Personal Safety Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Mayfield Intermediate
Developed by Technology Services 1:1 Laptop Initiative
Part I: Making Good Online Choices
Internet Safety Review Focus: Community A Literacy-Based Teaching and Learning Activity Level 5.
The Plan Today you will be learning about personal safety when online. This unit consists of four mini lessons. The slide show covers all lessons.
INTERNET SAFETY FOR STUDENTS
Community Level 7. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Cyber Bullying Grade 3.
e-safety and cyber bullying
Using internet and cell phones safely
Cyber Bullying Level 7.
Web Logs: A Positive Approach to Blogging. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Cyber Bullying Level 8.
Intellectual Property
Intellectual Property Grade 5 Lesson 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned.
Safe Website Design. Hey Everybody My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE. i-SAFE is concerned with teaching you how to.
Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.
Let’s talk about Internet Safety!
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Cyber Security Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Cyber Security Level 8. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Cyber Bullying Level 7. Hey It’s Me Again! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be.
Intellectual Property Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Personal Safety Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Intellectual Property Grade 5 Lesson 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Student Mentors Know the Rules of the Road Tell others about Internet safety Plan Internet Safety Activities and Events outside the classroom Teach i-SAFE.
Web Logs: A Positive Approach to Blogging. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Internet Safety Helpful Tips to Stay Safe. I bet you didn’t know… 18% of 8- to 10-year-olds spend time on some kind of social networking site daily Kids'
Intellectual Property Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Safe Website Design. Hey Everybody My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE America. i- SAFE is concerned with teaching.
Personal Safety Level 8. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Safeguarding your Identity While Online i-Safe, Inc.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Predator Identification Internet Safety Awareness.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Internet Safety Review Focus: Personal Information A Literacy-Based Teaching and Learning Activity Level 8.
Copyright and Fair Use. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.
Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites.
THINK CYBER SMART, BE CYBER SMART! CYBER SAFETY AND DIGITAL CITIZENSHIP IN A CLASSROOM.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
© 2008 i-SAFE Inc. an i-SAFE presentation. © 2008 i-SAFE Inc. Learning Goals YOU WILL: Understand that an online stranger is anyone met exclusively online.
E-Safety Quiz Are you cybersafe?.
Community Level 8. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
DIGITAL ETIQUETTE Teachers Students Quiz What is Digital Etiquette? What is Digital Etiquette? Social Networking Social Networking Cyber Bullying Cyber.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
Internet Safety Review Focus: Cyber Security A Literacy-Based Teaching and Learning Activity Level 6.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Cyber Bullying Level 7. Hey It’s Me Again! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be.
8 online danger tips By: kailee bariring.
Web Logs: A Positive Approach to Blogging
Personal Safety Online
Safe Website Design.
Presentation transcript:

Personal Safety Level 5

Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping you to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i- SAFE with others.

All right – Let’s talk Empowerment Remember - Empowerment means you own what you learn and can use it to teach others and make a difference.

So not only are you learning and sharing, you are getting rewarded for doing so! i-SAFE includes an empowerment activity in every lesson. By completing the activity you may be eligible for neat incentives and prizes. Check it out at – Click on the link to contests and Incentives. Empowerment is the Key to Learning!

Today you will be learning about personal safety when online. There are several activities incorporated into this lesson, including a cause and effect activity sheet. Additionally, you will be completing a presentation about Internet Safety while you learn, which can be used to support a Parent Night Event. The Plan

The Issue 1.What is Cyberspace, and how do we get there? 2.What are some of the ways we communicate in Cyberspace? 3.How do you know if someone is a stranger on the Internet? 4.What are possible reasons a stranger would contact you on the Internet? 5.What should you do if you get a message from a stranger on the Internet? Let’s figure out why personal safety is an issue in Cyberspace.

Teacher’s choice: For a classroom with computers, return to the lesson folder and select the HTML Activity for this lesson. Students should work in groups. When completed - Return here to Slide 13 Otherwise – let’s continue on…

We’re going to start with the Screen Name Game You can follow along on your activity page. We’re going to read through the information and complete the activities as we go along.

Online ID – What can you tell ? Directions: Look at the user names below. As a class, brainstorm what each says about the person who chose it. Then put the names in order from least informative to most informative. 1.Jessica4dance 2.Smithstealshome 3.Bayareababe 4.dancinfun 5.Fred14

Time for Discussion Think about your own screen name. What does it say about you? When you choose a screen name you want something that allows you to remain anonymous, or unknown. Don’t include personal information. Why do you think you shouldn’t include personal information? What are some of the dangers?

Password Protection Directions: Look at the information about each person below. What are some common and obvious guesses as to what their passwords might be? Brainstorm a list for each one. 1.John – John lives in the Tampa Bay area where the Bucs play. He is a really big fan. He loves football. 2. Jessica – Jessica loves all the popular music groups. She is head over heels in love with Justin Timberlake. 3. Ali – Ali is afraid to forget her password. She wanted something simple she could always remember.

Time for Discussion Think about your own password. -Is it something obvious? -Could someone easily guess it? -Does anyone else know it? When someone knows or can guess your password you could be in trouble. This allows them access to you. They could pretend to be you. - What sorts of dangers are involved with others knowing or guessing your password?

Group Activity In small groups – brainstorm some screen names and passwords that are not obvious and don’t reveal personal information. Be careful – don’t tell anyone your current password. If you currently have a screen name – discuss it. See if your classmates think it says too much about you.

Make sure you have a copy of the resource page to review: The FBI Internet Safety Tips i-SAFE’s 4’R’s RECOGNIZE REFUSE RESPOND REPORT

Let’s Brainstorm  Why do students feel safe on the Internet?  What are some dangers on the Internet?  What are some good things on the Internet?  How can you stay away from the dangerous things?

One-way to stay safe, is to not reveal any information about oneself online Never tell anyone: Your name Address Phone number Age Gender Family Names School Never give a stranger your picture These are all considered to be identifying or personal information.

I hope you learned something – I know I did! All right – let’s get into groups. Your teacher will divide you up for the next activity.

All right – Everyone in Groups? Good! Each group should have received a cause and effect sheet. I’m going to help you out and show you how to get started.

Here are the directions to get started  Brainstorm how each effect could have been avoided.  Brainstorm other possible effects of the person’s actions.  Present your information to the class.

So Get Started! Do your best on these cause and effect charts! Once you are finished, your group will present your chart to the rest of the class and discuss what you have learned.

Let’s Review! What have we learned about the following: Choosing a screen name? Choosing a password? Not revealing information? Consequences of actions?

What do you think? How are adults at risk on the Internet? List ways that adults use the Internet. How can issues such as screen name, password choice, and not revealing information online be important for parents/adults as well as children?

Create a Presentation Directions: As a class, run through the 5 slide presentation which begins with the next slide. The 5 Slide Presentation will be shown TWICE! Use the first time to become familiar with the slides and the information.

More Directions These slides are to educate your parents or others during a parent meeting or parent night on the topic of Internet Safety. What information do your parents need to know to protect both themselves and their children? Use what you have learned to tell others how to stay safe online.

Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites and material And some that parents also face, such as: Identity Theft Monetary theft

Predators Those who use Cyberspace to hunt for victims to take advantage of them. The Facts: There are predators online They use tools like chatrooms, Instant messaging, etc. to get close to kids. Sometimes a victim is a willing participant – and chooses to talk to a stranger.

Cyber Bullying Sending or posting harmful or cruel text or images using the Internet or other digital media source. The Facts: The Internet is a tool used to bully People feel removed from what they say online – they feel anonymous. Unexpected participants – anyone can join in. 1 in 5 youth will be faced with a hurtful or mean message while online.

Identity Theft The Facts: Posting personal information online makes it available for others to steal. With your personal information, someone can pretend to be you – use your credit card or bank account to buy things that you don’t know about. Personal information can also be stolen from you if you respond to s from strangers.

A Little Prevention… Prepare yourself - Many online problems can be avoided or dealt with safely. Keep in mind the 4 R’s RECOGNIZE REFUSE RESPOND REPORT

A Second Take… Now you are going to look at the slides again and write a “script” to coordinate with them. Think about what you need to say with each slide and what your parents need to know. Pick a person to write out the script. Practice the presentation so it flows smoothly for parent presentation.

Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites and material And some that parents also face, such as: Identity Theft Monetary theft

Predators Those who use Cyberspace to hunt for victims to take advantage of them. The Facts: There are predators online They use tools like chatrooms, Instant messaging, etc. to get close to kids. Sometimes a victim is a willing participant – and chooses to talk to a stranger.

Cyber Bullying Sending or posting harmful or cruel text or images using the Internet or other digital media source. The Facts: The Internet is a tool used to bully People feel removed from what they say online – they feel anonymous. Unexpected participants – anyone can join in. 1 in 5 youth will be faced with a hurtful or mean message while online.

Identity Theft The Facts: Posting personal information online makes it available for others to steal. With your personal information, someone can pretend to be you – use your credit card or bank account to buy things that you don’t know about. Personal information can also be stolen from you if you respond to s from strangers.

A Little Prevention… Prepare yourself - Many online problems can be avoided or dealt with safely. Keep in mind the 4 R’s RECOGNIZE REFUSE RESPOND REPORT

Now Use It! Keeping others informed on Internet Safety is important. How can you use the presentation you just helped create to reach others in your school, faculty, and in your community? You can host a Parent Night using the slideshow! You can even order materials at to help with the presentation.

Tier 2 Opportunity The activity you've completed is set up to be used as a Tier 2 Activity. You can easily use it to host a Parent Night, School Assembly or other event. Find out how by going to the Kids and Teens page at Submit a plan online for a tier 2 activity/event and become eligible for larger incentives.

So How Do you Know When You’re Done? Have you: 1. Completed your cause and effect chart? 2. Shared your chart with your class? 3. Discussed as a class what you have learned about screen names, passwords, and online safety? 4. Checked out the Contests and Incentives link at

It doesn’t have to end here! Find out about DRiVE!

Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at Visit the Kids and Teens section at to learn about the i-Mentor Training Network. It’s all online!

Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members. By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i- Parent Programs and Community Leaders Meetings.

1.Enroll online at by clicking on Create an Account. 2.Go to the Kids and Teens Section and Submit the Online Mentor Menu. 3.Receive your own Student Toolkit and materials to get started. Get the recognition you deserve as an i-SAFE Mentor Take Action