Title: Childrens Internet Proctection Act of 2000
1Childrens Internet Proctection Act of 2000
- Educational Technology
- Georgia Department of Education
- Richard Brock
2Background on CIPA
- CIPA Childrens Internet Protection Act
- Signed into law 12/21/2000 as part of a larger
appropriations bill - Consolidated Appropriations Act, 2001 Public Law
No. 106-554, Sections 1701-1741 - Establishes policy requirements for federal
technology funding
3Background on CIPA
- E-rate (Telecommunications Act of 1996)
- Library Services Technology Act (LSTA)
- Title III of Elementary Secondary Education Act
(ESEA)
4Background on CIPA
- Special provisions for E-rate users
- Does NOT apply to telecom-only funding
- Must meet additional Internet safety policy
requirements under Neighborhood Childrens
Internet Protection Act (N-CIPA)
5Background on CIPA
- FCC rules went into effect April 20, 2001
- Form 486 to be used for CIPA compliance
certification for E-rate purposes - Timeframe for adoption of Internet Safety Policy
same as for Technology Protection Measures
6CIPA Requirements
- Requires adoption and implementation of an
Internet Safety Policy - For all LSTA, ESEA, and E-rate fund applicants,
means operation of a technology protection
measure that blocks or filters Internet access
to visual depictions that are
7CIPA Requirements
- Obscene
- Child pornography
- Harmful to minors
- Other material deemed locally to be
inappropriate for minors - Minor an individual who has not attained the
age of 17
8CIPA Requirements
- For E-rate fund applicants only, requires other
safety and security measures for minors (as
called for in N-CIPA) re - E-mail
- Chat rooms
- Other direct electronic communications (e.g.,
Instant Messaging) - Hacking and other unlawful online activities
- Unauthorized disclosure of personal ID info on
minors
9CIPA Requirements
- For schools applying for E-rate funds, also
requires that the Internet Safety Policy include
monitoring the online activities of minors - NotePublic libraries are not required to monitor
the activities of minors
10CIPA Requirements
- Requires public hearing or meeting on the
Internet Safety Policy - Must provide reasonable public notice for the
hearing or meeting - Local schools must have their own policy
- Met the requirements of the law or are working to
meet the requirements by June 30, 2002
11CIPA Requirements
- Disabling of filtering is allowed
- For authorized use for bona fide research or
other lawful purposes - Federal funding
- ESEA and LSTA funds available
- E-rate funds NOT available
12CIPA Compliance
- To comply with this legislation, a school or
library in must - 1) adopt and implement an Internet Safety Policy
(including public hearing with reasonable public
notice), AND
13CIPA Compliance
- 2) implement an Internet filtering system
designed to prevent a minor from viewing obscene,
child pornography, and other material deemed
locally to be inappropriate for minors, AND - 3) implement other safety measures for minors
with regards to E-mail, Chat rooms, Other
e-coms, Hacking, and Unauthorized disclosure of
personal ID info on minors, AND
14CIPA Compliance
- 4) if you are a school or school library, monitor
the online activities of minors. (This may been
done with software or by having teachers or other
school employees monitor usage.) - Note A minor under CIPA is less than 17 years
of age.
15CIPA Impact on E-rate Year 4
- Must initially certify that an Internet Safety
Policy is in effect or that the applicant is
undertaking initial actions to do so - Timing is important
- Safest bet is to take some type of action before
funding Year 4 starts on July 1, 2001 - Can be as simple as assigning a staff member or
appointing a committee to begin the process
16CIPA Impact on E-rate Year 4
- Document the actions you take
- Letter or memo from responsible administrator
- Minutes from library or school committee/board
meeting - Record of attendance at meetings or workshops
related to CIPA (including names of attendees and
dates) - Just reading an e-mail about filtering probably
does NOT qualify as taking action
17CIPA Impact on E-rate Year 4
- If no action has been taken by the time the
school or library starts to receive Year 4 E-rate
services, those services will NOT be eligible for
discounts until the school or library does begin
the process of complying with the E-rate
provisions of CIPA
18When Must I Certify?
- Certification of compliance or taking steps to
comply must be made - on or before October 28, 2001 if no Year 4 E-rate
services received before this date or - on or before the start date for Year 4 E-rate
services, but no later than October 28, 2001 - For most, July 1, 2001will be the compliance date
19When Must I Certify?
- Certification of full compliance must be made by
the start of funding Year 5 (i.e., July 1, 2002) - Exception Unless applicant requests and receives
a waiver because full compliance is prevented due
to delays caused by local procurement procedures
20How Do I Certify?
- Year 4
- Schools and libraries applying for E-rate funds
certify via Form 486 (form being revised by SLD)
on or before October 28, 2001 that - a) they have the policies and technology
protection measures related to CIPA in place - b) they are undertaking actions to put such
policies and technology protection measures in
place by the start of Year 5 (July 1, 2002) or
21How Do I Certify?
- c) they are only applying for telecommunications
services and not for Internet access or internal
connections (therefore the E-rate CIPA provisions
do not apply). - Members of consortia certify on Form 479 (new
form) - Consortia leaders will be required to certify
that they have collected Forms 479 from all their
members indicating that they are in compliance
22How Do I Certify?
- Year 5
- Certification will be made on the (new) Form 486
- No specific filing dates announced yet
23Things You Should Be Doing
- Assign a staff member or appoint a committee to
begin implementing CIPA - Conduct research to understand the provisions of
CIPA and the FCCs regulations - Research the different technology protection
measures available
24Things You Should Be Doing
- Develop a draft RFP to obtain technology
protection measures - Develop a draft Internet Safety Policy for
discussion at a public meeting - Determine if your existing Internet Safety Policy
already meets CIPA requirements
25Things You Should Be Doing
- Whatever you do, you must undertake (and
document) some sort of effort to implement CIPA
by July 1, 2001 if you expect to receive E-rate
discounts on Internet access or internal
connections - However, you have until July 1, 2002 to complete
your efforts to fully implement CIPA
26Things You Should Be Doing
- Even after taking some initial action(s) to
implement CIPA, schools and libraries have until
October 28, 2001 to decide if they will or will
not fully implement CIPA
27What If I Choose NOT to Implement CIPA?
- Just dont certify CIPA compliance on your Form
486 - Still eligible to receive universal discounts on
telecommunications services - Simply file a Form 486 for your
Telecommunications FRNs with the box for CIPA
does not apply checked
28What If I Choose NOT to Implement CIPA?
- If applicable, file a Form 500 canceling the
Internet Access and Internal Connections FRNs
which you have received - Be aware that such a decision may affect your
ESEA Title III and LSTA funding
29FCC Rules on CIPA
- Local authorities are best situated to choose
which technology measures and Internet Safety
Policies will be most appropriate for their
relevant communities - A school administrative authority must certify
that its policy of Internet safety includes
monitoring the online activities of minors
30FCC Rules on CIPA
- Reimbursement for non-compliance shall be made
directly by the school or library (not the
service provider) - All members of a consortium receiving discounts
for Internet access and/or internal connections
must submit signed certifications to the Billed
Entity of each consortium on a new Form 479
31FCC Rules on CIPA
- The Billed Entity must maintain a file of all
Form 479 certifications - The Billed Entity must certify on the Form 486
that it has received completed and signed
certifications from all such members, and shall
make such certifications available to the FCC or
SLD upon request
32FCC Rules on CIPA
- The Billed Entity is NOT responsible for
verifying that members certifications are
accurate - The entire consortium will not be penalized due
to the non-compliance of an individual member(s) - CIPA makes no distinction between computers used
only by staff vs. the public
33What the FCC Rules Dont Require
- E-rate applicants do not have to
- certify the effectiveness of their filtering
- track attempts to access prohibited material
- further define prohibited material or actions
- establish specific provisions to disable
protection measures for lawful research - post actual CIPA requirements
- post text of their Internet safety policies
34What the FCC Rules Dont Require
- E-rate applicants do not have to
- identify their technology protection vendors
- post instructions on registering complaints
35Advice
- Schools, school districts, libraries and library
consortia may want to seek the advice of legal
counsel in an attempt to ensure that their
actions are in compliance with the letter of the
law
36Advice
37Advice
38Advice
39Sample from DeKalb Schools
- INTERNET ACCEPTABLE USE AND SAFETY
- MISSION To provide students and teachers with
guidelines for use of the Internet. - Use of the Internet must be in support of
education and research and consistent with the
educational objectives of the school system. - Internet Safety
- The Superintendent shall, with respect to any
computers belonging to the DeKalb County School
System and having access to the Internet - insure that a qualifying technology protection
measure, as that term is defined in section 1703
(b)(1) of the Childrens Internet Protection Act
of 2000, is installed and in continuous
operation and - institute, maintain, and enforce procedures or
guidelines which provide for monitoring the
online activities of users and the use of the
chosen technology protection measure to prevent
access to visual depictions that are (i) obscene,
(ii) child pornography, or (iii) harmful to
minors, as that term is defined in section 1721
( c ) of the Childrens Internet Protection Act
of 2000.
40Sample from DeKalb Schools
- The Superintendent shall, with respect to access
to the Internet by or through computers, networks
or other devices belonging to the DeKalb County
School System, institute, maintain and enforce
procedures or guidelines which - provide for monitoring the online activities of
users to limit, to the extent practicable, access
by minors to inappropriate matter on the Internet
and the World Wide Web - are designed to promote the safety and security
of minors when using electronic mail, chat rooms,
and other forms of direct electronic
communications - are designed to prevent unauthorized access,
including so-called hacking, and other
unauthorized activities by minors online - are designed to prevent the unauthorized
disclosure, use, and dissemination of personal
identification information regarding minors and - are designed to restrict minors access to
materials harmful to minors, as that term is
defined in section 1721( c ) of the Childrens
Internet Protection Act of 2000.
41Sample from filteringinfo.org
- YOUR SCHOOL Policy on Internet Access
- Internet users are expected to use the Internet
as an educational resource. The following
procedures and guidelines are used to help ensure
appropriate use of the Internet at YOUR SCHOOL. - Student Expectations in Use of the Internet
- Students shall not access material that is
obscene, pornographic, child pornography,
"harmful to minors", or otherwise inappropriate
for educational uses. - Students shall not use school resources to engage
in "hacking" or attempts to otherwise compromise
system security. - Students shall not engage in any illegal
activities on the Internet. - Students shall only use electronic mail, chat
rooms, and other forms of direct electronic
communications for school-related purposes. - Students shall not disclose personal information,
such as name, school, address, and telephone
number outside of the school network. - Any violation of school policy and rules may
result in loss of school-provided access to the
Internet. Additional disciplinary action may be
determined in keeping with existing procedures
and practices regarding inappropriate language or
behavior. When and where applicable, law
enforcement agencies may be involved.
42Sample from filteringinfo.org
- Staff Expectations in Use of the Internet
- Staff shall not use access material that is
obscene or is child pornography. - Any violation of school policy may result in loss
of school-provided access to the Internet.
Additional disciplinary action may be determined
in keeping with existing procedures and
practices. When and where applicable, law
enforcement agencies may be involved.
43Sample from filteringinfo.org
- Enforcement of policy
- YOUR SCHOOL uses a technology protection
measure that blocks or filters Internet access to
block access to some Internet sites that are not
in accordance with the policy of YOUR SCHOOL. - The technology protection measure that blocks or
filters Internet access may be disabled by a
YOUR SCHOOL staff member for bona fide research
purposes by an adult. - A YOUR SCHOOL staff member may override the
technology protection measure that blocks or
filters Internet access for a student to access a
site with legitimate educational value that is
wrongly blocked by the technology protection
measure that blocks or filters Internet access. - YOUR SCHOOL staff will monitor students' use of
the Internet, through either direct supervision,
or by monitoring Internet use history, to ensure
enforcement of the policy. - YOUR SCHOOL Internet Acceptable Use Policy,
Approved by YOUR SCHOOL BOARD, On this date
44Resource Sites
- Refer to the following web sites for additional
information on CIPA - http//www.ala.org/cipa
- http//www.filteringinfo.org
- http//www.safewiredschools.org/checklist.html
- http//www.library.state.ak.us/usf
- http//techservices.doe.k12.ga.us/edtech/cipa
- http//www.sl.universalservice.org