{"id":530,"date":"2007-12-15T22:40:40","date_gmt":"2007-12-16T03:40:40","guid":{"rendered":"http:\/\/www.trustyetc.com\/trustyblog\/2007\/12\/15\/detention-for-firefox-user\/"},"modified":"2007-12-19T23:18:16","modified_gmt":"2007-12-20T04:18:16","slug":"detention-for-firefox-user","status":"publish","type":"post","link":"https:\/\/www.trustyetc.com\/trustyblog\/2007\/12\/15\/detention-for-firefox-user\/","title":{"rendered":"Detention for Firefox User"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" align=\"right\" width=\"240\" src=\"http:\/\/farm2.static.flickr.com\/1198\/526512276_20699a48fd_m.jpg\" height=\"180\" style=\"width: 240px; height: 180px\" \/>Last week I ran across this scanned copy of <a target=\"_blank\" href=\"http:\/\/www.uploadgeek.com\/uploads456\/0\/1197784327416.png\">a detention notice<\/a> for an unnamed student.\u00a0 According to the letter, the student was caught using &#8220;firefox.exe&#8221; and was given a detention because &#8220;firefox.exe&#8221; was not closed when the teacher spotted its use.<\/p>\n<p>Today I found <a target=\"_blank\" href=\"http:\/\/www.bigspring.k12.pa.us\/news.php?action=view_article&amp;article_id=2130\">this response from the Principal<\/a> (whose name is at the bottom of the detention letter).\u00a0 It seems that someone took a real detention slip and doctored it to create a hoax letter.<\/p>\n<p>Since no names are mentioned in the hoax letter, it is hard to say if someone has been hurt by this.\u00a0 These actions do show the power of social networks and how school officials are going to have to respond to them&#8230; one way or another.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week I ran across this scanned copy of a detention notice for an unnamed student.\u00a0 According to the letter, the student was caught using &#8220;firefox.exe&#8221; and was given a detention because &#8220;firefox.exe&#8221; was not closed when the teacher spotted &hellip; <a href=\"https:\/\/www.trustyetc.com\/trustyblog\/2007\/12\/15\/detention-for-firefox-user\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[336,340,2],"class_list":["post-530","post","type-post","status-publish","format-standard","hentry","category-edtech","tag-edtech","tag-education","tag-technology"],"_links":{"self":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/comments?post=530"}],"version-history":[{"count":0,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/530\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/media?parent=530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/categories?post=530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/tags?post=530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}