SlideShare une entreprise Scribd logo
1  sur  49
The BBI Digital Citizen
Students understand human, cultural,
and societal issues related to technology
and practice legal and ethical behaviour.

  advocate and practise safe, legal and responsible use of
 information and technology
  exhibit a positive attitude toward using technology that
 supports collaboration, learning and productivity
  demonstrate personal responsibility for life long learning
  exhibit leadership for digital citizenship
Teachers understand local and global societal issues
and responsibilities in an evolving digital culture
and exhibit legal and ethical behaviour in their
professional practices.
      advocate, model, and teach safe, legal, and ethical use of digital
      information and technology, including respect for copyright, intellectual
      property, and the appropriate documentation of sources.

      address the diverse needs of all learners by using learner-centered strategies
      providing equitable access to appropriate digital tools and resources.

      promote and model digital etiquette and responsible social interactions
      related to the use of technology and information.

      develop and model cultural understanding and global awareness by
      engaging with colleagues and students of other cultures using digital-age
      communication and collaboration tools.
Issues that need
to be considered
for school
management
for school
        management
general school policies and
procedures - passwords, systems,
for school
        management
general school policies and
procedures - passwords, systems,
AUPs
for school
         management
general school policies and
procedures - passwords, systems,
AUPs
filters
for school
         management
general school policies and
procedures - passwords, systems,
AUPs
filters
equity and access
for school
         management
general school policies and
procedures - passwords, systems,
AUPs
filters
equity and access
monitoring
for school
         management
general school policies and
procedures - passwords, systems,
AUPs
filters
equity and access
monitoring
wellness - furniture, lighting, etc
for school
         management
general school policies and
procedures - passwords, systems,
AUPs
filters
equity and access
monitoring
wellness - furniture, lighting, etc
virus protection, software updates,
backups
for school
         management
general school policies and
procedures - passwords, systems,
AUPs
filters
equity and access
monitoring
wellness - furniture, lighting, etc
virus protection, software updates,
backups
abuse/misuse
for teachers
for teachers
personal use and personal publishing
protocols
for teachers
personal use and personal publishing
protocols
 teach and model safe, legal and
responsible use
for teachers
personal use and personal publishing
protocols
 teach and model safe, legal and
responsible use
teach digital citizenship lessons -
digital footprint, lifeskills
for teachers
personal use and personal publishing
protocols
 teach and model safe, legal and
responsible use
teach digital citizenship lessons -
digital footprint, lifeskills
monitoring and feedback
for teachers
personal use and personal publishing
protocols
 teach and model safe, legal and
responsible use
teach digital citizenship lessons -
digital footprint, lifeskills
monitoring and feedback
classroom practices
for students
for students
 publishing digital work - privacy,
ownership
for students
 publishing digital work - privacy,
ownership
online identity management
and monitoring
for students
 publishing digital work - privacy,
ownership
online identity management
and monitoring
 copyright and plagiarism
for students
 publishing digital work - privacy,
ownership
online identity management
and monitoring
 copyright and plagiarism
 procedures to keep safe
for students
 publishing digital work - privacy,
ownership
online identity management
and monitoring
 copyright and plagiarism
 procedures to keep safe
 digital literacy
for students
 publishing digital work - privacy,
ownership
online identity management
and monitoring
 copyright and plagiarism
 procedures to keep safe
 digital literacy
 social networking
for students
 publishing digital work - privacy,
ownership
online identity management
and monitoring
 copyright and plagiarism
 procedures to keep safe
 digital literacy
 social networking
 cyberbullying
for students
 publishing digital work - privacy,
ownership
online identity management
and monitoring
 copyright and plagiarism
 procedures to keep safe
 digital literacy
 social networking
 cyberbullying
 downloading
for students
 publishing digital work - privacy,
ownership
online identity management
and monitoring
 copyright and plagiarism
 procedures to keep safe
 digital literacy
 social networking
 cyberbullying
 downloading
 privacy
for students
 publishing digital work - privacy,
ownership
online identity management
and monitoring
 copyright and plagiarism
 procedures to keep safe
 digital literacy
 social networking
 cyberbullying
 downloading
 privacy
change, deletion or manipulation of files
for parents/community
for parents/community
     AUP
for parents/community
     AUP
     rights and permissions
for parents/community
     AUP
     rights and permissions
     consultation
for parents/community
     AUP
     rights and permissions
     consultation
     complaints
Digital Citizenship in Bucklands Beach Intermediate

  Respect
    ◦ Attribution will be given to the owner for information sources. Creative Commons images
       and website will be used.
    ◦ Students and teachers will take all necessary care of equipment.
    ◦ Permission will be gained from the individuals being videoed/photographed and respect/
       responsibility will be given to the footage/photos they are taking.

  Effect
     ◦ Publishing work online -
          ■ The student owns the copy right of their own artistic and literary works
          ■ Students have the Right of Integrity ie protection from derogatory treatment of their work
          ■ Students have the Right to say 'no' to their work being published or to request its
             removal
          ■ When working on the internet, students will only be identified by first name and class or
             year (no School name, no personal details.)
     ◦ Students have had formal class lessons preceding the introduction of any new online
         environment.
         An adult will be available when students are online at school
     ◦ Students will disable or moderate comments on online work.
     ◦ All online accounts set up will be owned by the teacher or school (or in some cases the
         parent) , NOT by a student.

  Protect
     ◦ BBI will use a MOE approved filter for all online work.
     ◦ Social networking – any cyberbullying, uploading images without consent, report abuse to
        teacher/DP.
     ◦ Use appropriate avatars, usernames.
     ◦ If the student is uncomfortable or accidentally finds something inappropriate, they will close
        the computer and report it immediately to the teacher/DP.
1. Portray yourself as you want others
            to see you.

         2. Protect passwords. Do not share.

         3. The student owns the copy right of
            their own artistic and literary works.

         4. Disable or moderate comments on
            online work.

         5. All online accounts set up will be
            owned by the teacher or school (or
            in some cases the parent), NOT by a
effect      student.

         6. Students have the Right of Integrity
            ie protection from derogatory
            treatment of their work.

         7. Students have the Right to say 'no'
            to their work being published or to
            request its removal.

         8. If you have nothing nice to say,
            then say nothing.
            Don’t forward it, don’t visit it.

         9. Report any abuse you see.
1. Cite the source of images and
information. Give credit to owner.
Ask permission.

2. Request to use the software and
media others produce.

3. Show respect for self, others and   respect
ideas. Comments also tell the
world something about you.

4. Permission when publishing
images and information about other
people.

5. Care of equipment.
1. Do not give personal details about
   yourself, or your family. Don't publish a
   schedule of your activities

2. Know what to do if you find something
   inappropriate or even if it just doesn’t feel
   right.

3. Know what to do if cyberbullying takes
   place.

4. Protect yourself, others, and ideas.

5. Many sites are R13 – if you are allowed to
   use the site, your teacher will need to set up
   a class account for these sites.
                                                    protect
6. Facebook and other social networking sites
   require appropriate use. Do not post any
   information that you would not want your
   mother, grand parent or employer to see.
   Do not use electronic mediums to flame,
   bully,harass or stalk other people.

7. Use appropriate avatars and user names.
image
manipulation
phishing         life skills
scams
purchasing
online
impulse
buying
chatrooms
passwords
onselling and
lists
identity theft
The Acceptable Use of the Internet at Bucklands Beach Intermediate

Acceptable Use
Every student at Bucklands Beach Intermediate will keep a portfolio on the internet which will be
stored in a secure, passworded environment. The Internet has been provided to further supplement
the school’s information resource; therefore the uses of the Internet are to be focused on activities that
support learning and teaching.

Internet Safety and Protocols:
  • Work published to open internet sites will be labelled with first names only.
  • On open internet sites, personal or contact details will not be disclosed.
  • Students are responsible for their own personal passwords.
  • Appropriate language and content will be used to reflect quality work standards.
  • Only licensed software and web-based tools that are approved by BBI will be used.
  • Only sites and images appropriate to learning will be accessed.
  • Students’ work may be shared with others within an educational setting.


In accordance with school policy, students are expected to use the resources of BBI with respect, care
and responsibility.
Bucklands Beach Intermediate uses a Ministry of Education approved filtering system to block
inappropriate sites. Whilst the school takes all care, Bucklands Beach Intermediate School is not
responsible for the nature or the accuracy of information of the content of the sites browsed.

I have read and understand the Bucklands Beach Acceptable Use Policy

signed (parent/caregiver)

signed (student)
ciconline.org




  Digital Citizenship Programme

1. Online - privacy,         4. Digital Literacy
   ownership                 5. Downloading and
2. Online identity              sharing
   management and            6. Copyright and
   monitoring                   plagiarism
3. Procedures to keep safe
The classroom programme
                    1. Online - privacy, ownership
•   Students own the copy right of their own artistic and literary works.
•   Students have the Right of Integrity ie protection from derogatory
    treatment of their work.
•   Students have the Right to say 'no' to their work being published or to
    request its removal.
•   Students will only be identified by first name and class or year (no School
    name, no personal details.)
•   Students have had formal class lessons preceding the introduction of any
    new online environment.
    Students will disable comments on all online work.
•   All online accounts set up will be owned by the teacher or school (or in
    some cases the parent) , NOT by a student.
•   School protocol for websites and passwords
•   A supervising adult will be present when students are online at school
The classroom programme
    2. Online identity management
    and monitoring
    •   User names will be appropriate for young
        students and reflect a positive attitude.
    •   Passwords will be kept private. Students will
        not ask for or use others’ passwords.
    •   Avatars and images will be appropriate for
        young students.
    •   Google your name. What image is going out
        to the world?
    •   What you upload is there forever -
        comments and videos.
The classroom programme
       3. Procedures to keep safe
   •   When online, use only first name or
       nom-de-plume. Give no personal
       information, especially emails, addresses
       and ph numbers.
   •   Most social networking are R13. If you
       join you are lying and putting yourself in
       a dangerous situation.
   •   Don’t engage in comments that are
       negative or derogatory.
   •   Don’t trust anyone online - not everyone
       tells the truth.

                                                    http://lh5.ggpht.com
The classroom programme

4. Digital Literacy
  •   Be able to use advanced search techniques. Will give you a more
      accurate and refined result.
  •   Be able to critique other websites. Is it what it appears to be?
  •   Images are easily manipulated. Is what you see true?
The classroom programme

5. Downloading and sharing
  •   It is illegal to download many movies and games.
  •   If you didn’t pay for it, it is probably illegal.
  •   If you use others’ illegal software or downloads, you are just as guilty.
The classroom programme
 6. Copyright and plagiarism
   •   Everyone is entitled to protection of their
       intellectual property. You cannot steal
       others ideas, published works and creative
       works.
   •   You cannot change, delete or manipulate
       the work of others without their permission.
   •   Use Creative Commons and attribution.
Digital Citizens at BBI
Own device:               School device:

 Responsible for own      Book through the
device - lock up          wiki
security available
                          Responsible for
Will not be asked to      device - treat with
share                     care

Use daily                 Report any problems

Needs to be checked       Ensure return before
and logged initially      period ends

Only approved sites

No sharing of software,
games, etc

Responsible for
protecting the school
passwords

Contenu connexe

Tendances

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipnhokanson
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldProjectsByJen.com
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2MGSD
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety TalkOllie Bray
 
Internet safety
Internet safetyInternet safety
Internet safetymartdale
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schoolsPaul Chamberlain
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...Stevecd
 

Tendances (19)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social networking for schools
Social networking for schoolsSocial networking for schools
Social networking for schools
 
E safety training for staff who work with children and young people - Stephe...
E  safety training for staff who work with children and young people - Stephe...E  safety training for staff who work with children and young people - Stephe...
E safety training for staff who work with children and young people - Stephe...
 

En vedette (7)

La forma sí importa - Miguel Antezana
La forma sí importa - Miguel AntezanaLa forma sí importa - Miguel Antezana
La forma sí importa - Miguel Antezana
 
Volcanoes, Plankton and Salmon - Cohen Commission Excerpt
Volcanoes, Plankton and Salmon - Cohen Commission ExcerptVolcanoes, Plankton and Salmon - Cohen Commission Excerpt
Volcanoes, Plankton and Salmon - Cohen Commission Excerpt
 
7
77
7
 
Obama and Romney on Science, Innovation, Education, More
Obama and Romney on Science, Innovation, Education, MoreObama and Romney on Science, Innovation, Education, More
Obama and Romney on Science, Innovation, Education, More
 
Accessibility on the iPad
Accessibility on the iPadAccessibility on the iPad
Accessibility on the iPad
 
Why the Media Stumble Over the Environment
Why the Media Stumble Over the EnvironmentWhy the Media Stumble Over the Environment
Why the Media Stumble Over the Environment
 
Election Saw Big Wins for State and Local Conservation Projects
Election Saw Big Wins for State and Local Conservation ProjectsElection Saw Big Wins for State and Local Conservation Projects
Election Saw Big Wins for State and Local Conservation Projects
 

Similaire à Digital citizenship ss

Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]jsmarr11
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentationSarah Sell
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policyBadaiaEnglish
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policyjsmarr11
 
Staff training session
Staff training sessionStaff training session
Staff training sessionmander5208
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipAplus Admin
 
Tec207 -final presentation teaching online safety
Tec207 -final presentation teaching online safetyTec207 -final presentation teaching online safety
Tec207 -final presentation teaching online safetySarah Sell
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]Debbie Oliver
 
Internet Publication
Internet PublicationInternet Publication
Internet PublicationDré Davis
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying ResourcesAndy Jeter
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectjuliewltn
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2guest594ea
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 

Similaire à Digital citizenship ss (20)

Acceptable use policy[1]
Acceptable use policy[1]Acceptable use policy[1]
Acceptable use policy[1]
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policy
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Staff training session
Staff training sessionStaff training session
Staff training session
 
Responsible use policy
Responsible use policyResponsible use policy
Responsible use policy
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Tec207 -final presentation teaching online safety
Tec207 -final presentation teaching online safetyTec207 -final presentation teaching online safety
Tec207 -final presentation teaching online safety
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Lesson 3 ethical issues
Lesson 3   ethical issuesLesson 3   ethical issues
Lesson 3 ethical issues
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
TeacherTechEthics11/12
TeacherTechEthics11/12TeacherTechEthics11/12
TeacherTechEthics11/12
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 

Plus de Lenva Shearing

Writing pilot programme
Writing pilot programmeWriting pilot programme
Writing pilot programmeLenva Shearing
 
12 in 120 - A potpuri of little known Web 2.0 Tools
12 in 120 - A potpuri of little known Web 2.0 Tools12 in 120 - A potpuri of little known Web 2.0 Tools
12 in 120 - A potpuri of little known Web 2.0 ToolsLenva Shearing
 
Southern Steel Presentation
Southern Steel PresentationSouthern Steel Presentation
Southern Steel PresentationLenva Shearing
 
Are tests the best way to see if
Are tests the best way to see ifAre tests the best way to see if
Are tests the best way to see ifLenva Shearing
 
Daisypopculturepowerpointdoc4
Daisypopculturepowerpointdoc4Daisypopculturepowerpointdoc4
Daisypopculturepowerpointdoc4Lenva Shearing
 
Eportfolios - A Learning Space
Eportfolios - A Learning SpaceEportfolios - A Learning Space
Eportfolios - A Learning SpaceLenva Shearing
 
Aditya Owns A Microwave #3 F
Aditya Owns A Microwave #3 FAditya Owns A Microwave #3 F
Aditya Owns A Microwave #3 FLenva Shearing
 
Information Literacy: Finding Information
Information Literacy: Finding InformationInformation Literacy: Finding Information
Information Literacy: Finding InformationLenva Shearing
 
Inquiry in the Middle School
Inquiry in the Middle SchoolInquiry in the Middle School
Inquiry in the Middle SchoolLenva Shearing
 

Plus de Lenva Shearing (20)

Assessment
AssessmentAssessment
Assessment
 
Writing pilot programme
Writing pilot programmeWriting pilot programme
Writing pilot programme
 
12 in 120 - A potpuri of little known Web 2.0 Tools
12 in 120 - A potpuri of little known Web 2.0 Tools12 in 120 - A potpuri of little known Web 2.0 Tools
12 in 120 - A potpuri of little known Web 2.0 Tools
 
Persona powerpoint
Persona powerpointPersona powerpoint
Persona powerpoint
 
Andy warhol slideshow
Andy warhol slideshowAndy warhol slideshow
Andy warhol slideshow
 
E asttle
E asttleE asttle
E asttle
 
Southern Steel Presentation
Southern Steel PresentationSouthern Steel Presentation
Southern Steel Presentation
 
Southern Steel
Southern SteelSouthern Steel
Southern Steel
 
Are tests the best way to see if
Are tests the best way to see ifAre tests the best way to see if
Are tests the best way to see if
 
Seal inquiry
Seal inquirySeal inquiry
Seal inquiry
 
Daisypopculturepowerpointdoc4
Daisypopculturepowerpointdoc4Daisypopculturepowerpointdoc4
Daisypopculturepowerpointdoc4
 
Eportfolios - A Learning Space
Eportfolios - A Learning SpaceEportfolios - A Learning Space
Eportfolios - A Learning Space
 
Aditya Owns A Microwave #3 F
Aditya Owns A Microwave #3 FAditya Owns A Microwave #3 F
Aditya Owns A Microwave #3 F
 
Mauis Dolphin
Mauis DolphinMauis Dolphin
Mauis Dolphin
 
Photography
PhotographyPhotography
Photography
 
Information Literacy: Finding Information
Information Literacy: Finding InformationInformation Literacy: Finding Information
Information Literacy: Finding Information
 
Amazing Maths Trick
Amazing Maths TrickAmazing Maths Trick
Amazing Maths Trick
 
Pedagogy and ICT
Pedagogy and ICTPedagogy and ICT
Pedagogy and ICT
 
Inquiry in the Middle School
Inquiry in the Middle SchoolInquiry in the Middle School
Inquiry in the Middle School
 
Inquiry Learning
Inquiry LearningInquiry Learning
Inquiry Learning
 

Dernier

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 

Dernier (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 

Digital citizenship ss

  • 1. The BBI Digital Citizen
  • 2. Students understand human, cultural, and societal issues related to technology and practice legal and ethical behaviour. advocate and practise safe, legal and responsible use of information and technology exhibit a positive attitude toward using technology that supports collaboration, learning and productivity demonstrate personal responsibility for life long learning exhibit leadership for digital citizenship
  • 3. Teachers understand local and global societal issues and responsibilities in an evolving digital culture and exhibit legal and ethical behaviour in their professional practices. advocate, model, and teach safe, legal, and ethical use of digital information and technology, including respect for copyright, intellectual property, and the appropriate documentation of sources. address the diverse needs of all learners by using learner-centered strategies providing equitable access to appropriate digital tools and resources. promote and model digital etiquette and responsible social interactions related to the use of technology and information. develop and model cultural understanding and global awareness by engaging with colleagues and students of other cultures using digital-age communication and collaboration tools.
  • 4. Issues that need to be considered
  • 6. for school management general school policies and procedures - passwords, systems,
  • 7. for school management general school policies and procedures - passwords, systems, AUPs
  • 8. for school management general school policies and procedures - passwords, systems, AUPs filters
  • 9. for school management general school policies and procedures - passwords, systems, AUPs filters equity and access
  • 10. for school management general school policies and procedures - passwords, systems, AUPs filters equity and access monitoring
  • 11. for school management general school policies and procedures - passwords, systems, AUPs filters equity and access monitoring wellness - furniture, lighting, etc
  • 12. for school management general school policies and procedures - passwords, systems, AUPs filters equity and access monitoring wellness - furniture, lighting, etc virus protection, software updates, backups
  • 13. for school management general school policies and procedures - passwords, systems, AUPs filters equity and access monitoring wellness - furniture, lighting, etc virus protection, software updates, backups abuse/misuse
  • 15. for teachers personal use and personal publishing protocols
  • 16. for teachers personal use and personal publishing protocols teach and model safe, legal and responsible use
  • 17. for teachers personal use and personal publishing protocols teach and model safe, legal and responsible use teach digital citizenship lessons - digital footprint, lifeskills
  • 18. for teachers personal use and personal publishing protocols teach and model safe, legal and responsible use teach digital citizenship lessons - digital footprint, lifeskills monitoring and feedback
  • 19. for teachers personal use and personal publishing protocols teach and model safe, legal and responsible use teach digital citizenship lessons - digital footprint, lifeskills monitoring and feedback classroom practices
  • 21. for students publishing digital work - privacy, ownership
  • 22. for students publishing digital work - privacy, ownership online identity management and monitoring
  • 23. for students publishing digital work - privacy, ownership online identity management and monitoring copyright and plagiarism
  • 24. for students publishing digital work - privacy, ownership online identity management and monitoring copyright and plagiarism procedures to keep safe
  • 25. for students publishing digital work - privacy, ownership online identity management and monitoring copyright and plagiarism procedures to keep safe digital literacy
  • 26. for students publishing digital work - privacy, ownership online identity management and monitoring copyright and plagiarism procedures to keep safe digital literacy social networking
  • 27. for students publishing digital work - privacy, ownership online identity management and monitoring copyright and plagiarism procedures to keep safe digital literacy social networking cyberbullying
  • 28. for students publishing digital work - privacy, ownership online identity management and monitoring copyright and plagiarism procedures to keep safe digital literacy social networking cyberbullying downloading
  • 29. for students publishing digital work - privacy, ownership online identity management and monitoring copyright and plagiarism procedures to keep safe digital literacy social networking cyberbullying downloading privacy
  • 30. for students publishing digital work - privacy, ownership online identity management and monitoring copyright and plagiarism procedures to keep safe digital literacy social networking cyberbullying downloading privacy change, deletion or manipulation of files
  • 33. for parents/community AUP rights and permissions
  • 34. for parents/community AUP rights and permissions consultation
  • 35. for parents/community AUP rights and permissions consultation complaints
  • 36. Digital Citizenship in Bucklands Beach Intermediate Respect ◦ Attribution will be given to the owner for information sources. Creative Commons images and website will be used. ◦ Students and teachers will take all necessary care of equipment. ◦ Permission will be gained from the individuals being videoed/photographed and respect/ responsibility will be given to the footage/photos they are taking. Effect ◦ Publishing work online - ■ The student owns the copy right of their own artistic and literary works ■ Students have the Right of Integrity ie protection from derogatory treatment of their work ■ Students have the Right to say 'no' to their work being published or to request its removal ■ When working on the internet, students will only be identified by first name and class or year (no School name, no personal details.) ◦ Students have had formal class lessons preceding the introduction of any new online environment. An adult will be available when students are online at school ◦ Students will disable or moderate comments on online work. ◦ All online accounts set up will be owned by the teacher or school (or in some cases the parent) , NOT by a student. Protect ◦ BBI will use a MOE approved filter for all online work. ◦ Social networking – any cyberbullying, uploading images without consent, report abuse to teacher/DP. ◦ Use appropriate avatars, usernames. ◦ If the student is uncomfortable or accidentally finds something inappropriate, they will close the computer and report it immediately to the teacher/DP.
  • 37. 1. Portray yourself as you want others to see you. 2. Protect passwords. Do not share. 3. The student owns the copy right of their own artistic and literary works. 4. Disable or moderate comments on online work. 5. All online accounts set up will be owned by the teacher or school (or in some cases the parent), NOT by a effect student. 6. Students have the Right of Integrity ie protection from derogatory treatment of their work. 7. Students have the Right to say 'no' to their work being published or to request its removal. 8. If you have nothing nice to say, then say nothing. Don’t forward it, don’t visit it. 9. Report any abuse you see.
  • 38. 1. Cite the source of images and information. Give credit to owner. Ask permission. 2. Request to use the software and media others produce. 3. Show respect for self, others and respect ideas. Comments also tell the world something about you. 4. Permission when publishing images and information about other people. 5. Care of equipment.
  • 39. 1. Do not give personal details about yourself, or your family. Don't publish a schedule of your activities 2. Know what to do if you find something inappropriate or even if it just doesn’t feel right. 3. Know what to do if cyberbullying takes place. 4. Protect yourself, others, and ideas. 5. Many sites are R13 – if you are allowed to use the site, your teacher will need to set up a class account for these sites. protect 6. Facebook and other social networking sites require appropriate use. Do not post any information that you would not want your mother, grand parent or employer to see. Do not use electronic mediums to flame, bully,harass or stalk other people. 7. Use appropriate avatars and user names.
  • 40. image manipulation phishing life skills scams purchasing online impulse buying chatrooms passwords onselling and lists identity theft
  • 41. The Acceptable Use of the Internet at Bucklands Beach Intermediate Acceptable Use Every student at Bucklands Beach Intermediate will keep a portfolio on the internet which will be stored in a secure, passworded environment. The Internet has been provided to further supplement the school’s information resource; therefore the uses of the Internet are to be focused on activities that support learning and teaching. Internet Safety and Protocols: • Work published to open internet sites will be labelled with first names only. • On open internet sites, personal or contact details will not be disclosed. • Students are responsible for their own personal passwords. • Appropriate language and content will be used to reflect quality work standards. • Only licensed software and web-based tools that are approved by BBI will be used. • Only sites and images appropriate to learning will be accessed. • Students’ work may be shared with others within an educational setting. In accordance with school policy, students are expected to use the resources of BBI with respect, care and responsibility. Bucklands Beach Intermediate uses a Ministry of Education approved filtering system to block inappropriate sites. Whilst the school takes all care, Bucklands Beach Intermediate School is not responsible for the nature or the accuracy of information of the content of the sites browsed. I have read and understand the Bucklands Beach Acceptable Use Policy signed (parent/caregiver) signed (student)
  • 42. ciconline.org Digital Citizenship Programme 1. Online - privacy, 4. Digital Literacy ownership 5. Downloading and 2. Online identity sharing management and 6. Copyright and monitoring plagiarism 3. Procedures to keep safe
  • 43. The classroom programme 1. Online - privacy, ownership • Students own the copy right of their own artistic and literary works. • Students have the Right of Integrity ie protection from derogatory treatment of their work. • Students have the Right to say 'no' to their work being published or to request its removal. • Students will only be identified by first name and class or year (no School name, no personal details.) • Students have had formal class lessons preceding the introduction of any new online environment. Students will disable comments on all online work. • All online accounts set up will be owned by the teacher or school (or in some cases the parent) , NOT by a student. • School protocol for websites and passwords • A supervising adult will be present when students are online at school
  • 44. The classroom programme 2. Online identity management and monitoring • User names will be appropriate for young students and reflect a positive attitude. • Passwords will be kept private. Students will not ask for or use others’ passwords. • Avatars and images will be appropriate for young students. • Google your name. What image is going out to the world? • What you upload is there forever - comments and videos.
  • 45. The classroom programme 3. Procedures to keep safe • When online, use only first name or nom-de-plume. Give no personal information, especially emails, addresses and ph numbers. • Most social networking are R13. If you join you are lying and putting yourself in a dangerous situation. • Don’t engage in comments that are negative or derogatory. • Don’t trust anyone online - not everyone tells the truth. http://lh5.ggpht.com
  • 46. The classroom programme 4. Digital Literacy • Be able to use advanced search techniques. Will give you a more accurate and refined result. • Be able to critique other websites. Is it what it appears to be? • Images are easily manipulated. Is what you see true?
  • 47. The classroom programme 5. Downloading and sharing • It is illegal to download many movies and games. • If you didn’t pay for it, it is probably illegal. • If you use others’ illegal software or downloads, you are just as guilty.
  • 48. The classroom programme 6. Copyright and plagiarism • Everyone is entitled to protection of their intellectual property. You cannot steal others ideas, published works and creative works. • You cannot change, delete or manipulate the work of others without their permission. • Use Creative Commons and attribution.
  • 49. Digital Citizens at BBI Own device: School device: Responsible for own Book through the device - lock up wiki security available Responsible for Will not be asked to device - treat with share care Use daily Report any problems Needs to be checked Ensure return before and logged initially period ends Only approved sites No sharing of software, games, etc Responsible for protecting the school passwords

Notes de l'éditeur

  1. \n
  2. ISTE NETS (National Educational Technology Standards) for Teachers\n
  3. ISTE NETS (National Educational Technology Standards) for Teachers\n
  4. \n
  5. development of policies and procedures - published, discussed and circulated\n
  6. development of policies and procedures - published, discussed and circulated\n
  7. development of policies and procedures - published, discussed and circulated\n
  8. development of policies and procedures - published, discussed and circulated\n
  9. development of policies and procedures - published, discussed and circulated\n
  10. development of policies and procedures - published, discussed and circulated\n
  11. development of policies and procedures - published, discussed and circulated\n
  12. development of policies and procedures - published, discussed and circulated\n
  13. include scams, purchasing online, lifeskills\n\nManaging a digital footprint is not the same as a hidden or private profile. Who are you? What do you stand for? What are your passions and beliefs? The important lesson with managing your digital footprint is that everything we do online should represent who we are and what we stand for and we must have the knowledge that this representation will stick with us potentially forever.\n
  14. include scams, purchasing online, lifeskills\n\nManaging a digital footprint is not the same as a hidden or private profile. Who are you? What do you stand for? What are your passions and beliefs? The important lesson with managing your digital footprint is that everything we do online should represent who we are and what we stand for and we must have the knowledge that this representation will stick with us potentially forever.\n
  15. include scams, purchasing online, lifeskills\n\nManaging a digital footprint is not the same as a hidden or private profile. Who are you? What do you stand for? What are your passions and beliefs? The important lesson with managing your digital footprint is that everything we do online should represent who we are and what we stand for and we must have the knowledge that this representation will stick with us potentially forever.\n
  16. include scams, purchasing online, lifeskills\n\nManaging a digital footprint is not the same as a hidden or private profile. Who are you? What do you stand for? What are your passions and beliefs? The important lesson with managing your digital footprint is that everything we do online should represent who we are and what we stand for and we must have the knowledge that this representation will stick with us potentially forever.\n
  17. include scams, purchasing online, lifeskills\n\nManaging a digital footprint is not the same as a hidden or private profile. Who are you? What do you stand for? What are your passions and beliefs? The important lesson with managing your digital footprint is that everything we do online should represent who we are and what we stand for and we must have the knowledge that this representation will stick with us potentially forever.\n
  18. Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
  19. Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
  20. Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
  21. Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
  22. Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
  23. Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
  24. Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
  25. Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
  26. Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
  27. Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. Your digital footprint. Think about the information you are posting, what will it mean to an outsider viewing it? \n
  34. \n
  35. strict internet protocol\n - passwording\n\n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n