rhetoric, Community, and Culture of Weblogs, blog.lib.umn. edu/blogosphere/introduction.html [accessed November 20, 2005]. 2. Technorati, ( is a search engine that tracks blog activity; as of March 2006, it counted 30 million blogs (60 times the number three years ago). Blogs are doubling about every 5.5 months, with about 75,000 new blogs appearing each day. 3. Chris Bowers and Matthew Stoller, Emergence of the Progressive Blogosphere: A New Force in American Politics (New Politics Institute: A Think Tank for Politics, 2005), [accessed December 15, 2005]. 4. See 5. MySpace and Facebook have created algorithms to identify underage users and eradicate their profiles. They also screen photos that are posted to safeguard against offensive content. Some organizations, such as epals Classroom Exchange and WiredKids, have

5 announced plans to develop kid-friendly blogging tools that limit use to young people and monitor for inappropriate content. 6. Gurak, et al. 7. David A. Huffaker and Sandra L. Calvert, Gender, Identity, and Language Use in Teenage Blogs, Journal of Computer-Mediated Communication 10, no. 2 (2005), article 1, jcmc.indiana.edu/vol10/issue2/ huffaker.html. 8. Lee Rainie, The State of Blogging, Pew Internet and American Life Project (January 2005) www. pewinternet.org/ppf/r/144/report_display.asp. 9. Catherine Poling, Blog on: Building Communication and Collaboration among Staff and Students, Learning and Leading with Technology 32, no. 6 (March 2005): Profiles 2/22/06 4:27 PM Page Emily Anthes, Blogging Classroom Connects to Parents, (August 9, 2005), com/2005/08/09/tampabay/blogging_classroom_ co.shtml [accessed December 18, 2005]; Alorie Gilbert, Blogging 101-Web Logs go to School (October 17, 2005), news.com.com/blogging+101 Web+logs+go+to+school/ _ html [accessed December 15, 2005]; Larry Magid, Your Students are Blogging (N.D.), [accessed December 10, 2005]; Edward Moyer, Schoolhouse Blogs (October 17, 2005), news.com. com/schoolhouse+blogs/ _ html [accessed December 15, 2005]. 11. See www3.essdack.org/socialstudies/blogs.htm. 12. Michael Lorenzen, American Presidents Blog C e l e b r a t i n g 5 0 Ye a r s P R O F I L E S IN COURAGE John F. Kennedy Introduction by Caroline Kennedy 2006 marks the 50th anniversary of the publication of John F. Kennedy s Pulitzer Prize winning classic now with a new Introduction by Caroline Kennedy. (January 2006), american-presidents.blogspot.com/ [accessed March 7, 2006]. 13. Amanda Paulson, Schools Grapple with Policing Students Online Journals (February 2, 2006), www. csmonitor.com/2006/0202/p01s04-stct.html [accessed February 15, 2006]. 14. Tim Stahmer, Fear Factor, March 6, 2006, AssortedStuff.com, [accessed March 7, 2006]. 15. Ilene R. Berson, Grooming Cybervictims: The Psychosocial Effects of Online Exploitation for Youth, Journal of School Violence 2, no. 1 (2003): Ibid. 17. Amanda Lenhart, Protecting Teens Online, Pew Internet and American Life Project, (March 17, 2005), Electronic Frontier Foundation, Bloggers FAQ on Student Blogging, [accessed December 15, 2005]; Magid; Paulson. 19. Ilene R. Berson and Michael J. Berson, Children and Their Digital Dossiers: Lessons in Privacy Rights in the Digital Age, Enhancing Democracy with Technology in the Social Studies [special issue], International Journal of Social Education 21, no. 1 (2006): Associated Press, MySpace.com Subject of Sex Assault Probe, (February 3, 2006), abcnews.go. com/technology/wirestory?id= &cmp=otc- RSSFeeds0312&technology=true [accessed February 3, 2006]. 21. Jamie Malernee, Websites Helped Police Find Beating Suspects, Solve Other Crimes, Sun Sentinel (January 21, 2006). 22. Joyce K. Valenza, tech.life@school: Teenagers Have a Voice in Blogs, The Philadelphia Inquirer (December 25, 2005), business/ htm. 23 Electronic Frontier Foundation, See blogsafety.com and Jonathan I. Ezor, Real World Blog Safety Risk, (January 2006), www. blogsafety.com/realworldrisks.htm [accessed January 30, 2006]. 25. Berson and Berson, Developing Thoughtful Cybercitizens, Social Studies and the Young Learner 16, no.4 (March/April 2003) 5-8. This book is not just the stories of the past but a book of hope and confidence for the future. What happens to the country, to the world, depends on what we do with what others have left us. from the Foreword by Robert F. Kennedy A thoughtful and persuasive book about political integrity. New York Times ISBN (paperback) $13.95 ($18.95 Can.) 304 pages Encourage your students to participate in the John F. Kennedy Profile in Courage Essay Contest. Ilene R. Berson is an associate professor in the Department of Child and Family Studies at the Louis de la Parte Florida Mental Health Institute at the University of South Florida in Tampa and serves as the director of the Consortium for Child Welfare Studies. Her research focuses on the prevention and intervention of child abuse and victimization, explores preventative interventions for child safety and prosocial development in cyberspace, and includes cross-national studies on the socio-emotional impact of online exploitation of children. She can be contacted at berson@ fmhi.usf.edu. Michael J. Berson is an associate professor of social science education at the University of South Florida. Dr. Berson conducts research on global child advocacy and technology in social studies education. He can be contacted at berson@tempest.coedu.usf.edu. 128

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Students Acceptable Use Policy for Electronic Resources Rules Summary

Students Acceptable Use Policy for Electronic Resources Rules Summary Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

How To Protect Children From Abuse

How To Protect Children From Abuse CREATING A NETWORK OF PREVENTION AND PROTECTION To report suspected abuse of a minor, call the Pennsylvania Child Abuse Hotline 1-800-932-0313 If you suspect child abuse by clergy, church officials, church

More information

Best Practices for the Use of Social Media Summer 2011. Belmont University Athletics

Best Practices for the Use of Social Media Summer 2011. Belmont University Athletics Best Practices for the Use of Social Media Summer 2011 Belmont University Athletics Overview The rapid growth of social media technologies combined with their ease of use and pervasiveness make them attractive

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

The responsible use of technology and social media for HCPSS-sanctioned activities.

The responsible use of technology and social media for HCPSS-sanctioned activities. BOARD OF EDUCATION POLICY 8080 RESPONSIBLE USE OF TECHNOLOGY AND SOCIAL MEDIA Effective: July 1, 2013 I. Policy Statement The Board of Education of Howard County is committed to providing appropriate access

More information

Social Media Guidelines

Social Media Guidelines Purpose for Social Media Guidelines: Guilford County Schools (GCS) realizes that part of 21st century learning is adapting to the changing methods of communication. The importance of teachers, students

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Acceptable Use of Information Technology

Acceptable Use of Information Technology Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5

i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 Scope of curriculum i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction

More information

University Schools Social Media Guidelines for Employees

University Schools Social Media Guidelines for Employees University Schools Social Media Guidelines for Employees Purpose of Social Media Guidelines All University Schools Laboratory Employees are subject to the Ball State University Social Media Policy available

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

GUIDELINES FOR THE USE OF SOCIAL MEDIA. January 2010

GUIDELINES FOR THE USE OF SOCIAL MEDIA. January 2010 GUIDELINES FOR THE USE OF SOCIAL MEDIA January 2010 Revised July 2010 Prepared by: The Voices Technology and Best Practice Team TABLE OF CONTENTS Overview of Document...2 General Rules to Follow...3 Social

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Lake County Schools GUIDELINES FOR EMPLOYEE USE OF SOCIAL MEDIA NETWORKS. Introduction

Lake County Schools GUIDELINES FOR EMPLOYEE USE OF SOCIAL MEDIA NETWORKS. Introduction Lake County Schools GUIDELINES FOR EMPLOYEE USE OF SOCIAL MEDIA NETWORKS Introduction Blogs, social networks and Websites such as Facebook, Flickr, Linkedin, MySpace, Ustream, Blogger, Wordpress, Twitter,

More information

Holyoke Community College Social Media Guidelines Adopted: May 3, 2010 by the HCC Web Team Revised February 17, 2012

Holyoke Community College Social Media Guidelines Adopted: May 3, 2010 by the HCC Web Team Revised February 17, 2012 Holyoke Community College Social Media Guidelines Adopted: May 3, 2010 by the HCC Web Team Revised February 17, 2012 Introduction Social media offers HCC a tremendous opportunity to connect with and better

More information

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents

More information

Facts for Teens: Youth Violence

Facts for Teens: Youth Violence P.O. Box 6003 Rockville, MD 20849-6003 nyvprc@safeyouth.org www.safeyouth.org Facts for Teens: Youth Violence Introduction Many teenagers are concerned about youth violence, and with good reason. Each

More information

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating

More information

The Negative Effects of Social Media on Children and Young Adults

The Negative Effects of Social Media on Children and Young Adults The Negative Effects of Social Media on Children and Young Adults How can we reduce the negative effects of social media on children and young adults? Overview What is Social Media? Social media is defined

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

BOARD OF EDUCATION POLICY

BOARD OF EDUCATION POLICY BOARD OF EDUCATION POLICY IFBGE Internet Safety 7/1/13 It is the policy of the Cobb County School District (District) to: (a) prevent user access over its computer network to, or transmission of inappropriate

More information

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

Counselors Guidelines for the Healthy Development of Youth in the Digital Age

Counselors Guidelines for the Healthy Development of Youth in the Digital Age Suggested APA style reference information can be found at http://www.counseling.org/library/ Article 40 Counselors Guidelines for the Healthy Development of Youth in the Digital Age Lakitta D. Johnson

More information

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online

More information

Auburn University at Montgomery Policies and Procedures

Auburn University at Montgomery Policies and Procedures Auburn University at Montgomery Policies and Procedures Title: Responsible Office: Social Media Policy University Relations I. PURPOSE This policy outlines the procedures governing social media pages created

More information

MINNETONKA PUBLIC SCHOOLS

MINNETONKA PUBLIC SCHOOLS MINNETONKA PUBLIC SCHOOLS Policy #470: Employee Use of Social Media I. PURPOSE As a national leader in using technology as an accelerator of learning, the Minnetonka School District recognizes the value

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

Social Media Guidelines

Social Media Guidelines MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

BOBCAT COMPUTING POLICY

BOBCAT COMPUTING POLICY BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect

More information

Professional Advisory

Professional Advisory Professional Advisory Use of Electronic Communication and Social Media The Council of the Ontario College of Teachers approved this professional advisory on February 23, 2011. This advisory applies to

More information

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview

More information

[Name of School] E-safety policy

[Name of School] E-safety policy [Name of School] E-safety policy Adopted: Review date: Note: Blue boxes contain advisory notes which should be read and deleted. These indicate where schools need to make decisions or choices. This policy

More information

Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement

Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement The Newark City Schools is pleased to make available access to interconnected computer systems within the district

More information

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives

More information

Social Media - Public & Private Use

Social Media - Public & Private Use TEMECULA VALLEY CHARTER SCHOOL BOARD POLICY Section 5000 Personnel 5013 Employee Use of Social Media Board Action: Approved Effective Date: 11-2-2015 Temecula Valley Charter School recognizes the value

More information

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life. Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for

More information

DRUG AND ALCOHOL ADDICTION. BY: Kristen Mehl AGE: 17 GRADE: 12. SCHOOL NAME: St. Clair High School

DRUG AND ALCOHOL ADDICTION. BY: Kristen Mehl AGE: 17 GRADE: 12. SCHOOL NAME: St. Clair High School DRUG AND ALCOHOL ADDICTION BY: Kristen Mehl AGE: 17 GRADE: 12 SCHOOL NAME: St. Clair High School DRUG AND ALCOHOL ADDICTION Drug and alcohol addiction is a rising problem among all ages, including our

More information

Appropriate Uses of Modern Technology

Appropriate Uses of Modern Technology Appropriate Uses of Modern Technology Each new school year brings high hopes, great expectations and challenges for both new and seasoned educators. Th e American Federation of Teachers (AFT) has developed

More information

CLAYTON STATE UNIVERSITY DEPARTMENT OF PUBLIC SAFETY SOCIAL MEDIA POLICY February 2013

CLAYTON STATE UNIVERSITY DEPARTMENT OF PUBLIC SAFETY SOCIAL MEDIA POLICY February 2013 CLAYTON STATE UNIVERSITY DEPARTMENT OF PUBLIC SAFETY SOCIAL MEDIA POLICY February 2013 I. PURPOSE The department endorses the secure use of social media to enhance communication, collaboration, and information

More information

FAST FACTS. 100 TO 140 MILLION girls and women in the world have experienced female genital mutilation/ cutting.

FAST FACTS. 100 TO 140 MILLION girls and women in the world have experienced female genital mutilation/ cutting. 603 MILLION women live in countries where domestic violence is not yet considered a crime. Women and girls make up 80% of the estimated 800,000 people trafficked across national borders annually, with

More information

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized

More information

Cyberbullying, Sexting & Predators Oh My!

Cyberbullying, Sexting & Predators Oh My! Cyberbullying, Sexting & Predators Oh My! Addressing Youth Risk in the Digital Age in a Positive and Restorative Manner Nancy Willard Center for Safe and Responsible Internet Use Cyber Savvy Cyber Savvy

More information

Acceptable Use and Internet Safety Policy. Bloom Vernon Local School District

Acceptable Use and Internet Safety Policy. Bloom Vernon Local School District Acceptable Use and Internet Safety Policy FOR THE COMPUTER NETWORK OF THE Bloom Vernon Local School District (Read and retain this document for future reference. Sign and return page 7 ONLY.) The Bloom

More information

Outsmarting On-line Predators. Christina Kilbourne

Outsmarting On-line Predators. Christina Kilbourne Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information

More information

INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT

INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT 1. Introduction and essential information 2. Required lesson 3. Optional lessons and activities 4. Additional resources 5. Standards

More information

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour

More information

Administrative Procedures Memorandum A1300

Administrative Procedures Memorandum A1300 Page 1 of 8 Date of Issue October 2013 Original Date of Issue June 2012 Subject INFORMATION AND COMPUTING TECHNOLOGY - APPROPRIATE USE GUIDELINES FOR STUDENTS References This APM replaces A1160 Computing

More information

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78 Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section

More information

Version 2.1 ROM Web and Social Media Standards

Version 2.1 ROM Web and Social Media Standards Version 2.1 ROM Web and Social Media Standards What is Social Media? Social Media can be simply defined as online social conversation. The word conversation is key. Traditional media delivers content one

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

NYC Department of Education Social Media Guidelines

NYC Department of Education Social Media Guidelines Spring 2012 NYC Department of Education Social Media Guidelines A. Introduction/Purpose 1. Social media technology can serve as a powerful tool to enhance education, communication, and learning. This technology

More information

How To Use Social Media At St James Anglican School

How To Use Social Media At St James Anglican School P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :

More information

Domestic Violence: Can the Legal System Help Protect Me?

Domestic Violence: Can the Legal System Help Protect Me? Domestic Violence: Can the Legal System Help Protect Me? What is domestic violence? Domestic violence is a pattern of physically and/or emotionally abusive behavior used to control another person with

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Keeping Safe Online. Program Support Notes. Junior - Senior Secondary. 24 mins. Health and Welfare. VEA Bringing Learning to Life

Keeping Safe Online. Program Support Notes. Junior - Senior Secondary. 24 mins. Health and Welfare. VEA Bringing Learning to Life VEA Bringing Learning to Life Program Support Notes Junior - Senior Secondary Keeping Safe Online 24 mins Program Support Notes by Belinda Kime, App Sci (Home Ec)/Ed (Sec) Produced by VEA Pty Ltd Commissioning

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow Estimated time: 40 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy

More information

2015 LSU Agricultural Center Training on Title IX and Sexual Harassment SUPPLEMENTAL MATERIAL

2015 LSU Agricultural Center Training on Title IX and Sexual Harassment SUPPLEMENTAL MATERIAL 2015 LSU Agricultural Center Training on Title IX and Sexual Harassment SUPPLEMENTAL MATERIAL Under various Louisiana and federal laws and regulations, employees are required to receive training annually

More information

Catholic Diocese of Fort Worth Social Media Policy

Catholic Diocese of Fort Worth Social Media Policy Catholic Diocese of Fort Worth Social Media Policy General Policy Social media represents a broad group of digital technologies whose content is driven entirely by its members. Individuals are allowed

More information

Harassment and Sexual Assault

Harassment and Sexual Assault Protecting Students on Campus: Laws and Best Practices to Prevent Bullying, Stalking, Harassment and Sexual Assault Disclaimer: Not intended as legal advice or establishing an attorney-client relationship.

More information

How To Use The Internet Safely

How To Use The Internet Safely Administrative Procedure 140 DISTRICT-WIDE NETWORK AND INTERNET APPROPRIATE USE Background School District No.43 (Coquitlam)'s District-wide network provides data communication links among all District

More information

RIVERVIEW SCHOOL DISTRICT

RIVERVIEW SCHOOL DISTRICT No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

Teen Online Safety & Digital Reputation Survey

Teen Online Safety & Digital Reputation Survey Teen Online Safety & Digital Reputation Survey Cox Communications Teen Online Safety & Digital Reputation Survey in Partnership with the National Center for Missing & Exploited Children (NCMEC) (Fielded

More information

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications

More information

Marion County School District Computer Acceptable Use Policy

Marion County School District Computer Acceptable Use Policy Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February 2014. Purpose.

System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February 2014. Purpose. System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February 2014 1 2 3 4 5 6 7 8 9 Purpose The purpose of this policy is to define expectations

More information

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy 1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow LESSON PLAN Private Today, Public Tomorrow UNIT 4 Essential Question How can you respect the privacy of others online? Lesson Overview Students reflect on their responsibility to protect the privacy of

More information

Networking and Social Media Policy

Networking and Social Media Policy Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools

More information

Mandatory Review Date: January 15, 2018

Mandatory Review Date: January 15, 2018 THE SHERIDAN COLLEGE INSTITUTE OF TECHNOLOGY AND ADVANCED LEARNING TITLE: Student Code of Conduct Policy Date of Approval: January 13, 2015 Effective Date: January 15, 2015 Mandatory Review Date: January

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information