Total Pageviews
Sunday, March 9, 2014
Participate 4.1.1 Digital Rights and Responsibilities Quest
"What we have here is a failure to communicate." People often do some very unwise things online but in many instances, they violate some rule that they were unaware of. An acceptable use policy can go far in eliminating violations of internet protocol but the policy must be clear and known to all who wish to participate.
The first step is to decide on what will and will not be accepted within the DLC. Nothing should be left to chance or the belief that, "Well that's just common sense". As Voltaire said, "Common sense is not so common." What behaviors does the DLC seek to encourage and which ones do they seek to dissuade? Who is going to be allowed to participate, what media is acceptable, what standards does the DLC prize? These are just a few of the many questions that must be answered before a useful policy can be developed.
The link to ISafe provides some very clear procedures that could be followed when creating an acceptable use policy. First and foremost, the plan needs to be clearly written and accessible to everyone.
http://kto8.com/Lessons_SCORM/technology/isafe/pdf/Acceptable%20Use%20Policies_Gr5-8_2006.pdf
Clarification:
The link to the isafe.org page brings up a "404 error Page Not Found." Since your post refers to the procedures here, please double-check this link. Also consider, "What strategies can we take to help our students consistently keep digital safety in the forefront of their minds?"
The link has been updated for your review...enjoy! One strategy to help our students remain vigilant regarding digital safety would be to provide links to articles related to cyber crimes such as identity theft. Students take to heart real world examples of how their actions can have negative consequences.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment