Rules of the road
Users of the Hawaii State Department of Education (HIDOE) Internet Portal System, Internet services and digital devices must comply with:
- Acceptable Use Guidelines: For employees, contracted workers, volunteers and all other non-student and non-parent users of HIDOE-owned or leased digital devices. [VIEW]
- Technology Acceptable Use Guidelines: For students and parents. [VIEW]
In order to provide a safe and secure learning environment for students and minimize exposure to malicious content on the web for all users, technology protection measures such as web content filtering and web traffic monitoring are utilized. To comply with the Children's Internet Protection Act (CIPA), we filter student access to offensive/inappropriate content over the Internet such as pornography, abused drugs, and gambling.
What are we protecting students from online?
Online sexual predators
An online sexual predator is an adult Internet user who uses the Internet to meet and seduce vulnerable children and underage teenagers into sexual encounters. In a recent study by the University of Hawaii, it was found that online sexual predators is the top concern of students, parents and teachers. A national study of 1,501 students found that 19.0% of them had been sexually solicited online. Overall, sexual encounters with minors fall under child pornography, a felony. Social networking sites are where predators lurk most often. See the
online safety tips from the Federal Bureau of Investigation, or FBI.
Cyberbullying is the the continuous and deliberate act of harassment, embarrassment, or intimidation via digital communication device. Merriam-Webster defines it as the electronic posting of mean-spirited messages about a person (as a student) often done anonymously. Pseudonimity, which is the use of a pseudonym for anonymity, seems to encourage hurtful behaviors that would otherwise not be done face to face. Cyberbullying is not tolerated in schools and warrants disciplinary action as described in Chapter 19.
Cyberstalking is the obsessive pursuit of someone using digital means. There is usually a pattern of malicious or threatening behavior that results in the victim feeling credible fear and harm. Reporting cyberstalking immediately is the best way to deal with cyberstalking.
National cyberstalking and cyberharassment laws are available at the National Conference of State Legislatures webpage.
Sexting is the sending of sexually explicit images via SMS message or other means via mobile phone, computer or any other device capable of electronic data transmission or distribution. It is against the law to sext in the state of Hawaii (§712-1215.6). Adults who sext with minors falls under child pornography, and is a felony. Minors who sext with other minors commit the offense of promoting minor-produced sexual images in the second degree, a petty misdemeanor. In a local study here, it was found that about 5 percent of 492 students surveyed had sent a sext.
Identify theft is the illegal use of someone else's personal information (as a Social Security number) in order to obtain money or credit as defined by Merriam-Webster dictionary. Being vigilant about personal information is the best way to protect against becoming a victim. The newest forms are "smishing" and "vishing" where scammers will text or voicemall call you to try to get personal information. The Federal Bureau of Investigation has a strong informational webpage about
internet fraud protection.
Use and stealing of copyright content
Violating copyright is using someone else's creative works without giving them proper credit. The spirit of copyright is to balance the benefits of the author with the benefits to society. Teachers and students should be aware of
fair use guidelines and
digital millenium copyright act. Once someone puts something into a fixed medium, it is technically copyrighted. However,
registering a claim on that copyright starts at $35. A recommended resource is the
Taking the Mystery Out of Copyright" lessons from the Library of Congress.
Of additional concern is the use of peer-to-peer sites where mostly music and videos are shared. Sometimes, the sharing is illegal. Worse is that child pornography, violent images and viruses are found on files shared via these sites.
Awareness of viruses/malware/hacker attacks and rogue apps
Criminals no longer need to physically break into your windows and doors to steal from you. They can break into your accounts to steal key holdings and possessions by hacking and using malicious code. Being aware of the sender and the source of downloaded files is critical to being safe online. Everyone should exercise vigilance about resources and opening random files. The FBI officially calls these "computer intrusions" and considers it a key area of their cyber crimes work. Check out their
E-Scams and Warnings page to keep up to date.
More and more, our lives are becoming digitized. Students need to understand digital environments, and the broad-based impacts their behavior in these environments have. Families are engaged partners in cultivating responsibility. Namely:
- The digital posts of today can be referenced tomorrow. What you say or do can be captured and last indefinitely.
- Colleges, employers and the community routinely reference digital profiles. What do you want the world to know about you?
- Being irresponsible with digital profiles and personal information can lead to identity theft.
- As with bullying, cyberbullying is punishable under Chapter 19, which governs student misconduct and discipline. Learn more.
- Theft of intellectual property for school assignments or other uses is punishable under Chapter 19. Learn more.
Parents and families, in particular, have a crucial role to play in helping their children to become responsible digital citizens, and to train them to be ready for a digital world. This includes understanding social media, cyberbullying, privacy and internet safety, and more. Common Sense Media offers an excellent online education center for parent concerns that all families should review.
Also, this family contract features a "Kids' Pledge" that provides a valuable conversation starter and structure for defining digital rules in households.