Personal Safety Unit - Level 7

Slides:



Advertisements
Similar presentations
Mayfield Intermediate
Advertisements

Personal Safety Unit - Level 6. Today you will be learning about personal safety when online. This unit consists of four mini lessons. The PPT covers.
Part I: Making Good Online Choices
Internet Online Safety How to have FUN and Stay in Control.
Internet Safety Review Focus: Community A Literacy-Based Teaching and Learning Activity Level 5.
Personal Safety Unit - Level 8. Today you will be learning about personal safety when online. This unit consists of four mini lessons. The PPT covers.
The Plan Today you will be learning about personal safety when online. This unit consists of four mini lessons. The slide show covers all lessons.
INTERNET SAFETY FOR STUDENTS
Cyber bullying and internet safety Parents meeting: staying safe online.
Identifying Online Predators
This week is anti-bullying week.
Community Level 7. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
How to keep your kids safe online
Cyber Bullying Level 7.
Web Logs: A Positive Approach to Blogging. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Do you know how to keep yourself safe?
Internet Safety Awareness
INTERNET SAFETY FOR STUDENTS
+ An Introduction to Safety on the Internet 1 Material and Advice provided by:
Cyber Bullying Level 8.
Intellectual Property
Intellectual Property Grade 5 Lesson 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned.
Safe Website Design. Hey Everybody My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE. i-SAFE is concerned with teaching you how to.
Safety On The Internet  Usage time  Locations that may be accessed  Parental controls  What information may be shared with others Online rules should.
Welcome to our E-Safety
Let’s talk about Internet Safety!
Let’s Talk About Cyber Security
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Cyber Security Level 8. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Personal Safety Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Personal Safety Unit - Level 7
“It is like, totally anonymous, so no one worries about getting in trouble. Lots of kids would never do this stuff in the ‘real world.’” —13 year old boy.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Cyber Bullying Level 7. Hey It’s Me Again! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be.
Intellectual Property Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Personal Safety Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Intellectual Property Grade 5 Lesson 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are.
Web Logs: A Positive Approach to Blogging. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Intellectual Property Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Safe Website Design. Hey Everybody My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE America. i- SAFE is concerned with teaching.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
Personal Safety Level 8. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
M M U U L L T T I I - - Q Q ! ! Multi- Q Introd uction I Safe’s Internet Safety Review Game M M U U L L T T I I - - Q Q ! ! Welcome to … Skip Rules.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Predator Identification Internet Safety Awareness.
CHAT ROOMS What Makes Them Dangerous And How YOU Can Make Them Safe! MARY B. CONYERS PROTECT EVERYCHILD P. O. Box 749, Knightdale, NC
Internet Safety Review Focus: Personal Information A Literacy-Based Teaching and Learning Activity Level 8.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Internet Safety Tips.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
© 2008 i-SAFE Inc. an i-SAFE presentation. © 2008 i-SAFE Inc. Learning Goals YOU WILL: Understand that an online stranger is anyone met exclusively online.
Appropriate Online Behavior
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Freshman Seminar. Find kids through social networking, blogs, chatrooms, instant messaging, , discussion boards, and other websites. Try to seduce.
Internet Safety Review Focus: Cyber Security A Literacy-Based Teaching and Learning Activity Level 6.
1 BTW…..R U SAFE? Socializing Online Smiths Station Jr. High School Presented by: Bernice Howard.
Gosbecks E-Safety Guide
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
i-SAFE’s Internet Safety Review Game
Personal Safety Unit - Level 8
Predator Identification
Web Logs: A Positive Approach to Blogging
Online Safety: Rights and Responsibilities
Presentation transcript:

Personal Safety Unit - Level 7

The Plan Today you will be learning about personal safety when online. This unit consists of four mini lessons. The PPT covers all lessons in the unit, with a spacer slide between the lessons. Safeguarding Your Identity Online: Screen Names and Passwords, and Safety Resolutions Protecting Personal Information Online Strangers, Predators, and the Grooming Process Online Personal Safety Review and Action

Lesson 1 Safeguarding Your Identity Online: Screen Names, Passwords, and Safety Resolutions

Resource Pages Read and review the resources pages as a class.

Be Smart Be Safe The Internet is not anonymous. When you sign on, others have access to you. Your e-mail address, screen name, and password serve as barriers between you and others. You need to maintain this barrier by not giving out private information. There are many out there who would like to know more for various reasons: They could want to harm you. They could want money They could use information to conduct their own business - either selling your info or using it in an illegal manner.

Personal Information This information should not be given out on the Internet to maintain your safety. Name Address School Friends’ names Family names Age Social Security Number Phone number

DO NOT USE Personal Information such as: User Id/Screen name A User Id is a “nickname” you select to identify you in e-mail, chats, etc. DO NOT USE Personal Information such as: -Your real first name -Your real last name -Your location (i.e. hilliegirl, HaverhillGuy) -Your zip code -A suggestive name or word (i.e. sexyman42, hotbabygirl) -Pornographic or obscene words For added security, always opt NOT to add your name or nickname to any sort of member directory.

Password A Password is a series of letters, numbers or symbols used to log you into a computer system. Passwords are used to access email, join chatrooms, etc. They are usually between 6 and 8 characters long. Password Security: Don’t tell anyone your password. Don't write your password down anywhere. When you decide on a password, make sure it can't be guessed. If you think there's even a chance someone else might know your password, change it. Make sure no one is standing near you when you enter your password

Break for Activity At this point, your teacher will give you a profile worksheet. Please fill out this worksheet now.

Personal Profile What type of information did the personal profile form ask? Would you be comfortable handing that form out to strangers on the street? Would your parents want you to hand that form out to strangers on the street? Would you feel comfortable handing that form out at a prison to criminals? Would you feel comfortable handing out that form to a murderer?

Think About It When you fill out a profile online, can/do you determine who will look at it? Could a criminal, thief, murderer, etc view it? Where else have you seen personal information asked for when online? Some examples include website registrations, contest forms, pop-up advertisements, shopping, etc. How do you know if these requests for information are valid? Do you personally know the person asking? Have you validated the site?

Think About It You should NEVER reveal information online without your parent’s knowledge or permission. However, with a parent’s help, you may be able to safely fill out necessary information online.

Brainstorm On your paper, create two columns. In the first column - brainstorm a list of examples of online instances that can result from divulging personal information. In the second column - brainstorm a list of safety rules/tips that can help people respond appropriately to online requests for personal information.

Discuss What examples did you come up with? What safety tips did you develop? Name five common rules that can prevent personal information from being divulged inappropriately online ?

Lesson 2 Protecting Personal Information

Let’s Brainstorm · Why do students feel safe on the Internet? ·        What are some dangers on the Internet? ·        What are some good things on the Internet? ·        How can you stay away from the dangerous things?

Article Your teacher is going to read an article to you. Pay close attention because afterwards, we’re going to discuss it!

The Article According to events in the article, how could what happened have been prevented?

Reference Page Refer to the reference page. Cover the information as a class.

Watch out for… Dangers On the Web Inappropriate sites - There are some sites you should not go to. They can be pornographic, hate filled, or upsetting. When you accidentally come across a site you know you shouldn’t be in, close out of it quickly. If you still have trouble, try logging off completely or rebooting.

Watch out for… Dangers On the Web    Faulty information sites - Don’t trust everything you read without checking and double-checking references.

Watch out for… Dangers On the Web Private/personal Information – Some websites ask you for private information before you can access their stuff. Make sure you ask your parents before giving anyone private information.

Watch out for… Dangers On the Web Your own website – Many teens now have their own websites. However, you have to be careful about what information you display.

Watch out for… Dangers in E-mail E-mail is an online form of communication, typically between two people. Just like in regular mail, users write letters and send them electronically. Spamming – many companies advertise via e-mail. They try to entice you to purchase items, visit inappropriate sites, etc. Delete these e-mails. Be careful when you reply to an e-mail. You are including your e-mail address and you don’t know where it will go from there.

Watch out for… Dangers in Email Inappropriate, offensive, angry e-mail should be reported to your Internet provider. Remember - the sender of an e-mail may not be someone you know – don’t send personal information, photographs, etc.

Watch out for… Dangers in Chatting and Socializing Chats and blogs can result in revealing information you wouldn’t normally reveal. This can leave you open to someone who might want to harm you.

Tips to Remember when Chatting Keep online interaction online. Don’t agree to meet or phone people met online. Don’t give out personal information. Be careful about indirectly saying too much – like school mascot, game times, etc. Eventually you will have said enough. Keep your parents or guardians informed of online interaction. Use Chat rooms that are moderated. Be suspicious of someone who wants to be your friend and turns you against your parents, teachers or friends. Private chats aren’t always private – when you meet offline friends online in a private chat room be careful. Others can often enter and lurk. Try to choose a gender-neutral online screen name

Watch out for… Dangers in Newsgroups, Forums, and Social Networking Sites The most important thing to remember is to AVOID including personal information in postings. Don’t reveal anything identifying about yourself. Realize that by posting something, you are making it public. Be careful not to participate in a group, which might be illegal or hateful.

Resources for reporting incidents: Here is a general guideline for reporting Internet wrongdoing. Call the local police and ask if they have a dept. affiliated with "Internet Crimes Against Children (ICAC). If they do, go through that dept. 2. Simultaneously, file a report with the Cybertips hotline: 1-800-843-5678. Reports can be made directly online by clicking on the Cybertipline at http://www.missingkids.com/ 

Think About It… Before you knew all about Internet Safety, were you making mistakes in revealing personal information online?

In your groups Draft a set of rules for home use to guide safe Internet use. Take into account rules your parents might want included, what you have learned, etc

Share Share your rules with your class What have you learned today? Remember: Personal/identifying information should never be revealed online, whether to a person, in a profile, on a website, etc. Anyone met online is a stranger.

Lesson 3 Online Strangers, Predators, and the Grooming Process

Let’s Get Started Your teacher will read an article called Kelly’s Story to you.

Kelly’s Story What are possible reasons why Kelly considered Rick to be a trustworthy friend? What are possible reasons why Katy didn’t recognize Rick’s willingness to pay for her transportation as a danger signal? What are possible reasons why Kelly didn’t recognize Rick’s asking her to remove her computer hard drive as a danger signal? How was Kelly a “willing participant” in the relationship? Why do you think this occurred? How can similar mistakes be prevented?

Activity Directions: Your teacher will pass out the sample chat activity page. You will be timed, as quickly as possible, write in the unsafe behaviors and identities you find.

Discuss As a class discuss what dangers you found in the chat. How could the risks taken have been prevented?

Review the Statistics More than 74% of 5th graders surveyed by i-SAFE spent at least an hour online each week. 50% of 5th graders surveyed spend time in chat rooms. More than 7% of those surveyed in 5th grade have met someone face to face that they first met online. What does it mean? How can those actions lead to danger?

Strangers What is your definition of a stranger? What are common rules/advice for dealing with strangers in the physical world?

Strangers Online Those rules also apply to communication online! People met online are STRANGERS!

Online Predators Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators.

Key Point A predator is one who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.

Key Point One who is a victim or one who is vulnerable to victimization by a predator is prey, no matter what their age is.

Online Predators and Prey How do these terms apply to the online environment?

Minimize Dangers Choose screen name carefully Don’t reveal information online Choose people to communicate with online carefully No matter what – Tell an adult if you are made to feel uncomfortable online or are approached by someone who discusses inappropriate things or wants to meet you offline.

Grooming Flyer You should receive a flyer on the grooming process now from your teacher. As a class review and discuss the steps in the grooming process. Make sure you take your flyer home and share with your parents. Discuss what you’ve learned today!

Let’s Review Anyone met online is a stranger. What are the steps a predator uses to groom a potential victim? Remember: It is important to avoid revealing personal information online and have safe screen names so that you are not targeted by strangers online. Remember: It is important to report stranger behavior online that makes you uncomfortable, asks for personal information, or requests a face to face meeting.

Lesson 4 Online Personal Safety Review and Action

Start with a Review Game For a classroom with computer access, return to the lesson folder and select the PPT Activity: Personal Safety Game.ppt When completed - Return to slide 52 to continue. OR Continue on for the non-computer access option.

Here are the directions to get started You are going to play Who Wants to be a Winner! Students on each team will take turns answering questions about Internet safety. Each team starts with three help-options to use during the game: (1) pass, (2) ask a friend on their team, or (3) ask the whole class. Each team can only use each option once during the game. Write the three options on the board. When the team uses an option, it is erased. The first player to go will choose a question from the box. The teacher will read it. The player must decide if s/he knows the answer. If the player does not know the answer, s/he may pick an option. If s/he passes, the player next in line can have a chance at answering the question. If the pass option is used, it is then erased and cannot be used again by that team. Alternate choosing questions between two teams. When a team uses all the options, the players must try to answer their own question, even if they don't know it. When all the questions are gone, the game is over. The teams get one point for each question, and the team with the most points wins.

So Who Won?

What About Others If you could make mistakes online, do you think others do also? Who else could benefit from learning this information? Friends? Parents? Teachers? What are some good ways to relay this information to others?

Help Educate Others You will help implement the i-SAFE Library Safe Card Program. Take time to review the program now.

Library Safe Card What did you learn from the library safe card program? How can this information benefit others?

Library Safe Card We challenge you to get this information out there! Some ideas: Tell your school or local librarian about the program and provide a demonstration. Make arrangements to install the Library Safe Card Program on your school library computer(s) or another computer that can be used by other students. Create a plan to arrange to invite a younger class for instruction on the Library Safe Card, or to hold a general introduction in the library.

That’s a wrap! You now know the tips and tools that can help keep you safe online! Just remember, when you’re online you aren’t invincible. Rules can keep you safe.

It doesn’t have to end here! Find out about DRiVE!

Take Action It’s Easy with the i-MENTOR Training Network! Visit the X-BLOCK - http://xblock.isafe.org to learn about the i-MENTOR Training Network. It’s all online! The i-MENTOR Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-MENTOR Network located in the X-BLOCK – http://xblock.isafe.org

Get the recognition you deserve as an i-SAFE Mentor Enroll online at www.isafe.org by clicking on Create an Account. Go to the X-BLOCK and submit the Online Mentor Menu. Download your own Student Toolkit and materials to get started. Take Action www.isafe.org