Download presentation
Presentation is loading. Please wait.
Published byAubrie Cook Modified over 9 years ago
1
Personal Safety Level 8
2
Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping you to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i- SAFE with others.
3
All right – Let’s talk Empowerment Remember - Empowerment means you own what you learn and can use it to teach others and make a difference.
4
So not only are you learning and sharing, you are getting rewarded for doing so! i-SAFE includes an empowerment activity in every lesson. By completing the activity you may be eligible for neat incentives and prizes. Check it out at www.isafe.org – Click on the link to contests and Incentives.www.isafe.org Empowerment is the Key to Learning!
5
In this lesson you will be learning about personal safety on the Internet. In addition you will be guided to complete a presentation about Internet safety as you learn – this is called a Tier 1 activity. The Plan
6
Procedures are included to help you take it a step further and turn this into a Tier 2 activity: hosting the i- SAFE Assembly Experience or the Student Assembly Training session. The Plan Go to www.isafe.org to find about the contests and incentives you can earn by doing i-SAFE activities.www.isafe.org
7
Survey Time Your teacher is going to provide you with a survey to take. When finished, discuss the results of the survey with your classmates.
8
True Story Read the true story provided by your teacher. Afterwards discuss it as a class. How and Why did this happen? What can we learn from this story about online relationships?
9
In this lesson we’re going to discuss how to be safe online! Follow along on the corresponding activity pages, and give examples of experiences you’ve had with online safety issues.
10
The Internet is not anonymous. When you sign on, others have access to you. Your e-mail address, screen name, and password serve as barriers between you and others. You need to maintain this barrier by not giving out private information. There are many out there who would like to know more for various reasons: They could want to harm you. They could want money They could use information to conduct their own business - either selling your info or using it in an illegal manner.
11
Private Information: This information should not be given out on the Internet to maintain your safety. Name Address SchoolFriends’ names Family namesAge Social Security NumberPhone number
12
Indirect Information Solicitation: Sometimes, while online, people want to find out more about you for illegal purposes. However, they go about it in different ways. They may trick you into giving out information. You may not even realize what you have told them. Indirect information about your school, activities, etc, could lead them to knowing where you live. Be aware of what you say at all times.
13
User Id/Screen name A User Id is a “nickname” you select to identify you in e-mail, chats, etc. DO NOT USE Personal Information such as: -Your real first name -Your real last name -Your location (i.e. hilliegirl, HaverhillGuy) -Your zip code -A suggestive name or word (i.e. sexyman42, hotbabygirl) -Pornographic or obscene words For added security, always opt NOT to add your name or nickname to any sort of member directory.
14
Password A Password is a series of letters, numbers or symbols used to log you into a computer system. Passwords are used to access email, join chatrooms, etc. They are usually between 6 and 8 characters long. Password Security: Don’t tell anyone your password. Don't write your password down anywhere. When you decide on a password, make sure it can't be guessed. If you think there's even a chance someone else might know your password, change it. Make sure no one is standing near you when you enter your password
15
Watch out for… Dangers On the Web Inappropriate sites Inappropriate sites - There are some sites you should not go to. They can be pornographic, hate filled, or upsetting. When you accidentally come across a site you know you shouldn’t be in, close out of it quickly. If you still have trouble, try logging off completely or rebooting.
16
Watch out for… Dangers On the Web Faulty information sites Faulty information sites - Don’t trust everything you read without double- checking and checking references.
17
Watch out for… Dangers On the Web Private Information Private Information – Some websites ask you for private information before you can access their stuff. Make sure you ask your parents before giving anyone private information.
18
Watch out for… Dangers On the Web Your own website Your own website – Many teens now have their own websites. However, you have to be careful about what information you display.
19
Watch out for… Dangers in E-mail 1.E-mail is an online form of communication, typically between two people. Just like in regular mail, users write letters and send them electronically. 2. Spamming – many companies advertise via e-mail. They try to entice you to purchase items, visit inappropriate sites, etc. Delete these e-mails. 3. Be careful when you reply to an e-mail. You are including your e-mail address and you don’t know where it will go from there.
20
Watch out for… Dangers in Email 4.Inappropriate, offensive, angry e-mail should be reported to your Internet provider. 5.Remember - the sender of an e-mail may not be someone you know – don’t send personal information, photographs, etc.
21
Watch out for… Dangers in Chatting Chats can result in revealing information you wouldn’t normally reveal. This can leave you open to online predators.
22
Here are Some Tips to Remember when Chatting 1.Keep online interaction online. Don’t agree to meet or phone people met online. 2.Don’t give out personal information. Be careful about indirectly saying too much – like school mascot, game times, etc. Eventually you will have said enough. 3.Keep your parents or guardians informed of online interaction. 4.Use Chat rooms that are moderated. 5.Be suspicious of someone who wants to be your friend and turns you against your parents, teachers or friends. 6.Private chats aren’t always private – when you meet offline friends online in a private chat room be careful. Others can often enter and lurk. 7.Try to choose a gender-neutral online screen name
23
Watch out for… Dangers in Newsgroups, Forums, and Bulletin Boards 1.The main thing to remember is to NOT include personal information in postings. Don’t reveal anything identifying about yourself. 2.Realize that by posting, you are making your e- mail address public. 3.Be careful not to participate in a group which might be illegal or hateful.
24
Resources for reporting incidents: Here is a general guideline for reporting Internet wrongdoing. 1.Call the local police and ask if they have a dept. affiliated with "Internet Crimes Against Children (ICAC). If they do, go through that dept. 2. Simultaneously, file a report with the Cybertips hotline: 1-800-843-5678. Reports can be made directly online by clicking on the Cybertipline at http://www.missingkids.com/ http://www.missingkids.com/
25
The following are guidelines on proactive things you can do when you are bothered, harassed, or annoyed while online. Use these tips to make your online experience one that is more fun and safe too!
26
Junk E-mail/Spam: Delete without opening. Report to your Internet provider. Do not click unsubscribe as this identifies you as a real person.
27
Cyber stalking: Report this to the local police department and to your local provider, who can help you change your online ids to protect yourself.
28
Child Luring: If you feel you are in danger or someone you know is in danger of becoming a victim of a predator, notify a trusted adult immediately. Call your local police department.
29
I hope you learned something – I know I did!
30
Discussion Time oWho are most likely to be the most expert users of Cyberspace, children or adults? oWho are most vulnerable? (Peers, younger kids, siblings, parents?) oWho are the most qualified to get the message of personal safety out to others?
31
You can Make a Difference! The remainder of the lesson will enable you to make a presentation that may be used to teach others about what you know about online personal safety. Let’s Continue On…
32
i-SAFE mentorship - Using what you know to teach others! As participants in this lesson, you are already involved in this process. What do you think: Does a mentor have to be someone who likes to get up in front of people, put on events, etc? Many Mentors work behind the scenes – use their technology and/or Internet know-how to provide materials, technical assistance, etc. for outreach activities. You can go to the i-SAFE website at www.isafe.org to enter your activity from this lesson in an ongoing contest.www.isafe.org You can also order additional materials (videos, posters, etc.) to enhance the presentation activity or to put on the i-SAFE Assembly Experience.
33
Activity Time Ok – To get started on your presentation, we need to divide into groups. Your teacher will divide you up. (Or can be completed as one large group if desired) You may complete this activity with computers or without! Today we are going to do a jigsaw activity. Each group will contribute to the end product: a final presentation.
34
Here are the directions to get started Becoming Experts Each group will have a specific topic: Group 1 - User IDs/Passwords Group 2 - Private Information Group 3 - Online Interaction Group 4 - Consequences – possibilities for danger Group 5 - Resources Each group reads over the worksheet, discusses the issue with their group, creates corresponding slides or materials, and develops a script for the section. Later you will meet back as a class and put the final presentation together.
35
Presentations and Discussions The Groups should present their information to the class. If using PowerPoint slides, create one large class presentation. You can also do the same with any other props you created.
36
Tier 2 Opportunity The activities you've completed have prepared you to create a Tier 2 Activity. You can easily host a school assembly. Find out how at www.isafe.org. Go to the Kids and Teens section and find out about the I-mentor Training network. Submit a plan online for a tier 2 activity or event and become eligible for larger incentives. At isafe.org you’ll also find free materials you can order to help you host the event.
37
So How Do you Know When You’re Done? Have you: 1. Completed the survey? 2. Read the true life story? 3. Read the overview information? 4. Completed the group presentations? 5. Registered online and carried out the steps for your empowerment activity?
38
It doesn’t have to end here! Find out about DRiVE!
39
Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at www.isafe.org.www.isafe.org Visit the Kids and Teens section at www.isafe.org to learn about the i-Mentor Training Network.www.isafe.org It’s all online!
40
Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members. By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i- Parent Programs and Community Leaders Meetings.
41
www.isafe.org 1.Enroll online at www.isafe.org by clicking on Create an Account.www.isafe.org 2.Go to the Kids and Teens Section and Submit the Online Mentor Menu. 3.Receive your own Student Toolkit and materials to get started. Get the recognition you deserve as an i-SAFE Mentor Take Action
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.