What Password Policies should I Implement for School and Classroom Computers?
Creating a good password for the classroom computers is crucial for the safety of the children. It is, therefore, good to set some policies in place while creating passwords for the computers. Some of the possible policies may include:
Length
I recommend a minimum of six (preferably eight) characters in a password for students and […]
What do I need to know about Reporting Online Crimes?
When reporting suspicious or problematic online issues, it is important to note the following:
If someone’s life is in immediate danger, call 911 or the local emergency number in your area.
Report suspicious activity involving a missing or abducted child, child pornography, and/or the online exploitation of children to the National Center for Missing and […]
What are the Goals of Acceptable Use Policies in Schools?
The purpose of an Acceptable Use Policy (AUP) is to communicate in clear language how a district’s computer and network resources are to be used so that the environment is safe, secure and reliable.
Safety
Educational institutions have a responsibility to keep their students safe. Many schools have security guards, policies for students who want […]
How do I choose Filtering and Blocking Software for my Classroom Computer?
A good filtering and blocking software should be easy to use and will allow users to do the following:
Set up individual profiles, similar to setting up a user account as described previously to limit access or level of filtering based on the user profile.
Limit or deny access to chat rooms and/or instant messaging. […]
How do I Monitor Computer Usage in the Classroom?
A monitoring software helps you monitor computer usage. A good monitoring software program will capture all activity on a computer through a variety of means. The price of the software ranges from free to over $100 with the more effective ones charging a fee for the program.
Monitoring services generally include 1-2 years of […]
What is Grooming on the Internet?
Online grooming is a process where someone makes contact with a child with a motive to sexually abuse them, either online or offline. Predators usually build relationships with their victims. This grooming process usually includes several stages and may occur very quickly depending on the responses they get from their intended victim.
FRIENDSHIP FORMING […]
Virtual Worlds in Education Versus its Dangers
Virtual world websites are similar to gaming as users in both create an account and then use an avatar (picture or drawing) to represent them and move around. They differ from online gaming sites as the user isn’t there to play a game but to interact with the other users.
While virtual worlds have […]
Monitoring the Classroom Computer: Monitoring Software
One of the ways to monitor your classroom computer usage is with the help of a monitoring software. A good monitoring software program will capture all activity on a computer through a variety of means. Prices range from free to over $100 with the more effective ones charging a fee for the program.
Monitoring […]
Warning Signs: Who Abuses Children?
When we know the warning signs of potential abuse, we may be able to minimize or prevent abuse from happening.
“Warning sign” is really just another way of saying “opportunity for prevention” – a chance for caring adults to recognize a possible risk and to take action to protect […]