Big Brother Gets Bolder: Security Software on Laptops Goes off School Grounds and into Students' and Teachers' Homes

By Pascopella, Angela | District Administration, June 2006 | Go to article overview
Save to active project

Big Brother Gets Bolder: Security Software on Laptops Goes off School Grounds and into Students' and Teachers' Homes

Pascopella, Angela, District Administration

Web sites like those described to the left are likely off limits for most students in districts that have one-to-one laptop initiatives allowing students to take the computers home. And while administrators and parents aim to protect students from downloading naked pictures, chatting on Web sites with potential predators, and looking for non-educational material, some debate has erupted over the fine line of student privacy and squashing student rights to information--whether it be in libraries or on the World Wide Web.

In an age where more school districts are reviewing plans or have one-to-one laptop initiatives for their students, administrators are turning to high-tech answers to keep track of how students use these machines--even when they are not in class and not on school grounds.

Some companies offer their own "blacklist" of no-no Web sites to ensure students are sticking to education when using the laptops off school grounds, and even keep track of tech-savvy and tireless students that try to override the system and change grades, for example. Other companies have a system that can track if a laptop is stolen or lost and even remotely eliminate sensitive information on the laptop.

So, this sounds a lot like Big Brother--once again. "It is," admits Lightspeed CEO Joel Heinrichs. "Schools are in charge of children in lieu of the parents while they are gone. There's an obligation that school resources are being used appropriately. And to protect children from outside dangers and themselves."

But Nancy Willard, executive director of Center for Safe and Responsible Internet Use, disagrees, saying districts should be concerned with safe and responsible use issues. "The degree of reliance districts place on filtering systems to seek to control Internet use is unacceptable," says Willard, also author of Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Cruelty, Threats and Distress. "Students can easily bypass these systems to access social networking sites. Students generally are provided with e-mail capabilities and may be misusing the e-mail for cyberbullying. Filtering systems are ineffective in addressing these concerns."

But she notes that she doesn't think these programs can never be effective. "We need significantly greater emphasis on professional and curriculum development and significantly improved methods for Internet use management to ensure that they are effective."

Willard adds that companies which set up these blocked sites might have other agendas. "No one is watching the blockers," she adds. "And we don't know what they're blocking," such as sites that could help students answer questions they have about a sensitive topic.

But it's not only students getting all the attention. Teachers and staff are getting their own share of fixation from software programs. Having potential pornographic Web sites downloaded on laptops or opening viruses at home, teachers can bring that into the school's network when they come back to school. And more districts will spend the money now to avoid or stop it.

Big Bro Goes Off Campus

California is a big state. No one knows that better than Philip Scrivano, who at one time traveled around the state to repair and fix computer and laptop programs when they were compromised. Scrivano, IT analyst for California's Fiscal Crisis & Management Assistance Team, says that changed when they installed Light-speed Systems' Total Traffic Control v6.0 with a security agent, or desktop content filter, just a few months ago. FCAT's mission is to help the state's local educational agencies with fiscal advice, management assistance, training and other related school business services. Scrivano is based in the Kern County Superintendent of Schools office under contract with the state Department of Education and the governor's office.

Scrivano's job is to keep track of employees' computer work in the field.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
Loading One moment ...
Project items
Cite this article

Cited article

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited article

Big Brother Gets Bolder: Security Software on Laptops Goes off School Grounds and into Students' and Teachers' Homes


Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

While we understand printed pages are helpful to our users, this limitation is necessary to help protect our publishers' copyrighted material and prevent its unlawful distribution. We are sorry for any inconvenience.
Full screen

matching results for page

Cited passage

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.

Are you sure you want to delete this highlight?