Six Steps to Managing Internet Access - Tech Learning

Six Steps to Managing Internet Access

School districts face a moving target when it comes to keeping students from inappropriate Internet sites. Duval County Public Schools in Jacksonville, Fla., with 140,000 students, has in place a three-part system of filtering, monitoring, and reporting. Information security analyst Jim Culbert explains how it
Author:
Publish date:

School districts face a moving target when it comes to keeping students from inappropriate Internet sites.

Duval County Public Schools in Jacksonville, Fla., with 140,000 students, has in place a three-part system of filtering, monitoring, and reporting. Information security analyst Jim Culbert explains how it works.

Step 1. Take a look at content filter vendors in the education space.

Most filters are designed for corporate settings. Pay attention to the categories and whether they’re geared to an educational environment. For example, school cheating is a category that an education filter would have, but not a corporate one. The categories — including adult content, shopping, sports, gaming, chat rooms, and social networking sites — are already built in. That’s one of the biggest things you’re buying when you purchase a filter.

Step 2. Get an enterprise reporting system in place to justify policies.

An enterprise reporting system can generate data on where users are going on the Internet. Use these reports to gain support from your school board and your executive-level administrators. It’s a large undertaking to get Internet use policies in a format that a district is willing to enforce, so having hard data will put some teeth behind an acceptable use policy. These policies should include clearly-stated consequences for violators.

Step 3. Take responsibility for deciding which content filter categories the district will allow outside the technology division.

Put category selection in the hands of those of who have direct contact with kids, including parents. Duval County schools formed a committee of teachers, administrators, PTA members, media specialists, and parents. The committee votes on which categories we’re going to block or unblock.

We use the content filter from 8e6 Technologies. It can automatically upload unknown sites back to the host company, categorize those, and return them. Let’s say that you open up a new gaming Web site tomorrow, and someone from our district goes to it. The system would not know immediately which type of site it is. The system would send it back to 8e6, and they would categorize it. Then, next time someone tried to access it, the system would either allow or prevent them, depending on the committee’s decision.

Step 4. Authenticate users.

Users need to be authenticated on the network so you can know who is going to what site. That is so important. Don’t allow any anonymous Internet activity. Toward this end, have a strong, well-trained security staff to ensure that users are following district policy about logging on, and not sharing user names and passwords. That’s the whole point. Once you get all your users authenticated and students are aware they’re being monitored, it changes their entire mindset.

Step 5. Spell it out for students.

Use a log-on banner to notify your users that they have no expectation of privacy on the network, and that they must follow the acceptable use policy. Let’s say you try to go to Playboy.com. The page comes up with your name in the middle of it and a warning that you have violated the acceptable use policy and that continued attempts will result in discipline.

Step 6. Don’t get the wrong people in trouble.

You have to ensure that you never report anybody who has accidentally accessed inappropriate material. One of the things we look at is the search terms they used in Google or Yahoo or any other search engine. That information comes to the reporting system. The biggest thing definitely is intent. People get this notion that we sit around and look at everyone’s Internet history. That’s just not possible.

What we do is set thresholds of, for example, how many inappropriate sites you would need to attempt to access before we are permitted to start an inquiry on the activity.

School CIO wants to hear from you.
Send comments, description of your district’s best practices, or topics that you would like to see covered to: reader_comments@hotmail.com. Be sure to include your contact information.

Featured

Related

Six Steps to Managing Internet Access

Jim Culbert, information security analyst for the Duval County Public Schools in Jacksonville, Fla., talks about developing district policies that ensure kids remain safe online.

Ten Tips for Internet Safety

Protecting students from Internet dangers and distractions while still reaping its benefits is on every district's tech priority list.

Options for Controlling Internet Access

Question: What options are available for controlling student access of the Internet? The IT Guy says: One of the goals of every school’s computer literacy curriculum and campus policies should be helping students learn to be responsible and ethical users of technology tools. To this end, schools need to

SECURITY: Step by Step

It's time to begin planning for summer upgrades, and if information security isn't at the top of your list, it should be. Your students continue to learn more about the tools and technology that could be used to circumvent your current security infrastructure. What you need is a security architecture and approach that

5 TIPS: Getting Staff to Use Data Systems

from School CIO John Forbes, administrative analyst for the 80,000-student Fresno Unified School District in Fresno, California, and Terrence Young, chief information officer for the 70,000-student Guilford County Schools in Greensboro, North Carolina, share their strategies for getting staff on board with Web-based

Video production, step by step

Kids' Vid provides students and teachers with the  tools and instruction necessary to plan, script, create, edit, and show videos in the classroom. It includes lessons, example video clips, pre- and post-production tips, and advice from other kids. Following the steps and stages that are recommended can insure that