BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Hart District Acceptable Use Policy Acceptable Use Policy.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Internet Safety Tips for Parents.
INTERNET SAFETY.
How to keep your kids safe online
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Emily Snyder, William Darras, Stephanie Berger.  40Y 40Y.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
VISD Acceptable Use Policy
Grade 5 Student Assistants
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
Brandon Hall CSC 540.  The US Government first attempted to filter the Internet in the early 90’s.  This was an attempt to protect minors against the.
Tia Dimou.  The internet is a wonderful resource for people of all ages  Users must be cautious and aware of what information they input  Credit card.
Freedom of Speech in Cyberspace
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Ch3 Freedom of Speech The US Constitution.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Complying with CIPA: What Libraries Need to Know Bob Bocher Technology Consultant Wisconsin Department of Public Instruction State Division for Libraries,
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Digital Citizenship Created By: Kelli Stinson June 2011.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Chapter 18 Obscenity & Pornography. Pornography Protected by First Amendment Unless child pornography-not protected PgP BUSA331 Chapter 182.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
By: Elizabeth Scruggs Digital Citizenship Project.
Cybersex, Porn, and Filtering Information Technology and Social Life April 18, 2005.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
How is Democracy Socially Constructed? Is it Through Conflict We Find Social Reality? Presented by: Chelsea Jonson Spring
Are you a digital citizen? Zeborah Ware 1. Table of Contents Definition of Digital Citizenship Page 3 Classroom Rules for Cell Phones Page 4 Social Networking.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
I NTERNET S AFETY P ROJECT By: Rob Lackey, Erica Loose and Jessica Walters.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship Jacinta Little ED 505. Table of Contents Definition of Digital Citizenship………………………… Slides 3-4 Social networking…………………………………………
When young people go online:  13% received unwanted sexual solicitations  34% communicate with individuals they never met  11% establish close personal.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Laws and Rules That Govern Internet Safety Ashley Martin.
Miller County Board of Education Updated 2/7/2016 Microsoft Office Clip Art.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
By: Katie Rosengrant, Jacquelyn Brode, & Jamie Wheeler.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Internet Safety Mrs. Lijó. Some Names for the Internet Cyberspace The Web The Net The Information Highway The World Wide Web.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Danielle Hildebrant  Acceptable Use Policies ◦ document stating the use and limits of the network or internet  Cyberbullying ◦ Bullying that takes.
DIGITAL CITIZENSHIP ED 505 TECHNOLOGY AND EDUCATION (REVISION)
Online Safety! By: Michelle Deng.
Internet Safety Project
LAUSD Responsible Use Policy (RUP)
Emily Snyder, William Darras, Stephanie Berger
Teaching Internet Safety
Appropriate Use of Technology
Internet Safety Tips for Parents.
A Gift of Fire Third edition Sara Baase
Rules To Help You Navigate the Internet Safely
Freedom of Speech in Cyberspace
Student User Agreement and Policy 2022
A Gift of Fire Third edition Sara Baase
Presentation transcript:

BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety

1. Internet Safety In Schools 2. Laws and Rules to Assure Internet Safety 3. Our Suggestions 4. Digital Citizenship Education

Internet Safety in Schools ©Cyber bullying ©Illegal Downloading ©Identity Theft ©Viruses ©Privacy

Cyber bullying Sending hurtful messages, posts, photos, or conversations online or on cell phones. Occurs in cyberspace so it can be hard to detect 03Br1dwJR8http:// 03Br1dwJR8

Illegal Downloading Easier to do now with the ease of access online with computers Issue of not paying people for their work IT IS ILLEGAL! It is a form of theft Know the difference between legitimate sites and sites that are illegal

Identity Theft Impersonating someone, usually for financial gain (School CIO) Password Protection Don’t give out too much information Do not post important information

Viruses Use an up-to-date antivirus program Scan your computers regularly with the program to help prevent viruses Do not open s or attachments from unknown senders Do not download information from unknown sites

Privacy As technology's power increases, the ability to keep your information private gets harder to do. Everything you put online is available to the public! Control privacy settings on social networking sites and other websites for school use Everything you post online allows you to leave a “digital footprint”

Laws and Rules to Assure Internet Safety ©The Communications Decency Act (CDA) ©The Child Online Protection Act (COPA) ©The Children’s Internet Protection Act (CIPA) ©Sexual Predator Laws ©Laws Relating to Filtering, Blocking and Usage Policies in Schools and Libraries for Pennsylvania

The Communications Decency Act (CDA) Passed in 1996, the CDA represents Congress’s first attempt to regulate children’s access to sexually explicit material on the Internet. The CDA made it illegal to put “indecent” content on the Internet where kids could find it. However, the Supreme Court unanimously declared the CDA unconstitutional in 1997 in Reno v. ACLU for “broad suppression of speech addressed to adults”; the term “indecent” was found to be too vague.

The Child Online Protection Act (COPA) In 1998 a narrower version of the CDA required commercial Web sites to verify proof of age before giving users access to sexually explicit material considered obscene for minors. COPA was immediately challenged by the ACLU and other civil liberty organizations, and in 1999 a permanent injunction was ordered against its enforcement. On May 13, 2002, in ACLU v. Ashcroft, the Supreme Court directed a lower court to reexamine its ruling that COPA was unconstitutional. On March 7, 2003, the court again found that COPA was unconstitutional. On June 29, 2004 the Supreme Court kept in place the 1999 lower- court ruling against the enforcement of COPA, but ordered the lower court to consider whether recent advancements in filtering technologies could protect children more or less effectively than the criminal sanctions specified in COPA.

The Children’s Internet Protection Act (CIPA) In 2000, Congress enacted CIPA, which took effect in April 2001, requiring schools and libraries receiving federal technology funds to install pornography-blocking software on their computers. The American Library Association filed suit alleging that the library portion of CIPA was unconstitutional on its face. On May 31, 2002, the U.S. District Court for the Eastern District of Pennsylvania agreed. The U.S government appealed that decision, and on June 23, 2003, the Supreme Court overturned the district court’s ruling. (The school portion of CIPA has not yet been challenged, so its constitutionality remains untested.)

Sexual Predator Laws Federal laws have been enacted to protect children from people who lure or attempt to lure them into an offline meeting for the purpose of performing illegal sexual acts or coercing them to provide sexually explicit photos of themselves. In April 2003, Congress passed a law that provides wiretapping authority for seven sexual offenses, including child pornography and the sexual exploitation of children. Part of a broader child-protection bill entitled the Protect Act of 2003, which also mandates the Amber Alert system for abducted children, this law expands federal law-enforcement agencies’ wiretapping authority to catch online predators before they strike.

Laws Relating to Filtering, Blocking and Usage Policies in Schools and Libraries in Pennsylvania 24 P.S – 4612 Requires school boards and publicly- funded libraries to adopt and enforce acceptable use policies for Internet access that include the (1) use of software programs reasonably designed to block access to visual depictions of obscenity, child pornography or material that is harmful to minors; or (2) selection of online servers that block access to visual depictions of obscenity, child pornography or material that is harmful to minors #stateshttp:// 491#states

Our Suggestions ©Visibility ©Search Safely ©Stranger Danger

Visibility Place your computer in a centralized place in your classroom so that you are aware with what is being searched and viewed. –Especially important for observing children’s activity online

Search Safely Place security restrictions Use age appropriate websites Use filtering software –Helps to filter our inappropriate content

Stranger Danger Do not open s from unknown people –Could contain: Inappropriate Content Viruses

Digital Citizenship Education ©Think before you post ©Give credit when credit is due ©Cheating is still cheating online ©Privacy Counts ©Responsibility

Think Before You Post Think before you post something or even send a text message It is virtually permanent Cannot be erased

Give Credit When Credit Is Due Respect others’ work Give credit when using others’ work Cutting and pasting without credit is plagiarizing

Cheating is Still Cheating Online Use your self-pride –Do not download illegally –Do not use technology to cheat in school –Do not plagiarize

Privacy Counts Nothing is as private as you think Check your privacy settings Do not post anything that you do not anyone else to see

Responsibility Be responsible about sites you visit and things you post You are responsible for what you put online Use the internet WISELY

Works Cited le/880http:// le/880 ertips/virus_tips.htmlhttp:// ertips/virus_tips.html bid=13491#stateshttp:// bid=13491#states

Template Provided By 500,000 Downloadable PowerPoint Templates, Animated Clip Art, Backgrounds and Videos