Internet Safety & Acceptable Use Standards

Slides:



Advertisements
Similar presentations
Internet and Network Safety YKSD Policies. YKSD Board Policies 10 Pages of YKSD Board Policies exist for your protection. They are available from your.
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Internet Safety in Schools
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Internet Safety in Henry County Schools By the division’s Internet Safety Task Force.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
Media Center Essential Question How can I be an effective user of information?
Jana Dixon Dawson Educational Cooperative
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
INTERNET SAFETY FOR STUDENTS
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Internet Safety A User-Guide for Students!. PURPOSE: To review with you current trends and information on the Internet Internet access is central to everyday.
IT Security for Users By Matthew Moody.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
00870B2F.0/Internet%20Safety.jpg.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
INTERNET SAFETY.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
Branch of computer security specifically related to the Internet. Security for transactions made over the Internet. Internet security encompasses browser.
Danielle Hildebrant  Acceptable Use Policies ◦ document stating the use and limits of the network or internet  Cyberbullying ◦ Bullying that takes.
Child Safety Online November 2011 Ann Hines, CISSP, GLEG.
Top Tips for Online Safety Speaker Name Speaker Organization.
DIGITAL CITIZENSHIP ED 505 TECHNOLOGY AND EDUCATION (REVISION)
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Internet Safety.
Safety.
Keeping your children safe with technology
Presented by Miss Levine
To Know what Cyber crime is
E-Safety Briefing
Are You and Your Students Responsible Digital Citizens?
Information Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
What Teachers and staff need to know!
Technology Guidelines for Students
Dangers of the internet
Information Security 101 Richard Davis, Rob Laltrello.
Safety on the Internet By: Rachel Morello, Eddie Miller, Kyle Hayward, Heather Shuboney, and Lisa Ross.
Online Safety.
Appropriate Use of Technology
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Digital Citizenship & Social Media.
Information Technology Services Education and Awareness Team
Internet Safety and Acceptable Use Policies.
Internet Safety and Acceptable Use Policies.
Acceptable Use Policy Grace Lowe.
Internet Safety Vocabulary
Teaching our children the safe and responsible use of ALL technology.
Technology Guidelines for Students
Helping your children to stay safe online
Follow safety rules so that YOU: Avoid getting HURT.
Rules To Help You Navigate the Internet Safely
Welcome… E-safety & Cyberbullying Parent Awareness Presentation.
Welcome to the E Safety Workshop
Student User Agreement and Policy 2022
Information Technology Services Education and Awareness Team
Social Media Dangers.
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Internet Safety & Acceptable Use Standards Marketing 1

Identify Internet safety issues and procedures for complying with acceptable use standards. Task 33

LCPS Acceptable Use Policy http://www.lcps.org/cms/lib4/va01000195/centricity/domain/63/_files/srr.2012.english.pdf

Laws & Guidelines Internet Usage child protection Copyright fair & acceptable use File Sharing safety; privacy rights

The Importance of Internet Safety Personal Information Predators Security Attacks

Soliciting Personal Information Old School Online Dumpster Diving Mail Theft Social Engineering deception; con game Shoulder Surfing wandering eyes Stealing Personal Items wallet or purse Man-in-the-Middle intercepts information between two parties Phishing or Vishing voluntary surrender of information through deception or trickery Pharming check for the padlock symbol Search Engine Phishing too good to be true websites SMiShing texting – do not dial back Malware downloads Most Common Schemes  http://www.utica.edu/academic/institutes/cimip/idcrimes/schemes.cfm

Cyber Predators Online predators are adult online users who seek to exploit vulnerable children or adolescents. Cyber predators use information and communications technology and the Internet to locate, target, and victimize minors. Don’t download images from an unknown source. Don’t reveal personal info, especially age and gender, or family info online. Don’t continue communication if it gets too personal, and don’t keep it to yourself – tell someone. Don’t agree to meet someone in person that you’ve met online.

Security Attacks Software Applications Way to Protect Your Computer Norton AntiVirus McAfee Total Protection Install a firewall, antivirus software, and anti- spyware software. Use complex & secure passwords. Verify security settings on Internet browsers. Backup files regularly. Ten Common Attacks  https://securityintelligence.com/the-10-most-common-application-attacks-in-action/

The VDOE says… The Internet is a powerful tool that should be used wisely. Students should be taught specifically how to maximize the Internet’s potential while protecting themselves from potential abuse. Not all Internet information is valid or appropriate. Internet messages and the people who send them are not always what or who they seem. Predators and cyberbullies anonymously use the Internet to manipulate students – avoid dangerous situations and get adult help. Playing games and downloading music or video files can be enjoyable, but know which activities are safe and which are legal. Guidelines and Resources for Internet Safety in Schools (VDOE) http://www.doe.virginia.gov/support/safety_crisis_management/internet_safety/guidelines_resources.pdf

Virginia Department of Education Acceptable Use Policies Individual Assignment

Real World Consequences Xerox fired 40+ employees for downloading inappropriate images, choking the computer systems, and preventing employees from sending & receiving legitimate emails Wachovia Securities fired six brokers for sending inappropriate images in e-mails Chevron settled out of court for $2.2 million after being sued for an e-mail that circulated within the company containing offensive material Microsoft Corporation settled for $2.2 million in a sexual harassment lawsuit involving inappropriate emails http://www.isaca.org/Journal/archives/2005/Volume-6/Pages/Best-Practices-for-Establishing-an-Effective-Workplace-Policy-for-Acceptable-Computer-Usage1.aspx

Class Activity How do you use technology safely? When to use school computers/technology? What violates LCPS/BWHS AUP? Who/when do you report an issue online at school? misuse cyberbullying Tip you would give a 5th grader to keep them safe online?