Cyber Safety. Create a new folder and word document. Name both “cyber safety” Type your answer to the following question Based on your experiences on.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Claire Stabbert, Alexis Johnston, Kelly Gorcica, Kelly Hazzard, Amanda Henshaw MSTI 131 March 30, 2010.
Mayfield Intermediate
Are you being a safe and successful digital citizen? E-safety
Women’s Leadership Group – An Introduction
Bonnygate Primary School
lead ▪ learn ▪ protect ▪ engage e-Safety in the Home.
© 2010 i-SAFE Inc. an i-SAFE presentation. © 2010 i-SAFE Inc. Learning Goals YOU WILL: Understand the need for being safe in the cyber community - just.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Cyber bullying and internet safety Parents meeting: staying safe online.
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
Digital Citizenship L’école élémentaire Beachy Cove Elementary School January 2013.
Identifying Online Predators
Internet Safety Erik Carl ITC 525: Computers for Educators Summer II.
Information on Information. Overview Awareness  Social Networks  How information that is displayed or given can affect you  Predators and how to keep.
72% of all parents are concerned that other people could locate their child through their mobile phone using location based services.
Presentation By: Marche Levert Faith Bektas Brittany Pietras Introduction to Instructional Technology MSTI131 Nichole Heinsler March 23, 2010.
Concept: Internet Safety Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful.
Internet Safety Who should teach it? Everyone’s responsibility Everyone’s goal 1.
Are you being a safe and successful digital citizen?
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Virtual Safety Keeping you and your students safe in our virtual world.
Internet Safety Rules for Students
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
 Social Networking  Posting and watching videos on YouTube  Blogging  Chat Rooms  Visiting Wikis  Googeling virtually ANY subject.
How can you protect yourself from online identity theft?
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Private and Personal Information Common Sense Unit l – Lesson 2 (Cross-Curricular Categories) Privacy and Security Information Literacy.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
DIGITAL CITIZENSHIP BY MAYSAA Stage 2 WHAT IS DIGITAL CITIZENSHIP? 0 Digital Citizenship is safely connecting with groups on the internet. 0 It involves.
Internet Safety & Online Citizenship
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
Chat Room Safety How to keep your child safe!. Welcome Middle School Parents! You are about to begin your journey through Chat Room Safety! Pay close.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Online Safety Issues in Our School Topics of Discussion All about Acceptable Use Policies Significance of Signatures on an AUP What is included in an.
© 2008 i-SAFE Inc. an i-SAFE presentation. Examining Online Predators Have you ever heard the term “cyber” or “online predator” used? If so, where did.
How to stay safe on the internet! Mrs. Jessi Bailey April 6, 2013.
Computer Issues Acceptable Use Policy Online Safety Photo Permission Forms Rachel Gorsuch Stephanie Herbin Natalie Wu Acceptable Use Policy Online Safety.
Acceptable Use Policy By: Ashley Crehan Jessica Harmon Emily Edwards.
Topics AUP, Online Safety, and Permission By: Amy Mahon, Amy Lawrence, And Melissa Rafetto By: Amy Mahon, Amy Lawrence, And Melissa Rafetto.
Safety and Security Online: Private Information. Identify private information Recall that private information should not be given out in cyberspace.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Social, Legal, and Ethical Issues.  Social Networking Students face a certain amount of risk when engaging in social networking.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
MSTI 131 November 6, 2008 Meghan Hynes Katy Kincade Nichole Enos Brittany Hollenbeck Samantha Hook.
Safer Internet Day 2016 Let’s create a better internet together. What are the key messages we want the children to understand about safe online behaviour?
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
What Would You Do? The Risks of Behavior on the Internet.
Safe Social Networking: Parent Workshop Helping to keep your children safe online.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
KS2 E-Safety assembly How to be smart and keep safe online.
Digital Citizenship Our programme at Cashmere High School South Island Youth Librarians’ Conference Presentation by Saskia Hill is licensed under a Creative.
The term ‘digital technology’ is used to describe the use of digital resources to effectively find, analyse, create, communicate, and use information.
Data Privacy Request Janet Rash Intel Corporation Oregon Community Relations Manager October 3, 2008.
Social Media Smarts. Yep! That’s Me! I have had a cell phone since 5 th Grade I just got a cell phone this year I wish I had a cell phone I have an IPAD.
Welcome to the Year 4 Welcome Meeting
Safety on the Internet Claire Stabbert, Alexis Johnston, Kelly Gorcica, Kelly Hazzard, Amanda Henshaw MSTI 131 March 30, 2010.
Grade 10: Cyber Predators
Welcome to the Year 4 Welcome Meeting
Online Safety: Rights and Responsibilities
Safety on the Internet Claire Stabbert, Alexis Johnston, Kelly Gorcica, Kelly Hazzard, Amanda Henshaw MSTI 131 March 30, 2010.
STAYING SAFE WITH TECHNOLOLGY View the following presentation and try to click on the correct answers of the slides with questions.
Presentation transcript:

Cyber Safety

Create a new folder and word document. Name both “cyber safety” Type your answer to the following question Based on your experiences on the Internet, what are the types of information that legitimate websites ask for when you create an account? We will discuss your answers as a group in a few minutes

Go to my website and download this presentation to your laptop This will allow you to work at your own pace

Objectives Give examples of the kinds of information Web sites request before allowing visitors to participate in an online activity. Define identity theft. Distinguish between private identity information and personal information. Recall that private identity information should not be communicated in cyberspace without permission of a teacher, parent, or guardian.

Activity Divide into 5 groups – Yahoo – Facebook – Youtube – Hotmail – Skype

Activity look at the information required to sign up AND the Terms of Service and Privacy Policies for each group (that everyone usually agrees to accept) Record the answers to the following questions: – a. What is asked of me to create an account? – b. What information do students consider as “private”? – c. Are there any age requirements?

Activity When all groups are done we will get into jigsaw groups and discuss – d. common pieces of information requested – e. different pieces of information not asked in other websites Type answers to these questions in your word document.

Activity Put your name and date on the sheet that says “Private and Personal Information” Read the first page on your own In your groups discuss your response to the question, – “Am I giving out information that I should keep private?”

Activity it is often safe to give out some information, but you should always ask their parent or guardian before doing so. The latest research indicates that young adolescents can be the target of adults seeking offline sex, but the conventional wisdom that predators piece together private identity information in order to stalk young adolescents is unfounded. Researchers indicate that the riskiest behavior for teens is to engage in sexual talk or to share provocative photos with adults they meet online. This lesson tackles a broader reason for students not sharing private identity information—because of the risk of identity theft.

Activity Complete the back page of your worksheet.

Conclusion When you get to pages where you create an account, you should stop and consider whether providing the information requested will reveal private identity information.