Childrens Internet Proctection Act of 2000

1 / 44
About This Presentation
Title:

Childrens Internet Proctection Act of 2000

Description:

For authorized use for 'bona fide research or other lawful purposes' Federal funding ... by a [YOUR SCHOOL] staff member for bona fide research purposes by an adult. ... – PowerPoint PPT presentation

Number of Views:33
Avg rating:3.0/5.0
Slides: 45
Provided by: DMB85

less

Transcript and Presenter's Notes

Title: Childrens Internet Proctection Act of 2000


1
Childrens Internet Proctection Act of 2000
  • Educational Technology
  • Georgia Department of Education
  • Richard Brock

2
Background on CIPA
  • CIPA Childrens Internet Protection Act
  • Signed into law 12/21/2000 as part of a larger
    appropriations bill
  • Consolidated Appropriations Act, 2001 Public Law
    No. 106-554, Sections 1701-1741
  • Establishes policy requirements for federal
    technology funding

3
Background on CIPA
  • E-rate (Telecommunications Act of 1996)
  • Library Services Technology Act (LSTA)
  • Title III of Elementary Secondary Education Act
    (ESEA)

4
Background on CIPA
  • Special provisions for E-rate users
  • Does NOT apply to telecom-only funding
  • Must meet additional Internet safety policy
    requirements under Neighborhood Childrens
    Internet Protection Act (N-CIPA)

5
Background on CIPA
  • FCC rules went into effect April 20, 2001
  • Form 486 to be used for CIPA compliance
    certification for E-rate purposes
  • Timeframe for adoption of Internet Safety Policy
    same as for Technology Protection Measures

6
CIPA Requirements
  • Requires adoption and implementation of an
    Internet Safety Policy
  • For all LSTA, ESEA, and E-rate fund applicants,
    means operation of a technology protection
    measure that blocks or filters Internet access
    to visual depictions that are

7
CIPA Requirements
  • Obscene
  • Child pornography
  • Harmful to minors
  • Other material deemed locally to be
    inappropriate for minors
  • Minor an individual who has not attained the
    age of 17

8
CIPA Requirements
  • For E-rate fund applicants only, requires other
    safety and security measures for minors (as
    called for in N-CIPA) re
  • E-mail
  • Chat rooms
  • Other direct electronic communications (e.g.,
    Instant Messaging)
  • Hacking and other unlawful online activities
  • Unauthorized disclosure of personal ID info on
    minors

9
CIPA Requirements
  • For schools applying for E-rate funds, also
    requires that the Internet Safety Policy include
    monitoring the online activities of minors
  • NotePublic libraries are not required to monitor
    the activities of minors

10
CIPA Requirements
  • Requires public hearing or meeting on the
    Internet Safety Policy
  • Must provide reasonable public notice for the
    hearing or meeting
  • Local schools must have their own policy
  • Met the requirements of the law or are working to
    meet the requirements by June 30, 2002

11
CIPA Requirements
  • Disabling of filtering is allowed
  • For authorized use for bona fide research or
    other lawful purposes
  • Federal funding
  • ESEA and LSTA funds available
  • E-rate funds NOT available

12
CIPA Compliance
  • To comply with this legislation, a school or
    library in must
  • 1) adopt and implement an Internet Safety Policy
    (including public hearing with reasonable public
    notice), AND

13
CIPA Compliance
  • 2) implement an Internet filtering system
    designed to prevent a minor from viewing obscene,
    child pornography, and other material deemed
    locally to be inappropriate for minors, AND
  • 3) implement other safety measures for minors
    with regards to E-mail, Chat rooms, Other
    e-coms, Hacking, and Unauthorized disclosure of
    personal ID info on minors, AND

14
CIPA Compliance
  • 4) if you are a school or school library, monitor
    the online activities of minors. (This may been
    done with software or by having teachers or other
    school employees monitor usage.)
  • Note A minor under CIPA is less than 17 years
    of age.

15
CIPA Impact on E-rate Year 4
  • Must initially certify that an Internet Safety
    Policy is in effect or that the applicant is
    undertaking initial actions to do so
  • Timing is important
  • Safest bet is to take some type of action before
    funding Year 4 starts on July 1, 2001
  • Can be as simple as assigning a staff member or
    appointing a committee to begin the process

16
CIPA Impact on E-rate Year 4
  • Document the actions you take
  • Letter or memo from responsible administrator
  • Minutes from library or school committee/board
    meeting
  • Record of attendance at meetings or workshops
    related to CIPA (including names of attendees and
    dates)
  • Just reading an e-mail about filtering probably
    does NOT qualify as taking action

17
CIPA Impact on E-rate Year 4
  • If no action has been taken by the time the
    school or library starts to receive Year 4 E-rate
    services, those services will NOT be eligible for
    discounts until the school or library does begin
    the process of complying with the E-rate
    provisions of CIPA

18
When Must I Certify?
  • Certification of compliance or taking steps to
    comply must be made
  • on or before October 28, 2001 if no Year 4 E-rate
    services received before this date or
  • on or before the start date for Year 4 E-rate
    services, but no later than October 28, 2001
  • For most, July 1, 2001will be the compliance date

19
When Must I Certify?
  • Certification of full compliance must be made by
    the start of funding Year 5 (i.e., July 1, 2002)
  • Exception Unless applicant requests and receives
    a waiver because full compliance is prevented due
    to delays caused by local procurement procedures

20
How Do I Certify?
  • Year 4
  • Schools and libraries applying for E-rate funds
    certify via Form 486 (form being revised by SLD)
    on or before October 28, 2001 that
  • a) they have the policies and technology
    protection measures related to CIPA in place
  • b) they are undertaking actions to put such
    policies and technology protection measures in
    place by the start of Year 5 (July 1, 2002) or

21
How Do I Certify?
  • c) they are only applying for telecommunications
    services and not for Internet access or internal
    connections (therefore the E-rate CIPA provisions
    do not apply).
  • Members of consortia certify on Form 479 (new
    form)
  • Consortia leaders will be required to certify
    that they have collected Forms 479 from all their
    members indicating that they are in compliance

22
How Do I Certify?
  • Year 5
  • Certification will be made on the (new) Form 486
  • No specific filing dates announced yet

23
Things You Should Be Doing
  • Assign a staff member or appoint a committee to
    begin implementing CIPA
  • Conduct research to understand the provisions of
    CIPA and the FCCs regulations
  • Research the different technology protection
    measures available

24
Things You Should Be Doing
  • Develop a draft RFP to obtain technology
    protection measures
  • Develop a draft Internet Safety Policy for
    discussion at a public meeting
  • Determine if your existing Internet Safety Policy
    already meets CIPA requirements

25
Things You Should Be Doing
  • Whatever you do, you must undertake (and
    document) some sort of effort to implement CIPA
    by July 1, 2001 if you expect to receive E-rate
    discounts on Internet access or internal
    connections
  • However, you have until July 1, 2002 to complete
    your efforts to fully implement CIPA

26
Things You Should Be Doing
  • Even after taking some initial action(s) to
    implement CIPA, schools and libraries have until
    October 28, 2001 to decide if they will or will
    not fully implement CIPA

27
What If I Choose NOT to Implement CIPA?
  • Just dont certify CIPA compliance on your Form
    486
  • Still eligible to receive universal discounts on
    telecommunications services
  • Simply file a Form 486 for your
    Telecommunications FRNs with the box for CIPA
    does not apply checked

28
What If I Choose NOT to Implement CIPA?
  • If applicable, file a Form 500 canceling the
    Internet Access and Internal Connections FRNs
    which you have received
  • Be aware that such a decision may affect your
    ESEA Title III and LSTA funding

29
FCC Rules on CIPA
  • Local authorities are best situated to choose
    which technology measures and Internet Safety
    Policies will be most appropriate for their
    relevant communities
  • A school administrative authority must certify
    that its policy of Internet safety includes
    monitoring the online activities of minors

30
FCC Rules on CIPA
  • Reimbursement for non-compliance shall be made
    directly by the school or library (not the
    service provider)
  • All members of a consortium receiving discounts
    for Internet access and/or internal connections
    must submit signed certifications to the Billed
    Entity of each consortium on a new Form 479

31
FCC Rules on CIPA
  • The Billed Entity must maintain a file of all
    Form 479 certifications
  • The Billed Entity must certify on the Form 486
    that it has received completed and signed
    certifications from all such members, and shall
    make such certifications available to the FCC or
    SLD upon request

32
FCC Rules on CIPA
  • The Billed Entity is NOT responsible for
    verifying that members certifications are
    accurate
  • The entire consortium will not be penalized due
    to the non-compliance of an individual member(s)
  • CIPA makes no distinction between computers used
    only by staff vs. the public

33
What the FCC Rules Dont Require
  • E-rate applicants do not have to
  • certify the effectiveness of their filtering
  • track attempts to access prohibited material
  • further define prohibited material or actions
  • establish specific provisions to disable
    protection measures for lawful research
  • post actual CIPA requirements
  • post text of their Internet safety policies

34
What the FCC Rules Dont Require
  • E-rate applicants do not have to
  • identify their technology protection vendors
  • post instructions on registering complaints

35
Advice
  • Schools, school districts, libraries and library
    consortia may want to seek the advice of legal
    counsel in an attempt to ensure that their
    actions are in compliance with the letter of the
    law

36
Advice
37
Advice
38
Advice
39
Sample from DeKalb Schools
  • INTERNET ACCEPTABLE USE AND SAFETY
  • MISSION To provide students and teachers with
    guidelines for use of the Internet.
  • Use of the Internet must be in support of
    education and research and consistent with the
    educational objectives of the school system.
  • Internet Safety
  • The Superintendent shall, with respect to any
    computers belonging to the DeKalb County School
    System and having access to the Internet
  • insure that a qualifying technology protection
    measure, as that term is defined in section 1703
    (b)(1) of the Childrens Internet Protection Act
    of 2000, is installed and in continuous
    operation and
  • institute, maintain, and enforce procedures or
    guidelines which provide for monitoring the
    online activities of users and the use of the
    chosen technology protection measure to prevent
    access to visual depictions that are (i) obscene,
    (ii) child pornography, or (iii) harmful to
    minors, as that term is defined in section 1721
    ( c ) of the Childrens Internet Protection Act
    of 2000.

40
Sample from DeKalb Schools
  • The Superintendent shall, with respect to access
    to the Internet by or through computers, networks
    or other devices belonging to the DeKalb County
    School System, institute, maintain and enforce
    procedures or guidelines which
  • provide for monitoring the online activities of
    users to limit, to the extent practicable, access
    by minors to inappropriate matter on the Internet
    and the World Wide Web
  • are designed to promote the safety and security
    of minors when using electronic mail, chat rooms,
    and other forms of direct electronic
    communications
  • are designed to prevent unauthorized access,
    including so-called hacking, and other
    unauthorized activities by minors online
  • are designed to prevent the unauthorized
    disclosure, use, and dissemination of personal
    identification information regarding minors and
  • are designed to restrict minors access to
    materials harmful to minors, as that term is
    defined in section 1721( c ) of the Childrens
    Internet Protection Act of 2000.

41
Sample from filteringinfo.org
  • YOUR SCHOOL Policy on Internet Access
  • Internet users are expected to use the Internet
    as an educational resource. The following
    procedures and guidelines are used to help ensure
    appropriate use of the Internet at YOUR SCHOOL.
  • Student Expectations in Use of the Internet
  • Students shall not access material that is
    obscene, pornographic, child pornography,
    "harmful to minors", or otherwise inappropriate
    for educational uses.
  • Students shall not use school resources to engage
    in "hacking" or attempts to otherwise compromise
    system security.
  • Students shall not engage in any illegal
    activities on the Internet.
  • Students shall only use electronic mail, chat
    rooms, and other forms of direct electronic
    communications for school-related purposes.
  • Students shall not disclose personal information,
    such as name, school, address, and telephone
    number outside of the school network.
  • Any violation of school policy and rules may
    result in loss of school-provided access to the
    Internet. Additional disciplinary action may be
    determined in keeping with existing procedures
    and practices regarding inappropriate language or
    behavior. When and where applicable, law
    enforcement agencies may be involved.

42
Sample from filteringinfo.org
  • Staff Expectations in Use of the Internet
  • Staff shall not use access material that is
    obscene or is child pornography.
  • Any violation of school policy may result in loss
    of school-provided access to the Internet.
    Additional disciplinary action may be determined
    in keeping with existing procedures and
    practices. When and where applicable, law
    enforcement agencies may be involved.

43
Sample from filteringinfo.org
  • Enforcement of policy
  • YOUR SCHOOL uses a technology protection
    measure that blocks or filters Internet access to
    block access to some Internet sites that are not
    in accordance with the policy of YOUR SCHOOL.
  • The technology protection measure that blocks or
    filters Internet access may be disabled by a
    YOUR SCHOOL staff member for bona fide research
    purposes by an adult.
  • A YOUR SCHOOL staff member may override the
    technology protection measure that blocks or
    filters Internet access for a student to access a
    site with legitimate educational value that is
    wrongly blocked by the technology protection
    measure that blocks or filters Internet access.
  • YOUR SCHOOL staff will monitor students' use of
    the Internet, through either direct supervision,
    or by monitoring Internet use history, to ensure
    enforcement of the policy.
  • YOUR SCHOOL Internet Acceptable Use Policy,
    Approved by YOUR SCHOOL BOARD, On this date

44
Resource Sites
  • Refer to the following web sites for additional
    information on CIPA
  • http//www.ala.org/cipa
  • http//www.filteringinfo.org
  • http//www.safewiredschools.org/checklist.html
  • http//www.library.state.ak.us/usf
  • http//techservices.doe.k12.ga.us/edtech/cipa
  • http//www.sl.universalservice.org
Write a Comment
User Comments (0)