Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged mail

Rss Feed Group items tagged

Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Social Networking in High School - 0 views

  •  
    Is the average high school student able to define social networking or give an example of it? I thought most would use Facebook as an example, but during a recent visit to a local high school, one freshman student used e-mailing his teacher in First Class as an example. Many of his classmates were of the same opinion as he, so it opened up a much-needed conversation during which this classroom full of 20 students spoke about where they preferred to network with each other.
Anne Bubnic

Survey: One-Third of Youths Engage in Sexting - 2 views

  •  
    If you think the sexting phenomenon is growing, you're not imagining it. According to a new survey, almost one-third of youths admit they've engaged in sexting-related activities that involved either e-mailing a photo or video of themselves in the nude or being the recipient of such images.
Anne Bubnic

Digital Natives: Rewiring young brains | PBS - 4 views

  •  
    According to the latest Kaiser Family Foundation data, 8- to 18-year-olds are spending more than 50 hours a week with digital media. That's more than a full work week. Are e-mail, mp3s and the web affecting your child's brain? Dr. Gary Small is the director of UCLA's Memory and Aging Research Center.
Anne Bubnic

ReadWriteThink: Electronic Messaging & How It Affects Other Writing - 0 views

  •  
    With the increasing popularity of e-mail and online instant messaging among today's teens, a recognizable change has occurred in the language that students use in their writing. This lesson explores the language of electronic messages and how it affects other writing. Furthermore, it explores the freedom and creativity for using Internet abbreviations for specific purposes and examines the importance of a more formal style of writing based on audience.
Anne Bubnic

FL State lawmakers consider going easier on sexting teens - 0 views

  •  
    Florida State lawmakers Monday took up a bill that would, for the first time, create a separate penalty for the increasingly common, and risqué, practice among teens - sending naked or suggestive pictures of themselves via cell phone or e-mail.
Anne Bubnic

Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views

  •  
    Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
Anne Bubnic

Principal to parents: Take kids off Facebook [Video] - 4 views

  •  
    Anthony Orsini sent an e-mail blast to the Benjamin Franklin Middle School community in Ridgewood, New Jersey, on Wednesday, urging parents to take down their children's online profiles on Facebook and elsewhere. "There is absolutely no reason for any middle school student to be a part of a social networking site!," he wrote. "Let me repeat that - there is absolutely, positively no reason for any middle school student to be a part of a social networking site!" The main problem, he wrote, is that tweens do not have the resilience to withstand internet name-calling. "They are simply not psychologically ready for the damage that one mean person online can cause," he said.
Anne Bubnic

Digital Citizenship: Monitoring Technology Use & Abuse [pdf] - 0 views

  •  
    THE JOURNAL (arcticle) by Mike Ribble and Gerald Bailey. Provides a five-step program for creating a digital citizenship program in your school.Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is \nbeginning to emerge in our society. This outbreak of \ntechnology misuse and abuse is documented in continual news \ncoverage on TV, in newspapers and on the Internet - both \ninside and outside of schools. The endless list of misuse and \nabuse includes hacking into school servers, using e-mail to \nintimidate or threaten students, illegally downloading music, \nplagiarizing information from the Internet, using cellular \nphones during class time, accessing pornographic Web sites, \nand playing video games during class. Therefore, if you are \nusing technology in your district, you must begin to deal with \ndigital citizenship in a significant way. \n
Anne Bubnic

Summer Photo Contest for Kids - Capturing spirit of biodiversity - 0 views

  •  
    National Geographic, Airbus, and ePals have partnered to raise awareness of biodiversity worldwide, especially among young people. A major component of this effort is a summer photo contest for students age 6-16, called "See the Bigger Picture". Students can submit digital photos online or via mailed electronic media until September 8th. The contest is open to kids aged between 6 and 16.
buyglobalshop

Buy Verified LiLi Accounts - Buy Global Shop - 0 views

  •  
    Have you listened almost LiLi accounts and pondered what they are all almost? Well, you're not alone! LiLi accounts, brief for Constrained Risk Venture accounts, are a sort of speculation item that offers a special combination of development potential and resource security for financial specialists. These accounts give a layer of assurance for financial specialists by constraining their risk in the case of monetary misfortunes, making them a well known choice among those looking to oversee chance whereas still looking for openings for development in their venture portfolios. Buy Verified LiLi Accounts What precisely is a LiLi account? Have you ever listened of a LiLi account and pondered what precisely it is? In today's advanced keeping money world, there are bounty of modern account choices accessible, and LiLi is one of them. A LiLi account, brief for "life-living," is a sort of money related item outlined to offer assistance people consistently oversee their cash and accomplish their individual money related objectives. But what sets a LiLi account separated from conventional checking or investment funds accounts? Let's take a closer see at what makes a LiLi account one of a kind and how it might advantage your monetary wellness. Buy Verified LiLi Accounts Unlike conventional accounts, a LiLi account ordinarily offers a combination of managing an account administrations and money related apparatuses all in one put. With a LiLi account, you can effectively track your investing, set reserve funds objectives, and indeed gain rewards for assembly certain money related turning points. Furthermore, a few LiLi accounts may offer competitive intrigued rates, permitting your cash to develop over time. Whether you're looking to spare for a enormous buy or fair need to way better oversee your day-to-day accounts, a LiLi account may be a profitable device in making a difference you reach your money related objectives. Remain tuned to learn more approximately th
buyglobalshop

Buy Amazon Seller Accounts - 100% Best Quality & Full Verified Account - 0 views

  •  
    Have you ever considered offering items online but were uncertain of where to begin? One prevalent choice for people looking to offer on a huge stage is opening an Amazon Vender Account. An Amazon Vender Account permits you to list items for deal on the Amazon commercial center, giving you get to to millions of potential clients around the world. Whether you're looking to offer carefully assembled creates, vintage things, or unused fabricated products, Amazon Vender Accounts give you with a stage to reach a wide gathering of people and develop your business. Buy Amazon Seller Accounts What Is Amazon Dealer Accounts? Amazon Dealer Accounts are a pivotal device for people and businesses looking to offer items on the world's biggest online commercial center. These accounts provide dealers get to to a wide extend of highlights and benefits that can offer assistance them reach a more extensive group of onlookers and increment their deals. From setting up item postings to overseeing orders and dealing with client request, Amazon Dealer Accounts give a comprehensive stage for dealers to develop their online businesses. Buy Amazon Seller Accounts With millions of clients going to Amazon each day, having a Dealer Account can open up a riches of openings for venders to grandstand their items and interface with potential buyers. Whether you are a little commerce proprietor looking to grow your online nearness or an person looking to make a few additional wage by offering items, an Amazon Dealer Account can give you with the instruments and assets required to succeed in the competitive e-commerce scene. In this article, we will dive into the different highlights and benefits of Amazon Vender Accounts, as well as give tips and exhortation for modern venders looking to explore the stage effectively. Is there a expense to open an Amazon Dealer Account? In arrange to offer items on the stage, you will require to make an Amazon Vender Account. But the huge address numerous in
tinderaccountbuy

Buy Verified Stripe Account From SmmPaidService - 0 views

  •  
    Buy Verified Stripe Account From SmmPaidService Replay and contact 24/7 Live Support E-mail : smmpaidservice@gmail.com Telegram : @smmpaidservice Skype : smmpaidservice
buyglobalshop

Buy Content Writing Service - Best Quality Everything Content Writing Service 2024 - 0 views

  •  
    Substance composing administrations are an basic component of any effective computerized promoting technique. Whether you are looking to make strides your website's look motor optimization (SEO), make locks in social media posts, or deliver instructive web journal articles, a proficient substance composing benefit can offer assistance you accomplish your objectives. Substance composing administrations give businesses with high-quality, well-researched, and locks in composed substance that is custom fitted to their particular needs and target audience. Buy Content Writing Service How can substance composing administrations advantage my business? In today's advanced age, having solid and locks in substance is significant for businesses looking to draw in and hold clients. Substance composing administrations offer a important arrangement for businesses looking for to upgrade their online nearness through well-crafted and pertinent substance. Whether it's web journal posts, site duplicate, social media substance, or e-mail pamphlets, proficient substance journalists can offer assistance businesses successfully communicate their message and interface with their target audience. Buy Content Writing Service By outsourcing substance composing to a talented group of journalists, businesses can spare time and assets whereas guaranteeing they reliably deliver high-quality substance. This can offer assistance businesses set up validity, move forward look motor rankings, and drive activity to their site. Furthermore, substance composing administrations can offer assistance businesses remain up-to-date with the most recent patterns and best hones in substance promoting, guaranteeing they remain competitive in today's fast-paced advanced scene. Whether you're a little startup or a huge enterprise, contributing in substance composing administrations can advantage your trade by making a difference you stand out from the competition and construct a steadfast client base.
  •  
    Substance composing administrations are an basic component of any effective computerized promoting technique. Whether you are looking to make strides your website's look motor optimization (SEO), make locks in social media posts, or deliver instructive web journal articles, a proficient substance composing benefit can offer assistance you accomplish your objectives. Substance composing administrations give businesses with high-quality, well-researched, and locks in composed substance that is custom fitted to their particular needs and target audience. Buy Content Writing Service How can substance composing administrations advantage my business? In today's advanced age, having solid and locks in substance is significant for businesses looking to draw in and hold clients. Substance composing administrations offer a important arrangement for businesses looking for to upgrade their online nearness through well-crafted and pertinent substance. Whether it's web journal posts, site duplicate, social media substance, or e-mail pamphlets, proficient substance journalists can offer assistance businesses successfully communicate their message and interface with their target audience. Buy Content Writing Service By outsourcing substance composing to a talented group of journalists, businesses can spare time and assets whereas guaranteeing they reliably deliver high-quality substance. This can offer assistance businesses set up validity, move forward look motor rankings, and drive activity to their site. Furthermore, substance composing administrations can offer assistance businesses remain up-to-date with the most recent patterns and best hones in substance promoting, guaranteeing they remain competitive in today's fast-paced advanced scene. Whether you're a little startup or a huge enterprise, contributing in substance composing administrations can advantage your trade by making a difference you stand out from the competition and construct a steadfast client base.
onlineitstore25

Buy Outlook Accounts - 100% Safe, Ready to Supply - 0 views

  •  
    Buy Outlook Accounts Are you looking to Buy Outlook Accounts? Then you are in the right place. We are providing the best and most Outlook Accounts at an affordable price. Our staff works hard to provide the best quality services possible to make sure that all of our customers can be satisfied. Order now and see the results for yourself And get more exposure for your business! Why will you purchase my service? ➤100% Customer Satisfaction Guaranteed. ➤100% Non-Drop Accounts ➤100% Real Active Accounts ➤Created Unique IP ➤Recovery Email Added ➤Old, Aged & PVA Account ➤100% KYC & Phone & Email Verified Account. ➤Very Cheap Price. ➤High-Quality Service. ➤100% Money-Back Guarantee. ➤USA, CA, UK, NA, AUS, and other Countries available
Anne Bubnic

America's Libraries adapted to digital age - 0 views

  • As a group, libraries have embraced the digital age," said Lee Rainie, founding director of the Pew Internet & American Life Project, which has surveyed public attitudes toward libraries. "They've added collections, added software and hardware, upgraded the skills of their staff. A lot of institutions have had to change in the Internet age, but libraries still have a very robust and large constituency." A December 2007 Pew survey found that more than half of Americans — 53% — visited a library in the past year. That's expected to grow as more people look for free resources and entertainment in a slowing economy.
  • At the one-room Watha T. Daniel/Shaw Interim Library in the District of Columbia, books still line the shelves. But on one recent day, almost every adult at the library sat in front of a computer, surfing the Web, checking e-mail or visiting a social networking site.
  • The analysis found that libraries are thriving in the Internet age: •Attendance increased roughly 10% between 2002 and 2006 to about 1.3 billion. Regionally, Southern states lag the rest of the country in visits per capita. •Circulation, which measures how often library visitors check out print or electronic materials, increased about 9%, from 1.66 billion to 1.81 billion during the five-year period.
  • ...2 more annotations...
  • •The number of Internet-capable computers soared 39% — from about 137,000 in 2002 to nearly 190,000 in 2006. Libraries in rural states in New England and the Midwest led the country in public computers per capita in 2006. The increase in Internet access is thanks in part to the Bill & Melinda Gates Foundation, which launched a national program in 1997 to bring the Internet to libraries, beginning with the South. By 2003, the foundation had spent $250 million on some 47,000 computers, as well as training and tech support, bringing almost every public library online, said Jill Nishi, deputy director of the foundation's U.S. Libraries initiative. "You should be able to walk into any library and find Internet service," she said. "It's free, unfettered access to information."
  • Free Internet access is particularly important for low-income people, said Ken Flamm, an economics professor at the University of Texas at Austin who has studied the role of the Internet in public libraries. Only about a third of households with incomes below $25,000 have Internet access, according to federal data.
  •  
    The Internet was supposed to send America's public libraries the way of eight-track tapes and pay phones. But it turns out, they're busier than ever. Libraries have transformed themselves from staid, sleepy institutions into hip community centers offering
Anne Bubnic

You Have to Be a Parent Online Too - 0 views

  • "When we were kids, our parents always told us not to talk to strangers. That was drilled into our heads," he said. "But now, we have to factor in what happens on the Internet."
  • Security settings and parental involvement are especially important in the virtual world, Morris urged. "Check your child's e- mail account on a regular basis. You're the parent; you can do that."
  • While social networking sites like Facebook, Myspace and Xanga can be hot-spots for sexual predators, "not everything about these sites is bad," Morris said, noting some of the most up-to-date information after the NIU shootings was found on Facebook. "Good things do occur, but we need to make sure we're monitoring them," he said. Morris urged the group to keep home computers in plain sight, to outline their expectations and review communications regularly with their children. "We want to build that level of communication with their kids," he said. "If they're talking to someone they shouldn't, we want them to be able to come to us. A child should be able to listen to a parent more than a predator."
  •  
    Parents today have responsibilities in both the real world and the virtual world, Kane County Regional Office of Education Director Phil Morris told the Elgin Academy community Tuesday.
Anne Bubnic

No bullies allowed [Pennsylvania State Initiative] - 0 views

  • A school must have a written bullying policy that includes consequences for violations, identify school personnel to notify with complaints and the policy must be posted in every classroom and be reviewed by students, according to a press release issued by Williams' office.
  • And while school violence had declined 4 percent during the past several years, bullying in schools has risen 5 percent, according to the U.S. Department of Education.
  • The new legislation applies to any threats or intimidation in a school setting, including on school grounds, on a school bus or at any school-sponsored event. Also, the measure covers threats sent via e-mail or over the Internet, called cyber bullying. According to the state Department of Education, every school day 160,000 students miss school because they are afraid of being bullied.
  • ...1 more annotation...
  • The anti-bully measure was included in a larger School Code bill in 2008. Greenleaf said he proposed the measure back in 2002, but met with resistance from school districts who worried about the cost of implementing such a program.
  •  
    A bill passed earlier this year makes it mandatory for Pennsylvania school districts to have a written anti-bullying policy in place beginning next year.
Anne Bubnic

Cyber Bullying Presents a Complex Legal Landscape - 0 views

  • Cyber bullying conducted at school allows school authorities to more easily impose discipline. The use of school equipment to cyber bully also makes a stronger legal argument for action by the school. And if the student e-mails offensive speech to school or downloads it at school and then distributes it, the school is in an advantageous position regarding disciplining the student. However, speech created at home—such as the creation of a Web site—affords greater legal protection for cyber bullies.
  • “The problem with the approach that web speech created at home can—if accessed at school—become school speech that can be regulated is the very nature of the Internet. Once something is created and placed on the Internet, the author loses control over who can access the speech and where it can be accessed.”
  •  
    As students across the country return to school, school districts face an often complicated and confusing legal landscape on how to deal with cyber bullies in their schools, according to Todd DeMitchell, EdD, a professor of education, who studies school liability, adequate supervision, and responses to preventing bullying and cyber bullying from school administrators and state legislatures.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
« First ‹ Previous 41 - 60 of 80 Next ›
Showing 20 items per page