This website uses Cookies, and by using the website, you accept our Terms of Service, Privacy Policy, and other applicable policies set by our Legal Department.

You agree to stay up to date on any changes to our legal policies, as they are posted, by visiting our Legal Department. For your viewing convenience, we are not required to notify you again.

MCE123 - Technology Development

Educational Monitoring System (EDUMSYS)

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.

This information pertains to an educational monitoring system, for the purpose of monitoring all information that pertains to schools, students, and teachers, for the purpose of ensuring that persons are not clandestinely targeting other persons outside of the school within public systems such as law enforcement, legal discovery, and the use of telecommunications or any other process of communications to disseminate information to third parties that are not part of the specific classroom.

Justification:

Students that focus on their school work and remain isolated for prolonged timeframes, including conditions of the economy that keep the students from moving forward towards their career, has a potential issue of being targeted by other students based on the amount of work that students work at home, such that the students do not socialize in public.

Characteristics of Potential Conflicts:

Students of various professional backgrounds and education levels may clash in the professional environments, due to one student having a greater amount of knowledge about topics than another, or in rare cases a student is targeted for the purpose of the third parties attempting to damage the student.

In rare cases, a student may have a greater amount of knowledge than the instructors about other topics, and if the instructors utilize legal discovery, the instructors have the potential capability of damaging the student.

Socialization decreases as the amount of academic and intellectual work increases, therefore the logic behind the justification of a lack of social responsibility of the student results in the student increasing the amount of academic and intellectual work. This is the equivalence of third parties criminalizing the student for competitive purposes, or there may be criminal purposes behind the targeting of the student.

Students and/or teachers discuss information pertaining to a classroom environment outside of the classroom environment, beyond the reasonable discussion of classroom materials and discussions that pertain to the classroom. In some cases, this can lead to third parties creating conspiracy and/or information misrepresented in their own perspective, such that the dissemination of the classroom from outside the classroom polarizes the public comparatively to the classroom, based on information that was taken from the classroom. The same applies to all information that pertains to attendance at a school, while each class is a separate class, unless if a correlation to referencing information that is not officially part of the class such as referring to information in another class makes reasonable sense.

Limitations of Internal Perception of Conspiracy by Federal Government:

Students, faculty, and other persons within an educational institution should not feel as though the presence of Federal Government computer systems establishes any type of conspiracy.

If there is ever a reference to “they”, such that the reference suggests a conspiracy by the government, such as persons within the government watching them online – this type of conspiracy implication does not correlate to Federal Government monitoring systems. Additionally, the activities that correspond to such activities should not be discussed with the public for purposes of avoiding conspiracy through the conspiracy of discussing the information. Any activities that suggest that there is active monitoring could either be reported to the IT staff at the school to keep a record, or internal processes of monitoring the activities without disclosing the information to determine where the activities originate from without seeking out the answers, or seeking help from Federal Law Enforcement to monitor the activities. There are requirements to cooperate with Federal Law Enforcement if the information pertains to an active case, such that the process may not target specific individuals in the public, in the classroom, or in any other way suggest that the government is causing the activities.

Possible Technological Characteristics:

Indirect computerized monitoring of online chat rooms and message boards

Indirect computerized monitoring of telephone calls, if there was information that suggested a correlation

Indirect computerized monitoring of classroom activities, including the use of satellites that can detect audio, video, and the presence of organizational structures within the discussions of the classroom

Indirect computerized monitoring of discussions with government agencies and other entities if the discussions relate to the school and/or school works in any way

Primary Purpose:

The purpose of the technology would be for the purpose of monitoring school activities, in order to determine if there is targeting based on political / sociological patterns that are common to dissemination of information that is protected under Federal Privacy Rights.


DMCA.com Protection Status Site Protected by SiteLock