One point that Chase specifically mentioned as important was “Keeping user profiles limited so that software cannot be installed and the continual monitoring of files and emails for inappropriate content.” There is, however, an unfortunate side effect to this monitoring. Legitimate and useful sites are also being blocked to both student and teachers of the Phoenix Elementary School District (PESD). In the United States, Kindergarten-12th grade schools are required by law to add filters to blocks sites obscene and harmful to minors. This requirement comes from a federal law enacted by congress called the Children's Internet Protection Act (CIPA). This law is indeed important for the safety of children at school. However, it only requires that there is sufficient monitoring it does not specify what specific sites should be monitored. Therefore it is up to the school to decide.
An example of a possibly legitimate site that is currently being blocked by PESD and many other schools is YouTube. This is blocked for both teachers and students. YouTube contains helpful how-to videos, current events, and educational content that could prove a valuable asset. While it is true that offensive content can be found on YouTube, we submit that at least the teachers should have access to YouTube, web 2.0, and other legitimate sites. They should also be able to grant access to their students on a case-by-case basis.
If the technology department does not feel like the teachers are educated enough to be in charge of their students’ and their own online safety, it would be a good idea to provide online safety training for the teachers. Because online threats are always changing and growing, this traini...
... middle of paper ...
...ict it may take days for someone come on site to assist. A quick solution to this issue would be to hire more technology staff. They might even want to hire on-call technicians instead of fulltime staff, as long as there is somebody available to assist the faculty and staff when needed.
If they are truly limited in the amount of staff they can hire, they may want to lighten the load of the workers by investing in cloud computing. For example, the free Google Apps for Educators could lighten the load tremendously. This service, provided by Google, gives teachers and even students email, Google Docs, web site creation, and scheduling all for free. This could eliminate the need for expensive email and document servers and software. More importantly, it could take the focus off of server administration and more on teacher and staff technology development.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- TABLE OF CONTENTS 1.0 HISTORY: 6 2.0 INTRODUCTION: 6 3.0 SCOPE: 7 4.0 RECOMMENDATIONS: 7 4.1 Physical Security: Operation Class; Physical and Environmental Family (ID:PE): 7 Table 1; Recommended Common Physical and Environmental Controls 6 4.2 Network Security: Technical Class; ID & Authentication (ID:IA), Access Control (ID:AC), Audit & Accountability (ID:AU) and System & Communications Protection (ID:SC): 7 Table 2; Recommended Common Network Controls (IA) 7 Table 3; Recommended Common Network Controls (AC) 6 Table 4; Recommended Common Network Controls (AU) 6 Table 5; Recommended Common Network Controls (SC) 7 4.3 Data Security: Technical Class; Systems and Information Integrity (SI): 7... [tags: Network Security]
1921 words (5.5 pages)
- The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (or the USA PATRIOT act) was enacted on October 26th, 2001 by president George W. Bush with the intention that the American Government could monitor multimedia use and prevent acts of terror. It was passed shortly after the September 11 attacks on the World Trade Centers in New York City. This article allows the government to view any net traffic that they consider dangerous. The government does this through the use of “bulk capture” systems.... [tags: Ptriot Act, Terrorism Acts, United States]
1098 words (3.1 pages)
- It is a great honor to write a letter of recommendation for Alejandra Galaviz. I have known Alejandra for three years in an academic setting. She was one of my finest Spanish students three years ago and she always motivated other students to succeed as well. She has been my most trusted teacher’s assistant for the last two years. She is one of the most mature, helpful, reliable and trustworthy students I have taught in my 12 years of public teaching. As a public high school teacher, I have seen hundreds of students walk in and out of my classroom over the last 12 years, and Alejandra is in the top 1% of students who have had a positive impact on me.... [tags: Recommendation]
848 words (2.4 pages)
- Australia is dependent on technology, everything from state security, economics and information collaboration is more accessible resulting in an increased reliance on digital networks. The rapid increase in cyber activity has a symbiotic relationship with cyber crime. The evolving nature of cyber crimes are constantly leaving counter measures obsolete in the face of these new technologies. Australia takes insufficient action against cyber crime, inaction is based on Australia’s previous focus on counter-terrorism.... [tags: Internet Crime, Cyber Crime Essays]
972 words (2.8 pages)
- Abstract With the significant increase of traffic monitoring camera systems, the debate on their safety, effectiveness and Constitutionality has increased. The purpose of this research is to present arguments from each side of the issue and then compare statistics on the subject in order to make a determination of whether these systems are more beneficial or detrimental to public safety, and whether public interest or financial gain is the core component in the implementation of the camera systems.... [tags: electronic monitoring devices]
3900 words (11.1 pages)
- Pacemakers are an electrical pulse regulatory mechanism, that helps create well balanced heart beats in patients in need. Pacemaker monitoring in the past has been limited to Physician visits, and emergent visit to the hospitals. Proper pacemaker monitoring with real-time implications leaves new insight and advancement within the medical field; while delivering real-time possible life saving patient information to appropriate personnel. With this newer technology Physicians, nurses, and other approved medical staff have the option to monitor their patient’s heart functionality, and fix pacemaker electrical signals to fit patients need from a mobile device, without ever bringing the patient... [tags: proper pacemaker monitoring, heart arrithmia]
637 words (1.8 pages)
- Dear Sir/Madame I am writing this letter to give my highest possible recommendation for Mr. Smith. I know Mr. Smith through his work in my office. Mr. Smith first approached me two years ago about the possibility of an internship in our company for the summer. At our first meeting I described the general outline of the project the he might work on. He asked good questions and appeared intelligent. He then went to the library and found many papers on the subject and read them carefully. He did this independently - I did not ask him to do this.... [tags: Letters of Recommendation]
356 words (1 pages)
- Two of the most important inventions in the last 50 years include the Internet and the World Wide Web. Over 1.96 billion people currently use the Internet around the world. Current statistics on world Internet usage and population from the Internet World Stats Web site. However, many of those people are unable to access the information on the Internet fully. Using the United States as an example, according to the U.S. Census Bureau, in 2005 “among the population 15 years and older, 7.8 million people (3.4 percent) had difficulty seeing words or letters in ordinary newspaper print, and 1.8 million of these people reported being unable to see,” (3).... [tags: The Internet]
1013 words (2.9 pages)
- Internet2 Internet2 was formed in 1006 with an original 34 institutions participating. With Internet2, the Clinton Administration was trying to advance technologies for many people. Their first step was to connect 100 institutions at 100 times the speed of the current internet. The applications generated by this research have already had a positive affect on fields such as health care, national security, distance learning, energy research, environmental monitoring, and manufacturing. Internet2 is an extremely interesting subject.... [tags: Internet Computers Technology Essays]
1512 words (4.3 pages)
- Whether you’re an average teenager wanting to keep in touch with friends after school, or a business person needing a low cost but effective way to keep work related material local and secret, chances are you use E-Mail or Instant Messaging services. For communication purposes in this high tech lifestyle that exists today, these systems are used only with the basic understanding needed to run these devices. You are about to learn how these systems came to be and the in depth understanding needed to make them work.... [tags: The Internet]
1529 words (4.4 pages)