Technology and You.

Slides:



Advertisements
Similar presentations
Internet Safety Presentation
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Forms of Cyberbullying
Understanding the impact technology has on you.. Sexting-The act of sending sexually explicit messages or photographs, primarily between mobile phones.
Intentional and repeated use of technology to harass, threaten, embarrass, or target another person.
Internet Safety for Students
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Smart Choices for our 21st Century Cyber Surfers
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
What do I need to know?.   Instant Messages  Social Networking.
Westport Middle School Presentation 2015
An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
CYBER BULLYING Cody O’Brien. Goals for Today’s Presentation Introduce Cyber bulling Identify forms of cyber bulling Steps to prevent it What to do if.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
GUIDANCE LESSON INTERNET SAFETY/NETIQUETTE IF YOU DO NOT WANT IT TO BE TOMORROW’S FRONT PAGE NEWS, DO NOT SEND IT THROUGH TECHNOLOGY!!!
CyberSafety A Lesson in CYBERWORLD Culture, Customs, Culture, Customs, Language, and Safety.
Internet Safety Mrs. Robison The presentation was created by: A Deputy Stafford County Sheriff’s Office Modifications made to formatting and relevance.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Grade Head Session.  Sexting is the act of sending sexually explicit messages and/or photographs, primarily between mobile phones.sexually explicit.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
Fil Santiago Director of Staff Development and Technology West Orange Public Schools.
Sexting Criminal Teen Trend
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Sexting Definition: The act of sending, receiving or forwarding sexually explicit messages or photos electronically, primarily between cell phones, but.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Tips for Students 1 Prepared by Tina Dixon School Counselor Geneva High School.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
PGHS Advocacy Digital Citizenship Lesson 2
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Acceptable Use of Internet & Technology and Netiquette for High School Students.
T HINK ! Before You Post A lesson on Internet Safety Source:
KALEY ROBERTS CPSY 646 FACULTY IN-SERVICE Sexting.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Combing the words “sex” with “texting” describes the act of someone sending sexually explicit messages or images of themselves electronically - primarily.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
Technological Awareness for Teens and Young Adults.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Safety.
Social Media LCBMS Guidance Staff.
A Guide to Internet Safety High School
E-Safety.
“Cyber-Bullying, Sexting, Social Networking and the Law”
Bullying.
Pics, Flicks, and Sexting
Virtual Battles: Cyberbullies
Teaching Internet Safety
Issues In media studies: Cyberbullying
Appropriate Use of Technology
How many of these apps do you really know?
Bullying and Harassment
Warrior Wednesday DIGITAL CITIZENSHIP.
SOCIAL MEDIA: ARE YOU PLAYING IT SAFE?.
Follow safety rules so that YOU: Avoid getting HURT.
Follow safety rules so that YOU: Avoid getting HURT.
Rules To Help You Navigate the Internet Safely
SAFEKIDS A Guide to Internet Safety High School
ICT CyberSecurity Lesson 2:
ICT Communications Lesson 3: Internet Life and Privacy
Who are we? We provide a service for anyone affected by bullying who is still of school age. We give advice to children, young people, parents/carers.
Personal Safety Online
Relationship and Abuse
Presentation transcript:

Technology and You

TECHNOLOGY AND YOU Lesson goal To improve students’ understanding of some of the difficulties posed by technology, including hazards on the Internet and the dangers and consequences of sexting and cyberbullying.

Students will learn: Virginia laws designed to protect Internet users TECHNOLOGY AND YOU Students will learn: Virginia laws designed to protect Internet users Hazards on the Internet Laws relating to cyberbullying and sexting Strategies for safe Internet surfing

TECHNOLOGY AND YOU Computer crimes There are numerous sections of the Code of Virginia that address computer crimes and are listed in the Internet Safety Laws handout. These laws address: Fraud SPAM or “junk mail” Computer trespass Invasion of privacy using a computer or computer network Using a computer to access information using deception

Computer crimes, cont. Theft of computer services TECHNOLOGY AND YOU Computer crimes, cont. Theft of computer services Personal trespass by computer Using a computer to harass another Sexting

TECHNOLOGY AND YOU Computer use There are laws addressing computer use, SPAM, computer trespass, and harassment using a computer. §22.1-70.2 of the Code of Virginia addresses Internet use policies for public and private schools. Virginia became the first state in the nation to require Internet safety to be integrated into all school instructional programs statewide.

TECHNOLOGY AND YOU SPAM §18.2-152.3:1 of the Code of Virginia makes it a Class 1 misdemeanor to use a computer or computer network with the intent to falsify or forge electronic mail transmission information in connection with the transmission of unsolicited bulk electronic mail (“SPAM”).

TECHNOLOGY AND YOU Computer trespass §18.2-152.4 of the Code of Virginia prohibits computer trespass by making it a Class 1 misdemeanor for any person, with malicious intent, to do any of the following: Remove, halt, or disable any computer data, computer programs, or computer software from a computer or computer network. Cause a computer to malfunction. Alter, disable, or erase any computer data, computer programs, or computer software.

Computer trespass, cont. TECHNOLOGY AND YOU Computer trespass, cont. Effect the creation of a financial instrument or of an electronic transfer of funds. Use a computer or computer network to cause physical injury to the property of another. Use a computer or computer network to make or cause to be made an unauthorized copy, in any form, including, but not limited to, any printed or electronic form of computer data.

TECHNOLOGY AND YOU Harassment A key law designed to protect you while you are online is §19.2- 152.7:1, harassment by computer, which states: If any person, with the intent to coerce, intimidate, or harass any person, shall use a computer or computer network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, or make any suggestion or proposal of an obscene nature, or threaten any illegal or immoral act, he shall be guilty of a Class 1 misdemeanor. This type of illegal behavior is referred to as cyberbullying.

TECHNOLOGY AND YOU Cyberbullying Bullying is an aggressive behavior that is intentional, involves an imbalance of power or strength, and is usually repeated over time. In recent years, technology has given children and youth a new way to bully each other, which can involve: Sending mean, vulgar, or threatening messages or images. Posting sensitive, private information about another person. Pretending to be someone else in order to make that person look bad. Intentionally excluding someone from an online group.

Cyberbullying, cont. Cyberbullying can occur through: E-mails TECHNOLOGY AND YOU Cyberbullying, cont. Cyberbullying can occur through: E-mails Social Media Instant messaging Text or digital image messages sent on cell phones Web pages Blogs Chat rooms or discussion groups Other information communication technologies

TECHNOLOGY AND YOU Cyberbullying, cont. 18% of students in grades 6-8 said they had been cyberbullied. 11% of students in grades 6-8 said they had cyberbullied another person in the last couple of months. 19% of regular internet users between the ages of 10 and 17 reported being involved in online aggression. That is almost one in five. 17% of 6-11 year-olds and 36% of 12-17 year-olds reported that someone said threatening or embarrassing things about them through e-mail, instant messages, websites, chat rooms or text messages.

TECHNOLOGY AND YOU Cyberbullying, cont. For 6-11 year-olds, about one in six had been a victim. For 12-17 year-olds, over one third had been a victim. In a recent study of students in grades 6-8, girls were about twice as likely as boys to be victims and perpetrators of cyberbullying.

TECHNOLOGY AND YOU Sexting The National Center for Missing and Exploited Children (2009) defines sexting as “youth writing sexually explicit messages, taking sexually explicit photos of themselves or others in their peer group, and transmitting those photos and/or messages to their peers.” It is against the law in Virginia to produce, store, or share lewd or explicit pictures or videos of minors. Many of these images are classified as child pornography. (Code of Virginia §§ 18.2-374.1 and 18.2-374.1:1)

TECHNOLOGY AND YOU Sexting, cont. It may start as a joke or an image sent between boyfriend and girlfriend, but sexting has serious consequences. Legally, just having such images on your cell phone, sharing them with other students via cell phone, or creating them using your cell phone, can be classified as a felony. This can mean years in prison and having your name on the sex offender registry for the rest of your life. In addition, you may be suspended from school, dismissed from jobs or other organizations, denied admission to college, and lose jobs and other opportunities later in life.

TECHNOLOGY AND YOU Sexting, cont. In a 2009 study by Cox Communications, about 19 percent of students admitted to sexting. The survey also reported that: 9 percent had sent a sexting message; 17 percent had received a sexting message; 3 percent had forwarded a sexting message; 60 percent of those sending sexting messages had sent them to boyfriends or girlfriends; 11 percent of those sending sexting messages had sent them to someone they did not know; and 14 percent of those sending sexting messages were caught (mostly by parents).

Sexting, cont. How can you avoid this very serious crime? TECHNOLOGY AND YOU Sexting, cont. How can you avoid this very serious crime? Think about the consequences of taking, sending, or forwarding a sexual picture of someone underage, even if it’s of you. Never take images of yourself that you wouldn’t want everyone — classmates, teachers, family and employers — to see. Before hitting SEND, remember that you can’t control where this image may go.

Sexting, cont. How can you avoid this crime, cont. TECHNOLOGY AND YOU Sexting, cont. How can you avoid this crime, cont. Don’t hit forward – if you forward a sexual picture of someone underage, you are as responsible for this image as the original sender. Report any nude pictures you receive to an adult you trust. Do not delete the message. Instead, get your parents or guardians, teachers and school counselors involved immediately.

Strategies for staying safe online TECHNOLOGY AND YOU Strategies for staying safe online E-mails from unknown persons or businesses: Danger: May contain computer viruses and “worms” that can damage your computer. Strategies: Do not open these e-mails at all. Never open any attachments.

Strategies for staying safe online TECHNOLOGY AND YOU Strategies for staying safe online Phishing: Danger: You can accidentally give away valuable personal information like a password, social security number, bank account number or credit card number to a criminal pretending to “verify” information. Strategies: Do not provide personal information unless you are absolutely sure a website is legitimate and secure. Don’t respond to unsolicited e-mails.

Strategies for staying safe online TECHNOLOGY AND YOU Strategies for staying safe online IM, chatting, and other types of electronic communication: Danger: Electronic chat can be used to cyberbully or to harass someone or to engage in inappropriate, predatory, or sexually explicit conversations. Strategies: National Center for Missing and Exploited Children advises teens: Communicate only with people you know in real life. Use privacy settings. Make sure you are familiar with the blocking features.

Strategies for staying safe online TECHNOLOGY AND YOU Strategies for staying safe online Posting videos or photographs online: Danger: Digital files can easily be saved and distributed to other people, beyond the circle of trusted friends and family. Saving, sending and posting any images that are sexually provocative or inappropriate may have serious legal and lifetime consequences. Employers are increasingly checking the web for images of, or information about, job applicants.

Strategies for staying safe online TECHNOLOGY AND YOU Strategies for staying safe online Posting videos or photographs online, cont.: Strategies: Assume that anything sent or posted online is there forever. Ask yourself “Would I be embarrassed if my friends or family saw these pictures or videos?” If the answer is yes, stop. Be aware of what is in the camera’s field of vision and remember to turn it off when not in use. Do not send or post identity-revealing or sexually provocative photographs. Do not post photos of friends without their parents’ permission. If you receive an inappropriate image, do not delete it, but show it to a trusted adult.

Strategies for staying safe online TECHNOLOGY AND YOU Strategies for staying safe online Here are some general tips from the National Crime Prevention Council for staying cyber-safe: Never post or share your personal information online. Never share your Internet passwords with anyone, except your parents. Never respond to messages from unfamiliar persons. Never enter an online area that charges for services without getting your parents’ permission first. Never meet face-to-face with anyone whom you only know online. Talk to your parents about what you do online.

Strategies for staying safe online TECHNOLOGY AND YOU Strategies for staying safe online Complete the activity in “What Would YOU Do Staying Safe Online”

Review and Recap You have learned: TECHNOLOGY AND YOU Review and Recap You have learned: That there are many Virginia laws addressing computer crimes and that some of these laws are specifically intended to help protect you while you are online; That bullying using a computer takes many forms and is called cyberbullying; What sexting is and how it violates Virginia law; and That there are risks associated with being online, but there are strategies you can use to reduce those risks.