Personal Safety Level 8. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.

Slides:



Advertisements
Similar presentations
Mayfield Intermediate
Advertisements

Personal Safety Unit - Level 6. Today you will be learning about personal safety when online. This unit consists of four mini lessons. The PPT covers.
Internet Online Safety How to have FUN and Stay in Control.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Internet Safety Review Focus: Community A Literacy-Based Teaching and Learning Activity Level 5.
Personal Safety Unit - Level 8. Today you will be learning about personal safety when online. This unit consists of four mini lessons. The PPT covers.
Personal Safety Unit - Level 7
INTERNET SAFETY FOR STUDENTS
Community Level 7. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Cyber Bullying Grade 3.
Cyber Bullying Level 7.
Internet Safety Family Sciences. Goals To increase student knowledge of Internet safety To aid the student in identifying dangers on the Internet To build.
Web Logs: A Positive Approach to Blogging. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Do you know how to keep yourself safe?
INTERNET SAFETY FOR STUDENTS
Cyber Bullying Level 8.
Intellectual Property
Intellectual Property Grade 5 Lesson 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned.
Safe Website Design. Hey Everybody My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE. i-SAFE is concerned with teaching you how to.
Computer Passwords.
Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.
Welcome to our E-Safety
Community Level 8. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Let’s Talk About Cyber Security
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Cyber Security Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Cyber Security Level 8. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Personal Safety Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Personal Safety Unit - Level 7
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Cyber Bullying Level 7. Hey It’s Me Again! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be.
Intellectual Property Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Internet Safety: 5 th Grade. The Internet What are some good things with using the Internet? What are some good things with using the Internet? What are.
Personal Safety Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Intellectual Property Grade 5 Lesson 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are.
Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Student Mentors Know the Rules of the Road Tell others about Internet safety Plan Internet Safety Activities and Events outside the classroom Teach i-SAFE.
Web Logs: A Positive Approach to Blogging. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are.
Cynthia Wynn- EDU 384 Important Internet Safety Rules.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Intellectual Property Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Safe Website Design. Hey Everybody My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE America. i- SAFE is concerned with teaching.
M M U U L L T T I I - - Q Q ! ! Multi- Q Introd uction I Safe’s Internet Safety Review Game M M U U L L T T I I - - Q Q ! ! Welcome to … Skip Rules.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
Predator Identification Internet Safety Awareness.
CHAT ROOMS What Makes Them Dangerous And How YOU Can Make Them Safe! MARY B. CONYERS PROTECT EVERYCHILD P. O. Box 749, Knightdale, NC
EHS Computer Network Review. Hey Everybody! My name is Tek. I ’ m going to be your guide today!
Internet Safety Review Focus: Personal Information A Literacy-Based Teaching and Learning Activity Level 8.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Copyright and Fair Use. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.
Community Level 8. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
Internet Safety Review Focus: Cyber Security A Literacy-Based Teaching and Learning Activity Level 6.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
1 BTW…..R U SAFE? Socializing Online Smiths Station Jr. High School Presented by: Bernice Howard.
Cyber Bullying Level 7. Hey It’s Me Again! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be.
Gosbecks E-Safety Guide
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
i-SAFE’s Internet Safety Review Game
Personal Safety Unit - Level 8
Web Logs: A Positive Approach to Blogging
Safe Website Design.
Presentation transcript:

Personal Safety Level 8

Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping you to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i- SAFE with others.

All right – Let’s talk Empowerment Remember - Empowerment means you own what you learn and can use it to teach others and make a difference.

So not only are you learning and sharing, you are getting rewarded for doing so! i-SAFE includes an empowerment activity in every lesson. By completing the activity you may be eligible for neat incentives and prizes. Check it out at – Click on the link to contests and Incentives. Empowerment is the Key to Learning!

In this lesson you will be learning about personal safety on the Internet. In addition you will be guided to complete a presentation about Internet safety as you learn – this is called a Tier 1 activity. The Plan

Procedures are included to help you take it a step further and turn this into a Tier 2 activity: hosting the i- SAFE Assembly Experience or the Student Assembly Training session. The Plan Go to to find about the contests and incentives you can earn by doing i-SAFE activities.

Survey Time Your teacher is going to provide you with a survey to take. When finished, discuss the results of the survey with your classmates.

True Story Read the true story provided by your teacher. Afterwards discuss it as a class. How and Why did this happen? What can we learn from this story about online relationships?

In this lesson we’re going to discuss how to be safe online! Follow along on the corresponding activity pages, and give examples of experiences you’ve had with online safety issues.

The Internet is not anonymous. When you sign on, others have access to you. Your address, screen name, and password serve as barriers between you and others. You need to maintain this barrier by not giving out private information. There are many out there who would like to know more for various reasons: They could want to harm you. They could want money They could use information to conduct their own business - either selling your info or using it in an illegal manner.

Private Information: This information should not be given out on the Internet to maintain your safety. Name Address SchoolFriends’ names Family namesAge Social Security NumberPhone number

Indirect Information Solicitation: Sometimes, while online, people want to find out more about you for illegal purposes. However, they go about it in different ways. They may trick you into giving out information. You may not even realize what you have told them. Indirect information about your school, activities, etc, could lead them to knowing where you live. Be aware of what you say at all times.

User Id/Screen name A User Id is a “nickname” you select to identify you in , chats, etc. DO NOT USE Personal Information such as: -Your real first name -Your real last name -Your location (i.e. hilliegirl, HaverhillGuy) -Your zip code -A suggestive name or word (i.e. sexyman42, hotbabygirl) -Pornographic or obscene words For added security, always opt NOT to add your name or nickname to any sort of member directory.

Password A Password is a series of letters, numbers or symbols used to log you into a computer system. Passwords are used to access , join chatrooms, etc. They are usually between 6 and 8 characters long. Password Security: Don’t tell anyone your password. Don't write your password down anywhere. When you decide on a password, make sure it can't be guessed. If you think there's even a chance someone else might know your password, change it. Make sure no one is standing near you when you enter your password

Watch out for… Dangers On the Web Inappropriate sites Inappropriate sites - There are some sites you should not go to. They can be pornographic, hate filled, or upsetting. When you accidentally come across a site you know you shouldn’t be in, close out of it quickly. If you still have trouble, try logging off completely or rebooting.

Watch out for… Dangers On the Web Faulty information sites Faulty information sites - Don’t trust everything you read without double- checking and checking references.

Watch out for… Dangers On the Web Private Information Private Information – Some websites ask you for private information before you can access their stuff. Make sure you ask your parents before giving anyone private information.

Watch out for… Dangers On the Web Your own website Your own website – Many teens now have their own websites. However, you have to be careful about what information you display.

Watch out for… Dangers in 1. is an online form of communication, typically between two people. Just like in regular mail, users write letters and send them electronically. 2. Spamming – many companies advertise via . They try to entice you to purchase items, visit inappropriate sites, etc. Delete these s. 3. Be careful when you reply to an . You are including your address and you don’t know where it will go from there.

Watch out for… Dangers in 4.Inappropriate, offensive, angry should be reported to your Internet provider. 5.Remember - the sender of an may not be someone you know – don’t send personal information, photographs, etc.

Watch out for… Dangers in Chatting Chats can result in revealing information you wouldn’t normally reveal. This can leave you open to online predators.

Here are Some Tips to Remember when Chatting 1.Keep online interaction online. Don’t agree to meet or phone people met online. 2.Don’t give out personal information. Be careful about indirectly saying too much – like school mascot, game times, etc. Eventually you will have said enough. 3.Keep your parents or guardians informed of online interaction. 4.Use Chat rooms that are moderated. 5.Be suspicious of someone who wants to be your friend and turns you against your parents, teachers or friends. 6.Private chats aren’t always private – when you meet offline friends online in a private chat room be careful. Others can often enter and lurk. 7.Try to choose a gender-neutral online screen name

Watch out for… Dangers in Newsgroups, Forums, and Bulletin Boards 1.The main thing to remember is to NOT include personal information in postings. Don’t reveal anything identifying about yourself. 2.Realize that by posting, you are making your e- mail address public. 3.Be careful not to participate in a group which might be illegal or hateful.

Resources for reporting incidents: Here is a general guideline for reporting Internet wrongdoing. 1.Call the local police and ask if they have a dept. affiliated with "Internet Crimes Against Children (ICAC). If they do, go through that dept. 2. Simultaneously, file a report with the Cybertips hotline: Reports can be made directly online by clicking on the Cybertipline at

The following are guidelines on proactive things you can do when you are bothered, harassed, or annoyed while online. Use these tips to make your online experience one that is more fun and safe too!

Junk /Spam: Delete without opening. Report to your Internet provider. Do not click unsubscribe as this identifies you as a real person.

Cyber stalking: Report this to the local police department and to your local provider, who can help you change your online ids to protect yourself.

Child Luring: If you feel you are in danger or someone you know is in danger of becoming a victim of a predator, notify a trusted adult immediately. Call your local police department.

I hope you learned something – I know I did!

Discussion Time oWho are most likely to be the most expert users of Cyberspace, children or adults? oWho are most vulnerable? (Peers, younger kids, siblings, parents?) oWho are the most qualified to get the message of personal safety out to others?

You can Make a Difference! The remainder of the lesson will enable you to make a presentation that may be used to teach others about what you know about online personal safety. Let’s Continue On…

i-SAFE mentorship - Using what you know to teach others! As participants in this lesson, you are already involved in this process. What do you think: Does a mentor have to be someone who likes to get up in front of people, put on events, etc? Many Mentors work behind the scenes – use their technology and/or Internet know-how to provide materials, technical assistance, etc. for outreach activities. You can go to the i-SAFE website at to enter your activity from this lesson in an ongoing contest. You can also order additional materials (videos, posters, etc.) to enhance the presentation activity or to put on the i-SAFE Assembly Experience.

Activity Time Ok – To get started on your presentation, we need to divide into groups. Your teacher will divide you up. (Or can be completed as one large group if desired) You may complete this activity with computers or without! Today we are going to do a jigsaw activity. Each group will contribute to the end product: a final presentation.

Here are the directions to get started Becoming Experts Each group will have a specific topic: Group 1 - User IDs/Passwords Group 2 - Private Information Group 3 - Online Interaction Group 4 - Consequences – possibilities for danger Group 5 - Resources Each group reads over the worksheet, discusses the issue with their group, creates corresponding slides or materials, and develops a script for the section. Later you will meet back as a class and put the final presentation together.

Presentations and Discussions The Groups should present their information to the class. If using PowerPoint slides, create one large class presentation. You can also do the same with any other props you created.

Tier 2 Opportunity The activities you've completed have prepared you to create a Tier 2 Activity. You can easily host a school assembly. Find out how at Go to the Kids and Teens section and find out about the I-mentor Training network. Submit a plan online for a tier 2 activity or event and become eligible for larger incentives. At isafe.org you’ll also find free materials you can order to help you host the event.

So How Do you Know When You’re Done? Have you: 1. Completed the survey? 2. Read the true life story? 3. Read the overview information? 4. Completed the group presentations? 5. Registered online and carried out the steps for your empowerment activity?

It doesn’t have to end here! Find out about DRiVE!

Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at Visit the Kids and Teens section at to learn about the i-Mentor Training Network. It’s all online!

Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members. By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i- Parent Programs and Community Leaders Meetings.

1.Enroll online at by clicking on Create an Account. 2.Go to the Kids and Teens Section and Submit the Online Mentor Menu. 3.Receive your own Student Toolkit and materials to get started. Get the recognition you deserve as an i-SAFE Mentor Take Action