Thursday, March 17, 2011

C.O.S.T.  What does cyber safety cost you OR what does the lack of cyber safety cost you as a parent, student or educator?

The purpose of this blog is to educate parents, students and educators for a better understanding of cyber safety to enable everyone to appropriately use all the valuable resources available on the world wide web. 

Federal Laws Concerning Cyber Safety

Children's Internet Protection Act (CIPA):  http://www.fcc.gov/cgb.consumerfacts/cipa.html   This law addresses access to offensive content on the intent when using library or school computers.

Family Educational Rights and Privacy (FERPA):  http://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html
This law protects the privacy of student education records.

Children's Online Privacy Protection Act (COPPA):  http://en.wikipedia.org/wiki/Children's_Online_Privace_Protection_Act  This law sets guidelines concerning the online collection of personal information from children under 13 years of age.

The West Virginia State Department of Education has issued the following standards for technology in our schools:

      21C.0.3-4.3.TT.4�� Student complies with county acceptable use policy.Students identifies the need for acceptable use policies (AUP), discusses basic issues related to responsible use of technology and information, describes personal consequences of inappropriate use and begins to cite sources for information found through electronic searches.
      21C.0.5-0.3.TT.4�� Student complies with county acceptable use policy.Students discusses legal and ethical behaviors related to acceptable use of information and communication technology (e.g. privacy, security, copyright, file-sharing, plagiarism) and predicts the possible effects of unethical use of technology (e.g. consumer fraud, intrusion, spamming, virus setting, hacking) on the individual and society, as well as identify methods for addressing these risks.
      21C.0.9-12.3.TT.4Student adheres to acceptable use policy and displays ethical behaviors related to acceptable use of information and communication technology (e.g. privacy, security, copyright, file-sharing, plagiarism); student predicts the possible cost and effects of unethical use of technology (e.g. consumer fraud, intrusion, spamming, virus setting, hacking) on culture and society; students identifies the methodologies that individuals and businesses can employ to protect the integrity of technology systems.


From:http://wvde.state.wv.us/policies/p2520.14_ne.doc

WATCH FOR PAGES ON THE FOLLOWING CYBER SAFETY ISSUES:
1.  Cyberbullying, Cyberstalking, and Identity Theft
2.  Spam, Scam, and Other Intrusions
3.  Legal and Ethical Use of the Web
4.  Online Social Networking Issues
5.  Risks, Rights and Responsibilities
6.  Educate, Engage and Empower Students