Academics » Child Internet Protection

Child Internet Protection

Child Internet Protection Act 

CIPA RESOURCES

Lake Lure Classical Academy receives funding through the FCC's Federal eRate program. Please read our responsibilities regarding our participation in the eRate program. 
 
Schools and libraries subject to CIPA may not receive the discounts offered by the E-rate program unless they certify that they have an Internet safety policy that includes technology protection measures. The protection measures must block or filter Internet access to pictures that are: (a)obscene; (b) child pornography; or (c) harmful to minors (for computers that are accessed by minors).
 
Schools subject to CIPA have two additional certification requirements: 1) their Internet safety policies must include monitoring the online activities of minors; and 2) as required by the Protecting Children in the 21st Century Act, they must provide for educating minors about appropriate online behavior, including interacting with other individuals on social networking websites and in chat rooms, and cyberbullying awareness and response.
Schools and libraries subject to CIPA are required to adopt and implement an Internet safety policy addressing:
  • Access by minors to inappropriate matters on the Internet;
  • The safety and security of minors when using electronic mail, chat rooms and other forms of direct electronic communications;
  • Unauthorized access, including so-called “hacking,” and other unlawful activities by minors online;
  • Unauthorized disclosure, use, and dissemination of personal information regarding minors;
  • Measures restricting minors' access to materials harmful to them. 
Every student attending Lake Lure Classical Academy must be educated in online privacy once a year paired with year-long school discussions.  The required lessons are listed below and have been created by Common Sense Media. 

K Safety in My Online Neighborhood

1 Internet Traffic Light

2 That’s Private

3 Password Powerup!

4 Private and Personal Information

5 You Won’t Believe This

6 Don’t Feed the Phish

7 Big, Big, Data!

8 Being Aware of What You Share

9 - 12 The Big Data Dilemma

These discussions should be ongoing throughout the year across all classes, and discussions specific to the technologies to be utilized are strongly encouraged. Lesson resources for teachers are available below:
 

K - Going Places Safely (PDF)

1 - Sending Email (PDF)

2 - Showing Respect Online (PDF)

3 - Follow the Digital Trail (PDF)

4 - The Power of Words (PDF)

5 - Talking Safely Online (PDF)

6 - Safe Online Talk (PDF) and Strong Passwords (PDF)

7 - Trillion Dollar Footprint (PDF) and Cyberbullying: Crossing the Line (PDF)

8 - Which Me Should I Be? (PDF) and Cyberbullying: Be Upstanding (PDF)

9 - Private Today, Public Tomorrow (PDF)

10 - Risky Online Relationships (PDF)

11 - College Bound (PDF)

12 - Taking Perspectives on Cyberbullying (PDF)