Being Aware of What You Share

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access.
What is identity theft, and how can you protect yourself from it?
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Do you know how to keep yourself safe?
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
How can you protect yourself from online identity theft?
PRIVACY BOOTCAMP YpJU.
Scams & Schemes Common Sense Media.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Activity 4 Phone Safety Quiz. 1 You receive a picture message from a friend that makes you uncomfortable. Do you… Send back a text telling her to get.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
What’s the Big Deal about Internet Privacy Marrs Computer Club.
What’s the Big Deal About Internet Privacy?. Today’s Objective I can explain to Mr. Bates why companies collect information about visitors on their websites.
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Digital Citizenship How to use the internet to learn and have fun How to stay in control How to report Karen Bentall, LibrarianAnne Terwilliger, Counselor.
What’s the Big Deal About Internet Privacy? 1.Intro: 2.Teach 1: What's Private? 3.Teach 2: Design a Privacy Policy 4.Wrap-Up 5.Assessment 6.Extension Activity.
Mrs. Esman Computer Special
Creating your online identity
Fraud Protection.
Social Media Security: Understanding how to keep yourself safe.
Scams & Schemes Common Sense Media.
Fraud protection.
Phishing, identity theft, and more
8 online danger tips By: kailee bariring.
Digital Citizenship.
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
How to use the internet safely and How to protect my personal data?
Information Security.
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Protecting your personal information and privacy
Appropriate Use of Technology
Importance of Privacy Internet Safety
Lesson 2- Protecting Yourself Online
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Scams and Schemes.
Information Security Session October 24, 2005
Setting up an online account
SafeSurfing Module 5 September 2016.
ICT Communications Lesson 3: Internet Life and Privacy
Digital Citizenship Unit 1 * Digital Life * Strategic Searches
Internet Safety – Social Media
Online Safety: Rights and Responsibilities
Digital Citizen.
Lesson 2- Protecting Yourself Online
What’s the Big Deal About Internet Privacy?
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Being Aware of What You Share DIGITAL CITIZENSHIP | GRADE 8 Being Aware of What You Share

How can you protect your privacy when you're online? Essential Question How can you protect your privacy when you're online?

Learning Objectives l Reflect on the concept of privacy, including what they feel comfortable sharing and with which people. Analyze different ways that advertisers collect information about users to send them targeted ads. Identify strategies for protecting their privacy, including opting out of specific features and analyzing the app or website's privacy policy. 2 3

Would it be fun to be able to read minds? OBSERVE + ANALYZE IMAGE Would it be fun to be able to read minds? How would you feel if YOUR mind was being read? What do you think of this meme? Funny? Bottom image is someone showing someone’s reaction to learning that their mind is being read. Even though that sounds cool, it could be scary for everyone else that you could read their minds. Not sharing private thoughts is an example of PRIVACY.

KEY VOCABULARY Let’s read the AD DETECTIVE sheet. What do you think about it? Has this happened to you? How does it make you feel? (answer Q1) Privacy Protection from being observed or tracked by others, including the government, the public, or selected individuals or groups What if the ad was less direct? How about if you talked in social media about a friend moving to Europe, and then you got ads for trips to Europe? Can you think of things that people might want to keep private? Online it becomes more complicated…many times, what you put online is tracked or collected. Companies, especially track your information without you even being aware.

To use this site you have to agree to cookies. OBSERVE + ANALYZE IMAGE Let’s look closer. Has anyone seen a screen like this before? What is it? To use this site you have to agree to cookies.

KEY VOCABULARY Cookies Small text files placed on your device by the sites you visit that collect information about your device and your activity

ACTIVITY: PROTECT YOUR PRIVACY Tips for Protecting Your Privacy Turn off cookies in your browser settings.

What do these screens show? What could you use them for? OBSERVE + ANALYZE IMAGE What do these screens show? What could you use them for? Screenshots from settings within Snapchat’s app (Oct 2018).

Privacy settings Opt out KEY VOCABULARY Privacy settings Choices a website or app might give you about what information is visible to other users and third parties Opt out To choose to not participate in something

ACTIVITY: PROTECT YOUR PRIVACY Tips for Protecting Your Privacy Turn off cookies in your browser settings. Review the app's privacy settings and opt out of any sharing options you're not comfortable with.

Privacy policy Terms of service KEY VOCABULARY Privacy policy A legal document that an app or website must provide and that describes what user information they collect and how they use it Terms of service A legal document that an app or website must provide and that describes the rules the company and users must obey when they use the app or website

ASK Accessed Shared Known What will be accessed? What will be shared with other people or companies? Known What could be known about me if I use this? ASK Extra time: Take a moment to look at the Fortnite Privacy Policy and terms. You might be surprised what they can do with your information. Screenshot from Snapchat’s privacy policy: https://www.snap.com/en-US/privacy/privacy-policy/

ACTIVITY: PROTECT YOUR PRIVACY Tips for Protecting Your Privacy Turn off cookies in your browser settings. Review the app's privacy settings and opt out of any sharing options you're not comfortable with. Review the privacy policy and terms of service and use ASK to analyze how using the app will affect your privacy. Let’s go back to Keet’s example. What do you think he could’ve done to protect his privacy more? What information are you OK with sharing?

Protecting yourself from Identity Theft Scams and Schemes

Identity Theft Understand what it is Know why its important to guard against it Learn to recognize strategies scam artists use to get private information Learn to guard against phishing and identity theft Do you know someone who has been scammed? What happened? What was the purpose? What tricks did they use? How can people be scammed on the Internet? Besides ASKING for money directly, how else do identity thieves use your information?

Useful Personal Information Can you guess what information makes you vulnerable? Full name Date of Birth and where you were born Current and previous addresses and phone numbers Drivers license or passport numbers Account numbers for companies you use (paypal, amazon, visa credit etc.) Passwords Social Security Number

Let’s catch a phish… How can you spot a scam? Try the ones you have on your worksheet.

“Protect Yourself” Recap: Be suspicious of any online communication that asks for personal information If from a “friend”, ask yourself if it is in character for that friend. Don’t reply to unknown addressees Don’t click on any links, even to close Report it as spam or junk Go to ftc.gov to report your identity stolen Forward spam to spam@uce.gov if it looks suspect.