SlideShare une entreprise Scribd logo
1  sur  27
Staying Safe in Cyberspace ,[object Object],[object Object]
Table of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safety Rules HOME More Info. *Only use the Internet when there is an adult home. *Don’t answer email from strangers.  *Tell an adult when you feel unsafe.  *Keep passwords private.  *Don’t meet someone in person whom you met  online.  *Don’t send your picture to anyone online.  Even More Info.
Are you safety savvy? HOME BACK What are some ways you can stay safe on the Internet? a. Share your password with others.                 b. Don’t send your picture to anyone online.   c. Use the Internet when no one is home.
Let’s try again! HOME Keep your password private.  Others can hack into your accounts using your password.
Let’s try again! HOME Make sure there is an adult at home when using the Internet.  Who else will you tell if something goes wrong?
Correct! HOME Make sure you don’t send pictures to people over the Internet (even if you know them.)
Cyber Bullying HOME What is it?   *When a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones. How it Works:   *Direct attacks  *Using others as    accomplices Take Action!  Keep personal information private.  Stop, Block, and Tell.  Take 5! VIDEO
Are you safety savvy? HOME BACK What actions can you take to stop Cyper Bullying? a. Keep personal information   private.   b. Help spread the rumors. c. Text harmful information about   another person. True  or  False ?  Cyber bullying is talking with a friend over the Internet.
Let’s look at that again! HOME Simply talking with a friend over the Internet is not Cyber Bullying.
Let’s look at that again! HOME Helping to spread rumors is being an accomplice to the bullying.
Let’s look at that again! HOME Texting harmful information about another person is Cyber Bullying.
Great Thinking! HOME Cyber Bullying is when a child is tormented,  threatened, harassed, humiliated,  embarrassed, or targeted by another  child using the Internet or cell phones. Bullies could be a friend or just an acquaintance.
Great Thinking! HOME Make sure you keep your personal information private. Bullies could be a friend or just an acquaintance.
Email Safety HOME Email Dangers:  *Chain Letters  *Hoaxes, rumors and urban  legends  *Phishing  *Scams and fraud  *Spam  *Spoofing  *Viruses What are these? Safety Tips:  *Change password often  *Keep password private  *Log off when done  *Don’t reply to spam,  harassing, or  offensive email.  *Don’t forward chain letters  *Delete emails, UNREAD,  from people you  don’t know  *Use anti-virus programs  before opening  attachments. Even more Information!
Are you safety savvy? HOME BACK What are some email dangers?  a. Chain Letters                          b.  Phishing                               c.   Spam                                     d. All of the above
Not Quite! HOME Take another look at that list.
Way To Go! HOME Spam, Phishing, and Chain Letters can be dangerous. Watch Out  for these too:  * Hoaxes, rumors and urban legends  *Scams and fraud  *Spoofing    *Viruses
Netiquette HOME Respect  all other users! Be patient with newcomers. Be careful to not use rude or bad language online. Make a good impression. Do not TYPE IN ALL CAPITAL LETTERS. Don’t break any laws. Do to others as you would have them do to you. More     Info. Even More Info. What is it?   Internet etiquette or guidelines for proper  behavior on the Internet.
Are you safety savvy? HOME BACK What is an example of good Internet behavior? a. TYPE IN ALL CAPITAL LETTERS  b. Use rude or bad language              c. Do to others as you would have   	 them do to you.
Do you need a redo? HOME Typing in all capital letters makes people think you are yelling at them.  This is not good Internet behavior.
Do you need a redo? HOME Using rude or bad language anywhere, whether on the Internet or not is inappropriate behavior.  Many Internet providers will terminate your account if you use this type of language.
Absolutely! HOME Doing to others as you would like them to do to you is a rule you should use throughout your life.  This is wonderful Internet behavior to have.
Get Cybersmart with Phineas and Ferb HOME
Earn Your License to Surf the Web HOME “ Rules of the Road”
PA State Standards HOME Science and Technology and Engineering Education    3.4.B: Technology and Society    3.4.5.B1: Explain how the use of technology can have unintended  consequences. 3.4.D: Abilities for a Technological World  3.4.5.D3: Determine if the human use of a product or system creates  positive or negative results. National Educational Technology Standards 5. Digital Citizenship  Students understand human, cultural, and societal issues related to technology  and practice legal and ethical behavior. Students:      a. advocate and practice safe, legal, and responsible use of  information and technology.      c. demonstrate personal responsibility for lifelong learning.      d. exhibit leadership for digital citizenship.
Credits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],HOME

Contenu connexe

Tendances

Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital EtiquetteKATRUE01
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquetteguestc38192
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette EMCox02
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonEva Buyuksimkesyan
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquettedhabyahalk
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennisdensio123
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 

Tendances (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquette
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Uno Digital Etiquette
Uno Digital EtiquetteUno Digital Etiquette
Uno Digital Etiquette
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 

Similaire à Internet safety

The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Digital literacy
Digital literacyDigital literacy
Digital literacyAmanda lee
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Calebguestde489f
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Calebguestde489f
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2guest0e1ade
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2guest0e1ade
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 

Similaire à Internet safety (20)

The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Untitled Presentation.pdf
Untitled Presentation.pdfUntitled Presentation.pdf
Untitled Presentation.pdf
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 

Dernier

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Dernier (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Internet safety

  • 1.
  • 2.
  • 3. Safety Rules HOME More Info. *Only use the Internet when there is an adult home. *Don’t answer email from strangers. *Tell an adult when you feel unsafe. *Keep passwords private. *Don’t meet someone in person whom you met online. *Don’t send your picture to anyone online. Even More Info.
  • 4. Are you safety savvy? HOME BACK What are some ways you can stay safe on the Internet? a. Share your password with others. b. Don’t send your picture to anyone online. c. Use the Internet when no one is home.
  • 5. Let’s try again! HOME Keep your password private. Others can hack into your accounts using your password.
  • 6. Let’s try again! HOME Make sure there is an adult at home when using the Internet. Who else will you tell if something goes wrong?
  • 7. Correct! HOME Make sure you don’t send pictures to people over the Internet (even if you know them.)
  • 8. Cyber Bullying HOME What is it? *When a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones. How it Works: *Direct attacks *Using others as accomplices Take Action! Keep personal information private. Stop, Block, and Tell. Take 5! VIDEO
  • 9. Are you safety savvy? HOME BACK What actions can you take to stop Cyper Bullying? a. Keep personal information private. b. Help spread the rumors. c. Text harmful information about another person. True or False ? Cyber bullying is talking with a friend over the Internet.
  • 10. Let’s look at that again! HOME Simply talking with a friend over the Internet is not Cyber Bullying.
  • 11. Let’s look at that again! HOME Helping to spread rumors is being an accomplice to the bullying.
  • 12. Let’s look at that again! HOME Texting harmful information about another person is Cyber Bullying.
  • 13. Great Thinking! HOME Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones. Bullies could be a friend or just an acquaintance.
  • 14. Great Thinking! HOME Make sure you keep your personal information private. Bullies could be a friend or just an acquaintance.
  • 15. Email Safety HOME Email Dangers: *Chain Letters *Hoaxes, rumors and urban legends *Phishing *Scams and fraud *Spam *Spoofing *Viruses What are these? Safety Tips: *Change password often *Keep password private *Log off when done *Don’t reply to spam, harassing, or offensive email. *Don’t forward chain letters *Delete emails, UNREAD, from people you don’t know *Use anti-virus programs before opening attachments. Even more Information!
  • 16. Are you safety savvy? HOME BACK What are some email dangers? a. Chain Letters b. Phishing c. Spam d. All of the above
  • 17. Not Quite! HOME Take another look at that list.
  • 18. Way To Go! HOME Spam, Phishing, and Chain Letters can be dangerous. Watch Out for these too: * Hoaxes, rumors and urban legends *Scams and fraud *Spoofing *Viruses
  • 19. Netiquette HOME Respect all other users! Be patient with newcomers. Be careful to not use rude or bad language online. Make a good impression. Do not TYPE IN ALL CAPITAL LETTERS. Don’t break any laws. Do to others as you would have them do to you. More Info. Even More Info. What is it? Internet etiquette or guidelines for proper behavior on the Internet.
  • 20. Are you safety savvy? HOME BACK What is an example of good Internet behavior? a. TYPE IN ALL CAPITAL LETTERS b. Use rude or bad language c. Do to others as you would have them do to you.
  • 21. Do you need a redo? HOME Typing in all capital letters makes people think you are yelling at them. This is not good Internet behavior.
  • 22. Do you need a redo? HOME Using rude or bad language anywhere, whether on the Internet or not is inappropriate behavior. Many Internet providers will terminate your account if you use this type of language.
  • 23. Absolutely! HOME Doing to others as you would like them to do to you is a rule you should use throughout your life. This is wonderful Internet behavior to have.
  • 24. Get Cybersmart with Phineas and Ferb HOME
  • 25. Earn Your License to Surf the Web HOME “ Rules of the Road”
  • 26. PA State Standards HOME Science and Technology and Engineering Education 3.4.B: Technology and Society 3.4.5.B1: Explain how the use of technology can have unintended consequences. 3.4.D: Abilities for a Technological World 3.4.5.D3: Determine if the human use of a product or system creates positive or negative results. National Educational Technology Standards 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior. Students: a. advocate and practice safe, legal, and responsible use of information and technology. c. demonstrate personal responsibility for lifelong learning. d. exhibit leadership for digital citizenship.
  • 27.