Digital Citizenship Lesson Plan

Size: px
Start display at page:

Download "Digital Citizenship Lesson Plan"

Transcription

1 Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. OBJECTIVES: To help participants identify risky behavior when going online To teach methods to reduce risk when online To explore resources that cover the topics of identity theft, cyber bullying and other threats To engage in coversation that helps to raise awareness of the risks Lesson Plan The topic of Digital Citizenship is an important one, but may not be one that your participants choose when deciding which workshops to attend. It is that reason that we have created the Internet Safety Tips handouts that you can use at your trainings. Each topic should be delivered in minutes at either the beginning or end of your training. That way we are still delivering these important messages without dedicating an entire session to the topic. For each topic there is a 1-page handout with facts and information, as well as links to resources on the TechTECS website. There are also infographics on the website that you can review with the group if there is time. These topics can generate lots of good conversation, so if you have an engaged group it may be good to go over the Tips sheet at the end of the training so that it doesn t take up too much training time. Internet Safety Tips Topics Identity Theft Protecting Future Reputations Password Tips and Tricks CyberBullying A Parents Guide to Mobile Device Security CyberPredators

2

3 Identity Theft Identity theft has been a problem for many years, but with the influx of online shopping, mobile devices, social media and the amount of information available online, the ID theft problem keeps multiplying. ID theft doesn t always mean financial exposure, it could also impact your reputation if someone is pretending to be you on social media sites, or when using your mobile device. It is important for you to understand the risks and to inform your loved ones as well. To learn more about identity theft, explore resources and access quizzes to see if you are at risk for identity theft, visit: TechTECS.com/digital-citizenship Who is most at risk for identity theft? Children Are being targeted 35 times more often than adults. People with social media profiles Due to the personal information they put on their profiles. Smartphone Owners 7% of smartphone owners were victims of ID fraud. This is 1/3 higher incident rate compared to the general public. Deceased people Nearly 3 million of stolen identities are that of deceased people College students More often college students have good credit scores, making them an ideal target. Victims of data breaches Are 9.5 times more likely to be a victim of ID fraud. Higher income individuals Those with higher incomes are more likely to be victimized Did you know? In the US more than 11.6 million adults became victims of identity theft. 62% of smartphone owners do not use a password on their home screen 32% of smartphone owners save log-in information on their device. Every three seconds someone s identity is stolen. Victims who found out about their identity theft more than six months after it happened incurred costs four times higher than the average 58 hours is the average amount of time victims spent repairing the damage done to existing accounts 43% of identity theft occurrs from stolen wallets, check-books, credit cards, billing statements, or other physical documents Facts and Statistics from

4 Protecting Future Reputations Social media, can be a good, positive tool if used responsibly. It is those that choose to put reputation damaging photos and comments on their feed or profile pages that need to think about how that will affect their futures. Colleges, scholarship readers, employers, coaches, teachers and family members access the Internet to gather information on people they are interested in. How you portray yourself online today will follow you into the future. To learn more about protecting your online reputation and explore resources visit: TechTECS.com/digital-citizenship How do you protect your digital self? Join social media sites- This may seem counter productive, but by having a clean profile, you show you can be a responsible user of the technology. No profile at all may raise flags that you had to delete it all. Think before you post! - If you wouldn t say it at a Thanksgiving table or during a staff meeting at work, then don t say it online. Use the 80/20 Rule - If you have a professional Facebook page or Twitter feed, keep the content 80% professional and 20% personal. The 20% personal can help people get to know you better, just be sure to not get TOO personal! Google Yourself - It really doesn t matter which search engine you use, just be sure to search for yourself, your children and your company to see what others see when looking you up online. In 2010, 57% of adult internet users now use search engines to find information about themselves online, up from 47% in In 2010, 46% of online adults have created their own profile on a social networking site, up from just 20% in In 2010, 46% of internet users search online to find information about people from their past, up from 36% in Likewise, 38% have sought information about their friends, up from 26% in Facts and Statistics from

5 Password Tips and Tricks For the most part, your data is only as secure as you are. If you aren t using a secure password, then you are opening yourself up to identity theft, fraud and financial loss. Creating and maintaining a unique, secure password for all of your web based sites may seem like a daunting task, but a few tips and tricks may help you to keep your information safe. To learn more password tips and tricks and explore resources visit: TechTECS.com/digital-citizenship How do you create a good password? Use a variety of character types- Use upper and lower case letters, numbers & symbols when creating a strong password. Don t use words found in the dictionary - You may think you have a clever password, however, if the word can be found in the dictionary, or in the dictionary written backwards, then the password can be easily hacked. Don t use numbers or names that identify you - Your pets or kids names, your birthday or your phone number are all examples of poorly chosen passwords that can be easily guessed. Don t write them down and place in an obvious location- A sticky note on your monitor or under your keyboard is not a good place to put passwords. If you must write them down, put them in a secure spot, such as in a safe. Create a password scheme you will stick to- Choose a scheme that you will remember, such as using 3 for E or $ for S ($pagh3tti) Use a phrase or lyrics instead of a word- Using this method you could use the entire phrase, or just the first letter of each word. For example, ilov3th3gr33nbaypack3rs or iltgbp. A computer loaded with the latest virtualization software and high powered graphics cards can now crack an eight-character password in 5 1/2 hours. The average internet user has 25 online accounts, 6.5 passwords and waits an average of 3.1 months before changing passwords. 66% of people online utilize only 1 or 2 passwords for all of their accounts. Facts and Statistics from

6 Cyberbullying Cyber bullying is defined as a young person tormenting, threatening, harassing, or embarrassing another young person using the Internet or other technologies, like cell phones. At first thought, it may seem like less of an issue if the bully is hiding behind a screen, however, studies have shown this type of bullying can be just as dangerous, if not more, as the face-to-face kind. To learn more about cyber-bullying and explore resources visit: TechTECS.com/digital-citizenship/ How do you identify and stop cyberbullying? Talk to your kids- Have a conversation about bullying, sometime kids may think they are just teasing, and not realize the impact they may be having on another child. Keep a record- There are antibullying laws in many states. If your child is being bullied and the bully won t back down, the transcripts of the comments can help if law enforcement gets involved. Nearly 43% of kids have been bullied online. 1 in 4 has had it happen more than once. 70% of students report seeing frequent bullying online. 81% of young people think bullying online is easier to get away with than bullying in person. 53% of kids admit having said something mean or hurtful to another person online. More than 1 in 3 have done it more than once. Over 80% of teens use a cell phone regularly, making it the most common medium for cyberbullying. Over 25% of teens have been bullied repeatedly through text messages. 68% of teens agree that cyber bullying is a serious problem. Girls are about twice as likely as boys to be victims and perpetrators of cyber bullying. Only 1 in 10 victims will inform a parent or trusted adult of their abuse. 1 in 6 parents know their child has been bullied online. Cyberbullying victims are 2 to 9 times more likely to consider committing suicide. Facts and Statistics from

7 Taking Back Control: A Parents Guide to Managing Technology at Home Generally speaking, kids today know more about technology than their parents do. Even though the kids may know more about the technology, it doesn t mean parents should remain in the dark when it comes to the latest devices. Parents are still the ones in charge and they should remain that way by setting some rules and guidelines for their kids to follow. To learn more about managing devices and exploring resources, visit: TechTECS.com/digital-citizenship/ How do you manage your kids and their devices? Set some ground rules- Many kids are given a laptop, ipad or cellphone by those who love them and no ground rules are set. Remember, these devices access the world and there should be some rules in place to keep your kids safe. Limit Online Access- Nothing good happens after midnight, so there is no reason for kids to be online that late at night. You can set your wireless router to deactivate at certain hours, such as from 11:00 PM to 6:00 AM. If they have smartphones with data plans, have them turn them in at a certain time to be charged for the night. Plus, your kids need their sleep! Know what devices go online- Many video gaming units have internet access. Friend your kids on social media- If everyone else who are friends with your child knows what they are up to, you should too. It isn t an invasion of privacy. They are minors and your responsibility; your house, your rules. 93% of teens ages go online 69% of teens have their own computer 24% of teens with a game console use it to go online 73% of teens are on a social network 37% send messages to friends every day As many as 7.5 million Facebook users in the U.S. are under age a violation of Facebook s user policies A 2010 Pew Internet Project survey found that 75% of those ages have cell phones, up from 45% in Facts and Statistics from

8 CyberPredators We all remember when 20/20: To Catch a Predator aired on TV. People were shocked to see the predators that were trying to meet and take advantage of young kids. What was even more disturbing when the facts came out was that many of these people were from respectable professions, such as doctors and teachers. So how can we keep our kids safe from those who look for prey online? Here are some tips that may help you. To learn more about cyberpredators and to explore resources, visit: TechTECS.com/digital-citizenship/ How do you keep your kids safe from predators? Make sure your child s online friends are friends they know in person- If they wouldn t walk up and say hi to that person on the street, then they shouldn t be friends with them on Facebook or other social media sites. Talk about what information is private- Kids need to know what information to share online and what not to share. Report inappropriate behavior- Many sites allow you to report abusers and they will ban them from sites. Let your kids know it is ok to tell a trusted adult if someone makes them feel uncomfortable. Follow the rules- Social media sites such as Facebook have a minimum age. Make sure you are enforcing these rules as a parent. One in five U.S. teenagers who regularly log on to the Internet says they have received an unwanted sexual solicitation via the Web. (only 25% of those told a parent!) About 30% of the victims of Internet sexual exploitation are boys. Internet sexual predators tend to fall between the ages of 18 and 55, although some are older or younger. Their targets tend to be between the ages of 11 and 15 In 100% of the cases, teens that are the victims of sexual predators have gone willingly to meet with them. Teens are willing to meet with strangers: 16% of teens considered meeting someone they ve only talked to online and 8% have actually met someone they only knew online. 75% of children are willing to share personal information online about themselves and their family in exchange for goods and services. Statistics from

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Cyber-Safety Keeping Australians Safe Online

Cyber-Safety Keeping Australians Safe Online Cyber-Safety Keeping Australians Safe Online AIMIA Digital Policy Group DIGITAL POLICY GROUP Contents DIGITAL POLICY GROUP Facebook 2 Google 4 Yahoo!7 8 ebay 10 Summary 12 Key Contacts 12 Millions of people

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

Cyber bullying, sexting and Facebook. Know the law, know your rights

Cyber bullying, sexting and Facebook. Know the law, know your rights Cyber bullying, sexting and Facebook Know the law, know your rights 2 Cyber bullying, sexting and Facebook Contents 4 Cyber bullying 10 Sexting 14 Facebook 17 More information 18 Useful websites Disclaimer

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

Class 2: Manage Your Digital Footprint. Student Handbook

Class 2: Manage Your Digital Footprint. Student Handbook Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

Teens, Online Stranger Contact and Cyberbullying What the research is telling us

Teens, Online Stranger Contact and Cyberbullying What the research is telling us Teens, Online Stranger Contact and Cyberbullying What the research is telling us Amanda Lenhart Internet Safety Task Force April 30, 2008 Washington, DC Methodology Interviewed 700 parent-child pairs in

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

2014 Teen Internet Safety Survey. Conducted by The Futures Company

2014 Teen Internet Safety Survey. Conducted by The Futures Company 2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online

More information

A Parents' Guide to. 2014 ConnectSafely.org

A Parents' Guide to. 2014 ConnectSafely.org A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

CYBER BULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING. Read this CYBERBULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING

CYBER BULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING. Read this CYBERBULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING Read this CYBER BULLYING An initiative of the Department of Basic Education If you re like most teenagers, you spend a lot of time on a cell phone or instant messenger chatting with friends and uploading

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

Contents. NetSafe 3. Facebook 4. YouTube 6. Google 7. Microsoft 8. Yahoo! 10. Trade Me 12. Twitter 14. Further Reading 17

Contents. NetSafe 3. Facebook 4. YouTube 6. Google 7. Microsoft 8. Yahoo! 10. Trade Me 12. Twitter 14. Further Reading 17 Contents NetSafe 3 Facebook 4 YouTube 6 Google 7 Microsoft 8 Yahoo! 10 Trade Me 12 Twitter 14 Further Reading 17 The internet is a part of everyday life for New Zealanders. Four out of five of us spend

More information

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

Places to Call: The Ophelia Project

Places to Call: The Ophelia Project How Can Adults Learn About Cyberbullying, Prevention, and Policies to Enforce Safe Cyber Climates? Things to Do: Learn Ten Ways for Parents to Prevent Cyberbullying through The Ophelia Project s Webinar

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

UNSUPERVISED AND ONLINE

UNSUPERVISED AND ONLINE UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS

DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS Foreword We love technology, and with good reason. It offers so much to the home in terms of entertainment, education, as well improving the functionality

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message

More information

TAVISTOCK COLLEGE POLICIES & PROCEDURES

TAVISTOCK COLLEGE POLICIES & PROCEDURES TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Related KidsHealth Links

Related KidsHealth Links Grades 6 to 8 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards

More information

Class 3: Identify Tricks and Scams Online

Class 3: Identify Tricks and Scams Online Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices

More information

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

Staying Safe.....on social media and online

Staying Safe.....on social media and online Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or

More information

Safer Internet Day Quiz Are you a good friend online?

Safer Internet Day Quiz Are you a good friend online? Safer Internet Day Quiz Are you a good friend online? Safer Internet Day 2015 is all about helping to create a better internet together. One way to do this is to be a good friend to others online. What

More information

Related KidsHealth Links. Discussion Questions

Related KidsHealth Links. Discussion Questions Grades 6 to 8 Personal Health Series Online Safety and Cyberbullying KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible

More information

e-rate toolkit Cyberbullying: Crossing the Line

e-rate toolkit Cyberbullying: Crossing the Line e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview

More information

Internet Safety Guide for Parents

Internet Safety Guide for Parents Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both

More information

Social Media Status Update Messages. Twitter

Social Media Status Update Messages. Twitter Social Media Status Update Messages October 2012 is National Cyber Security Awareness Month. Join the social media community and raise awareness about online safety and security. Use the following messages

More information

Cyber-Safety Keeping Australians Safe Online

Cyber-Safety Keeping Australians Safe Online Cyber-Safety Keeping Australians Safe Online AIMIA Digital Policy Group DIGITAL POLICY GROUP DIGITAL POLICY GROUP Contents Facebook 2 Twitter 4 Youtube 6 Google 7 Yahoo!7 10 Microsoft 12 ebay 14 Summary

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

Digital Safety and Privacy

Digital Safety and Privacy Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses

More information

Cyberbullying: A Need To Know Guide

Cyberbullying: A Need To Know Guide Sponsored by Telephone: 01535 604026 Email: free-guides@webanywhere.co.uk Web: www.webanywhere.co.uk Bullying has always been a problem within schools; for many children, and adults, it is as much a part

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9 Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of

More information

15 Dangerous Apps Every Parent Should Know About

15 Dangerous Apps Every Parent Should Know About 15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges

More information

Living Online: Using Technology Wisely Lesson. Guide

Living Online: Using Technology Wisely Lesson. Guide Living Online: Using Technology Wisely Lesson Guide Target Audience Adolescents 11-14 Time Entire program 1 hour, depending on discussion Program Objectives Ways to portray a positive image online How

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

Parenting & Technology: The Internet, Texting & Social Networks

Parenting & Technology: The Internet, Texting & Social Networks Parenting & Technology: The Internet, Texting & Social Networks Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety online Instant messaging,

More information

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their

More information

Digital Design Class Overview/Rules

Digital Design Class Overview/Rules Digital Design 1 4 Ms. Fuller, instructor Digital Design Class Overview/Rules Class procedures, policies, and information: Class Rules Passes Handouts Safety and Security ID Badges Lockdown Procedures

More information

IDENTITY AND INTERNET SAFETY CURRICULUM

IDENTITY AND INTERNET SAFETY CURRICULUM IDENTITY AND INTERNET SAFETY CURRICULUM INTRODUCTION Consider the following statistics: 96 percent of teens use social networking applications such as Facebook, MySpace, Chat rooms, and blogs 1 70 percent

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

RCNA Social Media Guidelines for Nurses. CEO Foreword (with Photo) RCNA Social Media Guidelines for Nurses 0

RCNA Social Media Guidelines for Nurses. CEO Foreword (with Photo) RCNA Social Media Guidelines for Nurses 0 RCNA Social Media Guidelines for Nurses CEO Foreword (with Photo) RCNA Social Media Guidelines for Nurses 0 Foreword The nursing profession is no stranger to change. Transformation and growth are essential

More information

A Time to Tell Troop Meeting Guide

A Time to Tell Troop Meeting Guide A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

More information

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

objectives Essential Question: How can I make sure my emails are clear and respectful? Learning Overview and Objectives Materials and Preparation

objectives Essential Question: How can I make sure my emails are clear and respectful? Learning Overview and Objectives Materials and Preparation E-RATE TOOLKIT Show Respect Online LESSON PLAN Essential Question: How can I make sure my emails are clear and respectful? Learning Overview and Objectives Overview: Students explore the similarities and

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the

More information

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and

More information

STUDENTS AGAINST VIOLENCE EVERYWHERE

STUDENTS AGAINST VIOLENCE EVERYWHERE ACTIVITY Cyberbullying Objectives Students will be able to define cyberbullying. Students will identify situations involving cyberbullying and learn different techniques to handle the situations. Students

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Social networking and Facebook information for foster carers

Social networking and Facebook information for foster carers Social networking and Facebook information for foster carers It is important that foster carers understand about social networking, including the opportunities and the dangers, and that they can discuss

More information

Cyber Security. Keeping the internet safe for you and your family

Cyber Security. Keeping the internet safe for you and your family Cyber Security { Keeping the internet safe for you and your family The Five Things you MUST do Learn the lay of the land Protect your identity Become a sceptic Be aware of stranger danger Be a good cyber

More information

www.xxxchurch.com Online Predators & Strangers

www.xxxchurch.com Online Predators & Strangers www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through

More information

Facebook Guidelines For Parents

Facebook Guidelines For Parents Facebook Guidelines For Parents By Jayne A. Hitchcock Copyright 2010 As kids go online at younger and younger ages, parents need to be aware of what they are doing on the Internet, most importantly on

More information