SlideShare une entreprise Scribd logo
1  sur  17
Cyber Safety
Lorraine Flores
What is Cyber Safety?
• Acceptable Use Policy (AUP)
–A written guideline for using school
computers
• Cyberbullying
–The use of any electronic with the intention
of intimidating others.
• Cyberpredators
– A stranger who attempts to be your best
friend electronically but who turns out to
manipulative or dangerous.
Cyber Safety (continued…)
• Identity Safety
–Your identity will be safely maintained in
the Classroom.
• Piracy & Plagiarism
–Piracy involves the unauthorized use of
other people’s materials, such as movies or
software.
–Plagiarism is the unauthorized use of other
people’s ideas or written words.
What is Acceptable Use Policy?
Acceptable Use Explained
Video
Acceptable Use Policy
• Written guidelines
• Student Agreement Form
• Computer access in the classroom, computer lab,
and media center to connect to the Internet, E-
Mail, etc.
• User Responsibilities – “Do’s and Don’ts”
• Personal Safety
• Inappropriate Use
• Serious consequences for those caught in violation
of theAcceptable Use Policy.
What is Cyberbullying?
Cyberbullying is any intimidation or
manipulation that occurs through electronic
technology; such as cell phones, computers,
tablets, etc.
What communication tools are involved in
Cyberbullying?
Social Media,Text Messaging, OnlineChat
Rooms and OnlineWebsites
Examples of Cyberbullying
• Sending mean text message or emails
• Starting rumors via texts or emails
• Posting embarrassing pictures, videos, or
information on social networking sites and or
websites without the express permission of
the people involved.
• Francis ArtVideo
What is a Cyberpredator?
A cyberpredator is a person who:
• uses the computer to “hunt” the young
person and “groom” them for an ongoing
relationship
• knows how to manipulate a young person
• may attempt to meet you face to face
• pretends to be your best friend
• tells you that it is okay to keep secrets from
your parents
Example of a Cyberpredator
• The Internet is a large gathering space, for our
example, we will use the Mall as an example.
• Sometimes meeting someone online is like
going to the Mall and meeting a stranger
there without your parents’ permission.
• Do not give personal information to any
stranger you have met online, such as your
personal email address or your phone
number
• Internet SafetyVideo
What is Identity Safety?
• Always be careful about what you share
online with your social media.
• Keep your usernames/passwords private. Do
not share any of this information with
anyone, not even your friends!
• Be suspicious about people who are trying to
connect with you via social media
Identity Safety
• What is Personal Information?Video
• If, for any reason, you feel suspicious about
something or you feel something is becoming
unsafe, please report your safety concerns to
a trusted adult: teacher , counselor, and
principal.
Piracy & Plagiarism
Piracy
– What is Piracy?Video
–Make sure all new software comes with a
licensing agreement, original disks and
original packaging.
–Do not purchase software without the
appropriate hardware
–Do not share your password with others
–Educate yourself and others about the
dangers of Piracy
Piracy & Plagiarism
• Plagiarism
–Plagiarism 101Video
–Cite all sources and give credit to original
authors, whether you are paraphrasing or
quoting
–DO NOT COPY from an author’s words,
including an author’s written words,
paragraphs poems, etc.
–Do your OWN work!
Review
Several scenarios for each:
• AUP
• Cyberbullying
• Cyberpredators
• Identity Safety
• Piracy and Plagiarism
• If you experience any kind of of physical or
online harassment, please alert your
classroom teacher, counselor, and/or
principal. These adults will follow up and will
take necessary action to find and punish the
online cyberpredator(s).
• Safety is our school's number one top priority.
• Be a good digital citizen.
References
• Ban SignCyberbullying. 2013[photograph]. Retrieved from
http://resources.uknowkids.com/blog/bid/159164/Global-Perspective-on-Cyberbullying.
• Cyber Safety for Kids.[Photograph]. 2009. Retrieved from http://mediamunchies-
courtney.blogspot.com/.
• CyberSafetyTeam Edcuation. Weebly. (n.d. ) Identity Safety. Retrieved from
http://cybersafetyteameducation422.weebly.com/identity-safety.html.
• CyberSafetyTeam Education. Weebly. (n.d. ) Retrieved from
Cybersafetyteameducation422.weebly.com/piracyplagiarism.html.
• Franis, C. (2011, Nov. 11). Anti-BullyingAwareness- Indirect, Cyber Bullying,Alienated-Lesson-School.
Retrieved from https://youtu.be/YFzay3Vm860.
• LIRC Productions. 2013, Oct. 29. Plagiarism 101 with year 6. Retrieved from
https://youtu.be/fDd7up936MQ.
More references
• Netsafeutah. (n.d.)What is Personal Information. Retrieved from
http://www.netsafeutah.org/kids/kids_videos.html.
• Orchard Hill Elementary School. Schoolwires, Inc. 2015. Retrieved from
http://www.mtsd.k12.nj.us/domain/694.
• Pham,T. 2014, July 27.What is Piracy. Retrieved from https://youtu.be/IaOGSJwzuWQ.
• RECfilms. 2007, Jun. 14. Internet Safety. Retrieved from https://youtu.be/xZHq4CQekTY.
• Ripp, P. 2010, Sept. 8. Why the Internet is like the Mall. Retrieved from
http://mrspripp.blogspot.com/2010/09/why-internet-is-like-mall.html
• Schoen, J. (2014, Sept. 17). Acceptable Use Policy Explained. Retrieved from
https://youtu.be/hKK9EYl5hdw.
• Two gold humans shake hands from the computer monitor. [Photograph].2013. Retrieved from
http://www.coetail.com/jasonc/2013/10/06/a-comparison-of-the-acceptable-use-policies-of-three-
international-schools/.

Contenu connexe

Tendances

Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineIan Krieger
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlinexlilmermaidx
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents lisluandaprimary
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 

Tendances (20)

Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Similaire à Cyber safety by Lorraine Flores

Internet safety
Internet safetyInternet safety
Internet safetymartdale
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptxKnepperE
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentationSarah Sell
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013Julie Esanu
 
Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldInterMediaKT
 
Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011Tea Teić
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxTriveni Prabaakar
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptxsaththiyans1
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
E safety for kids: curriculum, lessons, resources
E safety for kids: curriculum, lessons, resourcesE safety for kids: curriculum, lessons, resources
E safety for kids: curriculum, lessons, resourcesheila1
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 

Similaire à Cyber safety by Lorraine Flores (20)

Internet safety
Internet safetyInternet safety
Internet safety
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013
 
Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual World
 
Online safety 2011
Online safety 2011Online safety 2011
Online safety 2011
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
E safety for kids: curriculum, lessons, resources
E safety for kids: curriculum, lessons, resourcesE safety for kids: curriculum, lessons, resources
E safety for kids: curriculum, lessons, resources
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 

Dernier

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Dernier (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Cyber safety by Lorraine Flores

  • 2. What is Cyber Safety? • Acceptable Use Policy (AUP) –A written guideline for using school computers • Cyberbullying –The use of any electronic with the intention of intimidating others. • Cyberpredators – A stranger who attempts to be your best friend electronically but who turns out to manipulative or dangerous.
  • 3. Cyber Safety (continued…) • Identity Safety –Your identity will be safely maintained in the Classroom. • Piracy & Plagiarism –Piracy involves the unauthorized use of other people’s materials, such as movies or software. –Plagiarism is the unauthorized use of other people’s ideas or written words.
  • 4. What is Acceptable Use Policy? Acceptable Use Explained Video
  • 5. Acceptable Use Policy • Written guidelines • Student Agreement Form • Computer access in the classroom, computer lab, and media center to connect to the Internet, E- Mail, etc. • User Responsibilities – “Do’s and Don’ts” • Personal Safety • Inappropriate Use • Serious consequences for those caught in violation of theAcceptable Use Policy.
  • 6. What is Cyberbullying? Cyberbullying is any intimidation or manipulation that occurs through electronic technology; such as cell phones, computers, tablets, etc. What communication tools are involved in Cyberbullying? Social Media,Text Messaging, OnlineChat Rooms and OnlineWebsites
  • 7. Examples of Cyberbullying • Sending mean text message or emails • Starting rumors via texts or emails • Posting embarrassing pictures, videos, or information on social networking sites and or websites without the express permission of the people involved. • Francis ArtVideo
  • 8. What is a Cyberpredator? A cyberpredator is a person who: • uses the computer to “hunt” the young person and “groom” them for an ongoing relationship • knows how to manipulate a young person • may attempt to meet you face to face • pretends to be your best friend • tells you that it is okay to keep secrets from your parents
  • 9. Example of a Cyberpredator • The Internet is a large gathering space, for our example, we will use the Mall as an example. • Sometimes meeting someone online is like going to the Mall and meeting a stranger there without your parents’ permission. • Do not give personal information to any stranger you have met online, such as your personal email address or your phone number • Internet SafetyVideo
  • 10. What is Identity Safety? • Always be careful about what you share online with your social media. • Keep your usernames/passwords private. Do not share any of this information with anyone, not even your friends! • Be suspicious about people who are trying to connect with you via social media
  • 11. Identity Safety • What is Personal Information?Video • If, for any reason, you feel suspicious about something or you feel something is becoming unsafe, please report your safety concerns to a trusted adult: teacher , counselor, and principal.
  • 12. Piracy & Plagiarism Piracy – What is Piracy?Video –Make sure all new software comes with a licensing agreement, original disks and original packaging. –Do not purchase software without the appropriate hardware –Do not share your password with others –Educate yourself and others about the dangers of Piracy
  • 13. Piracy & Plagiarism • Plagiarism –Plagiarism 101Video –Cite all sources and give credit to original authors, whether you are paraphrasing or quoting –DO NOT COPY from an author’s words, including an author’s written words, paragraphs poems, etc. –Do your OWN work!
  • 14. Review Several scenarios for each: • AUP • Cyberbullying • Cyberpredators • Identity Safety • Piracy and Plagiarism
  • 15. • If you experience any kind of of physical or online harassment, please alert your classroom teacher, counselor, and/or principal. These adults will follow up and will take necessary action to find and punish the online cyberpredator(s). • Safety is our school's number one top priority. • Be a good digital citizen.
  • 16. References • Ban SignCyberbullying. 2013[photograph]. Retrieved from http://resources.uknowkids.com/blog/bid/159164/Global-Perspective-on-Cyberbullying. • Cyber Safety for Kids.[Photograph]. 2009. Retrieved from http://mediamunchies- courtney.blogspot.com/. • CyberSafetyTeam Edcuation. Weebly. (n.d. ) Identity Safety. Retrieved from http://cybersafetyteameducation422.weebly.com/identity-safety.html. • CyberSafetyTeam Education. Weebly. (n.d. ) Retrieved from Cybersafetyteameducation422.weebly.com/piracyplagiarism.html. • Franis, C. (2011, Nov. 11). Anti-BullyingAwareness- Indirect, Cyber Bullying,Alienated-Lesson-School. Retrieved from https://youtu.be/YFzay3Vm860. • LIRC Productions. 2013, Oct. 29. Plagiarism 101 with year 6. Retrieved from https://youtu.be/fDd7up936MQ.
  • 17. More references • Netsafeutah. (n.d.)What is Personal Information. Retrieved from http://www.netsafeutah.org/kids/kids_videos.html. • Orchard Hill Elementary School. Schoolwires, Inc. 2015. Retrieved from http://www.mtsd.k12.nj.us/domain/694. • Pham,T. 2014, July 27.What is Piracy. Retrieved from https://youtu.be/IaOGSJwzuWQ. • RECfilms. 2007, Jun. 14. Internet Safety. Retrieved from https://youtu.be/xZHq4CQekTY. • Ripp, P. 2010, Sept. 8. Why the Internet is like the Mall. Retrieved from http://mrspripp.blogspot.com/2010/09/why-internet-is-like-mall.html • Schoen, J. (2014, Sept. 17). Acceptable Use Policy Explained. Retrieved from https://youtu.be/hKK9EYl5hdw. • Two gold humans shake hands from the computer monitor. [Photograph].2013. Retrieved from http://www.coetail.com/jasonc/2013/10/06/a-comparison-of-the-acceptable-use-policies-of-three- international-schools/.

Notes de l'éditeur

  1. What is cyber safety? It is about keeping information safe and secure by using the technology. Being responsible with that information, being respectful of other people online. Have you heard of using good etiquette? Same principal for netiquette (internet etiquette)
  2. Here are the five categories that we are going to cover for each term.
  3. Identity Safety – it’s about being safe in the classroom. Also, safe at home. Piracy – it’s about copy without permission, copy without paying fees, like stealing… Plagiarism – stealing someone’s idea or written words, will explain more on this
  4. What is acceptable use policy? Let’s watch this video from the YouTube.
  5. At the beginning of school year, each of you will receive the agreement form and follow the school policy for using the school computers. Do use the network in accordance with the school's code of conduct. Do cite the sources of information properly. Do use the network only for legal activity. Do be courteous and respectful in your messages to others. Do use appropriate language. Do not swear, use vulgarities, or any other inappropriate language. Do not degrade or disrupt equipment or system performance. Do not load personal software onto district computers. ·        Do not attempt to change computer settings or configurations. ·        Do not knowingly place a virus on any computer or in the Internet.  
  6. What is Cyberbullying? Bullying through electronic technology, text messaging, chat room, email, etc…
  7. Here’s the video clip from Francis Art: Anti-Bullying Awareness – Indirect, Cyber Bullying, Alienated – Lesson - School
  8. A Cyberpredator is a person who meet you online, becomes friend, asking questions, etc. You don’t know the other side of a cyberpredator. Suppose he says he’s 13 years old and you meet the person face to face, he’s not 13, he’s 50s.
  9. Using the analogy: The Internet is like a Mall. Going on the Internet is like going to the mall with the stranger without your parents’ supervision. Is it safe to walk with a stranger? This is same principles online. Here is the video, Internet Safety.
  10. What are Social Media? Facebook, My Space, Tumblr, Tweeter, Instagram, Snapchat,
  11. Here is the video from Net Safe Utah. There are several videos on that website. Choose “What is Personal Information?” video.
  12. Let’s focus on Piracy for now. Here is the short video explaining on Piracy. Let us hold the questions.
  13. Great video for you all to understand the meaning of Plagiarism.
  14. Group activities for each scenarios
  15. Please talk to any trusted adults here: teacher, counselor and/or principal. We are here for you. Remember be a good digital citizen! Any questions?