Remove Accessibility Remove Digital Citizenship Remove Mobility Remove Policies
article thumbnail

Acceptable or Responsible? What’s Your Use Policy?

Tom Murray

We believe it is our moral obligation as educators to keep students safe, while simultaneously enabling them to create responsible digital footprints. Unfortunately, many school districts’ filtering policies were developed before the rise of interactive web tools, social media, and mobile technologies. I am responsible for.”).

Policies 196
article thumbnail

6 steps to promote good digital citizenship for all students

eSchool News

They use these tools on their own terms and for their own reasons, many of which aren’t readily apparent to older adults who didn’t grow up with tablets and mobile phones in hand. Related: How to craft useful, student-centered social media policies. A 6-step digital citizenship plan. Here’s how we do it at our district.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to block websites in K-12 schools

Hapara

The federal Children’s Internet Protection Act (CIPA) was enacted in 2000 and requires schools to have an internet safety policy in place to receive E-rate program discounts. Under CIPA, schools must: block websites or filter learners’ internet access to inappropriate and harmful pictures. educate them about digital citizenship .

article thumbnail

Digital Citizenship: The Critical Call To Educate and Prepare 21st-Century Learners

EdNews Daily

Today’s youth are digital natives who are unaware of life without Internet access, instant communication, mobile phones and an abundance of on-demand information sitting in their pockets. As a society, it is our responsibility to ensure youth are fully aware as well as educated about digital citizenship.

article thumbnail

BYOD Begins With Trust and Respect

A Principal's Reflections

Up until this point we had students sign off on a paper guideline sheet after which I created a username and password for them to access the secure guest network. This information was then passed on to Ron and each student that filled out the form was granted access. Take a look at the traffic at each access point below.

BYOD 313
article thumbnail

How teachers address cell phones in class

Ask a Tech Teacher

Protocols for these mobile devices have little in common today with how they were addressed a decade ago. What do you do about personal devices that circumvent the school security to access the Internet? In many schools, Internet access is spotty, undependable, and a challenge to manage. And why not?

Mobility 173
article thumbnail

Tapping Tech-Savvy Students for IT Support and Digital Learning

EdTech Magazine

Some accessed sensitive information, such as students’ GPAs and SAT scores. But there are options for districts that want to foster students’ digital skills and steer them away from more mischievous or devious outlets for their hacking. And those are just a few examples from recent months. Such misbehavior is not new.