Remember the rules of online safety.. Never disclose personal information Full name Home address Phone number Social security number Passwords Names of.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Let’s Talk About Cyber Security
The Internet.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
“I think kids should stay safe in the internet by not giving out personal information”.Giving out personal information and giving your address could have.
INTERNET SAFETY FOR STUDENTS
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Threats to I.T Internet security By Cameron Mundy.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Online Safety 2.02 Remember the rules of online safety.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
Surfing the Internet Teaching Children about the SMARTS of using the Internet Are you being responsible when you use the Internet??? B E SMART! B E RESPONSIBLE!
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Agenda for August 27, 2014 Daily Prayer (Student will be chosen to read) Typing Teacher’s Lecture (Electronic Communication and Online Safety) –Student.
Digital Citizenship Grade Create a map that shows all of the places your family goes online and with whom you connect With a parent, find three.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Information Security Sharon Welna Information Security Officer.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Cassidy Culligan Digital Citizenship Project ED 505.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
I promise…. To always ask my parents before going online.
What is Spam? d min.
Online Safety 2.02 Remember the rules of online safety.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Julie Latham Digital Citizenship: An Informational Guide.
Cyber Safety Jamie Salazar.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Any criminal action perpetrated primarily through the use of a computer.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
How to be E-safe Objective To know how to use Technology responsibly in today’s world. Outcome To create a Responsible use of Technology poster suitable.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Internet Safety How to stay safe online.
2.02 Remember the rules of online safety.
Internet Identity, Safety, & Security
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
How to build a good reputation online
Remember the rules of online safety.
2.02 Remember the rules of online safety.
Scams, Identity Theft, and Viruses Kelly & Caitlin
ICT Communications Lesson 3: Internet Life and Privacy
Internet Safety – Social Media
Presentation transcript:

Remember the rules of online safety.

Never disclose personal information Full name Home address Phone number Social security number Passwords Names of family members Credit card numbers Your photograph Watch the video “Survivor Diaries”“Survivor Diaries” Why?

Do you have a Facebook account? According to the article published by Scott J. Cech, “..., a significant percentage of colleges and universities sometimes dig into would-be undergraduates’ social networking profiles.” The article describes how some college admissions officers research a potential student’s Internet information to assist in the careful and limited selection of students. “No school wants to give a very prestigious scholarship to some [student] who’s going to show up in the newspaper the next day with pictures of [student] standing on a beer keg.” Employers are also investigating social networking profiles of potential employees. Slide 3

Personal Safety – Warning Signs What does online yelling look like? What should you do if someone is yelling at you online? What is a cyberbully? What should you do if you are bullied online? What should you do if someone sends you explicit materials? Watch the video “Cyberbullying: You Can’t Take it Back”“Cyberbullying: You Can’t Take it Back” Watch the video “Your Photo Fate”“Your Photo Fate”

Safeguard against financial risk If purchasing something online, make sure that the site is secure. The URL should begin with https: A lock icon is displayed and is interactive – not just a graphic image. Does the site contain a site seal? Many, but not all sites will contain a seal that is highly visible and difficult to copy which indicates a safe site.

What are computer hazards? Viruses – software that attaches to programs installed on a computer or that are programmed to load when an is opened. Spam – unwanted s from advertisers and users that contain malicious and explicit material or try to sell products or services. Spyware/Malware – malicious software designed to take partial control of a computer’s operation without the knowledge or consent of the user. Often used to track a user’s browsing and spending habits while online and also to mine for personal information.

Protect against online hazards Beware of any s or sites that promise you will get rich quick. These s are usually a way for hackers to mine your computer for personal or financial information. Never open an from someone you do not know. Never download programs unless you know they are safe and contain no hidden files.