Schools and libraries that receive E-Rate funding are required by the Children's Internet Protection Act (CIPA) to have a technology protection measure in place that blocks obscene content, child pornography, and material harmful to minors. The stakes are real: failure to certify compliance means losing access to E-Rate discounts that can cover 20% to 90% of your institution's internet costs. DNS filtering satisfies the technology requirement, and it does it without software on every device, without enterprise pricing, and without a complex deployment.
This article covers what CIPA actually requires, why DNS filtering is the right technical approach for K-12 environments, and how to deploy it across a school network including take-home devices.
CIPA has six requirements for schools and libraries receiving E-Rate discounts or LSTA grants. They fall into two categories: what you must implement technically and what you must document and teach.
The technical requirements:
The policy requirements:
The technology protection measure is what DNS filtering addresses directly. The law does not specify what technology you must use. It only requires that it blocks the defined categories. For a full breakdown of all six requirements, documentation guidance, and an interactive checklist, see our CIPA compliance guide.
DNS filtering works by intercepting DNS lookups before a connection is made. When a student's device tries to reach a blocked domain, the resolver returns no valid address and the connection stops. This happens at the network level, before any content loads, and it applies to every device on the network regardless of operating system, browser, or whether the student has admin access to their device.
For K-12 environments, this architecture has three specific advantages over client-side filtering software:
CleanBrowsing is trusted by 10,000+ schools and educational institutions worldwide, including K-12 districts, charter schools, and universities. Predefined content categories for adult content, pornography, malware, and phishing map directly to what CIPA requires. You can layer additional categories on top, such as social media, gaming, VPNs, and AI chatbots, based on your acceptable use policy.
Network-level DNS filtering covers every device on your school Wi-Fi. For 1:1 programs where devices leave campus, you need an additional layer to maintain CIPA compliance off-network. CleanBrowsing supports all major device types:
For a complete deployment walkthrough covering all device types and MDM integrations, see the IT admin deployment guide.
CIPA applies differently to adults and minors. Schools must allow authorized adults to disable or adjust filters for bona fide research or other lawful purposes. CleanBrowsing handles this through filter profiles. You create a staff profile with appropriate access and a student profile with CIPA-compliant restrictions, then assign each to the relevant network segment or device group.
This same system supports grade-level differentiation. Elementary school devices can have stricter restrictions than high school devices. Scheduling adds another layer: student profiles can tighten filtering during school hours and relax restrictions after 3pm automatically. Content schedules run without manual intervention once configured.
CIPA-compliant filtering should extend to search results. A student who cannot access an adult site directly should also not be able to find adult content through a search engine. CleanBrowsing enforces SafeSearch on Google, Bing, YouTube, and other platforms at the DNS level. This is not dependent on browser settings the student can change. It also covers YouTube Restricted Mode, which limits access to age-inappropriate video content.
Academic dishonesty has a DNS footprint. Essay mills and contract cheating sites have existed for years, and CleanBrowsing's Academic Fraud category blocks them, covering sites that sell essay writing, homework completion, and similar services. That was the primary threat a few years ago. Today the more common path is a student opening ChatGPT, Gemini, or a similar tool and having it write the assignment directly.
CleanBrowsing's Artificial Intelligence category blocks AI content and image generation tools at the DNS level, including ChatGPT and similar platforms. Used alongside the Academic Fraud category, it gives IT administrators a complete DNS-level response to both sides of the academic integrity problem: the services that sell completed work and the AI tools used to generate it.
Whether to enable these categories is a policy decision, not a technical one. Some schools block AI tools entirely during school hours. Others allow access on teacher-supervised networks but block it on student device profiles. CleanBrowsing's profile system and scheduling make both approaches straightforward to implement. The relevant point for CIPA purposes is that your Internet Safety Policy should explicitly address AI tools and academic fraud. If your policy restricts them, DNS filtering is how you enforce it technically.
Both the Academic Fraud and Artificial Intelligence categories are currently in beta. See the full filter categories page for the current list of available categories and their status.
Students are resourceful. A well-deployed CIPA-compliant setup accounts for common bypass methods. For a full breakdown specific to K-12 environments, see how kids bypass filters and the filter bypass prevention guide. The most common vectors to address:
Bypass prevention is not a CIPA requirement, but it is the difference between filtering that works and filtering that looks good on paper. A student who gets around your filters does not change your compliance status on paper, but it does put real students in front of content your policy prohibits.
Schools (not libraries) are required to monitor minors' online activity. DNS activity monitoring in CleanBrowsing's dashboard shows every DNS query, blocked request, and filtering event across your network. Administrators can filter by profile, network, or time range to identify patterns or investigate specific incidents. For compliance-ready logging with longer data retention, DNS log forwarding to Trunc provides a searchable audit trail suitable for documentation purposes.
CleanBrowsing offers school-specific plans sized by student population:
All school plans include encrypted DNS protocols, 19+ predefined content filters, custom allow/block lists, device profiles, activity monitoring, and data retention controls. See the schools page for current details or contact us for district-level deployments.
Practical tips and tutorials to help you get the most out of DNS filtering and safe browsing.
Secure and accelerate your websites with authoritative DNS, a global CDN, and intelligent WAF protection.
Visit NOCHave a question? Reach out at support@cleanbrowsing.org