Recommendations For Internet Monitoring Essay

753 words - 3 pages

Recommendations

One point that Chase specifically mentioned as important was “Keeping user profiles limited so that software cannot be installed and the continual monitoring of files and emails for inappropriate content.” There is, however, an unfortunate side effect to this monitoring. Legitimate and useful sites are also being blocked to both student and teachers of the Phoenix Elementary School District (PESD). In the United States, Kindergarten-12th grade schools are required by law to add filters to blocks sites obscene and harmful to minors. This requirement comes from a federal law enacted by congress called the Children's Internet Protection Act (CIPA). This law is indeed important for the safety of children at school. However, it only requires that there is sufficient monitoring it does not specify what specific sites should be monitored. Therefore it is up to the school to decide.

An example of a possibly legitimate site that is currently being blocked by PESD and many other schools is YouTube. This is blocked for both teachers and students. YouTube contains helpful how-to videos, current events, and educational content that could prove a valuable asset. While it is true that offensive content can be found on YouTube, we submit that at least the teachers should have access to YouTube, web 2.0, and other legitimate sites. They should also be able to grant access to their students on a case-by-case basis.

If the technology department does not feel like the teachers are educated enough to be in charge of their students’ and their own online safety, it would be a good idea to provide online safety training for the teachers. Because online threats are always changing and growing, this training should be given at least yearly.

Another issue that Chase mentioned was that cost was a barrier to purchasing software. A possible solution to this problem is utilizing free and open source software alternatives. A great resource is http://osalt.com (open source as alternative). This site provides open source alternatives to commercial software. Instead of spending hundreds of dollars on Adobe Photoshop to edit photographs, students can...

Find Another Essay On Recommendations for Internet Monitoring

teen internet monitoring Essay

908 words - 4 pages There was a leak on the news a couple of days ago about how the NSA was monitoring their citizens without their permission. Not only the NSA is known to monitoring internet use, Company’s now can use profile web pages to decide if they want to hire someone for employment. Even some schools use places like Facebook, Instagram, and twitter to find the source of pranks, planned fights, and behavioral issues at school. Some parents are even

Electronic Performance Monitoring Essay

1127 words - 5 pages which may be so confidential. This has the effect of demoralizing and killing the spirits of employees while at work. For that reason, organizations need to exclude some of the employees’ information that is extremely confidential from the monitoring process (Alder, Noel, & Ambrose, 2006, p. 901). Works Cited Alder, G. S., Noel, T. W., & Ambrose, M. L. (2006). Clarifying the effects of Internet monitoring on the job attitudes: The

Workplace Privacy

3560 words - 14 pages privacy did occur. Appropriate Monitoring Policies for Employee Email and Internet Use A public employer’s best protection against suit is to implement an email/internet monitoring policy that provides a warning to employees that email messages and Internet use may be monitored. It should be noted that email/internet policy should be in addition to a monitoring policy that already exists for phones, video cameras, etc

MULTIPARTY COLLABORATION: ABSOLUTE TERM IN SUMATRAN TIGER CONSERVATION

1324 words - 6 pages Sumatra is also the recommendations for improving the effectiveness of the monitoring and handling of human with Tiger conflict. As for optimizing the protection of Sumatran tiger habitats, implementation of SMART-RBM as a patrolling tool across Sumatra is necessary to be encouraged. Some initiation to implementing SMART-RBM Patrol has already done collaboratively between PHKA, HarimauKita, FFI, WCS and ZSL in some Tiger Conservation Landscape (TCL

Security in The Cloud

1724 words - 7 pages stolen or lost. The most important question is what is cloud computing, and why is it important for storing and securing data. According to an article in pc mag “cloud computing means storing and accessing data and programs over the internet instead of your computer’s hard drive” (Griffith 2013). For the data to be considered cloud the data must stored online and be synchronized with devices. For example , just take a look at what the

Programme Monitoring and Review Processes

2585 words - 11 pages 2.0 PROGRAMME MONITORING AND REVIEW 2.1 Introduction In essence, programme monitoring and review processes in relation to modules and programmes are ‘self-reflective, self- critical processes’ concerning the performance and effectiveness of the modules and programme under consideration. These processes are thus essentially developmental and formative in nature, so as to determine actions for further enhancement’, (Southampton Uni doc) and to

Privacy in the Workplace

2493 words - 10 pages to see the employee's terminal, and with the different software there are many types of computer monitoring.20 With certain software employers can look at employee's computer terminal's screen as if it is there own and to view the content of the hard drive.21 With that they can also monitor internet-usage and electronic mail.22 Keystroke monitoring is another type of monitoring, which is used for intensive word-processing or data entry jobs.22 The

WHITE PAPER on “HVAC Industry: Challenges, Trends, Market Drivers”

984 words - 4 pages / recommendations can be given to user. b. Smart Grid integration can also be done and demand response based system can be implemented. c. The presence sensor can communicate to the gateway about the absence of any one, gateway can then switch off the HVAC devices in order to optimize energy consumption. The rules can be configured via platform and pushed to gateway for implementation. 2. Remote Monitoring and control: The different setting of the HVAC

Employee Privacy

1284 words - 5 pages be monitoring usage, its almost guaranteed to be followed. When a company's computers become infected, it leads to a loss of revenue by creating down time and resources to fix the issues. Employers are becoming strict for another reasdon, employee abuse. Employees that take advantage of internet usage are precisely why employers are monitoring their employees. Employers expect their employees to be working, not surfing the internet. Work

The Internet of Everything

3046 words - 13 pages for organizations to adopt to it because opportunities it offers are great for a an organization to survive in the era of IoE, In the following four “internets” (places, people, things and information) the four basic usage models created by combination of services and data streams when everything is digitized are operate, monetize, manage and extend. Internet of Everything As I have stated above that the IoE is simple networked connection

Careers in Computer Science

716 words - 3 pages designs and deliver them on the web site structure for some internet sites • Focus on managing documents, tests, implements and maintains web pages and multimedia design by using suitable web publishing, editing and graphics applications • Serves as a client contact regarding web site maintenance and enhancements. Investigates web site issues and coordinates resolutions • To monitor and report web statistics and make recommendations to managers to

Similar Essays

Electronic Monitoring Essay

324 words - 2 pages enforcement of nonincarcerative sanctions (Tonry, 179). After the offender has served a period of incarceration and the Provincial Corrections feel the offender is a good candidate he/she may be released on EM. The judge can also make recommendations for the offender to be on EM. The primary purpose of EM is to divert offender from incarceration that can reduce cost, and avoid over-crowding at prisons (Berlin, 77).WHAT IS ELECTRONIC MONITORING a

Internet Monitoring Essay

747 words - 3 pages been put onto the Internet, however some government regulations from other countries may prevent access. Monitoring the Internet has been a controversial issue regarding who should have access to the Internet, what is being put up, and what is being blocked. Some believe the Internet is a human right, while others believe it is a privilege and should be monitored by the government and businesses for their employees. There are both benefits as

Election Stakeholder Management In The Philippines:

639 words - 3 pages an election campaign. The first stage is “measuring” in which we try to quantify the voter commitment to a candidate and the assessment of their performance. The second is “managing” in where recommendations for strategic planning and political marketing come in as vital inputs in a campaign strategy. The last stage is “monitoring” where we track performance and evaluate progress of our campaign and serves as salient inputs to the first two

Work Environment And Legal Issues Essay

2119 words - 8 pages have implemented monitoring technology to help deter employees from using company computer for personal business. Many of these employees are sometimes unaware they are been monitored and are concern with the lack of privacy in the workplace. Employees believe employers implement monitoring systems to make them work harder. This paper will discuss the Internet abuse by employees and the affect it has the organizations as a whole. Employers