2. Students understand human, cultural,
and societal issues related to technology
and practice legal and ethical behaviour.
advocate and practise safe, legal and responsible use of
information and technology
exhibit a positive attitude toward using technology that
supports collaboration, learning and productivity
demonstrate personal responsibility for life long learning
exhibit leadership for digital citizenship
3. Teachers understand local and global societal issues
and responsibilities in an evolving digital culture
and exhibit legal and ethical behaviour in their
professional practices.
advocate, model, and teach safe, legal, and ethical use of digital
information and technology, including respect for copyright, intellectual
property, and the appropriate documentation of sources.
address the diverse needs of all learners by using learner-centered strategies
providing equitable access to appropriate digital tools and resources.
promote and model digital etiquette and responsible social interactions
related to the use of technology and information.
develop and model cultural understanding and global awareness by
engaging with colleagues and students of other cultures using digital-age
communication and collaboration tools.
6. for school
management
general school policies and
procedures - passwords, systems,
7. for school
management
general school policies and
procedures - passwords, systems,
AUPs
8. for school
management
general school policies and
procedures - passwords, systems,
AUPs
filters
9. for school
management
general school policies and
procedures - passwords, systems,
AUPs
filters
equity and access
10. for school
management
general school policies and
procedures - passwords, systems,
AUPs
filters
equity and access
monitoring
11. for school
management
general school policies and
procedures - passwords, systems,
AUPs
filters
equity and access
monitoring
wellness - furniture, lighting, etc
12. for school
management
general school policies and
procedures - passwords, systems,
AUPs
filters
equity and access
monitoring
wellness - furniture, lighting, etc
virus protection, software updates,
backups
13. for school
management
general school policies and
procedures - passwords, systems,
AUPs
filters
equity and access
monitoring
wellness - furniture, lighting, etc
virus protection, software updates,
backups
abuse/misuse
16. for teachers
personal use and personal publishing
protocols
teach and model safe, legal and
responsible use
17. for teachers
personal use and personal publishing
protocols
teach and model safe, legal and
responsible use
teach digital citizenship lessons -
digital footprint, lifeskills
18. for teachers
personal use and personal publishing
protocols
teach and model safe, legal and
responsible use
teach digital citizenship lessons -
digital footprint, lifeskills
monitoring and feedback
19. for teachers
personal use and personal publishing
protocols
teach and model safe, legal and
responsible use
teach digital citizenship lessons -
digital footprint, lifeskills
monitoring and feedback
classroom practices
22. for students
publishing digital work - privacy,
ownership
online identity management
and monitoring
23. for students
publishing digital work - privacy,
ownership
online identity management
and monitoring
copyright and plagiarism
24. for students
publishing digital work - privacy,
ownership
online identity management
and monitoring
copyright and plagiarism
procedures to keep safe
25. for students
publishing digital work - privacy,
ownership
online identity management
and monitoring
copyright and plagiarism
procedures to keep safe
digital literacy
26. for students
publishing digital work - privacy,
ownership
online identity management
and monitoring
copyright and plagiarism
procedures to keep safe
digital literacy
social networking
27. for students
publishing digital work - privacy,
ownership
online identity management
and monitoring
copyright and plagiarism
procedures to keep safe
digital literacy
social networking
cyberbullying
28. for students
publishing digital work - privacy,
ownership
online identity management
and monitoring
copyright and plagiarism
procedures to keep safe
digital literacy
social networking
cyberbullying
downloading
29. for students
publishing digital work - privacy,
ownership
online identity management
and monitoring
copyright and plagiarism
procedures to keep safe
digital literacy
social networking
cyberbullying
downloading
privacy
30. for students
publishing digital work - privacy,
ownership
online identity management
and monitoring
copyright and plagiarism
procedures to keep safe
digital literacy
social networking
cyberbullying
downloading
privacy
change, deletion or manipulation of files
36. Digital Citizenship in Bucklands Beach Intermediate
Respect
◦ Attribution will be given to the owner for information sources. Creative Commons images
and website will be used.
◦ Students and teachers will take all necessary care of equipment.
◦ Permission will be gained from the individuals being videoed/photographed and respect/
responsibility will be given to the footage/photos they are taking.
Effect
◦ Publishing work online -
■ The student owns the copy right of their own artistic and literary works
■ Students have the Right of Integrity ie protection from derogatory treatment of their work
■ Students have the Right to say 'no' to their work being published or to request its
removal
■ When working on the internet, students will only be identified by first name and class or
year (no School name, no personal details.)
◦ Students have had formal class lessons preceding the introduction of any new online
environment.
An adult will be available when students are online at school
◦ Students will disable or moderate comments on online work.
◦ All online accounts set up will be owned by the teacher or school (or in some cases the
parent) , NOT by a student.
Protect
◦ BBI will use a MOE approved filter for all online work.
◦ Social networking – any cyberbullying, uploading images without consent, report abuse to
teacher/DP.
◦ Use appropriate avatars, usernames.
◦ If the student is uncomfortable or accidentally finds something inappropriate, they will close
the computer and report it immediately to the teacher/DP.
37. 1. Portray yourself as you want others
to see you.
2. Protect passwords. Do not share.
3. The student owns the copy right of
their own artistic and literary works.
4. Disable or moderate comments on
online work.
5. All online accounts set up will be
owned by the teacher or school (or
in some cases the parent), NOT by a
effect student.
6. Students have the Right of Integrity
ie protection from derogatory
treatment of their work.
7. Students have the Right to say 'no'
to their work being published or to
request its removal.
8. If you have nothing nice to say,
then say nothing.
Don’t forward it, don’t visit it.
9. Report any abuse you see.
38. 1. Cite the source of images and
information. Give credit to owner.
Ask permission.
2. Request to use the software and
media others produce.
3. Show respect for self, others and respect
ideas. Comments also tell the
world something about you.
4. Permission when publishing
images and information about other
people.
5. Care of equipment.
39. 1. Do not give personal details about
yourself, or your family. Don't publish a
schedule of your activities
2. Know what to do if you find something
inappropriate or even if it just doesn’t feel
right.
3. Know what to do if cyberbullying takes
place.
4. Protect yourself, others, and ideas.
5. Many sites are R13 – if you are allowed to
use the site, your teacher will need to set up
a class account for these sites.
protect
6. Facebook and other social networking sites
require appropriate use. Do not post any
information that you would not want your
mother, grand parent or employer to see.
Do not use electronic mediums to flame,
bully,harass or stalk other people.
7. Use appropriate avatars and user names.
40. image
manipulation
phishing life skills
scams
purchasing
online
impulse
buying
chatrooms
passwords
onselling and
lists
identity theft
41. The Acceptable Use of the Internet at Bucklands Beach Intermediate
Acceptable Use
Every student at Bucklands Beach Intermediate will keep a portfolio on the internet which will be
stored in a secure, passworded environment. The Internet has been provided to further supplement
the school’s information resource; therefore the uses of the Internet are to be focused on activities that
support learning and teaching.
Internet Safety and Protocols:
• Work published to open internet sites will be labelled with first names only.
• On open internet sites, personal or contact details will not be disclosed.
• Students are responsible for their own personal passwords.
• Appropriate language and content will be used to reflect quality work standards.
• Only licensed software and web-based tools that are approved by BBI will be used.
• Only sites and images appropriate to learning will be accessed.
• Students’ work may be shared with others within an educational setting.
In accordance with school policy, students are expected to use the resources of BBI with respect, care
and responsibility.
Bucklands Beach Intermediate uses a Ministry of Education approved filtering system to block
inappropriate sites. Whilst the school takes all care, Bucklands Beach Intermediate School is not
responsible for the nature or the accuracy of information of the content of the sites browsed.
I have read and understand the Bucklands Beach Acceptable Use Policy
signed (parent/caregiver)
signed (student)
42. ciconline.org
Digital Citizenship Programme
1. Online - privacy, 4. Digital Literacy
ownership 5. Downloading and
2. Online identity sharing
management and 6. Copyright and
monitoring plagiarism
3. Procedures to keep safe
43. The classroom programme
1. Online - privacy, ownership
• Students own the copy right of their own artistic and literary works.
• Students have the Right of Integrity ie protection from derogatory
treatment of their work.
• Students have the Right to say 'no' to their work being published or to
request its removal.
• Students will only be identified by first name and class or year (no School
name, no personal details.)
• Students have had formal class lessons preceding the introduction of any
new online environment.
Students will disable comments on all online work.
• All online accounts set up will be owned by the teacher or school (or in
some cases the parent) , NOT by a student.
• School protocol for websites and passwords
• A supervising adult will be present when students are online at school
44. The classroom programme
2. Online identity management
and monitoring
• User names will be appropriate for young
students and reflect a positive attitude.
• Passwords will be kept private. Students will
not ask for or use others’ passwords.
• Avatars and images will be appropriate for
young students.
• Google your name. What image is going out
to the world?
• What you upload is there forever -
comments and videos.
45. The classroom programme
3. Procedures to keep safe
• When online, use only first name or
nom-de-plume. Give no personal
information, especially emails, addresses
and ph numbers.
• Most social networking are R13. If you
join you are lying and putting yourself in
a dangerous situation.
• Don’t engage in comments that are
negative or derogatory.
• Don’t trust anyone online - not everyone
tells the truth.
http://lh5.ggpht.com
46. The classroom programme
4. Digital Literacy
• Be able to use advanced search techniques. Will give you a more
accurate and refined result.
• Be able to critique other websites. Is it what it appears to be?
• Images are easily manipulated. Is what you see true?
47. The classroom programme
5. Downloading and sharing
• It is illegal to download many movies and games.
• If you didn’t pay for it, it is probably illegal.
• If you use others’ illegal software or downloads, you are just as guilty.
48. The classroom programme
6. Copyright and plagiarism
• Everyone is entitled to protection of their
intellectual property. You cannot steal
others ideas, published works and creative
works.
• You cannot change, delete or manipulate
the work of others without their permission.
• Use Creative Commons and attribution.
49. Digital Citizens at BBI
Own device: School device:
Responsible for own Book through the
device - lock up wiki
security available
Responsible for
Will not be asked to device - treat with
share care
Use daily Report any problems
Needs to be checked Ensure return before
and logged initially period ends
Only approved sites
No sharing of software,
games, etc
Responsible for
protecting the school
passwords
Notes de l'éditeur
\n
ISTE NETS (National Educational Technology Standards) for Teachers\n
ISTE NETS (National Educational Technology Standards) for Teachers\n
\n
development of policies and procedures - published, discussed and circulated\n
development of policies and procedures - published, discussed and circulated\n
development of policies and procedures - published, discussed and circulated\n
development of policies and procedures - published, discussed and circulated\n
development of policies and procedures - published, discussed and circulated\n
development of policies and procedures - published, discussed and circulated\n
development of policies and procedures - published, discussed and circulated\n
development of policies and procedures - published, discussed and circulated\n
include scams, purchasing online, lifeskills\n\nManaging a digital footprint is not the same as a hidden or private profile. Who are you? What do you stand for? What are your passions and beliefs? The important lesson with managing your digital footprint is that everything we do online should represent who we are and what we stand for and we must have the knowledge that this representation will stick with us potentially forever.\n
include scams, purchasing online, lifeskills\n\nManaging a digital footprint is not the same as a hidden or private profile. Who are you? What do you stand for? What are your passions and beliefs? The important lesson with managing your digital footprint is that everything we do online should represent who we are and what we stand for and we must have the knowledge that this representation will stick with us potentially forever.\n
include scams, purchasing online, lifeskills\n\nManaging a digital footprint is not the same as a hidden or private profile. Who are you? What do you stand for? What are your passions and beliefs? The important lesson with managing your digital footprint is that everything we do online should represent who we are and what we stand for and we must have the knowledge that this representation will stick with us potentially forever.\n
include scams, purchasing online, lifeskills\n\nManaging a digital footprint is not the same as a hidden or private profile. Who are you? What do you stand for? What are your passions and beliefs? The important lesson with managing your digital footprint is that everything we do online should represent who we are and what we stand for and we must have the knowledge that this representation will stick with us potentially forever.\n
include scams, purchasing online, lifeskills\n\nManaging a digital footprint is not the same as a hidden or private profile. Who are you? What do you stand for? What are your passions and beliefs? The important lesson with managing your digital footprint is that everything we do online should represent who we are and what we stand for and we must have the knowledge that this representation will stick with us potentially forever.\n
Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
Recognize the signs and emotional effects, the legal consequences and effective solutions for Cyberbullying.\nExhibit responsibility and Netiquette when communicating digitally.\nUnderstand the importance of online identity management and monitoring.\nDemonstrate and advocate for ethical and legal behaviors\nPractice citing sources of text and digital information\nMake ethical and legal decisions when confronted with usage dilemmas\n\nust because information appears on a computer screen doesn’t make it public.\n
\n
\n
\n
\n
\n
Your digital footprint. Think about the information you are posting, what will it mean to an outsider viewing it? \n