9 months ago
The Student Acceptable Use Policy is distributed each year at the start of school to all students.This document must be signed by student and guardian and returned to the school prior to the student being allowed to access the school’s internet system. Students who do not return this document are not allowed access to the District Computer system.
Resources for Parents, Students and Teachers
- NetSmartz - an interactive, educational program of the National Center for Missing & Exploited Children® (NCMEC) that provides age-appropriate resources to help teach children how to be safer on- and offline. The program is designed for children ages 5-17, parents and guardians, educators, and law enforcement. With resources such as videos, games, activity cards, and presentations, NetSmartz entertains while it educates.
- Educate children on how to recognize potential Internet risks
- Engage children and adults in a two-way conversation about on- and offline risks
- Empower children to help prevent themselves from being exploited and to report victimization to a trusted adult
- Internet Safety Tips for Middle School Kids
- Internet Safety Tips for Students and Parents
- Guide to Keeping Children Safe Online (Updated for 2018)
- Teen Safety on the Internet
- Internet Safety-National Crime Prevention Council
- FBI-Parent's Guide to Internet Safety
- Explaining the Internet to Younger Elementary Students
- How to Teach Internet Safety to Younger Elementary Students
- Cyberbullying Research Center
- STOP Cyberbullying
- Cyberbullying: The New Online Crime
Internet Filtering Process
9 months ago
We would like to give everyone brief overview of how we filter internet content for the Chicopee Public School district. I think it will be beneficial for everyone to have a general understanding of the process, the limitations of it, and our intentions.
We operate our district’s firewall from our main office, which all internet access is run through. The purposes of that firewall is to block unauthorized access to our network, prohibit or allow outward communication, and also filter internet content. We are going to focus on the content filtering aspect of our firewall.
These filtering categories help us stay compliant with the Children’s Internet Protection Act (CIPA) which allows us to get government funding through the FCC’s E-rate program. The E-rate program allows us access to telecommunication services, internet access, and other network devices the city normally couldn’t afford.
While our network has grown over the last couple of years with Chromebooks, iPads, and other mobile devices, we are still a Windows based network. All of our servers run Windows, most if not all teachers should have a Windows based desktop or laptop computer. Everyone in the district has a Windows network account; which they use to log into these desktops and laptops. Our firewall has the ability to integrate with our Windows directory of network accounts. We configured several servers that parse every network login, so when a student or teacher logs into a Windows desktop or laptop, our servers take note of who has logged into that computer and relays the information to our firewall. If someone is using a Chromebook, iPad, phone, or a personal device not issued by the district our Firewall has no way to identify who the user is.
The firewall will take that login information and put them into groups, they are sorted by students, teachers, and SRO officers (if the firewall can’t identify the user they will be considered a member of the student group). First each of these groups is filtered by their own individual set of 64 categories, which are determined by the manufacturer of the firewall (these range from social networking, travel, multimedia, religion, news, games, alcohol, weapons, etc.). When a user tries to access a website, the firewall checks the category of the website, cross checks it with that user’s list of allowed and denied categories, and either gives them access to the website or denies them access. For each of these groups (students, teachers, SRO officers) we can then add a whitelist (websites we allow even if they are in a denied category) and a blacklist (websites we prohibit even if they are in an allowed category). We cannot block or allow a portion of a website, or an individual video, we can only allow or block the entire domain.
All individual teacher logins, including the elementary school logins, have access to YouTube. We understand YouTube hosts some truly informative and captivating videos, however it also hosts violent, pornographic, and racist videos. We don’t have any control over what videos on YouTube can be accessed, we only control whether YouTube (in its entirety) can be accessed or not. Without being able to control that access we don’t feel it’s safe to open up all of YouTube for student access. YouTube access also uses the largest chunk of our internet bandwidth. The average music video on YouTube can use up to 80MB of bandwidth. That’s just one connection, we have 15 buildings in the district each with hundreds, the larger buildings with thousands of connections each day. If YouTube access was granted to all students the amount of bandwidth used would be staggering. The entire district shares one pool of bandwidth, it is our job to make sure that this bandwidth is available for high priority necessities, such as NWEA testing, MCAS testing, WIDA testing, Lexia testing, Edgenuity, library catalogs, email communication, Munis access; the list of online activities and testing can go on indefinitely.
If a teacher is having a problem accessing YouTube from a Windows computer please have them log off the computer, and log back in. This will reinitialize the login process where the firewall will sort the logged in user to the correct group (students, teachers, and SRO officers). If there are problems after that please contact our office so we can check the teacher’s network account, as well as the computer they are using.
Teachers can use their YouTube access to find appropriate videos for their classroom and show them on their projectors, interactive boards, or TVs. They can also use a YouTube downloader (such as http://www.videograbby.com/) to save a YouTube video to their computer. They can host that video in their Google drive and add it to a Google classroom so that students can access it from any device at school or at home.
Our commitment is to help facilitate the education process for the school district as a whole. We are in a digital age where technology is a vital part of educational process. We strive to help bring technology into the classroom and do our best to maintain the functionality of our the technology in our district. Please feel free to contact our department with any comments or concerns.
9 months ago
Only authorized licensed software is allowed on Chicopee Public Schools computer systems.
Recently we have experienced difficulty with Spyware which is a virus type software that is acquired through downloads of screensavers, mail program enhancement products, wallpaper etc.
These Spyware programs run in the background recording and stealing information and data from your computer then sends it to the party who initiated the Spyware program. The information sent back can put the user at risk for identity theft, invasion of privacy (records keystroke activity including passwords, credit card numbers etc.), computer processor slowdown and unnecessary internet bandwidth usage.
The way to prevent a computer from becoming infected with Spyware is to refrain from downloading web based applications (wallpaper, screensavers, pop-up offers etc.) . The Telecommunications Department's policy is not to allow employees to download these types of programs on school department computers.
If you believe that a computer in your building or office is infected, kindly contact the Telecommunications Department. We will examine the computer, clean it out, if necessary, and take steps to prevent future infections.
Stop badware - Viruses and worms are no longer the biggest threat to computer users – now it's badware. Badware is a term we use to encompass the broad range of malicious software that is sneaking onto people's computers, including spyware and deceptive adware. It can subvert your computer for the benefit for a third party, frustrate you with unwanted advertising, and even steal your most personal information.