1 Activity 5.3 – Statement 2, page 135 Lise Auffray Ray Reid and Lee Purves.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Computer Care. The Power Cord Dont drop your laptop.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Breaking Trust On The Internet
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Introducing K12Planet.com What is K12Planet.com? Who can access it? Is it secure? What do I need to use it? Can I control the information I see?
Computer Security!!! By Katie Sawyer 8P Viruses! Viruses are horrible things created by horrible people! They make your computer behave in a different.
e-safety and cyber bullying
S2 – COMMUNICATIONS UNIT
Identity Theft Both Offline And Online It’s Not New Just Easier…
Using Word Processing, Spreadsheet, and Database Software
Digital Citizenship Presentation Mr. E. Colston Note to Portfolio Reviewers: The following material is not my own creation, though it has been modified.
Computer Lab Rules No food or drink in the lab. That includes gum and candy. Obey all regular classroom rules. Treat the computer with respect: Please.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Social impacts of the use of it By: Mohamed Abdalla.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
INTERNET SAFETY Sergeant Karl Youngblood Barbara Burchard Information adapted from the
Online Safety
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
RULES FOR ONLINE SAFETY BY KYLE K AND JASON. CHECK WITH YOUR PARENTS FIRST ! Don’t ever agree to get together with someone you meet online without checking.
BUSINESS B1 Information Security.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Social Media. Topics 1. Inclusion Means Everywhere 2. What is Social Media? 3. Facebook 4. Twitter 5. Youtube 6. Instagram 7. Linked In 8. Staying Safe.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Lindsey Cunningham Education and Technology. What is Digital Citizenship? Digital Citizenship is the principle of teaching appropriate and responsible.
Privacy and Information Management ICT Guidelines.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
Review of Lesson One Material From Start To Finish Review.
INTERNET AND HOW TO USE IT SAFELY By: Josh Cooper.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Security Training USAID Information Security.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
HIPAA Pre-Clerkship Review Dr. Maryann Skrabal, Pharm.D., CDE.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
Grades 4-6 Be SAFE Online! Ceres Unified School District.
HOW TO BE SAFE ONLINE By :Sarah Quarles. The internet is a great tool when used with caution!  The internet is an amazing tool that connects people from.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
On-line Safety and Student . I understand there are certain rules I need to follow when I am online.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
INTERNET SAFETY Sergeant Karl Youngblood Barbara Burchard Information adapted from the
Digital Communication By: Kimmie LaRich. Digital Communication- is how we communicate with people all over the world Two main ways we communicate are.
Digital Citizenship Project Kimberly Robbins. “Advances in computer technology and the Internet have changed the way America works, learns, and communicates.
1 and Internet Safety The internet is a vastly growing research tool that offers insight to the world in which we live. Through the internet we are.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Julie Latham Digital Citizenship: An Informational Guide.
Acceptable Use of Internet & Technology and Netiquette for High School Students.
Internet Safety Provided by the Nebraska Attorney Generals Office.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Security and Ethics Safeguards and Codes of Conduct.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Acceptable Use Policy (Draft)
Network and Internet Security and Privacy
University of west Alabama Ed 505 Tasha Vaughn
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Network and Internet Security and Privacy
Presentation transcript:

1 Activity 5.3 – Statement 2, page 135 Lise Auffray Ray Reid and Lee Purves

2 Databases Databases can store and classify large amounts information in a central computer, allowing users to locate and/or change information quickly and efficiently, through use of keywords, given to describe a given search.

3 Questions for Thought and Discussion The increasing use of databases in our society, combined with pervasive use of the Internet, is making it very easy to get access to personal information about anyone. What implications arise regarding the safety and privacy of students in our schools? What is the teacher’s role in these privacy and security issues?

4 The Impact of Database in Education Databases are a permanent part of our culture! The power of knowledge and ease of access they provide does not come without dangers. Personal information about some, is easy for others to obtain, misuse and abuse. Easy access to information about people has long been recognized as a threat to personal privacy.

5 Personal Threat Each of our names is listed, along with much of our personal information, on literally dozens of databases. This information is shared among many information systems.

6 Canadian Law In Canada, the importance of protectiong personal information is recognized by law. Bill C-6, the Personal Information Protection and Electronic Documents Act, came into effect on January 1, 2001.

7 Teacher Responsibilities Teachers must recognize their responsibility to safeguard private student information and protect it from unauthorized access. This means keeping disks in secure places, keeping passwords secret, and even deleting information if parents or students request it. Imagine if all your student addresses and phone numbers got into the hands of people of ill intentions!

8 We must teach our students to … Never give out personal information to anyone. Not respond to pop-up ads that appear on their screens. Not share their passwords with others.

9 And … Never to open from someone whose name they don’t recognize. Not to respond to SPAM messages from anyone. Always to log off from a machine in a public computer room or even in the school computer lab, before leaving the room.

10 Privacy and Security Keeping these precautions in mind, do take advantage of the many unique capabilities offered by databases, and teach your students to do so.