WHY

Safety net (noun) - something that provides security against misfortune or difficulty

http://mw1.meriam-webster.com/dictionary/safety+net?show=0&t=1295992721 , retrieved 1/25/2011

About Me

Hello Cameron students and parents! I'm the counselor at the high school, and this blog is being developed to help you spin Safety Nets that will protect you physically, emotionally and legally while you use the web. Check out all of the pages and feel free to comment, post and ask questions. Let's start talking.

Goals

This blog is intended to address the standards below in a way that makes sense for parents and students at Cameron Junior/Senior High School.


From: http://wvde.state.wv.us/policies/p2520.14_ne.doc


21C.O.9-12.3.TT1 Student protects software, hardware, and network resources from viruses, vandalism, and unauthorized use and employs proper tehcniques to access, use, and shut down technology equipment.


21C.0.9-12.3.TT.4: Student adheres to AUP and displays ethical behaviors related to acceptable use of information and communication technology (e.g., privacy security, copyright, file-sharing, plagiarism); student predicts the possible cost and effects of unethical use of technology (e.g., consumer fraud, intrusion, spamming, virus setting, hacking) on culture and society; student identifies the methodologies that individuals and businesses can employ to protect the integrity of technology systems.


21C.O.9-12.3.TT5 Student models ethical behavior relating to security, privacy, computer etiquette, passwords and personal information and demonstrates an understanding of copyright by citing sources of copyrighted materials in papers, projects, and multimedia presentations. Student advocates for legal and ethical behaviors among peers, family, and community regarding the use of technology and information.


21C.O.9-12.3,TT7 Student protects his/her identity online and in email and/or websites, limits the distribution of personal information/pictures, and evaluates the authenticity of emails that solicit personal information. Student identifies the methodologies that individuals and businesses can employ to protect the integrity of technology systems.



















No posts.
No posts.