Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.

Slides:



Advertisements
Similar presentations
Cyber Safety By Georgia & Emily. The Internet Dos Remember to share guidelines with your students. If you are going to put names on the web make up nicknames.
Advertisements

Internet Safety Rockingham County Public Schools
How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
Breaking Trust On The Internet
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
Internet Safety/Cyber Ethics
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Company LOGO Internet Safety A Community Approach.
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Safeguarding. Your responsibility Your responsibility.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Digital Citizenship Project
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Staying Safe in Cyberspace Jessica Kohler ITC 525 Jessica Kohler ITC 525.
Internet Safety A User-Guide for Students!. PURPOSE: To review with you current trends and information on the Internet Internet access is central to everyday.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
E-Safety Challenge College. Learning Objectives Understanding the definition of ‘cyber’ bullying and the affect it can have on the victim.
IT security By Tilly Gerlack.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Cyber Bullying By Mrs. Giambri. What is Cyber Bullying? What is Cyber Bullying? ( What is Cyber Bullying? Cyber bullying.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
By: Jithin and Rey.  Cyber bullying is a form of bullying, which is carried out through an internet service such as , chat room, discussion group,
Berkeley Unified School District Cyber Savvy social networking and netiquette.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Squalicum High School Computer Network Student Use Guidelines.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Acceptable Use of Internet & Technology and Netiquette for High School Students.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Digital access is the equal chance for every country to be able access digital technology. Every person in the world should be able to have access to.
Cyber Time Fifth Grade. Personal Information Can Share: o Favorite Food o Favorite Color o Dislikes o State/Country Don’t Share: o Address o o.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
WHEN SHARING IS NOT CARING: INTERNET ETHICS By Baikgopodi “Bai” Ditiso Presented at CLTD– 09 May 2016.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
To Know what Cyber crime is
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Online Safety! By: Michelle Deng.
A POWERPOINT MADE TO KEEP YOU SAFE ONLINE!
Appropriate Use of Technology
Cyber Safety By: Lindsey C..
Follow safety rules so that YOU: Avoid getting HURT.
Rules To Help You Navigate the Internet Safely
CyberBullying.
Presentation transcript:

Internet Guidelines

Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like any community, there are also some people and areas that you need to avoid and others that you should approach with caution. If you know the dangers you can take advantage of all the positive aspects of the Internet while avoiding most of its pitfalls. (

Guideline 1: Do not give out personal information for predators or identity thieves to access. Address Phone number School name or location Credit card number Pictures

Guideline 2: Do not get together with someone you meet online. Chat room and game players acquaintances are not friends. You don’t know for certain who they are.

Guideline 3: Do not give out your passwords or use someone else’s password. If someone has forgotten to log off, please log them off and don’t go into any of their files.

Guideline 4: Do not download or install from Internet or open attachments or links. Don’t open if you don’t know who sent it to you, you could spread a virus. It would be best to delete the message. It is possible to get a virus from someone you know. It is best to purchase a virus scanning software program and update often. Avoid pop-up advertisements.

Phishing (guideline #4) phishing is an (or phone call) claiming to be an organization, but it is phony. They are looking to get your personal information. Things like account numbers, social security number, passwords, etc.

Guideline #5 Do not send or display offensive or inappropriate messages or pictures. Cyber bullying is using , instant messaging, chat rooms, cell phones, or other technology to harass, threaten, torment, or intimidate someone. Harassment is illegal. Respect others. Social networking sites Keep settings on private. Add only people you know in real life to your friend’s list.

Guideline 6: Do not damage computers, computer systems, or computer networks. Hacking is illegal. Do not use proxy servers to get around blocked web sites.

Reporting Internet Crime Call your Internet provider. Call local law enforcement. Go to Call

Quiz (handout) Read each question and write your answer using paragraph form. Use complete sentences. Read the additional information for each question.

Poster Design a poster to display good Internet ethics. Example: Don’t give out personal information; they’ll track down your location. Don’t be a computer hacker, be a virus cracker. Be creative.