Quick Links

Skip to main content Skip to navigation

Main Navigation

Top

CIPA

Sign up for the News Update.

Sub Navigation

Top

Home > breadcrumbs: Parents & Students > breadcrumbs: Technology > breadcrumbs: CIPA >

Working...

Ajax Loading Image

 

CIPA

CIPA

Children's Internet Protection Act

The law requires schools receiving eRate discounts for their internet access or internal connections to adopt internet safety policies and block students' access to inappropriate materials online.

USD 506 currently meets CIPA requirements by having an Acceptable Use policy in place and by using the SonicWall Internet Filtering service.

Background

The Children’s Internet Protection Act (CIPA) is a federal law enacted by Congress in December 2000 to address concerns about access to offensive content over the Internet on school and library computers. CIPA imposes certain types of requirements on any school or library that receives funding support for Internet access or internal connections from the “E-rate” program – a program that makes certain technology more affordable for eligible schools and libraries. In early 2001, the Federal Communications Commission (FCC) issued rules implementing CIPA.

What CIPA Requires

Schools and libraries subject to CIPA may not receive the discounts offered by the E-Rate program unless they certify that they have an Internet safety policy and technology protection measures in place. An Internet safety policy must include technology protection measures to block or filter Internet access to pictures that: (a) are obscene, (b) are child pornography, or (c) are harmful to minors, for computers that are accessed by minors.

Schools subject to CIPA are required to adopt and enforce a policy to monitor online activities of minors; and Schools and libraries subject to CIPA are required to adopt and implement a policy addressing: (a) access by minors to inappropriate matter on the Internet; (b) the safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications; (c) unauthorized access, including so-called “hacking,” and other unlawful activities by minors online; (d) unauthorized disclosure, use, and dissemination of personal information regarding minors; and (e) restricting minors’ access to materials harmful to them.

Back To Top