article thumbnail

Colleges Face Investigations Over Whether Their Use of Social Media Follows Accessibility Regulations

Edsurge

Nearly 200 colleges face federal civil rights investigations opened in 2019 about whether they are accessible and communicate effectively to people with disabilities. Among the newer aspects of these kinds of complaints is whether college social media communication meets accessibility standards.

article thumbnail

Understanding the legal implications of using web filters in K-12 schools

Hapara

It helps prevent students from accessing inappropriate content while learning online and is administered by the Federal Communications Commission. Most people know that content filters help prevent students from accessing inappropriate content online. What are CIPA guidelines for filtering?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What do Parents Ask About Technology in Education?

Ask a Tech Teacher

While many organizations differ in their recommendations, here are general guidelines you may find useful: Infants (0-18 months): Screen time is not recommended for infants, except video chatting with family or friends. Block and Report : Most social media platforms and websites have tools to block and report abusive users.

article thumbnail

Teaching About Generative AI Art Creation

The CoolCatTeacher

Some Typical Prompts for AI Art Generation Additionally, I've bought some books on artistic styles and terminologies because knowing the words to use is part of making AI art generation accessible to our students (and ourselves.) I started with QuickDraw, which recognizes doodling along with the curriculum from the MIT Media Lab on AI ethics.

Adobe 328
article thumbnail

Cybersecurity measures educators can take for e-learning environments

Neo LMS

Highlight cyberthieves, underage predators and hackers, and discuss some of the ways that these criminals may try to gain access, whether it’s by finding their way into chat rooms or social media, or by trying to hack passwords to get into students’ accounts. Unknown devices accessing the school’s network.

article thumbnail

ISTE Certification 02

Dangerously Irrelevant

Despite my familiarity with all of the ISTE Standards, I have found that I am thinking much more deeply about the ISTE Standards for Educators as I go through this process with my cohort (which I appreciate)… One of our activities asked us to reflect on the Universal Design for Learning (UDL) guidelines.

UDL 265
article thumbnail

Creating a safe environment for online learning

Neo LMS

From an email address to a social security number, just about any piece of personal information can be used by cybercriminals for malicious means. Even seemingly innocent social media posts can contain clues that hackers can use to guess passwords for other online portals that the students or their parents may use at home.