Good Practices In Technology: The K-12 Classroom



Similar documents
BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

C H E R O K E E C H R I S TIAN SCHOOLS ( E L E M E N TARY SCHOOL) I N F O R M A TION TECHNOLOGY AND A C C E P TABLE USE POLICY

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Learn to protect yourself from Identity Theft. First National Bank can help.

Computer and Information Security End User Questionnaire

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Code of Virginia, 1950, as amended, Sections , :1, , , and

PARENTS AND PUPILS UNITED HERZLIA SCHOOLS (UHS) INFORMATION AND COMMUNICATIONS TECHNOLOGY AND SOCIAL MEDIA POLICY

Dauphin County Technical School

POLICY Adopted by Board of Education: 4/20/05

Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement

Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

Protection from Fraud and Identity Theft

Pacific Northwest University of Health Sciences

COMPUTER USE IN INSTRUCTION

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Youth Online Behavior


COMPUTER NETWORK FOR EDUCATION

Saheel KHOYRATTY. Partner Technology Advisor

Recognizing Spam. IT Computer Technical Support Newsletter

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

STOP. THINK. CONNECT. Online Safety Quiz

INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP)

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

- Do not leave open /network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight.

Acceptable Use Policy ("AUP")

Malware & Botnets. Botnets

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

Marion County School District Computer Acceptable Use Policy

Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT

COMPUTER, NETWORK AND INTERNET USE POLICY

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

You ve Got Etiquette

Retail/Consumer Client. Internet Banking Awareness and Education Program

(EMC) ELECTRONICALLY MEDIATED COMMUNICATION. Communication sent via a channel such as a cell phone or the Internet (versus face-to-face).

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Information Security Code of Conduct

Social Media and Cyber Safety

Protect yourself online

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Cyber Security Awareness. Internet Safety Intro.

Online Safety for Middle and High School

Infocomm Sec rity is incomplete without U Be aware,

Redland Christian Migrant Association (RCMA) Internet Security and Safety Policy

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

Guideline on Windows 7 Parental Controls

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Wakefield Public Schools Technology Acceptable Use Policy

HIPAA Security Training Manual

RESPONSIBLE USE PROCEDURE for INFORMATION, COMMUNICATION AND COLLABORATION TECHNOLOGIES

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

Students Acceptable Use Policy for Electronic Resources Rules Summary

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

How To Deal With Social Media At Larks Hill J & I School

TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois

SOCIAL NETWORKING SITES

Technology Department 1350 Main Street Cambria, CA 93428

Transcription:

Good Practices In Technology: The K-12 Classroom Elizabethtown Independent School District BUILDING ON A TRADITION OF EXCELLENCE Ver 0909.2

Acceptable Use Policy All users must read the Acceptable Use Procedures (AUP) and sign an Individual Use Agreement (IUA). EIS electronic resources (Computers, Network, E-mail and Internet, etc.) are available to users for educational purposes. Users are solely responsible for their actions on the Internet. Use network with same good judgment expected when in the school building. Schools will provide reasonable supervision but are not responsible for individual user s actions.

Network, Internet and Email Guidelines Users are responsible for good behavior on the network Electronic assets are not for: Personal business (e.g., Tupperware, Avon, Mary Kay) Political activities Use your own login account do not give it to others Do not open others files, mail, etc. Only Principals can authorize access to student accounts Only Superintendent can authorize access to staff accounts Do not use destructive behavior such as sending viruses, deleting files, harassing, etc. Do not access network for hate mail, pornography, racist or other objectionable material. Obey copyright laws

Cyberbullying Part 1 90% of youth age 12-17 communicate via email; 75% use IM Cyberbullying - willful and repeated harm inflicted through use of computers, cell phones and other electronic devices ; involves a minor Children have killed/committed suicide after cyberbullying Two types Direct Attacks Via proxy Some Examples of Direct Attacks Send threatening messages; create screennames similar to others Steal passwords and send messages, lock out user, hack into comp. Post blogs/videos and create malicious web sites about kids Send degrading pictures of kids Internet polling who s hot/who s not Send malicious code, porn, junk e-mail

Cyberbullying Part 2 Prevention Educate kids about consequences Use internet and mobile phones carefully Don t give out personal information Victims should: Talk to someone they trust Report the incident (to police if necessary) Block messages/emails Keep offensive messages as evidence

E-mail Good Practices Use email to support the instructional program. Open email from those you know- not from strangers. Close email when not in use. Do not send or forward email that is: Chain letter or spamish in nature Infected with a virus Offensive in any manner Make it a habit to not bad mouth anyone/anything

E-mail Good Etiquette Do not use all CAPS considered shouting. Keep messages concise and to the point Several short paragraphs better than longer narrative Avoid public "flames" - messages sent in anger. Always use a signature. Mail systems are not private. Don t send embarrassing messages. Emoticons ( ) can help convey a message. Proof e-mail before sending; consider a 5 minute timeout before sending emotional responses Use High Priority sparingly (or risk overuse)

Miscellaneous Musings Protect your password Keep PW to yourself, use letters, numbers & special characters Example, password of sports could be 5p0rt5 where 5 looks like an s, and a zero replaces the letter o Only download educational programs and files from established locations Obey copyrights (documents, music, etc.) Sites/programs to not use from district resources Non KETS email (e.g., Hotmail, AOL mail) Instant Messaging (e.g. AIM0 Social Networking sites Facebook, Myspace, Twitter, etc. Note; When using from home, be aware of the risks these sites contain File Sharing sites like Kazaa Check with STC before using unauthorized antivirus/registry cleaners on district computers

Scams, Schemes & Such At home & work watch for scams Advance Fee Scams Nigerian Letter (cheated Americans of $122 mil) & Canadian Lottery Winner: You pay money to get money. Internet Schemes Auction web sites that don t deliver, phony emails, verify your account number, etc. Cramming Mysterious charges on your phone bill (fine print of agreements) Bogus business opportunities Work at home scams, leasing ATMs Viaticals Buying life insurance of terminally ill patients

Chain Mail Email chain mail sounds reasonable but is designed to overload mail networks Topics: Make Money Fast Email Tracking Giveaway Good Luck Follow Directions Carefully Chains of Mourning Charity Chains Urban Myths (Spiders under toilet seats, gang initiations, etc.) Forwarding chain mail is a violation of the district s AUP If email says Forward this to all it is probably chain mail

Chain Mail Example 1 (Note spelling errors were built in by author) Subject: PLEEEEEEASE READ!!!! it was on the news! To all of my friends, I do not usually forward messages, But this is from my good friend Pearlas Sandborn and she really is an attorney. For every person that you forward this e-mail to, Microsoft will pay you $245.00 For every person that you sent it to that forwards it on, Microsoft will pay you $243.00 and for every third person that receives it, You will be paid $241.00. Within two weeks, Microsoft will contact you for your address and then send you a check. I thought this was a scam myself, But two weeks after receiving this e-mail and forwarding it on. Microsoft contacted me for my address and within days, I receive a check for $24,800.00. You need to respond before the beta testing is over. If anyone can affoard this, Bill gates is the man. It's all marketing expense to him. Please forward this to as many people as possible.

Chain Mail Example 2 Chain Prayers "We all need friends to pray for us!!! When you receive this, say the prayer. That's all you have to do. There is nothing attached. This is powerful. Just send this to four people and do not break this, please. Prayer is one of the best free gifts we receive. (general prayer follows)... Passing this on to anyone you consider a friend will bless you both. Passing this on to one not considered a friend is something Christ would do."

Some thoughts for home computers Must have Antivirus software (Norton s, MacAfee's, etc.) With current AV definitions (weekly updates) Must apply Microsoft Windows updates regularly Must have a firewall if using DSL, Cable Good to have: Spybot Adaware Antispam software Note there are free versions of all of these on the Internet. There are many good, safe sources for the free versions one is: www.pcworld.com/downloads/

Some Freeware to Consider Open Office almost as good as Microsoft Office Firefox outdoes Internet Explorer browser AVG Antivirus software Misc Adaware Spybot Zone Alarm