Do you have any advice on filtering programs that are of any use?
Itâs amazing how quickly parents and school officials forget that their students are people. People that still have a lot to learn, but people.
Also, on school vs. workplace: if the schools are doing their jobs, then graduate will have choices about who to work for. Not so for public schools, typically.
Little Caesars massively over-expanded into the Twin Cities late in the 80âs. We tried it once, determined that they split the amount of toppings that would go on one pizza onto two pizzas and never bothered again. Iâm pretty sure our local one was gone before I completed university. I would not at all be surprised if there, indeed, was a Little Caesars within walking distance of Wayzata high school in the mid-90âs, but not currently.
So, to fill the slack, the school principals themselves became little Caesars?
Ba dum tish!
Recent-ish grad here of a certain high school in said 'burbs. I was responsible for the Terminal app (and the rest of the osx utilities) being blocked school wide after being âcaughtâ receiving free psychotherapy from the DOCTOR easter egg in Emacs. The memory of having to explain the situation always cracks me up. I might as well have been hacking my grades for all that poor woodshop teacher knew.
I think part of the issue is that itâs kind of a waste of time and energy to be overly paranoid that itâs not.
Ultimately, you canât effectively police this stuff. You need to make the students self-policing, relying on intrinsic motivation, not extrinsic limitations. Like putting in a firewall at a workplace (or on a nationâŚ), itâs not going to stop people from doing whatever they want to do, itâs just going to waste time and money on a quixotic compulsion to control.
Demand to see if there are any nudies on their phone, then throw the same line back at them: if you donât, why are you afraid to show them to me?
Though if you really want to troll them, get an used iPad and dress it up as if itâs being affected by the firewall, while itâs secretly linked to your tether. Then all of a sudden pretend to teach others how to bypass it. (It wonât work, of course) then when you get into trouble, hold the big reveal that itâs your own iPad and youâre not even on their network.
Hey, you know that if you share this article on Twitter, a Wayzata Public Schools âtechnology and public sector leaderâ auto tweets you saying, essentially, that the article is misleading. âThe title of the blog is not true. The District does not, nor do we have the ability to spy on students as part of our MDM.â Kinda strange, dontcha think?
@Medievalist :We have software that allows school faculty to login and monitorâeven controlâstudent computers remotely. To be honest, itâs very laggy and most of them donât use it much. But your question was about spying on students, and itâs a huge concern for us. Coincidentally, we were rolling out our laptop program right at the time that the Pennsylvania school spying case went public, so we spent a lot of time discussing whether we would even use such software.
What we ended up doing was having the monitoring software communicate via private network addresses at the school. If a student goes off school grounds/network, the IP addresses become invalid and we lose all contact. Frankly, the prospect of even being accused of having the ability to spy on students at home is terrifying from a legal and PR angle, and we want it to be technically impossible.
At school, only teachers who have specific students in class can monitor their computers. (Though they can do that at any time.) Faculty access to the monitoring system is logged, which is something that I would call a completely acceptable instance of âspying onâ people, since there is a larger issue of student privacy at stake.
I donât want to sound like we have a perfect system. Thereâs still a lot we could do better. I wish I could spend less time with broken screens and Java updates, and more with the bigger issues.
I completely agree. I donât have time or brain space to be overly paranoidâat least how I define paranoid.
Example: I know for a fact that there are a small handful of students that are getting around our filtering system. Iâd rather they didnât, but I canât completely prevent it. Iâll skip the technical reasons why.
If I had a specific name and specific proof, I could go to our administration and get someone disciplined. But unless it blows up into a bigger problemâlike teaching others how to bypass the system, or completely inappropriate computer use in the school cafeteriaâIâm most likely going to let it slide. Iâve got too many other issues that are affecting too many other students.
So, thatâs a confession, I guess: Iâm either too busy or too inept to be too paranoid.
While the title could potentially be misconstrued, the contents of the article are factual. Since the publication of this article, Iâve had a much less one-sided and much more potentially constructive discussion with school personnel about these issues.
Would just like to point out though, ââŚas part of our MDM.â is pretty significant. They can still read our school email, and I know for a fact that theyâve monitored the desktop computers in the past - during the briefly mentioned DOS Batch learning incident, the evidence against me was a screenshot pulled from the computer while I was coding.
Well there are good educational reasons that you want facility to record what a student is doing. When teaching IT I would occasionally display one students screen on the projector so other students could see the work they were doing. I guess there are also good educational reasons for using the camera as well.
This is all fine as long as the computers are restricted to school property. Thing get tricker if you give the students the right to take the computers home as well. Here we might be limited by the software, how do you ensure it is disabled when out of hours or off school property. The software might not have such facility which gets quite tricky to program, should it block the camera when on a school trip? Who controls when the camera is enabled? The simplest solution might be to issue all students with a roll of electrical tape so they can cover the camera.
Make it accessible only when the computer is connected to the school network?
Thought. If it initiates connection from the tablet out, make it connect to a local network address (and authorize, e.g. via a SSL cert). Letâs say the address is 10.25.25.1; it is not routable, so from any local network it wonât go past the router/NAT. The authorization step is there to avoid active attack by somebody setting up their own LAN with the 10.25.25.* segment and run their own rogue accesspoint and rogue surveillance/supervision software.
By using the nonroutable IPs, the connection wonât happen when over The Internet itself, so it is automatically limited to the on-premises local network.
Many more variants but this one looks as the most straightforward to me.
I think this is crucial. Kind of like having cameras on police vests. When I worked in banking, any activity required two different departments: whatever you did, someone on a different floor would check the print-outs, logs, signatures, etc. Actually going into a vault, etc. would require at least two people with different job responsibilities. With power SHOULD come constant checks on that power.
I had teachers like this in high school (back when we rode dinosaurs to school, etc. etc.). If you can tell someone is using their brains and being well-disciplined about it, not getting anyone else involved who would be more likely to cause trouble, then keep it in your peripheral vision but otherwise stay focused on the kids who actually need supervision.
I wouldnât call that too busy, too inept, or too paranoidâŚI would call that wise.
There might be different working definitions. I see the presence of a filtering system in the first place to be pretty pointlessly paranoid. I appreciate now that thereâs requirements that fall onto folks in your position from above, but that just changes the target of the attention. Ultimately, those kids who are getting around the filtering system are the ones mastering the actual skills theyâll need to survive in, say, a post-Net Neutrality world. They donât need to be punished, they need to be lauded, encouraged, and given a platform to spread their skills to others. They arenât the enemy, the ones making the policies are the enemy, and the ones protecting the policies are the enemyâs ennablers. A lot of adults are stuck â they canât challenge the system because they depend on the system for food and housing and gas money. But kids arenât reliant on the system yet. We need to encourage them when theyâre willing to fight the problems in it. They often see those problems more clearly than we can.
No. I hate that kind of stuff and it was years ago that I was setting that up for my stepson. Oh god that software was terrible. I think nowadays you can set up parental controls on the browser settings that are pretty good. Iâd try that first.
My daughter is of the age to get into trouble but I just keep virus protection on her computer. She knows that she has a lot of privileges because she is a great kid who doesnât abuse my trust and I tell her that as a way for her to understand that her keeping those privileges depends on her continuing to deserve my trust. So far it works for her but I know that wouldnât work for every kid; I kind of raised her up to respond to this approach.
I think that is still the case, I was just looking for smart people opinions that I could use for ammunition for the future discussion when the kids turn 10.
[quote=âCapnCrunch, post:130, topic:47399â]
Frankly, the prospect of even being accused of having the ability to spy on students at home is terrifying from a legal and PR angle, and we want it to be technically impossible.[/quote]
Well, speaking once again as a parent, that is a great relief to me! It means not only are you aware of the illegality, you understand the impropriety, and youâve prioritized your technical efforts appropriately.
A lot of people are claiming âyour employers will spy on you so this is just training kids for employmentâ. And thatâs actually true - but in the industry (here speaking as a subject matter expert) systems for logging and monitoring employee communications are increasingly subject to second-level monitoring. For example, my current employers use a very popular enterprise communications archival package. The HR department cannot directly access other employeesâ email, but they can formally request that an authorized technical staffer do so. If one of those people decrypts a message archive, I personally am notified as part of the decryption process. I donât have the ability to read othersâ email archives - but I have the ability to blow the whistle on anyone who is doing so inappropriately; and in fact I can yank anyoneâs access to all systems at any time, if that seems necessary. Essentially we have a three-level authorization, logging and oversight system before anyoneâs business communications can be extensively examined, and thatâs looking like itâll be the norm for employers in the future.
Client-side Java is the worst thing to happen to PC users since the 80286 memory architecture. You rarely see such a horrifying difference between theory and practice. My sympathies!