Public Chapter 989 49 1 221 Internet Use

  • Slides: 46
Download presentation
Public Chapter 989 § 49 -1 -221 Internet Use in Public and Private Schools

Public Chapter 989 § 49 -1 -221 Internet Use in Public and Private Schools in Tennessee

What does the law say? § 49 -1 -221. (a)(1) Every two (2) years,

What does the law say? § 49 -1 -221. (a)(1) Every two (2) years, each director of schools shall file with the Commissioner of Education an acceptable use policy, approved by the local school board, for the international network of computer systems commonly known as the Internet n First AUP filing date deadline was October 31, 2008 n Final Implementation Date September 30, 2009

Provisions in the Policy n Provisions are designed to: n n n Prohibit inappropriate

Provisions in the Policy n Provisions are designed to: n n n Prohibit inappropriate use by district employees and students of the district’s computers via the Internet; Prevent access to material that the district deems to be harmful to kids; Select a technology to filter or block Internet access to child pornography and obscenity; Establish appropriate measures to be taken against persons who violate the policy; Include a component on Internet safety for students that is integrated into the district’s instructional program; Encourage that communications with parents which raise awareness about Internet safety are made using existing avenues of communication, i. e. parent-teacher conferences.

Inclusion of other terms or conditions……. . n The policy may include other terms,

Inclusion of other terms or conditions……. . n The policy may include other terms, conditions, and requirements as deemed appropriate, such as…. Requiring written parental authorization for Internet use by juveniles, or n Differentiating acceptable uses among elementary, middle and high school students. n

Guidelines Even though Internet Safety programs from district to district may be similar, each

Guidelines Even though Internet Safety programs from district to district may be similar, each district should formulate their own programs according to specific needs and resources of that district. The program should be inclusive of but not limited to the following: n n n n n Development and implementation of a process for reviewing, evaluating, and revising the Internet Safety program biennially A method by which inappropriate use by school district employees and students of the school district is prohibited Develop and implement a data and network security plan Develop and implement procedures to address breaches of Internet security and protect students’ safety Establish appropriate measures to be taken against persons who violate the policy Integration of Internet safety in the k-12 curriculum and instruction Outreach programs to parents, grandparents, caregivers, and community stakeholders Professional development opportunities for teachers and staff across the district Safety, security, and ethics measures, including any that already exist

The Director’s Responsibilities n n Every two years, you will file with the Commissioner

The Director’s Responsibilities n n Every two years, you will file with the Commissioner of Education an acceptable use policy, approved by the local school board The director of schools shall take such steps as appropriate to implement and enforce the school district’s policy.

The Department’s Responsibilities n n n Report to the Chairmen of the Education Committees

The Department’s Responsibilities n n n Report to the Chairmen of the Education Committees of the Senate and the House on or before December 1, 2008 a summary of acceptable use policies filed with the commissioner pursuant to this section of the law and the status thereof. Issue guidelines to school districts regarding instructional programs related to Internet safety Encourage cooperation between school districts and local law enforcement agencies

The Attorney General’s Role with the Do. E n n Is to assist districts

The Attorney General’s Role with the Do. E n n Is to assist districts in developing their own methods for teaching Internet safety to elementary and secondary students, as well as the parents, which are within the guidelines established by the Do. E. And to establish best practices for teaching Internet safety and make those best practices and other resources, including sample curricula on Internet safety, available to public and private schools across Tennessee.

Public Chapter No. 989 n http: //www. legislature. state. tn. us/bills/cur rentga/Chapter/PC 0989. pdf

Public Chapter No. 989 n http: //www. legislature. state. tn. us/bills/cur rentga/Chapter/PC 0989. pdf

Current Legislation n *SB 0283 by *Black ( HB 0451 by *Dunn) n Requires

Current Legislation n *SB 0283 by *Black ( HB 0451 by *Dunn) n Requires (rather than recommends) school districts to include certain criteria in policies preventing harassment, intimidation or bullying. Amends TCA Section 49 -6 -1016

Cyberbullying n n Is that a word? What does it mean? Who’s affected by

Cyberbullying n n Is that a word? What does it mean? Who’s affected by it? How do they do it?

Definition n According to Hinduja and Patchin, p. 17 (2009), it is the “willful

Definition n According to Hinduja and Patchin, p. 17 (2009), it is the “willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices. ” One instance of mistreatment cannot be construed as bullying…as it has to involve harmful behavior that is repetitive. n It’s actually harassment taken to the next level. n

Who’s affected by it?

Who’s affected by it?

Where/How does it happen? n n Cell Phones Email (s) Social Networks Chat Rooms/Instant

Where/How does it happen? n n Cell Phones Email (s) Social Networks Chat Rooms/Instant Messaging

Cell Phones n n n Texting Now, some cell phones receive email too…as well

Cell Phones n n n Texting Now, some cell phones receive email too…as well as updates from social networking sites. Photos/videos

Emails n n n Fake accounts Send to multiple people Can have photo or

Emails n n n Fake accounts Send to multiple people Can have photo or video attachments or embedded

Social Networks n n n My. Space. com Facebook. com Xanga. com Flickr n

Social Networks n n n My. Space. com Facebook. com Xanga. com Flickr n Twitter n n There are 100 s if not 1000 s of these types of “gathering places. ” However, these are currently rated as the most popular in the United States and at this age level.

Instant Messaging and Chat Rooms n n Yahoo Messenger Google talk AOL – AIM

Instant Messaging and Chat Rooms n n Yahoo Messenger Google talk AOL – AIM America’s Online Instant Messenger MSN

Anonymity or Fake n Any one of the methods above can be utilized by

Anonymity or Fake n Any one of the methods above can be utilized by virtually anyone and without the truth of identity being known. By blocking numbers, txts can be sent so that they appear to be anonymous n Accounts with fake information and pictures can be used for anonymity or to impersonate another person. n

Some things to be aware of…. . n Txt Acronyms n n n n

Some things to be aware of…. . n Txt Acronyms n n n n n Ttyl = Talk to you later Brb = Be right back Pir = Parent(s) in room Pos = Parent(s) over shoulder P 911 = My parents are coming in the room PA = Parent Alert PAL = Parents Are Listening PAN or PANB = Parents Are Nearby IRL = In Real Life

Emoticons n Symbolic language to show emotion n n n : ) or :

Emoticons n Symbolic language to show emotion n n n : ) or : -) : ( or : -( (<> or <>) : II or : -II : @ or : [email protected] >: -( = Smiling = Frowning = Alienated = Angry or screaming = Angry or annoyed

Sexting or Sex. Casting n n Sexting: The act of poor judgment when using

Sexting or Sex. Casting n n Sexting: The act of poor judgment when using digital technology by sending an image, video or text message of an explicit (adult) or risque nature to another individual. Sext. Casting Summarized: Sext. Casting: A Sext. Cast. TM or Sext. Casting. TM is the process by which an individual(s) performs actions of a risqué or sexually explicit nature via a (live) webcam (or webcast), digital (image or video) camera, or other form of digital technology and sends and/or saves the content of their actions using digital technologies (i. e. a computer, camera card, email, social website, message board, etc). Main Entry: Sext • Cast • ing Function: noun Etymology: 21 st century via The Institute for Responsible Online and Cell. Phone Communication Reference: Urban Dictionary

A quote from the Institute’s Executive Director……. n Richard Guerry, the visionary behind the

A quote from the Institute’s Executive Director……. n Richard Guerry, the visionary behind the concept of "Responsibility 2. 1 C", and co-founder of The Institute for Responsible Online and Cell-Phone Communication recently stated that "We as a nation need to provide direct proactive communication of Digital Responsibility (Responsibility 2. 1 C) to a new generation. We cannot be reactionary treating today's digital issues, and we cannot resolve them with 20 th century threats, reprimand curriculum. " He went on to say, "The real problem is our youth has grown up learning what we call responsibility 1. 0 or offline responsibility. They do not understand the scope of the repercussions when they invoke poor (digital) judgment because they have not been proactively taught digital responsibility or what we call, Responsibility 2. 1 C. We cannot apply 20 th century solutions to 21 st century issues. “ n The Institute for Responsible Online and Cell Phone Communication Speakers Bureau 200 Walt Whitman Ave. P. O. Box 1131 Mount Laurel NJ, 08054 http: //www. iroc 2. org

Resources to peruse…. . n http: //www. iroc 2. org or n www. sextingisstupid.

Resources to peruse…. . n http: //www. iroc 2. org or n www. sextingisstupid. com

Help Tips for Reporting Offensive Profiles To Social Networking Sites Compiled by Patti Agatston,

Help Tips for Reporting Offensive Profiles To Social Networking Sites Compiled by Patti Agatston, Ph. D. Prevention/Intervention Center Updated 1/29/09 n n n My. Space: 1. My. Space provides a link in their help center to report offensive profiles. You can also enter this url to get to the help page that has a link to report harassment or threats: www. myspace. com/index. cfm? fuseaction=misc. faq&Category=6&Question=6 2. Educators can report an “imposter profile” that targets them on My. Space. This is also under the help center and frequently asked questions. The link for educators to report fake profiles targeting faculty members is: www. myspace. com/index. cfm? fuseaction=misc. faq&Category=6&Question=39 3. Parents can request that their child’s profile be removed. The link to make that request is on the parent safety tips page. Here is the url: www. myspace. com/Modules/Common/Pages/Safety. Tips. aspx# 4. Anyone can report inappropriate content. This information is also on the help page. The link is: www. myspace. com/index. cfm? fuseaction=misc. faq&Category=3&Question= 27

Facebook: n n n 1. Abuse can be reported by e-mailing Facebook directly at

Facebook: n n n 1. Abuse can be reported by e-mailing Facebook directly at [email protected] com. There is also a link provided under the security page of Facebook. The security page link is: http: //www. facebook. com/safety Scroll down to the security section and click on the link to report abuse. 2. If someone is harassing/libeling you, Facebook gives the following recommendations: “We suggest that you block the person by listing his or her name in the "Blocking People" box at the bottom of the My Privacy page. If this does not resolve the problem, please write an email to [email protected] com from your login email address. We will need to know your name, login email address, and school. Also, please provide the name and school of the person who is harassing you along with a description of the situation. ” 3. Use the e-mail [email protected] com to report any other information that you think should not be posted.

Xanga: n 1. Schools and parents can contact Xanga for help at the following

Xanga: n 1. Schools and parents can contact Xanga for help at the following url: http: //help. xanga. com/contact/parentcontact. htm n 2. Xanga also provides a link to wiredsafety’s cyber abuse hotline for severe cases of cyber bullying or other abuses such as cyberstalking, identity theft and child exploitation. The link to wired safety’s cyberabuse hotline is: http: //www. wiredsafety. org/911/index. html

Youtube: n n The guidelines for uploading appropriate videos are posted on Youtube’s community

Youtube: n n The guidelines for uploading appropriate videos are posted on Youtube’s community guidelines. Here is the link: http: //youtube. com/t/community_guidelines Anyone can flag a video as inappropriate. If Youtube reviews the video and finds it to be inappropriate, the video is shut down. If they decide to terminate the user’s account the user is prohibited from ever having another account on Youtube. Contact Us - You. Tube Help http: //help. youtube. com/support/youtube/bin/request. py ? contact_type=abuse Youtube now has a help center that will assist you in abuse and safety issues. Click the above link for assistance in addressing issues of cyber citizenship, hate speech, cyberbullying, etc.

Other Resources http: //www. cyberbullying. us/resources. php Videos n Cyberbullying Summarized - Dr. Patchin's

Other Resources http: //www. cyberbullying. us/resources. php Videos n Cyberbullying Summarized - Dr. Patchin's video for Sony Creative Software, detailing the basics of online aggression among youth (5: 30 in length).

Fact Sheets n n n n Cyberbullying Fact Sheet - introduces and details the

Fact Sheets n n n n Cyberbullying Fact Sheet - introduces and details the nature and extent of cyberbullying, the contributive nuances of Internet communication, and provides general advice to respond to the problem Emotional and Psychological Consequences Fact Sheet - specifies how adolescents are negatively affected by cyberbullying by highlighting how online aggression leads to adolescent strain and stress, which then can create developmental and functional concerns Victimization of Adolescent Girls Fact Sheet - highlights the specific cyberbullying experiences of female teenagers through the content analysis of detailed responses received from victims Cyberbullying Victim and Offender Warning Signs - a list of red flags that might indicate the presence of cyberbullying in the life of a child or adolescent Cyberbullying Legal and Policy Issues Fact Sheet - providing a summary of important court cases and pending legislation that can help school districts evaluate and improve their current cyberbullying policies Safe and Responsible Use of Social Networking Sites Fact Sheet - a guide encouraging and enabling youth to think about certain important issues when posting content on social networking sites My. Space: Personal Information of Adolescents on the Internet - summarizes our My. Space research concerning the extent to which adolescents post personal information on their profile pages Cyberbullying Scripts - provides parent/teenager "scripts" to promote dialogue and discussion about cyberbullying

Activities n n Cyberbullying Word Find - a word search to be distributed to

Activities n n Cyberbullying Word Find - a word search to be distributed to kids and adolescents to promote discussion about cyberbullying Crossword Puzzle - a crossword puzzle to be distributed to kids and adolescents to promote discussion about cyberbullying Cyberbullying Word Scramble - unscramble the words to uncover cyberbullying‐related concepts and web sites! Cyberbullying Scenarios - engage youth in a discussion about cyberbullying by reading them these scenarios and asking them how they would handle each situation

Reference Materials n n n Common Chat Abbreviations - defines and explains the multiple

Reference Materials n n n Common Chat Abbreviations - defines and explains the multiple textual devices and shortcuts during computer-mediated communication such as instant messaging and chatting How to Preserve Cyberbullying Evidence Through Screenshots - provides instructions on how to create an image of the contents of your computer desktop so that evidence of Internet harassment can be saved and used to support a case Viewing Cyberbullying Email Headers in Various Email Programs - specifies how individuals who receive malicious emails can view the email header information to discern the Internet Service Provider to contact and alert of the situation

Other Materials n n n n Cyberbullying Report Card - determine how well your

Other Materials n n n n Cyberbullying Report Card - determine how well your school is currently dealing with cyberbullying issues Internet Use Contract for Parents and Children/Teenagers - a formal agreement to be signed by both parties to help facilitate an open line of communication regarding Internet-related use Cell Phone Use Contract for Parents and Children/Teenagers se this to lay the groundwork for safe and responsible cell phone usage Cyberbullying Incident Tracking Form - to track individual incidents of cyberbullying that occur at your school Cyberbullying Trustee Designation - signage to let students know that you take cyberbullying seriously and can help them if they need it Bibliography - a list of the scholarly literature (of which we are aware) that examines issues relating to cyberbullying and electronic peer victimization Network Query Tool - can be used to identify the Internet Service Provider associated with the Internet Protocol (IP) address of a cyberbully

Policy n So…. what makes a good policy for cyberbullying? n n n n

Policy n So…. what makes a good policy for cyberbullying? n n n n n One that clearly defines cyberbullying, intimidation, and harassment Graduated consequences and remedial actions Procedures for reporting Procedures for investigating Language specifying that if a student’s off campus speech or behavior results in “substantial disruption of the learning environment, ” the student can be disciplined. Procedures for preventing bullying Use simple language that students and non-technical folks can understand Have your legal representation look to make sure you haven’t done something incorrectly or left something out. Cross your fingers….

Contact Info Dr. Barbara Denson Coordinator of Instructional Technology Andrew Johnson Tower – 5

Contact Info Dr. Barbara Denson Coordinator of Instructional Technology Andrew Johnson Tower – 5 th Floor 710 James Robertson Pkwy. Nashville, TN 37243 Barbara. [email protected] gov 615. 532. 4757 (o) 615. 653. 3608 (c)

IBgr 8 t! TTYL!

IBgr 8 t! TTYL!