An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.

Slides:



Advertisements
Similar presentations
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
 NYS Internet Crimes Against Children Task Force E-Safety Mr Trofimczuk E-Safety 1.
Forms of Cyberbullying
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
INTERNET SAFETY.
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
Smart Choices for our 21st Century Cyber Surfers
How to keep your kids safe online
Cyber Safety in Schools
e-safety and cyber bullying
Using internet and cell phones safely
CYBERBULLYING INFORMATION AND PREVENTION August 2009.
What do I need to know?.   Instant Messages  Social Networking.
 Grades 5-8 – 56 out of 66 – 85%  Grades 9-12 – 79 out of 85 – 93%  Grades 5-12 – 135 out of 151 – 89%  100% of the Juniors and Seniors use a social.
Internet Safety Awareness
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
CyberSafety A Lesson in CYBERWORLD Culture, Customs, Culture, Customs, Language, and Safety.
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Stay Safe in Cyberspace By: Mrs. Marple Never Give out personal information. Such as: Your home address Your phone number The name and location of your.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Video: SNL Clip Quick Facts Online teens admit that they frequently communicate with people they have never met. – 54% have Instant Messaged a stranger.
E.H.M.S. Parent/Guardian Workshop Internet Safety (In conjunction with E.H.M.S. Open House) When: Wednesday, September 19 th 8:00-8:30 pm Where: E.H.M.S.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 NYS Internet Crimes Against Children Task Force Online Safety for Middle and High School Version 4.0 – 10/
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
 NYS Internet Crimes Against Children Task Force Online Safety for Middle and High School Version 5.0 – 8/
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Do pictures always give truthful information? Can publishing it be hurtful??
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Cyber Bullying By Mrs. Giambri. What is Cyber Bullying? What is Cyber Bullying? ( What is Cyber Bullying? Cyber bullying.
1 CYBER SAFETY.  Online Actions  Offline Consequences  What you type, say, or do online can have a short and/or long-term effect on your life. 2.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Internet Safety KNOW HOW TO STAY SAFE ONLINE. You should never give out certain information over the internet.  Examples include:  Your last name 
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Berkeley Unified School District Cyber Savvy social networking and netiquette.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Welcome to Technology Thursday, January 15, 2015.
Being Good Digital Citizens with Today’s Technologies.
CYBER SAFETY do now… How is the internet used in your life? List at least 2 ways that you use the internet.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cyber Morality and Citizenship Greater St. Albert Catholic Schools Parent Presentation Learning Technology Services,
Welcome to Technology Wednesday, January 14, 2015.
T HINK ! Before You Post A lesson on Internet Safety Source:
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Freshman Seminar. Find kids through social networking, blogs, chatrooms, instant messaging, , discussion boards, and other websites. Try to seduce.
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
Cyberbullying Internet Safety. What is Cyber-bullying? Cyber-bullying is repeatedly hurting someone else through the use of technology. So, instead of.
94% of teens aged 12 – 17 use the Internet. 84% of online teens have a social networking profile. 84% of teens have cell phones; more than 88% are texting.
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
Cybersafety 4 Kids: Smart Moves in an Online World.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
A predator might talk to you about: Anything that interests you Sports School work Things that make you angry or sad Your home life.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Appropriate Use of Technology
Rules To Help You Navigate the Internet Safely
Presentation transcript:

An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday Night Live

Predators Your Online life Cyber Bullying RevealingRevealing Too Much Click on text to skip to specific sections

Video: SNL Clip

Quick Facts Online teens admit that they frequently communicate with people they have never met.  54% have Instant Messaged a stranger  50% have ed a stranger  45% have participated in a chat room discussion with a stranger 27% of teens said that they have known a friend to actually meet someone whom they only knew online. 47% of children have received s or IMs with attachments or links to pornography.

Quick Facts In 2007, more than 30,000 known registered sex offenders had active myspace accounts. According to the Center for Missing and Exploited Children, each week an average of 50 children fall prey to online predators (through social networking sites, chats, online gaming, and other web tools.) Most predators will spends months forming a friendship with the child to gain their trust.

Video: Everyone Knows Your Name

Predators Entice If Anyone:  Talks about inappropriate things  Sends you sexually explicit material  Asks for your personal information  Talks about or wants you to do something that makes you uncomfortable  Wants to meet you in person

Survivor Diaries Video: Survivor Diaries

Survivor Diaries Video: Julie’s JourneyActivity: Julie’s Journey

Risks of Meeting Off-line

Warning Signs If someone tries to:  Isolate you from family and friends  Turn you against your parents or guardians  Make you keep things secret  Send inappropriate material or talk about explicit topics  Threatens you!

Never Meet Off-Line Video: Promises

You Can’t Take It Back Words and photos published online are there for the world to see - once out there, they can’t be taken back. Any photo or video posted online can be saved, accessed and altered by anyone. This applies even if your page is private. Private conversations can be saved.

You Can’t Take It Back Video: Bulletin Board

Why Should You Care? Family, friends, parents, teachers, and others will likely check your online life. College admissions officials often check to see what online information they can find on candidates. The same applies to employers you might want to work for in the future. Interested in a career with a public life? Beware what you post! Profiles & blogs may be viewed by online predators.

How Much is Too Much? Information that could lead a predator to your door: Photos or video should never be posted online if they show:  Backgrounds that reveal identifying information  Sexually provocative poses  Too much skin Name age birthday phone number School schedule location

Tracking Teresa Video: Tracking TeresaActivity: Tracking Teresa

Cyber-bullying What is it?  Spreading rumors and gossip  Posting pictures without consent  Obtaining a password to assume a person’s identity  Harassing or threatening with mean or bad language

Cyber-bullying Video:Can’t take it back Activity:Can’t take it back

Cyber-bullying Video: Broken Friendship Activity: Broken friendship

Cyber-bullying Consequences  Broken friendships  Hurting people  School Consequences  Prosecution by police Harassment Posting sexually explicit photos of people under 18 is illegal (even if it is your friend)

What to do? If you are ever cyber-bullied:  Do not respond  Save the evidence  Tell an adult you trust  Report it to your ISP (Internet Service Provider) If someone threatens you, or you feel in immediate danger:  Contact the local police!

Your Online Life

Anything Wrong Here?

Comments Can Get You in Trouble Cell phone numbers Location / gathering details Last names IM screen names Descriptions Identifying information

Parents Colleges Employers Principals Predators Relatives Teachers

Webcams & Video Videos can be used against you for exploitation Check your surroundings for information that could reveal your location Remember any video can be accessed and altered by anyone Webcams left turned on, may be accessed at the server level making it possible for others (predators) to watch you without your knowledge

Cell Phones Never post your cell phone number online Don’t respond to harassing text messages Never take or send provocative photos or video of yourself Having a cell phone is a privilege, not a right!

Online Gaming Use voice-mask and other safety features to hide your age and gender Don’t get angry! Walk away if things become too “heated” Have a life outside of gaming!!

, IM, Chatrooms Communicate with people you know in person Keep your personal information private No meeting off-line Don’t respond to offensive messages Choose gender-neutral, non-revealing, non- suggestive screen names and addresses

File Sharing It is illegal to share copyrighted material without permission such as music, movies, etc. File sharing settings can slow your computer Downloading from unknown sources is the easiest way to get a computer virus

Spyware, spam & scams Only download from trustworthy sources to prevent spy-ware and viruses. Protect your privacy and don’t give out information to soliciting sites and . If an offer seems too good to be true, it usually is!

Make Safer Choices YOU control your online image and how much information is revealed Be a good friend and sibling, and encourage others to be safer online Talk to an adult you trust if anything makes you feel scared or uncomfortable

Resources for YOU  If you or someone you know has been victimized, tell a trusted adult and report it to the Cyber Tipline.  Watch the video from this presentation again, access online safety activities, get more information.