Using Someone’s Password Without Permission May Be a Crime This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.

Slides:



Advertisements
Similar presentations
Is the amount of time you spend on the internet healthy? This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
Advertisements

Digital Disasters Laura M Cyberbulling Digital Reputation Identity Theft Offensive or Illegal Content Sexting Unwanted Contact.
What is Cyberbullying? Cyberbullying is when one person or a group of people aim to threaten, tease or embarrass someone else by using a mobile phone,
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
 Identity theft is the taking of one’s personal information and using it for yourself. Usually for illegal reasons. Though its all illegal if you even.
Breaking Trust On The Internet
Cyberbullying information for teens. Are you a cyberbully? For the following questions: Give yourself a 0 = no, I have never done this 1 = yes, I have.
INTERNET SAFETY and Social Networking
Online safety & CSE PC Rachel Hall.
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
Kohlberg’s Moral Development Stages
SOCIAL DEVELOPMENT: CYBER BULLYING TEXTING/SOCIAL MEDIA LESSON ONE 8th Grade 1.
Not only was there offences for different crimes like murder and harassment etc. There were punishments for weird things back in 1850 down in San Diego,
Alternative Safe Environment Training Grades
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
By: Melissa Leyva & Connie Villarreal
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
By: Sophia Dermouche & Maheen Khalid
Use kind words, help when you can, share and take turns, listen to what others have to say, be honest and truthful, think before you speak out, remember.
What if I told you that a random stranger has access to…
By: 9E Caring Ambassadors Pleasant Unpleasant High FEELING Low ENERGY.
Mrs. Jefferson Business Information Management I.
Aggression.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Managing Conflicts and Preventing Violence Lesson 3 How do you think media violence impacts the emotions of those who watch it? How do you think media.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
NEW MEDIA MENTOR FOR DIGITAL CITIZENSHIP Rejecting Hate Online Lesson 14.
Cyber Bullying Cyber bullying can happen in many different ways. The mains ways are either texting on a phone or ing. Cyber bullying is a criminal.
SHOCKING SEXTING STATISTICS Counseling Department RHS.
Digital Citizenship Literacy
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
It’s a Big Deal. ‘It’s a Big Deal’  If a photo is sent to you, do not send it to other people.  If you receive a photo from someone you.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Carl Theragene. School to prison pipeline The school to prison pipeline is a process where you’re in school and end up in prison. There are the push out.
Juvenile crime. Don´t do it! I´m too young to go to court! Children as young as seven can be tried in a juvenile court. And if you commit a crime when.
Bullying, Cyberbullying, and the Law. Stop Hating Online: Pass It On TV Commercial Stop Hating Online: Pass It On.
 What do you use the internet for?  Discuss the positive and negative aspects of the internet.  Provide examples of 3 positive aspects and 3 negative.
 News article. OzP0QqsRg&feature=related.
PGHS Advocacy Digital Citizenship Lesson 2
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Activity 2 Sharing Images – The Law. Sexting
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
CYBERBULLYING Cyberbullying is when someone bullies others over the internet or on a mobile phone by sending abusive s or texts directly or by posting.
Lecture 3 Ethics in the Workplace Privacy and Social Networks.
By Konrad keller. People who have a phone are “cool” and people who don’t are considered not cool so the people with the phone exclude others that are.
ANONYMITY, JUVENILES AND SEX OFFENCES. JUVENILES  The age of criminal responsibility is 10 – nobody under that age can be prosecuted.  “Juvenile” defendants.
Malala Yousafzai Education Activist “Why is it that countries which we call strong are so powerful in creating wars but are so weak in bringing peace?
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
Cyberbullying Internet Safety. What is Cyber-bullying? Cyber-bullying is repeatedly hurting someone else through the use of technology. So, instead of.
Learning Outcomes: Anti-bullying Week I understand what bullying is I understand my rights and responsibilities as a member of the school community to.
NELSON ALTERNATIVE METHOD Kristie Shitley Nick Seguin Karen Brendel.
PSHE Monday 17 th March Aims and Outcomes By the end of this lesson you will … …be able to explain the risks associated with social networking.
Travis Hayes Logan Walker
● SmartLaw Sexting and the Law.
● SmartLaw Cyberbullying.
Kohlberg’s Moral Development Stages
SEXTING.
تكملة الوحدة الاولى الفصل الثاني بالكتاب للاطلاع ثم الفصل الثالث التخطيط لبناء الاختبارات التحصيلية الفصل الثالث من الكتاب (87-164)
Cybersecurity and Personal Finance
What makes a healthy relationship?
The wrong choices Taking and sending the photo Lowri Resource 3g.
Working out sexting – Results
Sexting and the Law.
CONTENTS     Enter text Enter text Enter text Enter text
Cybercrime By: Kimberly Foreiter
SmartLaw Cyberbullying.
Relationship and Abuse
NCPCR and UNICEF Media Guidelines
Presentation transcript:

Using Someone’s Password Without Permission May Be a Crime This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM

Discovering passwords is often easy The password may be weak It may have been shared The person might have walked away from their computer It may be automatically stored by the device Content Created by LOOKBOTHWAYS LLC iKeepSafe © All Rights Reserved Made possible by a grant from WebRoot October 2011 But that doesn’t give you the right to use them

Here’s what happened: Young man received text message with girl’s password Young man used password, sexualized her profile, and impersonated her in sexual messages to other boys. – Changed profile = libel – Impersonation = ID theft Result? Young man convicted - 90 days in a juvenile academy and probation Content Created by LOOKBOTHWAYS LLC iKeepSafe © All Rights Reserved Made possible by a grant from WebRoot October 2011

Questions to Ponder Have you ever used someone’s password without permission? Did you know using someone’s password may be a crime? Was the punishment this young man received fair? – If not, what is fair? Should the person who sent the password via text message also have been punished? Content Created by LOOKBOTHWAYS LLC iKeepSafe © All Rights Reserved Made possible by a grant from WebRoot October 2011

Weighing Ethics Several people received the password but only one abused it. Why didn’t others use the info? What could the people who received the password have done to make the situation better? What ethical considerations do you see in using information obtained without consent? Besides the criminal penalties, what other consequences could there be for this young man? Content Created by LOOKBOTHWAYS LLC iKeepSafe © All Rights Reserved Made possible by a grant from WebRoot October 2011

Takeaways The young man learned an important lesson in respecting the identity of others and in ethics…but he learned it in a very hard way. We learn either by doing, by thinking through potential actions and outcomes, or by seeing what others have done. Had he understood the consequences of his actions, do you think he would have abused her password, changed her profile, or stolen her identity to post sexual messages? How will you learn? Content Created by LOOKBOTHWAYS LLC iKeepSafe © All Rights Reserved Made possible by a grant from WebRoot October 2011

This iKeepCurrent TM lesson is brought to you by iKeepSafe TM Content Created by LOOKBOTHWAYS LLC iKeepSafe © All Rights Reserved Made possible by a grant from WebRoot October 2011