ICT Communications Lesson 3: Internet Life and Privacy

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Internet Safety Tips for Parents.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
A Student’s Guide to Proper and Safe Web Behavior
Staying Safe Online Keep your Information Secure.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Safe Use of Social Media Cadets – Air Force’s Future.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship.  I can…. What is digital citizenship?  Think.Pair.Share.
Internet Life and Privacy Essentials. Privacy & Digital Footprint After completing this lesson, students will be able to:  Define “privacy” and relate.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Safety.
Gosbecks E-Safety Guide
How to stay safe using the internet & App’s
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Internet Safety How to stay safe online.
Safe Surfin’ on the Internet
Cyber and Internet Safety (Parents’ Night)
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Social Media Security: Understanding how to keep yourself safe.
An Introduction to Phishing and Viruses
8 online danger tips By: kailee bariring.
Digital Citizenship.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Digital Citizenship Middle School
How to use the internet safely and How to protect my personal data?
Online Safety! By: Michelle Deng.
How to use the internet safely and How to protect my personal data?
Safe Internet Mechatronika Budapest.
Remember the rules of online safety.
Emily Snyder, William Darras, Stephanie Berger
Appropriate Use of Technology
Importance of Privacy Internet Safety
Digital Citizenship.
Information Security Footprint.
STOP. THINK. CONNECT. Online Safety Quiz.
Risk of the Internet At Home
Internet Safety Tips for Parents.
Staying safe on the internet
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Rules To Help You Navigate the Internet Safely
Online Safety! Created by Educational Technology Network
Digital Citizenship.
CYBERSAFETY & Personal information
Internet Safety – Social Media
Digital Citizenship.
Internet Safety.
What devices use the internet?
Presentation transcript:

ICT Communications Lesson 3: Internet Life and Privacy

Objectives 2.3.1: Define “privacy” and relate it to the term “digital footprint.” 2.3.2: Describe risks of communicating on social networking sites (e.g., Facebook, MySpace, Twitter), and identify ways to communicate safely. 2.3.3: Describe online communication practices that contribute to cyberbullying. 2.3.4: Practice safe online communication techniques with Internet searches, e-mail, chat rooms, and other social network websites. 2.3.5: Follow an Acceptable Use Policy (AUP) when accessing the Internet.

Digital Footprint - Privacy Digital Footprint: Online virtual trail Personal information: any information that can be used to identify you in real life or give any access to your money or family. Social network: Online community of people with common interests, or the Web site or online service that the community of people uses to communicate.

Social Media Privacy Use just your first name or a pseudonym (false name) Profile pictures are always public – use avatars Set your profile to 'friends only’ Never use your home or cell numbers for contact information on social media. Use e-mail addresses only. Check out the privacy policies on your social media sites.

Social Media IP addresses are like telephone numbers for computers. Sometimes when people behave badly online, the police may use that IP to track the user down. Consider saving text or instant message conversations. They can be a big help in tracking someone down that is bothering or bullying you. There are lots of things you can post online about yourself, photos, art, videos, poetry, and personal profiles. Remember , the internet is an open environment and anyone can find these things. Information on the internet is routinely kept for many years and future schools, employers, or even boyfriends/girlfriends can find this stuff online. Be safe and focus on only putting positive things online.

Top Tips Treat your password like your toothbrush – don’t share it with anyone and change it often. Always remember to logoff when you have finished with an online service. Use your own digital footprints to remember your favorite websites like the history or favorites functions. Remember that most websites you visit will make a note of your visit and may also track the websites you visit before and after their website! Let an adult know if anything you read or see makes you feel worried or upset. Research social media privacy settings and use them

Identity theft Don’t give out your personal information to anyone you meet online that you wouldn’t give it out to face to face. Be careful of personal information posted online or on social media like Facebook, Instagram, Twitter, etc.. Other may use this information to pretend to be you. Never let others use your online accounts, protect your information.

11 Tips Use privacy settings Keep a list of accounts you have and delete ones you no longer use Don’t over share Use a password keeper Google yourself Monitor linking accounts Use a secondary email You don’t need a dozen email accounts “Sending” is like publishing forever Searches are social: Web sites keep ALL information, private or not, for marketing purposes – including websites you visit Manage your digital footprint: Disconnect (Disconnect.me), DoNotTrackMe (Abine.com) and Ghostery (Ghostery.com) are examples of cross-platform extensions that block tracking cookies and give users control over site scripts Private browsing

Netiquette Netiquette is the do's and don'ts of online communication: the rules of polite interaction online Be respectful of everyone. Do not be too quick to take offense. Use emoticons and acronyms to convey meaning. Protect others' privacy. Do not give out information or share posts or pictures without their consent. Check your language.

Cyberbullying Cyberbullying is any bullying behavior that takes place using electronic technology as opposed to in person Do not respond to or forward cyberbullying messages. Keep evidence of cyberbullying. Block the person who is cyberbullying you.

Acceptable Use Acceptable Use Policy (AUP) is a set of rules you must follow in order to use a Web site or Internet service Do not violate any state or federal laws. Respect others' rights. Do not knowingly distribute viruses or other malware. Do not try to gain access to unauthorized areas or others' accounts. Respect others' copyrights and intellectual property. Know the rules and report violations.

Virus Protection Malware is a program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device. Viruses are malicious programs designed by hackers which can do anything from create annoying popups to completely shut down your device. Include: Trojan horses, spyware, and viruses. Any computer, tablet, or smartphone can be damaged by malware

Types of Malware Spyware: designed to collect information about users without their knowledge, often about their browsing habits and to create pop-up ads. Compromises a user's privacy and often interferes with the operation of the device. It is often bundled with downloads. Spam: unsolicited mail or junk mail. Sometimes it comes from legitimate companies, but often it disguises malware or is part of a phishing scam. Phishing: e-mail or message scam that are disguised to look like legitimate communications from businesses. They are designed to trick users into providing sensitive information, such as passwords, credit card details, etc.

Safety Tips Avoid peer-to-peer sites or torrents. Only download from well-known and legitimate sites. If your browser pops up a warning message about the site you are on or the file you are downloading, exit the site immediately and run a virus scan.