ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t e-mail Never post.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

TECHNICOOL A Technology Safety Program © 2011 PCAV.
Mindari Session Helping teenagers deal with Bullying By ARC Brian See
Definition Is when a child, preteen is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child, preteen, or teen.
Forms of Cyberbullying
Cyberbullying Old Problem, New Playground. Bullies are no longer restricted to the school yard. They are often online, out of the sight and earshot of.
Intentional and repeated use of technology to harass, threaten, embarrass, or target another person.
Cyberbullying.
A Guide to Internet Safety High School
Today’s Quiz 1. The most popular social networking site among young people is Twitter. 2. Nothing is private once it is posted on the Internet. 3. Teens.
Objective: –Today students will learn about Cyber Bullying. –Students will learn: What is Cyber Bullying? How it Works? Why does it happen? How to prevent.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Cyber bullying Lara Climer and Michele Fesenbek. Interesting Tidbits  Over 87% of teens age use the internet  95% of parents do not understand.
An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.
Online Reputation Matters Amy d. Howell. Most Popular sites.
Crossing the Line Cyberbullying Crossing the Line
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
CYBER SAFETY RACHEL FOULGER & JANELL TOMLINSON. Cyber Bullying Violence In Media Pornography Fraud & Copyright Be Kind On Line.
GUIDANCE LESSON INTERNET SAFETY/NETIQUETTE IF YOU DO NOT WANT IT TO BE TOMORROW’S FRONT PAGE NEWS, DO NOT SEND IT THROUGH TECHNOLOGY!!!
What is cyberbullying? Contributed by Joanne Thompson All resources in the "Safeguarding Resources" section of our resource bank have been submitted by.
By: Sophia Dermouche & Maheen Khalid
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Stay Safe in Cyberspace By: Mrs. Marple Never Give out personal information. Such as: Your home address Your phone number The name and location of your.
Stay Safe on the Internet!
Lisa Jolynn Elrod I NTERNET S AFETY MICROSOFT CLIPART.
Digital Citizenship Texting vs. Sexting Cyberbullying.
By: Brett Sauve. What is Cyber-bullying? Being tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
 ❂ Cyber bullying is a mean or threatening  ❂ Cyber bullying is forwarding a private IM communication to others  ❂ Cyber bullying is a humiliating.
Do pictures always give truthful information? Can publishing it be hurtful??
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
SEXTING THE DANGERS OF SEXTING AND WHAT TEENAGERS NEED TO KNOW!!!!!
Internet Safety KNOW HOW TO STAY SAFE ONLINE. You should never give out certain information over the internet.  Examples include:  Your last name 
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Cyberbullying What it is, How to deal with it, and more.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
I promise…. To always ask my parents before going online.
Tips for Students 1 Prepared by Tina Dixon School Counselor Geneva High School.
Cyberbullying Crossing the Line (With a Few Extra Vocabulary Words Added for Clarification Purposes Only)
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Safety and Security Online: Private Information. Identify private information Recall that private information should not be given out in cyberspace.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
DIGITAL CITIZENSHIP. Digital Citizenship covers 9 areas according to Mike Ribble, an expert in the field.  Etiquette  Communication  Literacy  Access.
What is Cyber-Bullying? “Cyber-Bullying” is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted.
 The use of new media to harass, threaten, humiliate, embarrass, or target another person.  It only occurs among young people (adults involved: cyber-harassment.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Cyberbullying and Cyberstalking BY MS. BARBARA WOOLLEY.
Cyber Bullying Counseling Sessions G. Malek Fall 2011.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
Social Media Smarts. Yep! That’s Me! I have had a cell phone since 5 th Grade I just got a cell phone this year I wish I had a cell phone I have an IPAD.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Online Safety! By: Michelle Deng.
Appropriate Use of Technology
Warrior Wednesday DIGITAL CITIZENSHIP.
Digital Citizenship and Social Media
SOCIAL MEDIA: ARE YOU PLAYING IT SAFE?.
Cyber Bullying.
Cyberbullying PREPARED FOR STUDENTS OF SHAC ST. JOHN’S COLLEGE.
Internet Social Media. Internet Social Media Benefits: Internet is a useful tool if utilized appropriately. Uses Benefits: Internet is a useful tool.
Presentation transcript:

ThinkB4uClick A Smart Guide to Internet Safety

Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post a picture on anything Stay out of ALL chat rooms Avoid YouTube at all costs

Tools You Can Use Privacy settings Security tools Trusted sites only Hard to guess passwords – Idea: Make a sentence, use the first letters I hope I graduate from school in 2013 = IhIgfsi13 Practice good DIGITAL HYGIENE

DTUI Driving drunk or on drugs = DUI DTUI- Digital Technology Under the Influence Never use digital technology when – Angry – Really tired – Tipsy – Being influenced by goofy friends

Why Not?! It can hurt someone’s feelings Ruin their reputation Open them up for cyberbullying Ruin your reputation Cost you friends Cost you a job Cost you your freedom

Personally Identifiable Information (PII) – Can be tracked back to you – Can be used to identify you specifically Generic – Removes all PII – Leaves only facts: age, gender, reading level Profile – Tied to online identity Privacy Settings

Security Cell phones – Password protect them – Ask about call/text blocking – Don’t answer if you don’t recognize – Report immediately if lost Spyware – Keep a program running to protect yourself Settings – Look for them, explore them, use them

Security 2.0 Passwords – Keep them easy to remember – Make them hard to guess – Do not give them out – Change them if you have a fight or breakup – Do not let people manipulate you You can trust me…. If you loved me, you would…

Facebook Keep your password secure Log off EVERY TIME Don’t post anything you would not want your parents, police, or a creeper to see Think first about who will see it Think about later – College admissions – Job recruiters

Cell Phones Password protect your phone Information that can be read from your phone – Your name – Your address – Your friends numbers – Your parents numbers – Your pictures and all their pictures – Your text messages

Cybercrime Identity theft Threats of bodily harm Cyberstalking Cyberbullying Fraud Scams Craigslist

Cyberbullying When a minor is threatened, harassed, humiliated, or embarrassed by another minor using Internet, interactive technologies, or cell phones Not a one time deal Does not involve adults May not be taken seriously since it happens online- REPORT IT!

Cyberbullying 2.0 Can lead to – Fights – Suicides – Murder How to deal with it – Tell them to stop – Save all messages, electronic copies especially – Find ISP address of offender – Call police

Cyberstalking & Cyberharassment Most often involves adults Usually used by chickens – Revenge – Fear – Jealousy – Bigotry – Entertainment

Cyberstalking & Cyberharassment Uses digital technology to torment, harass, annoy, or set victims up for abuse by a third party Increases as prices go down and availability goes up Is punishable by same laws that govern stalking, harassment, and threatening

Distracted Driving Texting blamed in Chilton County I-65 deaths of woman, baby Published: Saturday, August 27, 2011, 10:00 AM Updated: Saturday, August 27, 2011, 10:25 AM Not just texting- eating, make-up, GPS, music Keep 2 eyes on the road 2 hands on the wheel Can’t resist? – Put your phone in the trunk

Sexting Sending nude or sexually suggestive pictures of yourself or others using digital technology Most think it is no big deal Most people share these pics Think of your mom or your younger sibs seeing it on Facebook Carries child pornography charges If convicted, you register as a sex offender

What to Do? UzUr Head B-Y’s ThinkB4uClick