2. What is Cyber Safety?
• Acceptable Use Policy (AUP)
–A written guideline for using school
computers
• Cyberbullying
–The use of any electronic with the intention
of intimidating others.
• Cyberpredators
– A stranger who attempts to be your best
friend electronically but who turns out to
manipulative or dangerous.
3. Cyber Safety (continued…)
• Identity Safety
–Your identity will be safely maintained in
the Classroom.
• Piracy & Plagiarism
–Piracy involves the unauthorized use of
other people’s materials, such as movies or
software.
–Plagiarism is the unauthorized use of other
people’s ideas or written words.
5. Acceptable Use Policy
• Written guidelines
• Student Agreement Form
• Computer access in the classroom, computer lab,
and media center to connect to the Internet, E-
Mail, etc.
• User Responsibilities – “Do’s and Don’ts”
• Personal Safety
• Inappropriate Use
• Serious consequences for those caught in violation
of theAcceptable Use Policy.
6. What is Cyberbullying?
Cyberbullying is any intimidation or
manipulation that occurs through electronic
technology; such as cell phones, computers,
tablets, etc.
What communication tools are involved in
Cyberbullying?
Social Media,Text Messaging, OnlineChat
Rooms and OnlineWebsites
7. Examples of Cyberbullying
• Sending mean text message or emails
• Starting rumors via texts or emails
• Posting embarrassing pictures, videos, or
information on social networking sites and or
websites without the express permission of
the people involved.
• Francis ArtVideo
8. What is a Cyberpredator?
A cyberpredator is a person who:
• uses the computer to “hunt” the young
person and “groom” them for an ongoing
relationship
• knows how to manipulate a young person
• may attempt to meet you face to face
• pretends to be your best friend
• tells you that it is okay to keep secrets from
your parents
9. Example of a Cyberpredator
• The Internet is a large gathering space, for our
example, we will use the Mall as an example.
• Sometimes meeting someone online is like
going to the Mall and meeting a stranger
there without your parents’ permission.
• Do not give personal information to any
stranger you have met online, such as your
personal email address or your phone
number
• Internet SafetyVideo
10. What is Identity Safety?
• Always be careful about what you share
online with your social media.
• Keep your usernames/passwords private. Do
not share any of this information with
anyone, not even your friends!
• Be suspicious about people who are trying to
connect with you via social media
11. Identity Safety
• What is Personal Information?Video
• If, for any reason, you feel suspicious about
something or you feel something is becoming
unsafe, please report your safety concerns to
a trusted adult: teacher , counselor, and
principal.
12. Piracy & Plagiarism
Piracy
– What is Piracy?Video
–Make sure all new software comes with a
licensing agreement, original disks and
original packaging.
–Do not purchase software without the
appropriate hardware
–Do not share your password with others
–Educate yourself and others about the
dangers of Piracy
13. Piracy & Plagiarism
• Plagiarism
–Plagiarism 101Video
–Cite all sources and give credit to original
authors, whether you are paraphrasing or
quoting
–DO NOT COPY from an author’s words,
including an author’s written words,
paragraphs poems, etc.
–Do your OWN work!
14. Review
Several scenarios for each:
• AUP
• Cyberbullying
• Cyberpredators
• Identity Safety
• Piracy and Plagiarism
15. • If you experience any kind of of physical or
online harassment, please alert your
classroom teacher, counselor, and/or
principal. These adults will follow up and will
take necessary action to find and punish the
online cyberpredator(s).
• Safety is our school's number one top priority.
• Be a good digital citizen.
16. References
• Ban SignCyberbullying. 2013[photograph]. Retrieved from
http://resources.uknowkids.com/blog/bid/159164/Global-Perspective-on-Cyberbullying.
• Cyber Safety for Kids.[Photograph]. 2009. Retrieved from http://mediamunchies-
courtney.blogspot.com/.
• CyberSafetyTeam Edcuation. Weebly. (n.d. ) Identity Safety. Retrieved from
http://cybersafetyteameducation422.weebly.com/identity-safety.html.
• CyberSafetyTeam Education. Weebly. (n.d. ) Retrieved from
Cybersafetyteameducation422.weebly.com/piracyplagiarism.html.
• Franis, C. (2011, Nov. 11). Anti-BullyingAwareness- Indirect, Cyber Bullying,Alienated-Lesson-School.
Retrieved from https://youtu.be/YFzay3Vm860.
• LIRC Productions. 2013, Oct. 29. Plagiarism 101 with year 6. Retrieved from
https://youtu.be/fDd7up936MQ.
17. More references
• Netsafeutah. (n.d.)What is Personal Information. Retrieved from
http://www.netsafeutah.org/kids/kids_videos.html.
• Orchard Hill Elementary School. Schoolwires, Inc. 2015. Retrieved from
http://www.mtsd.k12.nj.us/domain/694.
• Pham,T. 2014, July 27.What is Piracy. Retrieved from https://youtu.be/IaOGSJwzuWQ.
• RECfilms. 2007, Jun. 14. Internet Safety. Retrieved from https://youtu.be/xZHq4CQekTY.
• Ripp, P. 2010, Sept. 8. Why the Internet is like the Mall. Retrieved from
http://mrspripp.blogspot.com/2010/09/why-internet-is-like-mall.html
• Schoen, J. (2014, Sept. 17). Acceptable Use Policy Explained. Retrieved from
https://youtu.be/hKK9EYl5hdw.
• Two gold humans shake hands from the computer monitor. [Photograph].2013. Retrieved from
http://www.coetail.com/jasonc/2013/10/06/a-comparison-of-the-acceptable-use-policies-of-three-
international-schools/.
Notes de l'éditeur
What is cyber safety? It is about keeping information safe and secure by using the technology. Being responsible with that information, being respectful of other people online. Have you heard of using good etiquette? Same principal for netiquette (internet etiquette)
Here are the five categories that we are going to cover for each term.
Identity Safety – it’s about being safe in the classroom. Also, safe at home.
Piracy – it’s about copy without permission, copy without paying fees, like stealing…
Plagiarism – stealing someone’s idea or written words, will explain more on this
What is acceptable use policy? Let’s watch this video from the YouTube.
At the beginning of school year, each of you will receive the agreement form and follow the school policy for using the school computers.
Do use the network in accordance with the school's code of conduct.
Do cite the sources of information properly.
Do use the network only for legal activity.
Do be courteous and respectful in your messages to others.
Do use appropriate language. Do not swear, use vulgarities, or any other inappropriate language.
Do not degrade or disrupt equipment or system performance.
Do not load personal software onto district computers.
· Do not attempt to change computer settings or configurations.
· Do not knowingly place a virus on any computer or in the Internet.
What is Cyberbullying? Bullying through electronic technology, text messaging, chat room, email, etc…
Here’s the video clip from Francis Art: Anti-Bullying Awareness – Indirect, Cyber Bullying, Alienated – Lesson - School
A Cyberpredator is a person who meet you online, becomes friend, asking questions, etc. You don’t know the other side of a cyberpredator. Suppose he says he’s 13 years old and you meet the person face to face, he’s not 13, he’s 50s.
Using the analogy: The Internet is like a Mall. Going on the Internet is like going to the mall with the stranger without your parents’ supervision. Is it safe to walk with a stranger? This is same principles online. Here is the video, Internet Safety.
What are Social Media?
Facebook, My Space, Tumblr, Tweeter, Instagram, Snapchat,
Here is the video from Net Safe Utah. There are several videos on that website. Choose “What is Personal Information?” video.
Let’s focus on Piracy for now. Here is the short video explaining on Piracy. Let us hold the questions.
Great video for you all to understand the meaning of Plagiarism.
Group activities for each scenarios
Please talk to any trusted adults here: teacher, counselor and/or principal. We are here for you.
Remember be a good digital citizen!
Any questions?