2The PlanToday you will be learning about personal safety when online. This unit consists of four mini lessons. The slide show covers all lessons in the unit:Safeguarding your Identity While OnlineProtecting Personal InformationOnline Predators and the Grooming ProcessOnline Personal Safety Review and Action
4Cyberspace What is Cyberspace, and how do we get there? What are some of the ways we communicate in Cyberspace?
5Teacher’s choice: Otherwise – let’s continue on… For a classroom with computers, return to the lesson folder and select the HTML Activity for this lesson. Students should work in groups.When the activity is completed –Go to the Group Activity slide (slide 13)Otherwise – let’s continue on…
6Start with the Screen Name Activity Follow along on your resource and activity pages.Read through the information and complete the activities as we go along.
7Online ID – What can you tell? Directions: Look at the screen names below. As a class, brainstorm what each says about the person who chose it. Then put the names in order from least informative to most informative.Jessica4danceSmithstealshomeBayareababedancinfunFred14
8DiscussionThink about your own screen name What does it say about you?When you choose a screen name you want something that allows you to remain anonymous, or unknown. Don’t include personal information.Why do you think you shouldn’t include personal information?What are some of the dangers?
9Screen Names Screen names should never contain or refer to: Screen names should never contain or refer to:first and/or last nameaddressphone numberdate of birth (complete or partial) or ageSocial Security numberaddresscombinations of personal information such as listed abovecombinations of personal information (above) plus descriptions of such information as, but not limited to gender, school name, favorite sport, favorite celebrity, family member namesmarcy14inSanFrantiger1234
10Password ProtectionDirections: Look at the information about each person below. What are some common and obvious guesses as to what their passwords might be? Brainstorm a list for each one.John – John lives in the Tampa Bay area where the Bucs play. He is a really big fan. He loves football.2. Jessica – Jessica loves all the popular music groups. She is head over heels in love with Justin Timberlake.3. Ali – Ali is afraid to forget her password. She wanted something simple she could always remember.
11Discussion Think about your own password. - Is it something obvious? - Could someone easily guess it?- Does anyone else know it?When someone knows or can guess your password you could be in trouble. This allows them access to you. They could pretend to be you.What types of dangers are involved when others know or can guess your password?
12Passwords Follow these rules for creating safe passwords: be lengthy – at least 8 characterscontain a combination of letters, numbers, and symbolschanged when its secrecy is in doubtshould not contain personal informationshould not be sharedshould not be easily guessedshould not be provided in an , even if requested
13Group ActivityIn small groups – brainstorm some screen names and passwords that are not obvious and don’t reveal personal information.Be careful – don’t tell anyone your current password. If you currently have a screen name – discuss it. See if your classmates think it says too much about you.
14RememberIt is important to select safe and secure screen names and passwords.Think about it: What should you NEVER reveal in either?Think about it: What is your screen name and password? Do you think you need to change it? Why/Why not?
17Internet Safety TipsThink carefully before giving out personal information such as your name, home address, school name, or telephone number in a chat room or on social networking sites (IMs and blogs too!).Never write to someone who has made you feel uncomfortable or scared, even if you or your parents know who they are.
18Internet Safety TipsDo not meet someone or have them visit you without the permission of your parents.Tell your parents right away if you read anything on the Internet that makes you feel uncomfortable.Remember that people online may not be who they say they are.
19Remember that people online may not be who they say they are.
20Brainstorm · Why do students feel safe on the Internet? · What are some dangers on the Internet?· What are some good things on the Internet?· How can you stay away from the dangerous things?
21These are all considered to be identifying or personal information. One way to stay safe, is to avoid revealing any information about oneself onlineNever tell anyone:Your nameAddressPhone numberAgeGenderFamily namesSchoolNever give a stranger your pictureThese are all considered to be identifying or personal information.
22I hope you learned something – I know I did! OK – let’s get into groups. Your teacher will divide you up for the next activity.
23Everyone in Groups?Good! Each group should have received a cause and effect sheet. Here’s how to get started· Brainstorm how each effect could have been avoided.· Brainstorm other possible effects of the person’s actions.· Present your information to the class.
24So Get Started! Do your best on these cause and effect charts! Once you are finished, your group will present your chart to the rest of the class and discuss what you have learned.
25Let’s Review!Remember: It is important that any time you are asked to post personal information online you need to ask permission from a parent or supervising adult.This includes entering Web sites, filling out profiles, forms, etc.
27Learning Goals YOU WILL: Understand the need for being safe in the cyber community - just like your physical community.Be able to list safety rules/advice of behavior towards strangers in the physical community that also apply to behavior towards strangers in Cyberspace.Understand the importance of refusing inappropriate online relationships.Know how to interact online appropriately and safely.
28Do You Go Online? Discuss: Do you go online alone? What do you do online?How do you know how old someone is that you meet online?
29Group ActivityYour teacher will provide you with activity instructions.
30Rules for Communication Discuss:What rules do you follow in the physical world for meeting or communicating with strangers?Do these rules also apply to the cyber community?REMEMBER: Anyone you meet and know only online is a stranger to you, no matter how well you think you know them.
31Online SocializingTo socialize online means to interact with others using Internet technologies.Name some ways people socialize online.Name your favorite ways to socialize online.List some good rules to help us (even adults) stay safe when socializing online.
32Online RealitiesSometimes people lie about who they are when socializing online.This could be because they want to bully or steal identities.It also could be that they are just exploring and experimenting.Most online relationships are safe, but sometimes adults lie online in order to meet and form friendships with youth. They are called predators.
33The Grooming Process Have you heard of the grooming process? This term is used to mean the methods a predator uses to befriend youth online.
34Online RelationshipsMost online relationships are safe and do not involve a predator!How can you identify someone who might be an online predator?
35Online Grooming Studies have shown that an online predator will: encourage sexually explicit talkdo or say anything to show they carewant to meet
36Online Relationships Remember: Most online relationships are safe. However, the way one interacts online can increase the chances of meeting a predator.And no one can predict the harm that a predator could cause.
37Minimizing DangerThere are things you can do to minimize the danger and the chances of becoming the victim of an online predator, including the following:Choose a safe screen name.Use caution when choosing whom to communicate with.Avoid revealing too much personal information.No matter what, it is important to tell an adult if:You feel uncomfortable online for any reason.You are approached by someone who discusses inappropriate things.You are approached by someone who wants to meet you offline.
38Minimizing Danger Think about what UR Talking About. A predator looks for youth who willingly talk about sex online.It’s not appropriate! And it’s NOT SAFE!
39Review Think Safety First Use an appropriate screen name. Don’t engage in talk about sex online.Don’t agree to meet an online stranger.Avoid secret online friendships.Find an offline friend if you’re feeling down.
40Review It is important to stop the communication and tell an adult if: You feel uncomfortable online for any reason.You are approached by someone who discusses inappropriate things.You are approached by someone who wants to meet you offline.Who can U Tell?Tell your parent, guardian, or another trusted adult.Tell a teacher or another adult at school.Bottom line - Tell someone!
41Lesson 4 Online Personal Safety Review and Action
42Create a PresentationProcedure: As a class, run through the 5 slide presentation (which begins after the directions).The 5 slide presentation will be shown TWICE.Use the first time to become familiar with the slides and the information.
43DirectionsThese slides are to educate your parents or others during a parent meeting or parent night on the topic of Internet safety.What information do your parents need to know to protect both themselves and their children?Use what you have learned to tell others how to stay safe online.
44Personal Safety Online There are many dangers youth face while online, such as:Predators – strangers who may cause harmCyber bulliesInappropriate Web sites and materialAnd some that parents also face, such as:Identity theftMonetary theftThank you for attending today.The need for online safety is what this presentation is about. The Internet is an incredible tool but poses serious problems for you and your family. It was for this reason i-SAFE was created, and why Internet safety has quickly become an important issue in communities nationwide.I-SAFE has introduced Internet safety in the classroom and now your children are carrying that valuable message beyond the classroom and into the community.Today we will be talking about Personal Safety online. This is an important message not just for youth to know, but for parents to understand as well. While online, youth face numerous personal dangers such as predators, cyber bullies, and accessing inappropriate material and websites, adults are also targets of some of these threats.Hopefully when you leave here tonight you will not only be aware of the dangers but understand how to prevent them from happening and be able to discuss the issues with your family.
45PredatorsThose who use Cyberspace to hunt for victims to take advantage of them.The Facts:There are predators online.They use tools like social media, instant messaging, etc. to get close to kids.Sometimes a victim is a willing participant and chooses to talk to a stranger.Unfortunately it is a sad fact that there are predators online. These are people who use the internet as a tool to find victims. Predators attempt to make friends with kids online in chat rooms. By becoming their friend, they get closer and find out more information. They slowly open them to the idea of meeting. Eventually a face –to –face meeting is initiated and the results can be very dangerous.But not all victims are unaware that they are talking to someone older. Some are willing participants in these relationships. They are looking for a friend or relationship and will work to hide it from parents and friends. An open discussion, rules for computer usage, and parent involvement help to end these inappropriate relationships.
46Cyber BullyingSending or posting harmful or cruel text or images using the Internet or other digital media source.The Facts:The Internet is a tool used to bully.People feel removed from what they say online. They feel anonymous.Unexpected participants: Anyone can join in.1 in 5 youth will be faced with a hurtful or mean message while online.Cyber Bullies are another unfortunate danger many kids face online. Sometimes it can come across as harmless, but to kids any type of bullying can have adverse effects and result in low self esteem, depression, etc. Students use chat, IM, websites, and more to joke, poke fun of, and threaten others. Online one can find sites devoted to ranking the ugliest student at school. Sometimes after a fight a friend will become an enemy as what was meant to be a private is forwarded to others. Indeed some people say things which are meant to be taken one way but with only a computer screen facing the receiver, they are taken completely wrong. Bullying escalates and becomes a bigger problem. Perhaps more so then schoolyard bullying ever was because ANYONE can do it or be on the receiving end of it.
47Identity Theft The Facts: Posting personal information online makes it available for others to steal.With your personal information, someone can pretend to be you, use your credit card or bank account to buy things that you don’t know about.Personal information can also be stolen from you if you respond to s from strangers.Identity theft has gone high tech. Pretending to be your bank, ebay, paypal, or other institution, identity thieves mimic the logos, address, etc. to request you to confirm personal information, etc.Even typing in your personal information and credit card number online presents a risk to thieves.Another way to access personal info is through old fashioned hacking. If you are online you should be running firewalls and other security software to protect your computer and your information.
48A Little Prevention…Prepare yourself. Many online problems can be avoided or dealt with safely. Keep in mind the 4 RsRECOGNIZEREFUSERESPONDREPORTIt is best to act smartly when online. These 4 R’s can apply to many online safety hazards.For example – being aware of how a predator finds the victim and understanding that people online are strangers, allows one to act appropriately when faced with those situations:RECOGNIZE techniques used by online predators to deceive or intimidate their victims.REFUSE requests for personal information or a face-to-face meeting.RESPOND assertively by exiting the program, logging off, or turning off the computer.REPORT any suspicious or dangerous contact that makes you or your child feel uncomfortable.The 4 R’s also hold true for cyber bullying:RECOGNIZE ‘flaming’ and cyber bullying techniques and the bully’s screen name or address.REFUSE to open or read any message from a cyber bully.RESPOND assertively by leaving the chat room without responding or the letter unopened.REPORT cyber bullying to the ISP, the school, or law enforcement as needed to stop it immediately.And it is also true for identity theft scams. By being aware of the latest ploys such as phishing s (sending what looks like a reputable asking for personal information) one is better equipped to deal appropriately with them.RECOGNIZE techniques used by identity thieves to obtain people’s personal information.REFUSE to provide personal information by phone or if you didn’t initiate the communication.RESPOND assertively by contacting the three U.S. credit bureaus and put a fraud alert on your credit.REPORT any unusual, suspicious, or fraudulent activities to law enforcement authorities.
49A Second Take…Now you are going to look at the slides again and write a “script” to coordinate with them.Think about what you need to say with each slide and what your parents need to know. Pick a person to write out the script.Practice the presentation so it flows smoothly for parent/adult presentation.
50Personal Safety Online There are many dangers youth face while online, such as:Predators – strangers who may cause harmCyber bulliesInappropriate Web sites and materialAnd some that parents also face, such as:Identity theftMonetary theft
51PredatorsThose who use Cyberspace to hunt for victims to take advantage of them.The Facts:There are predators onlineThey use tools like social media, Instant messaging, etc. to get close to kids.Sometimes a victim is a willing participant and chooses to talk to a stranger.
52Cyber BullyingSending or posting harmful or cruel text or images using the Internet or other digital media source.The Facts:The Internet is a tool used to bully.People feel removed from what they say online. They feel anonymous.Unexpected participants: Anyone can join in.1 in 5 youth will be faced with a hurtful or mean message while online.
53Identity Theft The Facts: Posting personal information online makes it available for others to steal.With your personal information, someone can pretend to be you, use your credit card or bank account to buy things that you don’t know about.Personal information can also be stolen from you if you respond to s from strangers.
54A Little Prevention…Prepare yourself. Many online problems can be avoided or dealt with safely. Keep in mind the 4 RsRECOGNIZEREFUSERESPONDREPORT
55Now Use It! Keeping others informed on Internet safety is important. Now use the presentation you just helped create to reach others in your school, faculty, family, and in your community.
56That’s a wrap!You now know the tips and tools that can help keep you safe online! Just remember, when you’re online you aren’t invincible.