{"id":631,"date":"2008-04-13T16:17:57","date_gmt":"2008-04-13T21:17:57","guid":{"rendered":"http:\/\/www.trustyetc.com\/trustyblog\/2008\/04\/13\/tyranny-of-filtering\/"},"modified":"2008-04-13T16:17:57","modified_gmt":"2008-04-13T21:17:57","slug":"tyranny-of-filtering","status":"publish","type":"post","link":"https:\/\/www.trustyetc.com\/trustyblog\/2008\/04\/13\/tyranny-of-filtering\/","title":{"rendered":"Tyranny of Filtering"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" align=\"right\" width=\"240\" src=\"http:\/\/farm1.static.flickr.com\/41\/82189385_c50ddb78de_m.jpg\" height=\"76\" style=\"width: 240px; height: 76px\" \/>I managed to squeeze in an extra podcast this week.\u00a0 Teachers Teaching Teachers #95 dives into filtering first hand with the people that run the filters in an assortment of districts.\u00a0 The panelists ranged from a New York City department of education system engineer to a tech administrator from Alaska.<\/p>\n<p>The federal government requires filtering in any district that receives E-Rate funding.\u00a0 Even though the federal government&#8217;s contribution to the bottom line of the local district is somewhat small compared to state and local funds, most schools comply with federal filtering requirements.<\/p>\n<p>Specifically, districts must have several policies in place.<\/p>\n<blockquote><p>These include: measures to block or filter pictures that (a) are obscene, (b) contain child pornography, or (c) when computers with Internet access are used by minors, harmful to minors. (<a target=\"_blank\" href=\"http:\/\/www.fcc.gov\/cgb\/consumerfacts\/internetprotection.html\">CIPA<\/a>)<\/p><\/blockquote>\n<p>At every conference I attend where vendors of filtering software are on the show floor, I always ask the same question.\u00a0 &#8220;Do you guarantee your filtering solution will block 100% of those items required by CIPA.&#8221;\u00a0 So far not a single filtering vendor has been willing to guarantee anything like that.\u00a0 The Internet grows too fast to make this claim.<\/p>\n<p>Filtering by definition cannot be perfect, but the government still requires it.<\/p>\n<p>This podcast quickly gets beyond the CIPA mandates and into how filtering at the district level really works.\u00a0 I was glad to hear about one aspect of filtering that most teachers and students don&#8217;t think about: bandwidth.\u00a0\u00a0Many schools\u00a0block streaming media because the district doesn&#8217;t have the bandwidth to handle\u00a0it.\u00a0 In these cases, blocking streaming media has little to do with the content of that media.<\/p>\n<p>The most important point in this podcast was that teachers need to find out how the filtering rules are modified in a district.\u00a0 All of the panelists said that most\u00a0requests to unblock sites are granted, but a teacher has to know how to make her voice heard.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I managed to squeeze in an extra podcast this week.\u00a0 Teachers Teaching Teachers #95 dives into filtering first hand with the people that run the filters in an assortment of districts.\u00a0 The panelists ranged from a New York City department &hellip; <a href=\"https:\/\/www.trustyetc.com\/trustyblog\/2008\/04\/13\/tyranny-of-filtering\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[336,340,32,17,19,2],"class_list":["post-631","post","type-post","status-publish","format-standard","hentry","category-edtech","tag-edtech","tag-education","tag-filtering","tag-online","tag-podcast","tag-technology"],"_links":{"self":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/comments?post=631"}],"version-history":[{"count":0,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/631\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/media?parent=631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/categories?post=631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/tags?post=631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}