Children’s Internet Protection Act - CIPA Compliance

Protecting students online is often a moving target. Online threats are emerging as rapidly as ever, and minors are often seeking out inappropriate content. This makes it challenging for an educational institution to manage online threats. We have produced this guide in order to help you understand and meet CIPA compliance for your school.

Our CIPA compliance system will enforce Safe Search and YouTube restricted mode while also blocking the following categories:

  • Adult Content
  • Alcohol & Tobacco
  • Drugs
  • Gambling
  • Hacking & Cracking
  • P2P & Illegal
  • Search Engines & Portals
  • Weapons
  • Botnet
  • Cryptomining
  • Malware
  • Phishing & Deception
  • Proxy & Filter Avoidance

What are the requirements of CIPA?

The Children’s Internet Protection Act (CIPA) regulation centers around adopting an “Internet Safety Policy” (more well-known as an Acceptable Use Policy) which sets forth in writing how you will use protection measures, monitor technology use, and educate minors on safe use of technology. The FCC requires also that, “Before adopting this Internet safety policy, schools and libraries must provide reasonable notice and hold at least one public hearing or meeting to address the proposal.” A provision in the Protecting Children in the 21st Century Act also requires schools to incorporate the subject of appropriate online behavior (including social networking sites and cyber bullying awareness and response) into their Acceptable Use Policy and annual school training.

According to the FCC, there are five elements the Acceptable Use Policy must address:

  1. Access by minors to inappropriate matter on the Internet;
  2. The safety and security of minors when using electronic mail, chat rooms and other forms of direct electronic communications;
  3. Unauthorized access, including so-called “hacking,” and other unlawful activities by minors online;
  4. Unauthorized disclosure, use, and dissemination of personal information regarding minors; and
  5. Measures restricting minors' access to materials harmful to them.

We are able to help in meeting all five of these requirements. Although your school/library is responsible for writing a policy and monitoring technology use in the classroom, you can leave the enforcement of it in our hands. Our product is one of the most lightweight yet effective ways to ensure your entire network is protected from inappropriate content and online threats.


We will ensure that you are setup to be compliant by:

Using the FCC categories listed above, we build our solution to defend your network against malicious internet traffic.

  1. Prevent access by minors to inappropriate content. According to the FCC, ”The protection measures must block or filter Internet access to pictures that are: (a) obscene; (b) child pornography; or (c) harmful to minors (for computers that are accessed by minors).” We ensure that our CIPA compliant policies are in affect for your organization. We also automatically block child pornography for all customers, through our partnerships with the Internet Watch Foundation and Project Arachnid
  2. Enforce the safety and security of minors when using email, chat, and other direct electronic communication. The most effective way to do this is by blocking the following categories: Blogs & Personal Sites, Chat & Instant Messaging, Media Sharing, Message Boards & Forums, Social Networking, Streaming Media. You may consider whitelisting sites that you view as benign or are able to appropriately supervise in the classroom or library environment.
  3. Prevent unauthorized access, hacking, and unlawful activities. There are two things that should be put in place in order to prevent hacking and unlawful activities by minors on the network. The first is to apply filtering policies to the categories of Hacking & Cracking, and P2P & Illegal, as well as turn on all of our threat categories.
  4. Avoid unauthorized disclosure of personal information regarding minors. No action is required on your part to apply this for our product. We and our vendors do not collect personally identifiable information for adults or minors.
  5. Restrict minors’ access to materials harmful to them. The best way to restrict access is to ensure that minors cannot circumvent our settings. we do this by implementing multiple firewall rules. This is the only way to prevent minors from tampering with network adapter settings on their local device and escaping your filtering policy. The other side of the coin is that, under CIPA, adults should have the ability to bypass filtering policies for lawful purposes or bona fide research. There are two options for this. The first is to set up a bypass password. We can do this in our dashboard for you if you need. The second option is to implement NAT IPs , which allows you to have multiple policies based on network segments. This would allow staff computers which are on a separate LAN/vLAN to have different policies than students.

Other resources:

For more information on how we protect your organization, please don't hesitate to contact us. 

Was this article helpful?
0 out of 0 found this helpful



Article is closed for comments.