Dawes Intermediate miDevice Student Guidelines & Internet Safety Procedures Revised from the iSafe program at www.isafe.org.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Internet Netiquette & Safety Next. Internet Netiquette & Safety Never use the Internet without adult supervision. –Food and drinks can damage the keyboard.
Internet Safety Tips: Viruses. Computer Virus When you have a virus, you feel sick, tired, and yucky. You dont feel like working or playing.
Developed by Technology Services 1:1 Laptop Initiative
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
The Internet.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
What you don’t know CAN hurt you!
This week is anti-bullying week.
Using internet and cell phones safely
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
“I think kids should stay safe in the internet by not giving out personal information”.Giving out personal information and giving your address could have.
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Information guide.
Student Technology Use. 1. I can share passwords with my parents and teachers.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Nick Stoneman Simon Moules.  I was a police officer  I was born on 7 th July 1970  I live at 167 Victoria Road, Rayleigh  I have three pets, a dog,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Internet Safety Dangers and Netiquette Trust No One You Don’t Know! A shark is a predator. Predators swim around looking for victims. The ocean is beautiful.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
DIGITAL CITIZENSHIP BY MAYSAA Stage 2 WHAT IS DIGITAL CITIZENSHIP? 0 Digital Citizenship is safely connecting with groups on the internet. 0 It involves.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Digital Citizenship Grade Create a map that shows all of the places your family goes online and with whom you connect With a parent, find three.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
TUA for Primary Students This presentation was created to help students in Preschool – Grade 2 understand our district’s Technology Use Agreement before.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Santa’s s By…….. Sending an attachment to Santa Explain how you attached the . Clicked The Paper Clip and attatched it. Explain why you.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Cassidy Culligan Digital Citizenship Project ED 505.
TECHNOLOGY USE AGREEMENT FOR STUDENTS GRADES 3-8 This presentation was created to help students understand the district’s Technology Use Agreement before.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cyber Safety. Privacy What is safe to talk about online?
E- safety Learn how to be safe on the computer! Reporting ALWAYS TELL A TRUSTED ADULT straight away if you are upset or worried about something that.
Safer Internet Day. What do you use the Internet for? watching TV shows watching online videos playing gamestalking to friends homeworkfinding out things.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Internet Safety for Elementary Students Revised from the iSafe program at
KS2 E-Safety assembly How to be smart and keep safe online.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Cyberbullying Internet Safety. What is Cyber-bullying? Cyber-bullying is repeatedly hurting someone else through the use of technology. So, instead of.
GUIDE TO INTERNET SAFETY A VISUAL WALKTHROUGH TO SAFE INTERNET BROWSING.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Gosbecks E-Safety Guide
Safer Internet Day.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
STOP. THINK. CONNECT. Online Safety Quiz.
Presentation transcript:

Dawes Intermediate miDevice Student Guidelines & Internet Safety Procedures Revised from the iSafe program at

miDevice Student Guidelines

You may bring a 7" or larger electronic device to school. It must be able to access the internet. Devices must be labeled with your first and last name. You, the owner, are the only one allowed to use your device. You are allowed to bring only one device to school.

Your device must be charged at home. You will not be able to charge your device at school. Teachers will not correct any problems with your device. You may not load apps at school. All apps must be loaded on the device at home. You must take your device home each day.

miDevice Zones

RED ZONE DEVICES ARE NOT ALLOWED Bathrooms Cafeteria

miDevice Zones YELLOW ZONE DEVICES ARE NOT SEEN OR HEARD ClassroomPE CarpoolCafeteria HallMedia Center

miDevice Zones GREEN ZONE Devices are used under the direction of the teacher for educational purpose.

Internet Safety Procedures

Who likes riding a bike? Learning to ride a bike requires a lot of training, practice and education to stay safe…. Everyone needs to be taught to drive safely and…… to use the internet!

Keeping your equipment safe! Just like you have to take care of your bike … You need to take care of your device. Remember: *Be careful with food or drink around your device *Log in and Out (just like you have to get your bike ready and put it away.)

Night Riding – Online Predators Just like you can’t see everywhere at night and what is ahead …. You can’t see who is on the other end of the computer or device. And just like night riding …. Things/people aren’t how they seem! So…. Don’t Give out personal information Send photos to someone without parent’s permission. Agree to meet someone. If you hit something in the dark …… Tell an adult right away!

Road Rage - Cyberbullying Have you ever seen someone riding their bike in an unsafe manner? Well, people can be mean and nasty online too! Remember: Cyberbullying just like road rage can be turned in to the police! Don’t: *Reply mean things back to a bully. *Agree to meet a bully. Do: *Close out of or instant message *Tell an adult right away!

Riding Double - Downloading Have you ever seen anyone riding on the handlebars of someone’s bike? This happens on the internet, too. People download music and movies without paying for them. Artists work very hard and that is their job! Paying for this is the way they get paid. Downloading for free is “stealing”. Don’t: Download free movies and music online Do: Download them from a site that you pay to use.

Rough Road! - Spam Just like on the road you can run into bumpy sidewalks/stone or gravel – which slows you down. Spam can junk up your device and slow it way down! Don’t: * Click on pop up ads. * Answer an from someone you don’t know. * Don’t give out personal information.

Flat Tire/Broken Chain - Viruses Sometimes your bike gets a flat tire – or your chain breaks! A computer or device can get viruses and then it won’t work either…. Don’t: *Open attachments from someone you don’t know. * Keep antivirus and antispyware up to date. Do: * Delete s from people you don’t know.

Wanna Win a Free Bike?- Scams Everyone would like a shiny new bike! The internet is becoming the easiest place to purchase items. More and more “scams” are appearing. Don’t: * Give out personal information * Click on pop-up ads. * Click on free offers.

Dude – Where’s My Bike? – Stolen Identity Sometimes bikes get stolen. If you don’t protect your bike or use a chain and lock when you leave it – it could get stolen! Don’t give out personal information on sites that you are not sure of. Only use secure sites when entering information. Protect your passwords.

Bicycle Built for Two - Plagiarism You wouldn’t want to be on a bicycle built for two and you do all the peddling and work – you have to give credit when you use things from the internet. Plagiarism is copying and pasting off the internet and not giving credit for it and claiming it as your own. Remember: Teachers look for copied work!