190 likes | 394 Views
VBCPS Content Filtering. What are content filters and how do they work?. A content filter is a piece of hardware or software that acts as a shield between the Internet and a user’s computer. This helps to block access from potentially objectionable or offensive material.
E N D
What are content filters and how do they work? • A content filter is a piece of hardware or software that acts as a shield between the Internet and a user’s computer. • This helps to block access from potentially objectionable or offensive material.
ProfilesMost filters create profiles for different age groups • Children under 10 may be restricted of sites such as: • Adult Content • Illegal drugs • Sex education • Social networking. • Adult users may be restricted as well to sites such as: • Pornography • Gambling • Malware sites • Malicious software
What are pros and cons of filtering? Pros Cons Can possibly block useful materials that could be used for educational purposes. Word specific Some sites are chosen to be filtered by the software and not by a central impartial organization. • Protects students from potential dangers. • Libraries and schools can benefit financially as this will help them comply with the Children’s Internet Protection Act (CIPA), which qualifies them for federal funding. • Helps to decrease the amount of malware.
The Company • Located in Australia • ContentKeeper Technologies is a software development company that specializes in developing software to assist organizations in managing their Internet usage. • Global client base includes many companies and government organizations in Europe, the USA, Canada, Mexico, UK, South Africa and Australia.
How it works • Collaborative filtering – Input from all users around the world. Sites blocked locally by an organization are sent to CK to be researched and if needed added to the master list. • Local filtering – These are the sites we need to have blocked right away.
Features • Category lists – 31 categories and the ability to add more if needed (Adult, chatrooms etc) • Custom URLs – allows for blocking or allowing specific URLs and this takes precedence over a category • File type – Allows you to block or allow specific file types such as .exe, .zip etc • Protocols – Allows you to block or allow specific protocols such as AIM, MSNCHAT<, FTP etc • Keyword list – There are over 400 keywords on the list. Any search using one of these key words will be blocked
VBCPS use • Filtering – Of course we use the content filter to filter Internet use under CIPA. • Reporting – The Advanced Reporting Module (ARM) is used for daily reports and any special reports that may be requested by administrators • Bandwidth management tool – ARM also reports on bandwidth use.
The nitty-gritty • We have created 14 policies in Content Keeper. • Each user, student and staff, are assigned to a policy. • Each policy can be filtered differently. • So, teachers can see more than students, administrators can see more than teachers etc.
The nitty-gritty(cont) • This allows us the flexibility to provide the appropriate Internet access to each user on our network. • Using all of the features mentioned earlier, we can customize access with just a few clicks of the mouse.
History • VBCPS has an extensive Internet Safety Plan that was developed by students, parents and teachers. • Each school is required to follow the guidelines of the plan, however they are free to cover the information as they seem fit. • Library Media Specialists and Computer Resource Specialists work together to inform students about Internet Safety.
School WideStudents • Students need to know that the Internet is a powerful tool that should be used wisely. • Students need to know that not all Internet information is valid or appropriate. • Students need to be taught specifically how to maximize the Internet’s potential while protecting themselves from potential abuse. • Students need to know that Internet messages and the people who send them are not always what or who they seem.
School WideStudents • Students need to know that predators and cyberbullies anonymously use the Internet to manipulate students. Students must learn how to avoid dangerous situations and get adult help. • Students need to know that Internet activities such as playing games and downloading music or video files can be enjoyable. Students need to know which activities are safe and legal.
School WideParents • The Internet is a valuable learning, communication, and entertainment provider. A child’s Internet use should be based on age and the family’s needs and values. • Parents must understand potential Internet dangers and prepare their children, just as they prepare them for going to the playground or crossing the street.