12
HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated for educational purposes only.

HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

Embed Size (px)

Citation preview

Page 1: HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

HLS Staff Training

Technology Safety, Security, and Filtering

By Laura TelferApril 3, 2011

© 2011 Laura Telfer. All Rights Reserved. May be duplicated for educational purposes only.

Page 2: HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

Welcome Staff Objective: Apply internet safety and

security practices in the classroom and at home

Introduction: based on parents’ and teachers’ concerns of safety, security, and website blocking; this information has been brought to you to help inform and empower teachers about these 21st Century realities.

Page 3: HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

Family Education Rights & Privacy Act (FERPA) Guidelines for access and privacy of student

information. Schools are required to notify parents of their

rights. Groups permitted access Permitted to share information Directory Information

Not considered to be restricted Parents may choose to “opt out”

US Dept of Ed -- FERPA

Page 4: HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

Children’s Internet Protection Act (CIPA) Guidelines concerning protection of children

(through blocking and filtering) from harmful internet content.

Did you know (Pińa, 2011): 260 porn sites are launched a day. 12% of all websites are pornographic in nature. Online porn produces $3 billion in annual revenue.

Schools that receive E-Rate funding from the Dept. of Education are required to follow CIPA guidelines.

Pińa, A. (2011). Part 2: Open source and cloud computing. [PowerPoint slides]. Retrieved from https://aceels.epiclms.net/Learn/Player.aspx?enrollmentid=1732718

Page 5: HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

Children’s Internet Protection Act (CIPA) According to CIPA, teachers may be permitted to

bypass website blocking; however, HLS has not made this possible at this point.

Provide saf e communication tools

Install a firewall to safeguard student information Monitor online activity and website requests Provide internet safety information to parents FCC.gov -- CIPA

Page 6: HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

Teachers Monitoring Filtering software is not perfect. Computer monitors within view. Inform students of internet monitoring. Educate student’s of their responsibility for

internet safety.

Page 7: HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

A teacher’s security and safety at home is a serious concern.

Common Dangers

Page 8: HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

Computer Viruses

Automatic antivirus protection Automatic firewall protection Largest providers of viruses

Peer-2-Peer sharing sites Pornography sites

Backup documents (www.carbonite.com)

Page 9: HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

Phishing Scams Unsolicited e-mails asking for personal information Know the Tactics – don’t get sucked in

Compromised bank account needs reset Full e-mail account will be deleted Winning a contest or lottery

How do they do it? (Piper, 2011) Counterfeit website Man in the Middle Spear Phishing

NO LEGITIMATE AGENCY will ask for personal information by phone or e-mail

Go directly to the website or call on the phone. Don’t even open e-mails from strangers Do not click on links Do not open attachments

Piper, P. (2007). Phis pharming. Searcher, 15(9), Retrieved from http://proquest.umi.com/pqdweb?did=1360127361&sid=9&Fmt=3&clientId=72851&RQT=309&VName=PQD

Page 10: HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

Identity Theft Always maintain safe technology practices Set security settings conservatively on social

networking sites. Avoid using personal information on social

networking sites. Secure your passwords

Do not write them down anywhere Choose something unrelated to you or your family & that

is not guessable Strong passwords use a combination of letters, numbers,

and symbols Change your password periodically

Page 11: HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

Conclusion

Page 12: HLS Staff Training Technology Safety, Security, and Filtering By Laura Telfer April 3, 2011 © 2011 Laura Telfer. All Rights Reserved. May be duplicated

Webiography for Images Internet Safety

http://middleschooladvisory101.blogspot.com/2009/03/internet-safety-pledge.html Student Directory

http://www.primasoft.com/tour_teacher_software/teacher_software_tour01.htm Computer Virus

http://www.ci.haverhill.ma.us/departments/EMA/compute_virus.html Phishing Scams

http://bigbluecybersafety.wikispaces.com/space/about Identity Theft

http://www.followsteph.com/2009/05/07/preventable-identity-theft/ No Food/Drink

http://www.mydoorsign.com/Door-Signs/No-Food-Beverages-Beyond-This-Point.aspx Viruses

http://sonkusare.wordpress.com/2010/08/04/what-is-spyware/ Backup Devices

http://datarecoveryfromharddrivetips.com/ http://www.techfuels.com/applications/2919-acer-ait-2-turbo-ata-tape-drive.html http://www.crunchgear.com/tag/360/ http://gadgetophilia.com/10-essential-gadgets-for-students/

Cartoons http://bionicteaching.com/?p=274 http://www.gadgetell.com/tech/comment/internet-safety-classes-required-in-virginia-schools/