SlideShare a Scribd company logo
1 of 17
IT’S  MIDNIGHT  SOMEWHERE ON THE  INTERNET…. DO YOU KNOW  WHO  YOUR  TEENAGER  IS  TALKING  TO ?
of students say the main way they keep in touch with friends is through e-mail, instant messaging, or chat rooms. 34.1%
of students have given out personal information (name, sex, age) over the Internet. 29.2%
of students are online an average of more than an hour everyday. 24.3%
of students say they do not feel safe on the Internet. 24%
of students say they have visited inappropriate places online. 25%
of students say if their parents knew where they went or with whom they chatted on the Internet, they would disapprove, restrict their computer use, or take it away. 24%
of students see nothing wrong with chatting with strangers on the Internet  (2003-04 survey). 24%
of students trust those with whom they chat online. 37%
of students have seen something on the Internet that they consider dangerous. 28%
of students say kids and teens need to learn Internet safety. 81.9%
NRHS  USES THE FOLLOWING TECHNOLOGY LITERACY STANDARDS  TO TEACH  STUDENTS  ABOUT   INTERNET SAFETY
Technology Literacy Standard Health and Safety (2.3  ) Describe and use safe and appropriate practices when participating in online communities, such as discussion groups, blogs, and social networking sites. (2.32)
Technology Literacy Standard Health and Safety (2.3  ) Explain and use practices to protect one's personal safety online (e.g., not sharing personal information with strangers, being alert for online predators, reporting suspicious activities). (2.33)
Technology Literacy Standard Health and Safety (2.3  ) Explain ways individuals can protect their technology systems and information from unethical users. (2.34)
Technology Literacy Standard Health and Safety (2.3  ) Attend NRHS Web Safety Awareness program prior to signing the Nashoba Regional School District’s AUP. (2.3/NRSD)
Have questions? Officer Michael Sallese (Certified in Web Safety)   Mary Marotta (NRHS Instructional Technology Specialist and Dept. Chair for Technology Education/Business) Visit  Web Safety  Table Visit the Nashoba High School website for more information

More Related Content

What's hot

International Journal of Network Security & Its Applications (IJNSA) - Curre...
 International Journal of Network Security & Its Applications (IJNSA) - Curre... International Journal of Network Security & Its Applications (IJNSA) - Curre...
International Journal of Network Security & Its Applications (IJNSA) - Curre...IJNSA Journal
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1bmcdade
 
Mohamed rashid salim
Mohamed rashid salimMohamed rashid salim
Mohamed rashid salimHAMOOD13
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingdrogt1mm
 
Security Testing Web App
Security Testing Web AppSecurity Testing Web App
Security Testing Web AppAung Khant
 
Internet safety cyberbullying
Internet safety cyberbullyingInternet safety cyberbullying
Internet safety cyberbullyingJMFarkas
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 
On line e safety in the curriculum of cyprus
On line e safety in the curriculum of cyprusOn line e safety in the curriculum of cyprus
On line e safety in the curriculum of cyprusvarvara michael andreou
 
Digital identities & digital security
Digital identities & digital securityDigital identities & digital security
Digital identities & digital securitytanvir616
 
An Exploratory Study of the Security Management Practices of Hispanic Students
An Exploratory Study of the Security Management Practices of Hispanic StudentsAn Exploratory Study of the Security Management Practices of Hispanic Students
An Exploratory Study of the Security Management Practices of Hispanic StudentsCSCJournals
 
Jonathan Salem Resume 2015_updated
Jonathan Salem Resume 2015_updatedJonathan Salem Resume 2015_updated
Jonathan Salem Resume 2015_updatedJonathan Salem
 
Ems - Summer I ’11 - T101 Lecture 19a: David Nemer Social Media in Brazil
Ems - Summer I ’11 - T101 Lecture 19a: David Nemer Social Media in BrazilEms - Summer I ’11 - T101 Lecture 19a: David Nemer Social Media in Brazil
Ems - Summer I ’11 - T101 Lecture 19a: David Nemer Social Media in BrazilLindsayEms
 
Project 3 2 ismaeel mashi
Project 3 2 ismaeel mashiProject 3 2 ismaeel mashi
Project 3 2 ismaeel mashiIsmaeelMashi
 

What's hot (20)

International Journal of Network Security & Its Applications (IJNSA) - Curre...
 International Journal of Network Security & Its Applications (IJNSA) - Curre... International Journal of Network Security & Its Applications (IJNSA) - Curre...
International Journal of Network Security & Its Applications (IJNSA) - Curre...
 
Integrating technology1
Integrating technology1Integrating technology1
Integrating technology1
 
204
204204
204
 
Mohamed rashid salim
Mohamed rashid salimMohamed rashid salim
Mohamed rashid salim
 
Mohamme d hamed
Mohamme d hamedMohamme d hamed
Mohamme d hamed
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Security Testing Web App
Security Testing Web AppSecurity Testing Web App
Security Testing Web App
 
Internet safety cyberbullying
Internet safety cyberbullyingInternet safety cyberbullying
Internet safety cyberbullying
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
Mayed
MayedMayed
Mayed
 
Roman
RomanRoman
Roman
 
On line e safety in the curriculum of cyprus
On line e safety in the curriculum of cyprusOn line e safety in the curriculum of cyprus
On line e safety in the curriculum of cyprus
 
Digital identities & digital security
Digital identities & digital securityDigital identities & digital security
Digital identities & digital security
 
Ali abdullah
Ali abdullahAli abdullah
Ali abdullah
 
An Exploratory Study of the Security Management Practices of Hispanic Students
An Exploratory Study of the Security Management Practices of Hispanic StudentsAn Exploratory Study of the Security Management Practices of Hispanic Students
An Exploratory Study of the Security Management Practices of Hispanic Students
 
Jonathan Salem Resume 2015_updated
Jonathan Salem Resume 2015_updatedJonathan Salem Resume 2015_updated
Jonathan Salem Resume 2015_updated
 
Ems - Summer I ’11 - T101 Lecture 19a: David Nemer Social Media in Brazil
Ems - Summer I ’11 - T101 Lecture 19a: David Nemer Social Media in BrazilEms - Summer I ’11 - T101 Lecture 19a: David Nemer Social Media in Brazil
Ems - Summer I ’11 - T101 Lecture 19a: David Nemer Social Media in Brazil
 
Cyberfemm
CyberfemmCyberfemm
Cyberfemm
 
Project 3 2 ismaeel mashi
Project 3 2 ismaeel mashiProject 3 2 ismaeel mashi
Project 3 2 ismaeel mashi
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 

Viewers also liked

Viewers also liked (9)

Ingles
InglesIngles
Ingles
 
PresentaciòN Final De Raymer
PresentaciòN Final De RaymerPresentaciòN Final De Raymer
PresentaciòN Final De Raymer
 
Husvetmas
HusvetmasHusvetmas
Husvetmas
 
Tunombre
TunombreTunombre
Tunombre
 
Logos de "Partidos"
Logos de "Partidos"Logos de "Partidos"
Logos de "Partidos"
 
Philips-profiel in LinkedIn
Philips-profiel in LinkedInPhilips-profiel in LinkedIn
Philips-profiel in LinkedIn
 
Índices de Texto
Índices de TextoÍndices de Texto
Índices de Texto
 
Flats East
Flats EastFlats East
Flats East
 
Biologia I 1[1]
Biologia I 1[1]Biologia I 1[1]
Biologia I 1[1]
 

Similar to Web Safey

Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in EducationMonica Martinez
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Nat Rice
 
A Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsA Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsLori Mitchell
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youthnirmal00776
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthThinkB4UClick
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionTech and Law Center
 
APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07TristanLG
 
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTSIMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTSbhazz
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network pptKristi DeRoche
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 Bjboulanger
 

Similar to Web Safey (20)

Mobile Devices in Education
Mobile Devices in EducationMobile Devices in Education
Mobile Devices in Education
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Parenting the Net Generation - Preview Version
Parenting the Net Generation - Preview VersionParenting the Net Generation - Preview Version
Parenting the Net Generation - Preview Version
 
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
 
A Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsA Comparative Study Of Cyber Bullying Among Undergraduate Students
A Comparative Study Of Cyber Bullying Among Undergraduate Students
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
International comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youthInternational comparison of the state of Internet safety for children and youth
International comparison of the state of Internet safety for children and youth
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English version
 
APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTSIMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network ppt
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 

More from marottam

Applying Web 2.0 Part II into the Classroom
Applying Web 2.0 Part II into the ClassroomApplying Web 2.0 Part II into the Classroom
Applying Web 2.0 Part II into the Classroommarottam
 
Teaching in the Interactive Classroom with SMARTBoards
Teaching in the Interactive Classroom with SMARTBoardsTeaching in the Interactive Classroom with SMARTBoards
Teaching in the Interactive Classroom with SMARTBoardsmarottam
 
Teaching in the Interactive Classroom
Teaching in the Interactive ClassroomTeaching in the Interactive Classroom
Teaching in the Interactive Classroommarottam
 
SharePoint and Web 2.0 Tools in K-12
SharePoint and Web 2.0 Tools in K-12SharePoint and Web 2.0 Tools in K-12
SharePoint and Web 2.0 Tools in K-12marottam
 
Using Technology To Support Di July08
Using Technology To Support Di July08Using Technology To Support Di July08
Using Technology To Support Di July08marottam
 
Welcome To Nrhs 2012
Welcome To Nrhs 2012Welcome To Nrhs 2012
Welcome To Nrhs 2012marottam
 
New Digital Technologies To Improve Teaching And Learning
New Digital Technologies To Improve Teaching And LearningNew Digital Technologies To Improve Teaching And Learning
New Digital Technologies To Improve Teaching And Learningmarottam
 

More from marottam (8)

Applying Web 2.0 Part II into the Classroom
Applying Web 2.0 Part II into the ClassroomApplying Web 2.0 Part II into the Classroom
Applying Web 2.0 Part II into the Classroom
 
Teaching in the Interactive Classroom with SMARTBoards
Teaching in the Interactive Classroom with SMARTBoardsTeaching in the Interactive Classroom with SMARTBoards
Teaching in the Interactive Classroom with SMARTBoards
 
Teaching in the Interactive Classroom
Teaching in the Interactive ClassroomTeaching in the Interactive Classroom
Teaching in the Interactive Classroom
 
SharePoint and Web 2.0 Tools in K-12
SharePoint and Web 2.0 Tools in K-12SharePoint and Web 2.0 Tools in K-12
SharePoint and Web 2.0 Tools in K-12
 
Using Technology To Support Di July08
Using Technology To Support Di July08Using Technology To Support Di July08
Using Technology To Support Di July08
 
Standards
StandardsStandards
Standards
 
Welcome To Nrhs 2012
Welcome To Nrhs 2012Welcome To Nrhs 2012
Welcome To Nrhs 2012
 
New Digital Technologies To Improve Teaching And Learning
New Digital Technologies To Improve Teaching And LearningNew Digital Technologies To Improve Teaching And Learning
New Digital Technologies To Improve Teaching And Learning
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Web Safey

  • 1. IT’S MIDNIGHT SOMEWHERE ON THE INTERNET…. DO YOU KNOW WHO YOUR TEENAGER IS TALKING TO ?
  • 2. of students say the main way they keep in touch with friends is through e-mail, instant messaging, or chat rooms. 34.1%
  • 3. of students have given out personal information (name, sex, age) over the Internet. 29.2%
  • 4. of students are online an average of more than an hour everyday. 24.3%
  • 5. of students say they do not feel safe on the Internet. 24%
  • 6. of students say they have visited inappropriate places online. 25%
  • 7. of students say if their parents knew where they went or with whom they chatted on the Internet, they would disapprove, restrict their computer use, or take it away. 24%
  • 8. of students see nothing wrong with chatting with strangers on the Internet (2003-04 survey). 24%
  • 9. of students trust those with whom they chat online. 37%
  • 10. of students have seen something on the Internet that they consider dangerous. 28%
  • 11. of students say kids and teens need to learn Internet safety. 81.9%
  • 12. NRHS USES THE FOLLOWING TECHNOLOGY LITERACY STANDARDS TO TEACH STUDENTS ABOUT INTERNET SAFETY
  • 13. Technology Literacy Standard Health and Safety (2.3 ) Describe and use safe and appropriate practices when participating in online communities, such as discussion groups, blogs, and social networking sites. (2.32)
  • 14. Technology Literacy Standard Health and Safety (2.3 ) Explain and use practices to protect one's personal safety online (e.g., not sharing personal information with strangers, being alert for online predators, reporting suspicious activities). (2.33)
  • 15. Technology Literacy Standard Health and Safety (2.3 ) Explain ways individuals can protect their technology systems and information from unethical users. (2.34)
  • 16. Technology Literacy Standard Health and Safety (2.3 ) Attend NRHS Web Safety Awareness program prior to signing the Nashoba Regional School District’s AUP. (2.3/NRSD)
  • 17. Have questions? Officer Michael Sallese (Certified in Web Safety) Mary Marotta (NRHS Instructional Technology Specialist and Dept. Chair for Technology Education/Business) Visit Web Safety Table Visit the Nashoba High School website for more information