Digital Citizenship Lesson Plan
|
|
- Elwin Houston
- 8 years ago
- Views:
Transcription
1 Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. OBJECTIVES: To help participants identify risky behavior when going online To teach methods to reduce risk when online To explore resources that cover the topics of identity theft, cyber bullying and other threats To engage in coversation that helps to raise awareness of the risks Lesson Plan The topic of Digital Citizenship is an important one, but may not be one that your participants choose when deciding which workshops to attend. It is that reason that we have created the Internet Safety Tips handouts that you can use at your trainings. Each topic should be delivered in minutes at either the beginning or end of your training. That way we are still delivering these important messages without dedicating an entire session to the topic. For each topic there is a 1-page handout with facts and information, as well as links to resources on the TechTECS website. There are also infographics on the website that you can review with the group if there is time. These topics can generate lots of good conversation, so if you have an engaged group it may be good to go over the Tips sheet at the end of the training so that it doesn t take up too much training time. Internet Safety Tips Topics Identity Theft Protecting Future Reputations Password Tips and Tricks CyberBullying A Parents Guide to Mobile Device Security CyberPredators
2
3 Identity Theft Identity theft has been a problem for many years, but with the influx of online shopping, mobile devices, social media and the amount of information available online, the ID theft problem keeps multiplying. ID theft doesn t always mean financial exposure, it could also impact your reputation if someone is pretending to be you on social media sites, or when using your mobile device. It is important for you to understand the risks and to inform your loved ones as well. To learn more about identity theft, explore resources and access quizzes to see if you are at risk for identity theft, visit: TechTECS.com/digital-citizenship Who is most at risk for identity theft? Children Are being targeted 35 times more often than adults. People with social media profiles Due to the personal information they put on their profiles. Smartphone Owners 7% of smartphone owners were victims of ID fraud. This is 1/3 higher incident rate compared to the general public. Deceased people Nearly 3 million of stolen identities are that of deceased people College students More often college students have good credit scores, making them an ideal target. Victims of data breaches Are 9.5 times more likely to be a victim of ID fraud. Higher income individuals Those with higher incomes are more likely to be victimized Did you know? In the US more than 11.6 million adults became victims of identity theft. 62% of smartphone owners do not use a password on their home screen 32% of smartphone owners save log-in information on their device. Every three seconds someone s identity is stolen. Victims who found out about their identity theft more than six months after it happened incurred costs four times higher than the average 58 hours is the average amount of time victims spent repairing the damage done to existing accounts 43% of identity theft occurrs from stolen wallets, check-books, credit cards, billing statements, or other physical documents Facts and Statistics from
4 Protecting Future Reputations Social media, can be a good, positive tool if used responsibly. It is those that choose to put reputation damaging photos and comments on their feed or profile pages that need to think about how that will affect their futures. Colleges, scholarship readers, employers, coaches, teachers and family members access the Internet to gather information on people they are interested in. How you portray yourself online today will follow you into the future. To learn more about protecting your online reputation and explore resources visit: TechTECS.com/digital-citizenship How do you protect your digital self? Join social media sites- This may seem counter productive, but by having a clean profile, you show you can be a responsible user of the technology. No profile at all may raise flags that you had to delete it all. Think before you post! - If you wouldn t say it at a Thanksgiving table or during a staff meeting at work, then don t say it online. Use the 80/20 Rule - If you have a professional Facebook page or Twitter feed, keep the content 80% professional and 20% personal. The 20% personal can help people get to know you better, just be sure to not get TOO personal! Google Yourself - It really doesn t matter which search engine you use, just be sure to search for yourself, your children and your company to see what others see when looking you up online. In 2010, 57% of adult internet users now use search engines to find information about themselves online, up from 47% in In 2010, 46% of online adults have created their own profile on a social networking site, up from just 20% in In 2010, 46% of internet users search online to find information about people from their past, up from 36% in Likewise, 38% have sought information about their friends, up from 26% in Facts and Statistics from
5 Password Tips and Tricks For the most part, your data is only as secure as you are. If you aren t using a secure password, then you are opening yourself up to identity theft, fraud and financial loss. Creating and maintaining a unique, secure password for all of your web based sites may seem like a daunting task, but a few tips and tricks may help you to keep your information safe. To learn more password tips and tricks and explore resources visit: TechTECS.com/digital-citizenship How do you create a good password? Use a variety of character types- Use upper and lower case letters, numbers & symbols when creating a strong password. Don t use words found in the dictionary - You may think you have a clever password, however, if the word can be found in the dictionary, or in the dictionary written backwards, then the password can be easily hacked. Don t use numbers or names that identify you - Your pets or kids names, your birthday or your phone number are all examples of poorly chosen passwords that can be easily guessed. Don t write them down and place in an obvious location- A sticky note on your monitor or under your keyboard is not a good place to put passwords. If you must write them down, put them in a secure spot, such as in a safe. Create a password scheme you will stick to- Choose a scheme that you will remember, such as using 3 for E or $ for S ($pagh3tti) Use a phrase or lyrics instead of a word- Using this method you could use the entire phrase, or just the first letter of each word. For example, ilov3th3gr33nbaypack3rs or iltgbp. A computer loaded with the latest virtualization software and high powered graphics cards can now crack an eight-character password in 5 1/2 hours. The average internet user has 25 online accounts, 6.5 passwords and waits an average of 3.1 months before changing passwords. 66% of people online utilize only 1 or 2 passwords for all of their accounts. Facts and Statistics from
6 Cyberbullying Cyber bullying is defined as a young person tormenting, threatening, harassing, or embarrassing another young person using the Internet or other technologies, like cell phones. At first thought, it may seem like less of an issue if the bully is hiding behind a screen, however, studies have shown this type of bullying can be just as dangerous, if not more, as the face-to-face kind. To learn more about cyber-bullying and explore resources visit: TechTECS.com/digital-citizenship/ How do you identify and stop cyberbullying? Talk to your kids- Have a conversation about bullying, sometime kids may think they are just teasing, and not realize the impact they may be having on another child. Keep a record- There are antibullying laws in many states. If your child is being bullied and the bully won t back down, the transcripts of the comments can help if law enforcement gets involved. Nearly 43% of kids have been bullied online. 1 in 4 has had it happen more than once. 70% of students report seeing frequent bullying online. 81% of young people think bullying online is easier to get away with than bullying in person. 53% of kids admit having said something mean or hurtful to another person online. More than 1 in 3 have done it more than once. Over 80% of teens use a cell phone regularly, making it the most common medium for cyberbullying. Over 25% of teens have been bullied repeatedly through text messages. 68% of teens agree that cyber bullying is a serious problem. Girls are about twice as likely as boys to be victims and perpetrators of cyber bullying. Only 1 in 10 victims will inform a parent or trusted adult of their abuse. 1 in 6 parents know their child has been bullied online. Cyberbullying victims are 2 to 9 times more likely to consider committing suicide. Facts and Statistics from
7 Taking Back Control: A Parents Guide to Managing Technology at Home Generally speaking, kids today know more about technology than their parents do. Even though the kids may know more about the technology, it doesn t mean parents should remain in the dark when it comes to the latest devices. Parents are still the ones in charge and they should remain that way by setting some rules and guidelines for their kids to follow. To learn more about managing devices and exploring resources, visit: TechTECS.com/digital-citizenship/ How do you manage your kids and their devices? Set some ground rules- Many kids are given a laptop, ipad or cellphone by those who love them and no ground rules are set. Remember, these devices access the world and there should be some rules in place to keep your kids safe. Limit Online Access- Nothing good happens after midnight, so there is no reason for kids to be online that late at night. You can set your wireless router to deactivate at certain hours, such as from 11:00 PM to 6:00 AM. If they have smartphones with data plans, have them turn them in at a certain time to be charged for the night. Plus, your kids need their sleep! Know what devices go online- Many video gaming units have internet access. Friend your kids on social media- If everyone else who are friends with your child knows what they are up to, you should too. It isn t an invasion of privacy. They are minors and your responsibility; your house, your rules. 93% of teens ages go online 69% of teens have their own computer 24% of teens with a game console use it to go online 73% of teens are on a social network 37% send messages to friends every day As many as 7.5 million Facebook users in the U.S. are under age a violation of Facebook s user policies A 2010 Pew Internet Project survey found that 75% of those ages have cell phones, up from 45% in Facts and Statistics from
8 CyberPredators We all remember when 20/20: To Catch a Predator aired on TV. People were shocked to see the predators that were trying to meet and take advantage of young kids. What was even more disturbing when the facts came out was that many of these people were from respectable professions, such as doctors and teachers. So how can we keep our kids safe from those who look for prey online? Here are some tips that may help you. To learn more about cyberpredators and to explore resources, visit: TechTECS.com/digital-citizenship/ How do you keep your kids safe from predators? Make sure your child s online friends are friends they know in person- If they wouldn t walk up and say hi to that person on the street, then they shouldn t be friends with them on Facebook or other social media sites. Talk about what information is private- Kids need to know what information to share online and what not to share. Report inappropriate behavior- Many sites allow you to report abusers and they will ban them from sites. Let your kids know it is ok to tell a trusted adult if someone makes them feel uncomfortable. Follow the rules- Social media sites such as Facebook have a minimum age. Make sure you are enforcing these rules as a parent. One in five U.S. teenagers who regularly log on to the Internet says they have received an unwanted sexual solicitation via the Web. (only 25% of those told a parent!) About 30% of the victims of Internet sexual exploitation are boys. Internet sexual predators tend to fall between the ages of 18 and 55, although some are older or younger. Their targets tend to be between the ages of 11 and 15 In 100% of the cases, teens that are the victims of sexual predators have gone willingly to meet with them. Teens are willing to meet with strangers: 16% of teens considered meeting someone they ve only talked to online and 8% have actually met someone they only knew online. 75% of children are willing to share personal information online about themselves and their family in exchange for goods and services. Statistics from
Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More information2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
More informationCyber Safety For Parents
Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting
More informationA Parents Guide to. 2014 ConnectSafely.org
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationInternet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
More informationA Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk
A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the
More informationNational Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
More informationCyber-Safety Keeping Australians Safe Online
Cyber-Safety Keeping Australians Safe Online AIMIA Digital Policy Group DIGITAL POLICY GROUP Contents DIGITAL POLICY GROUP Facebook 2 Google 4 Yahoo!7 8 ebay 10 Summary 12 Key Contacts 12 Millions of people
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationToday s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
More informationCyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationHOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationNational Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationClass 2: Manage Your Digital Footprint. Student Handbook
Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal
More informationUNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationProtect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
More informatione-safety for Parents
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
More informationTeens, Online Stranger Contact and Cyberbullying What the research is telling us
Teens, Online Stranger Contact and Cyberbullying What the research is telling us Amanda Lenhart Internet Safety Task Force April 30, 2008 Washington, DC Methodology Interviewed 700 parent-child pairs in
More informationContents. NetSafe 3. Facebook 4. YouTube 6. Google 7. Microsoft 8. Yahoo! 10. Trade Me 12. Twitter 14. Further Reading 17
Contents NetSafe 3 Facebook 4 YouTube 6 Google 7 Microsoft 8 Yahoo! 10 Trade Me 12 Twitter 14 Further Reading 17 The internet is a part of everyday life for New Zealanders. Four out of five of us spend
More informationThe Online Generation Gap. Contrasting attitudes and behaviors of parents and teens
The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety
More informationBy Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
More information2014 Teen Internet Safety Survey. Conducted by The Futures Company
2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationTeen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationA Parents' Guide to. 2014 ConnectSafely.org
A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationCyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
More informationUNSUPERVISED AND ONLINE
UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationEmpowering young people to be safe on the Internet. Information for parents, teachers and community members
Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information
More informationParents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationC-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
More informationTWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY
TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message
More informationTAVISTOCK COLLEGE POLICIES & PROCEDURES
TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by
More informationDIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS
DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS Foreword We love technology, and with good reason. It offers so much to the home in terms of entertainment, education, as well improving the functionality
More informationClass 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
More informationThis document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationRelated KidsHealth Links
Grades 6 to 8 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards
More informationONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationRelated KidsHealth Links. Discussion Questions
Grades 6 to 8 Personal Health Series Online Safety and Cyberbullying KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible
More informationSocial Media Status Update Messages. Twitter
Social Media Status Update Messages October 2012 is National Cyber Security Awareness Month. Join the social media community and raise awareness about online safety and security. Use the following messages
More informationInternet Safety Guide for Parents
Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both
More informationDigital Safety and Privacy
Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationStaying Safe.....on social media and online
Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or
More informationTeen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online
Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012
More informationA Parents' Guide to. Snapchat. 2013 ConnectSafely.org
A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their
More informationOnly talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
More informationGuideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
More informatione-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
More informationCyber-Safety Keeping Australians Safe Online
Cyber-Safety Keeping Australians Safe Online AIMIA Digital Policy Group DIGITAL POLICY GROUP DIGITAL POLICY GROUP Contents Facebook 2 Twitter 4 Youtube 6 Google 7 Yahoo!7 10 Microsoft 12 ebay 14 Summary
More informationLt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
More informationDigital Design Class Overview/Rules
Digital Design 1 4 Ms. Fuller, instructor Digital Design Class Overview/Rules Class procedures, policies, and information: Class Rules Passes Handouts Safety and Security ID Badges Lockdown Procedures
More informationInternet basics 2.2 Staying safe online. Beginner s guide to. Basics
Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and
More informationHuman trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
More informationSeptember 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
More informationRCNA Social Media Guidelines for Nurses. CEO Foreword (with Photo) RCNA Social Media Guidelines for Nurses 0
RCNA Social Media Guidelines for Nurses CEO Foreword (with Photo) RCNA Social Media Guidelines for Nurses 0 Foreword The nursing profession is no stranger to change. Transformation and growth are essential
More informationCyber Security. Keeping the internet safe for you and your family
Cyber Security { Keeping the internet safe for you and your family The Five Things you MUST do Learn the lay of the land Protect your identity Become a sceptic Be aware of stranger danger Be a good cyber
More informationThe Digital Divide: How the Online Behavior of Teens is Getting Past Parents
June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents
More informationLiving Online: Using Technology Wisely Lesson. Guide
Living Online: Using Technology Wisely Lesson Guide Target Audience Adolescents 11-14 Time Entire program 1 hour, depending on discussion Program Objectives Ways to portray a positive image online How
More informationSocial Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
More informationTop 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
More informationInternet Safety Plan for Your Family
The Mcafee 10-Step Internet Safety Plan for Your Family How to talk to kids, tweens, teens, and novices of any age about online security 10 Table of Contents 3 Introduction 4 5 Today s Internet: Proceed
More informationParenting & Technology: The Internet, Texting & Social Networks
Parenting & Technology: The Internet, Texting & Social Networks Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety online Instant messaging,
More informationSafety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
More information15 Dangerous Apps Every Parent Should Know About
15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges
More informationScams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
More informationProtecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?
Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat
More informationwww.xxxchurch.com Online Predators & Strangers
www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through
More informationFraud Protection module
Fraud Protection module Trainer s Introduction While the vast majority of financial transactions are legitimate and honest, the few fraudulent ones can be costly and damaging. By recognizing the warning
More informationChapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
More informationCybersafety and protocols for conducting online life?
Cybersafety and protocols for conducting online life? Sunderland is an exciting place to live. We lead the way in making use of services online. We are one of the most connected cities in the UK. Whatever
More informationFacebook Guidelines For Parents
Facebook Guidelines For Parents By Jayne A. Hitchcock Copyright 2010 As kids go online at younger and younger ages, parents need to be aware of what they are doing on the Internet, most importantly on
More informationTeacher Guide TEEN SAFETY
The Vulnerable Teacher Guide TEEN SAFETY This companion to the online course provides questions and topics for classroom discussion and activities. 2012 ShieldTheVulnerable.org 1277 Treat Blvd #530 Walnut
More informationA Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationInternet Safety Kit. A wake-up call for safer surfing online for the young people in your life.
Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for
More informationSecurity Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
More informationHow To Teach Your Students To Be Respectful
E-RATE TOOLKIT Show Respect Online LESSON PLAN Essential Question: How can I make sure my emails are clear and respectful? Learning Overview and Objectives Overview: Students explore the similarities and
More informationBEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned
More informationOffice of the Privacy Commissioner of Canada. Identity Theft and You
Office of the Privacy Commissioner of Canada Identity Theft and You There have always been scammers who pose as somebody else to carry out fraudulent activities. With today s proliferation of technology,
More information