Oswego School District 308 Ethics and Internet Safety Review Plank Jr. High – AA&M Class Mr. Brown.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
WORD STUDY  SPAM”. Online Ethics, Safety, and Privacy Module 6.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Copyright Law & Your Websites Computer Science 201 November 21, 2005 Sarah Garner, J.D., M.L.I.S. Law Library Director,
INTERNET SAFETY FOR STUDENTS
Internet Safety/Cyber Ethics
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
VISD Acceptable Use Policy
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
INTERNET SAFETY FOR STUDENTS
Introduction Online gaming Webcams and videos File sharing , IM, and chat rooms Social networking.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Oswego School District 308 Internet Safety and Ethics Review Plank Jr. High – Tech 6 Mr. Brown.
Computer Ethics for Computer Users
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Lindsey Cunningham Education and Technology. What is Digital Citizenship? Digital Citizenship is the principle of teaching appropriate and responsible.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Student Technology Code of Ethics
By Cheryl Costantino, M.A. June  Teachers, students and parents have responsibilities when it comes to the use of technology.  There are national.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
By: Elizabeth Scruggs Digital Citizenship Project.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Intellectual Property Basics
SAFE AND ETHICAL USE OF TECHNOLOGY By Dorreth Bailey-Oldacre 12/14/14 Professor: Dr. Barbara Gruber, PhD, CETL.
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Cassidy Culligan Digital Citizenship Project ED 505.
Digital Citizenship Laura Locke ED 505. Netiquette on Social Media Sites  Netiquette is simply defined as “network etiquette.
THE SAFE AND ETHICAL USE OF TECHNOLOGY IN SCHOOLS PRESENTED BY JESSICA CHAIDEZ TECH 503.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Oswego School District 308 Internet Safety and Ethics Review Plank Jr. High – Tech 6 Mr. Brown.
Oswego School District 308 Ethics and Internet Safety Review Plank Jr. High – AA&M Mr. Brown.
Society & Computers PowerPoint
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
JOHN MARSHALL COMMUNITY SCHOOL Media Center Mrs. Shepard Updated 2/8/14.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Marion County Public Schools Acceptable Use Guidelines for Network Access.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
DIGITAL CITIZENSHIP ED 505 TECHNOLOGY AND EDUCATION (REVISION)
Safety.
DIGITAL CITIZENSHIP What You Should Know!.
Safe and Ethical Use of Technology
Digital Citizenship By: John Beverly.
Remember the rules of online safety.
Working to Keep our Children Safe in a World Filled with Technology
The Issues with Technology in education
Student User Agreement and Policy 2022
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Oswego School District 308 Ethics and Internet Safety Review Plank Jr. High – AA&M Class Mr. Brown

What are Ethics? _______________ that you should follow when using computers, social media, , and the Internet. For example: –U.S. and International Copyright Laws –Oswego School District – ______________________ – – Terms of Use and Privacy Policywww.google.com – – Terms of Use and Privacy Policywww.facebook.com 1 2

1. Using Computers/Internet at ______ or at Work 2. Using Computers/Internet at ______ through an ISP (__________________) 3. Using Computers/Internet at ____________ (e.g., Library, Starbucks, etc.) 4. Downloading/Using ________________ Artistic Material 5. Downloading/Using copyright protected __________ 6. Using Internet Content on _______________ Common Situations:

Don’t give out your ___________ to anyone Create a __________________ Computer Network Guidelines (Student Planner p. 19) _________________: –Blocks certain web sites (for example, pandora.com, etc.) –Blocks obscene language –Tracks all Internet usage by Student ID and Computer # –Can ________ a specific students use –Will slow down the speed of the Internet –DO NOT Attempt to get around it via _____________ Don’t send personal messages with your school account, use your personal account #1 Using Computers/Internet at School or at Work

Internet Use Agreement – should have with your parents / guardian ISP Safety Options - Available through most ISPs (Comcast, etc.) Use ______________________ Use Operating System Protections like the Windows ________ –Make sure it’s turned “On”. Check it regularly! –Make sure “Automatic Updates” are turned On Use _______ and ________ Protection - Prevent hackers from taking over or ruining your computer –Don’t use the cheap or free stuff… –Make sure “Automatic Updates” are turned On Use an External Hard Drive to ____________________________ Use Internet Explorer – Privacy and Security Settings. Avoid s from unknown Addresses known as “______” –They may contain viruses or spyware –______________, put them in the Junk or SPAM folder Beware of _______ scams TURN YOUR COMPUTER ____ WHEN NOT USING IT!!! Wireless Network Protections - If you have a home wireless network, make sure it’s _____________. Don’t use a neighbors unsecure network. That’s against the law! #2 Using Computers/Internet at Home thru an ISP

Use _______________ on Social Networking Websites – Facebook, Twitter, and Xbox Live Don’t Give Out PII Online (_______________________________) –Name, phone #, address, date of birth, social security #, school, picture, parent’s name, parent’s credit card # –You risking “Identity Theft” Don’t Give Out Other People’s PII ________________ or Login ID’s – pick ones that don’t disclose too much of your PII (for example, guitarman3025, lovetosing1818, etc.) Beware of ______________ (P2P), File Sharing, or Rogue Websites (like ) - you’re being tracked for copyright abuses and you can get computer viruses or spyware from themwww.limewire.com Use Proper ___________ – Don’t response or send , IM, or BLOG messages when you’re angry. It’s permanent and can’t be taken back. Tell a Trusted Adult (Parent/Guardian/Teacher/Police Officer) – If you or someone you know encounters something inappropriate You’re _______________ – Your IP Address can be tracked NEVER MEET A STRANGER YOU MET ONLINE FACE-TO-FACE!!! THEY’RE PROBABLY NOT WHO THEY SAY THEY ARE… #2 Using Computers/Internet at Home thru an ISP (cont.)

#3 Using Computers/Internet at other Public Locations For example, Public Library, Starbucks, Airport, etc. ____________________ (Public Library) Your Internet Use is still being tracked several ways Don’t leave your computer ______________! Use Windows Password Protection 32 31

#4 Downloading/Using copyright protected Artistic Material Can you name examples of the types of artistic material that can be downloaded? –Music –Motion Pictures and TV Shows –Pictures or Graphics –Video games –Books, Poems, Web Sites, and BLOGs –Screen Plays Do you know how long artistic material is protected by U.S. copyright laws? –_________________ 33

#4 Downloading/Using copyright protected Artistic Material (cont.) Private ownership (protected by copyright law): If you want to use it in a commercial way, you must ask the owner for permission and may have to pay a _________. ____________ (not protected by copyright law, free for use): Artist work that no person or legal entity has ownership. It is considered part of the common cultural heritage, anyone may use for commercial or non-commercial purposes without paying a royalty fee. ____________ (Allows some copying and use for Education): The Copyright Act of 1976 permits some duplication of protected material without permission or payment of a royalty fee to the copyright owner. The factors include: 1.Use is for educational purposes; 2.Amount being used depends on the medium (i.e., printed material and graphics are different then Music and Videos) 3.Impact on market value of the copyrighted work 4.MUST CITE YOUR SOURCE VIA WORKS CITED (See School District 308 – Writing Style Guide)

#5 Downloading/Using copyright protected ________________ Private ownership: Software that is owned by someone or company (protected by copyright law) –Individually licensed: Purchased by one person for use on one or and only one computer (sometimes more than 1) –______ licensed: Purchased by an organization for use on an limited or unlimited number of computers within the entire organization. Public domain: Software legal to copy and distribute –________: programs that are legal and ethical to download, made to be used for free (e.g., Facebook and Gaggle) –Free Trial Evaluation Copies: Usually end after ________

#6 Using Internet Content on School Assignments For example, web site facts, pictures, music, videos, etc. Falls under the “Fair Use” rules, so it’s OK to do You MUST cite your sources even if it’s part of the Public Domain (see School District 308 – Writing Style Guide) __________: The adoption or reproduction of ideas, words, or statements of another person without a work cited: –Plagiarizing or copying material without citing your sources is unethical –At Plank Jr. High, it will result in a zero on assignments –In high school, you will get suspended from school and a zero on the assignment –In college, you will get expelled from school and it will ruin your academic reputation Not all information obtained on the Internet can be _______ 41 42

Ethics and Internet Safety Final Assessment – Activity Activity rules: 1.Must use a PENCIL only. Ink is not O.K. 2.1 st read and complete the Ethics and Internet Safety situations on your own (5 minutes). DO NOT COMPLETE #13 3.Then we’ll get into small groups. Mr. Brown will group you. 4.While in your group (5 to 10 minutes) –Take turns having someone read aloud each situation. –Discuss in your group whether it is appropriate or inappropriate. –If while in your group, you change your mind, you can change your answer on your assessment. –When finished, select a group spokesperson. This person can optionally complete #13. All other group members must complete #13 following the whole classroom discussion. 5.We’ll conclude with a whole class discussion. Each group will take turns leading the discussion. The group spokesperson will read aloud the situation and their group response.