Security and Acceptable Use Policies

Viruses

A computer virus is a program that infects computer files by duplicating itself. A malicious individual writes a virus code and inserts it in an existing program. When the program is loaded into the computer, the virus attaches itself to other files residing in memory thus infecting them. This infection is spread further by using diskettes on infected computers and then using the same diskettes on clean computers. Because this is a common source of infection in schools, it is a wise policy to disallow students using diskettes from outside the computer laboratory. It is enforced by making the students get new disks from the teacher and keeping them in the lab or school room for their use. Some viruses are annoying while others can be very destructive such as erasing your hard drive. Some have even been found on brand new software programs or diskettes. The TSG page on virus Information is found at http://www.stfx.ca/TSG/Viruses/Index.html
The CIAC US Dept. Energy has good Virus information as well

Almost just as annoying are the many virus myths that abound. Annoying  email warnings are sent like chain letters warning of dire consequences should you fail to forward the message to all of the people on your mailing list. Check out the supposed virus first before you forward such messages at the hoax and myth page http://www.kumite.com/myths/
CIAC HoaxBusters is another great place to check out phony virus and chain letters.

A site devoted to warn about real virus epidemics and what can be done about them as well as hoaxes  is found at the TrueSecure Corporation at http://www.trusecure.com/html/tspub/hypeorhot/index.shtml

Viruses can also be downloaded from the Web or in attached files in e-mail. That is why it is necessary to have up to date virus scanners active on the school network which will detect and destroy any detectable viruses as soon as they appear. Updates to virus scanners are usually up dated every month or two - no longer than that is very safe. Even then a new virus will slip through undetected.

To find good virus scanners, go to CWS,(32-bit apps. for reviews and downloads. Some are freeware, shareware or offer very low prices to educational institutions and most have a 30 day free trial period. When you search for the best virus scanners, keep in mind; the platform and operating system you are using (Macintosh or Windows 95, NT,ME), the amount of your computer resources or memory required to run the scanner in the background, and the cost.

A few of the highly rated scanners are McAfee's ViruScan, F-Secure Anti Virus, Inoculate Personal Ed., and Norton Anti Virus. Inoculate Personal Ed. is totally free for personal use and is also highly rated.

Kid-Proofing Computers  

Computer labs are prone to abuse by certain students either intentional or otherwise. Some of the problems encountered are trashing files, deleting icons, stealing balls from mice, etc.

To prevent tampering with files and the desktop, a desktop security program such as FoolProof by Smartstuff Software is a good one. Some others frequently used are: Fortres , Consult the ratings to find others. The listserv  archives especially EDTECH can find discussions that center around this topic. Use Desktop security as a search string. Even the best programs can usually be cracked by some students, so the teacher must be vigilant and quick to crack down on infractions of this kind. One teacher advised using your best computer students as allies and helpers in the lab so as to minimize any mischief of this kind. To determine whether a program was really good, he enlisted his best students to try and crack the code on their security programs. When they were successful, he moved onto another one.:

Protecting Kids from Harmful Information and Predators- Filtering Software

If the computers have internet capabilities, it is advisable to have a filtering software in place for all computers on the network. This is also a frequent topic of discussion for EDTECH and computer using teacher related listservs. Use filtering software as a keyword search string. Some of the names often mentioned are:

Cyber Patrol http://www.cyberpatrol.com

Net Nanny http://www.netnanny.com

Safesurf http://www.safesurf.com/

Surfwatch http://www1.surfwatch.com/home/

These programs generally use keywords used in certain contexts for filtering information received by the children. Check SuperKids or Family PC to see their ratings of Parental control or filtering utilities. But this is not always effective and therefore vigilance on the part of the teacher is required.

Using Child friendly Search engines is also helpful in reducing risk. See Searching with Kids. , Kidsclick, and Search Tools for Kids

Discuss Safety Issues with children. Use some of these as references
University of Oklahoma Police Notebook - excellent articles
US Dept. Of Justice - Internet Rules of the Road - Do's and Dont's
WorldKids Internet Safety Rules

Acceptable Use Policy (AUP)

An AUP is a semi legal document indicating to parents, teachers, and students the appropriate uses of the Internet as well as consequences for students when the AUP is violated.

In general the AUP should contain how the Internet will be accessed and used for the benefit of the student, an explanation of the students' responsibilites, the consequences of violations, and a place for student, parent, and teacher signatures and date..

Every student and his/her parent must sign the AUP if they are to use the school's computer facilities.. This is also for the protection of both teacher and school.

There are many versions of AUP forms on the WEB. These are some of the links which may give you an idea of what should be contained on these forms. . Most school districts have a standard AUP. If your school does not have one, you may be asked to help draft one. There is no need to reinvent the wheel here.

The Nova Scotia Department of Education has a web site devoted to the Acceptable use of the Internet and a sample copy of an AUP in English can be downloaded from their site.at http://doc-depot.ednet.ns.ca/internet/english/
They spell out the guidelines in separate documents.

Security measures in Student Publishing is discussed in the following http://www.siec.k12.in.us/~west/online/copy2.htm
samples are found on P.73-74 in your text book:
http://www.peotone.will.k12.il.us/accept_use.html

Some AUP Resources recommended on Edtech:

http://mustang.coled.umn.edu/Started/use/Acceptableuse.html
http://www.nueva.pvt.k12.ca.us/nnaup.html
http://www.rice.edu/armadillo/aupenglish.html
http://www.ucalgary.ca/~mueller/hanson.html
AUP Ask ERIC Responses

Teacher Supervision

Because none of the above measures are 100% effective, the teacher is still the primary person to supervise the proper use of computer facilities. Here is one of Nova Scotia's experienced teacher's suggestions as to how to handle the acceptable use issue.

Here are some guidelines for such supervision:

  1. Discuss the AUP with the students, have them and their parents sign them. Be sure to collect them and not allow anyone access to the computer lab until the signed AUP has been returned. Keep it in a safe place.
  2. Discuss safety issues in using the Internet. They should never give out personal information, real name, address, telephone number, photos without the teacher's permission.
  3. Ask them to inform you if they come across something objectionable.
  4. If they wish to go to sites other than those indicated for the assignment, they should ask your permission.
  5. Using a U-shaped lab design where all of the screens are visible to the teacher is a good idea.
  6. Students must be warned at the outset that using the Internet to view objectionable material is against school rules and will be punished by some sort of sanction- such as taking away computer privileges for a period of time.

A good page for security in general is offered at Oklahoma University at http://www.ou.edu/oupd/inetmenu.htm



Assignment: read P 66-77 of your text

Please report any corrections to:
Ruth MacKinnon at rjmackin@stfx.ca
St. Francis Xavier University
     X Home                 Ruth's Home