Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged system

Rss Feed Group items tagged

Anne Bubnic

Appeals Court Upholds NYC School Cell Phone Ban - 0 views

  •  
    A ban on cell phones in the nation's largest school system was upheld Tuesday by a state appeals court.
Anne Bubnic

Koobface computer virus attacks Facebook users - 0 views

  •  
    Facebook's millions of users are in the crosshairs of a computer virus dubbed Koobface that is being spread through the social networking site's messaging system. Users whose computers are infected may have their credit card numbers stolen or their searches on Google, Yahoo and MSN diverted to fraudulent Web sites.
Anne Bubnic

ReadWriteThink: Campaigning for Fair Use [PSA's] - 0 views

  •  
    Students explore a range of resources on fair use and copyright then design their own audio public service announcements (PSAs), to be broadcast over the school's public address system. Work can also be published as podcasts on the Internet. Students tap research and persuasive writing strategies as they design announcements for an audience of their peers.
Anne Bubnic

CTAP4 Cybersafety Project - 0 views

  •  
    Note: Diigo is failing to add the final slash needed to access this site. The correct URL is: http://www.ctap4.org/cybersafety/

    The California Technology Assistance Project (CTAP Region IV) is a state-funded agency that has been a leader in cybersafety education for the California public school system since 1997. We have invested hundreds of hours into research on topics related to cybersafety education and curriculum development. We work in partnership with school districts, Safe School Planning teams and the local Educational Advocate for AT&T in the SF Bay Area. We have many great resources posted on our site for educators, parents and kids.

Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

K12HSN EdZone - Protected Environment for Use of Web 2.0 Tools - 0 views

  •  
    The California K-12 High Speed Network (K12HSN) is offering a comprehensive set of tools to support teaching and learning in California classrooms. This free suite of tools, known as edZone, was developed by the California Dept of Education and currently includes blogging, videoconference scheduling and a file sharing system where educators can upload videos, podcasts, images and documents. EdZone is an excellent tool to share lesson ideas, upload student learning objects, disseminate best practices, and more! EdZone will soon be expanded to include Instant Messaging, Moodle, Wikis, Social Networking, Moodle-an online course management system and other Web 2.0 tools to enhance today's classroom environment. Watch for these new tools in Summer 2008!
Anne Bubnic

Intro to CyberCITZ - 2 views

  •  
    Organized around the way middle schoolers use the Internet, the CyberCitz Project provides teaching materials on Internet safety, security and ethics. This new project includes an Educators' Guide, a youth website, technology citizenship posters, and e-lessons on a K-12 learning management system. This project was produced in collaboration with the Virginia Department of Educational Technology and IIIA at James Madison University. Navigate through the curriculum content using the sidebar on the left side of the screen.
Anne Bubnic

Lesson Plan: Copyright Awareness - 1 views

  •  
    Who owns what you compose? Who controls what happens with the words, images, music, sounds, videos that you create? What rights do you have to use other people's compositions? This unit plan focuses on helping students find answers to these questions. Students explore a range of resources on fair use and copyright then design their own audio public service announcements (PSAs), to be broadcast over the school's public address system
Anne Bubnic

Get Game Smart - 3 views

  •  
    Software giant Microsoft has launched its own site - www.getgamesmart.com - to help address the problem of cyberbullying in online games, as well as assist parents in using the ESRB Rating System to determine what games their children should be playing - and what games they should not.
Anne Bubnic

Norton ranks riskiest cities for cybercrime - 0 views

  • Symantec then rated each city using different categories, such as risky online behavior (defined as buying items online and accessing financial information) and the number of cybercrimes per capita.
  •  
    Among 50 U.S. cities studied for their vulnerability to cybercrime, Seattle came out on top as the riskiest place, followed by Boston, Washington, D.C., and San Francisco, according to the report "Norton's Top 10 Riskiest Online Cities," released Monday. Results are based on the number of attempted hacking attacks and infected systems.
Anne Bubnic

Facebook rolls out anti-bullying tools with White House support - 5 views

  •  
    A new reporting tool will let Facebook users, including teens and younger users, to privately report troubling content not just to the site itself but to parents, teachers and others in their support system. And an improved Safety Center, due out in the next few weeks, will provide educational videos, articles and other content created by bullying experts to help adults address the problem.
JOSEPH SAVIRIMUTHU

Apple May Offer Age Controls for iPhone Apps - 0 views

  • Apple May Offer Age Controls for iPhone Apps
  •  
    Now comes new details about the parental control system coming to the App Store. All iPhone applications will be rated in one of four age categories: 4+, 9+, 12+, or 17+. When Apple announced the coming 3.0 release of its iPhone software, it referred to parental controls for apps.
Brevity Software Solutions Pvt Ltd

Software Development Services Company in 2016 - 0 views

  •  
    Brevity is a Professional software development company in India. It also expertise in mobile app development, website design and development, travel & tourism portal, event management system, transport & logistics, enterprise mobility solutions and e commerce & m commerce app development services. Please do not hesitate to contact us if you require any further information.
Brevity Software Solutions Pvt Ltd

A Complete Solutions for Hire Travel and Tourism Portal Developer - 0 views

  •  
    Brevity Software provides the best solutions for travel technology, all booking engine system, B2B and B2C travel portal, payment gateways integration and many more services by experienced developers. For any query visit our website.
Brevity Software Solutions Pvt Ltd

ASP .NET Web Application Development Company - 0 views

  •  
    Brevity Software Solutions Pvt Ltd is a ASP .NET Web Application Development Company offering services that includes CMS, eCommerce, Educational Web Apps, Travel Portal Systems, HR Web Apps, Interactive Games, Inventory Management, Non-profit Donation Apps, Transport and Logistics Apps, Online Courses and Training, Discussion Forums, Online Reservations for Ticketing and Booking, Project Management Applications, Social Networking, Web Conference Apps.
adjustingto6figu

Insurance Adjusters and Back-Door Company Deals - 0 views

  •  
    One of the main qualities that insurance adjusters or an independent claims adjuster needs to have is to be trustworthy. Ethics play a major role in any business, and especially when it comes to insurance claims. Fraud in this industry can sometimes be written off as a "victimless" crime which is not necessarily true, as other insureds are footing the bill for the insurance companies' losses. If an adjuster is committing fraud or trying to scam the system and earn extra money, he is hurting everyone who uses that insurance company
acrel2023

power usage monitoring device - 1 views

  •  
    With the rapid development of 5G base stations, the energy consumption problem of base stations is becoming more and more prominent. A reasonable and reliable base station power distribution system solution is the key to improving the efficiency of base station energy consumption and realizing energy saving and consumption reduction of base stations.
wasifali

Housnat juicer for whole fruit - 0 views

image

started by wasifali on 03 Jul 23 no follow-up yet
wasifali

Housnat juicer for whole fruit - 0 views

image

started by wasifali on 03 Jul 23 no follow-up yet
buyverifiedets

Buy Wechat Account - 100% Fully Verified & Safe - 0 views

  •  
    Buy Wechat Account Introduction In China, Wechat is an extremely well-liked social media site. In that it enables user-to-user communication, it is comparable to WhatsApp, but it also offers a number of other features that set it apart. Users of Wechat, for instance, can follow each other's changes in a newsfeed and share photographs and videos. Additionally, Wechat includes an integrated payment system that makes it simple for users to make transactions online. What Is Wechat Account ? Users of the social media site Wechat can communicate with their friends and family. The ability to utilize all of Wechat's services requires a Wechat account, which can be used to log in. Making a WeChat account is free and simple. A working email address is all you need. You can start interacting with people once you've registered a Wechat account by adding them as friends, messaging them, and participating in group chats. Buy Wechat Account
  •  
    Introduction In China, Wechat is an extremely well-liked social media site. In that it enables user-to-user communication, it is comparable to WhatsApp, but it also offers a number of other features that set it apart. Users of Wechat, for instance, can follow each other's changes in a newsfeed and share photographs and videos. Additionally, Wechat includes an integrated payment system that makes it simple for users to make transactions online.
‹ Previous 21 - 40 of 67 Next › Last »
Showing 20 items per page