Ignition Discussion Questions

Size: px
Start display at page:

Download "Ignition Discussion Questions"

Transcription

1 Ignition Discussion Questions Module 1: Choosing a Computer 1. Why is it important to compare features of a computer before making a purchase? What are the different features of a computer that people should consider before making their selection? 2. What is cloud computing, and what does it enable us to do? 3. What are some of the ways computers change and evolve over time? What do you predict computers will be like 20 years from now? Module 2: Wireless Communication 1. Is owning a cell phone a big responsibility? How can people be more responsible with using or paying for their phones? 2. What are the dangers of using a cell phone while driving? 3. What can people do either as passengers or drivers to prevent texting while driving? Module 3: The Viral World 1. What kinds of risks can come with using technology? How can people reduce those risks, especially when it comes to protecting their privacy and online identities? 2. Is it possible to spend too much time with technology? What signs might indicate that someone is overusing technology? 3. How can people keep their technology use in check? Module 4: Internet Resources and Credibility 1. What does it mean to plagiarize, and what are some ways that people can make sure they are NOT plagiarizing? 2. What are the consequences of plagiarism? 3. How do we use technology in our schoolwork? When does technology use cause a problem in school? Module 5: Creating Multimedia Products 1. How can technology help people to be creative or to express themselves and their ideas? 2. Why do people need to be careful about what they post or share online?

2 3. What is the purpose of copyright? What are some examples of copyright infringement? Module 6: Digital Relationships and Respect 1. What is cyberbullying? 2. Is cyberbullying different than regular bullying? How is it different? 3. What should a person do if he or she is cyberbullied? What can you do as a friend if you see someone being cyberbullied? 4. How can people your age help put an end to cyberbullying? Module 7: The Future of Technology and You 1. What are some ways that technology has changed various professions and careers? 2. What is STEM? What are STEM careers, and why are they important? 2. What are some new jobs that have been created by of technology? 3. How can people your age start planning for a career in technology now?

3 Ignition Discussion Questions - Teacher Answer Key Module 1: Choosing a Computer 1. Why is it important to compare features of a computer before making a purchase? What are the different features of a computer that people should consider before making their selection? It s important to choose a computer that matches your wants and needs (today and at least a few years down the road). Features to consider: cost, monitor size, portability, memory capacity (or RAM), wireless capabilities, performance speed (how well it works with many programs running at once), hard drive space (how much data will be stored), and graphics and sound capabilities (how well you ll edit and experience multimedia). 2. What is cloud computing, and what does it enable us to do? Cloud computing allows people to use applications without having to install them on their hard drive. With cloud computing, people can access their personal files at any computer with internet access because it removes the need to have them stored on their computers. Some examples include social networking sites and photo sharing sites. 3. What are some of the ways computers change and evolve over time? What do you predict computers will be like 20 years from now? It is estimated that computing power and memory capacity double roughly every two years, which means that every few years, computer manufacturers release products that have even better, faster processors, larger hard drives, and improved software to go along with it. Some people predict that computers will continue to get smaller and faster over time, though we can t know for sure. Module 2: Wireless Communication 1. Is owning a cell phone a big responsibility? How can people be more responsible with using or paying for their phones? People can be responsible with their phones by choosing a cell phone plan they can afford and by sticking to that plan (e.g., not going over their minutes). People can also be responsible with their phones by choosing not to text while driving, not to share

4 inappropriate or hurtful messages with others, and not to use phones in disruptive or disrespectful ways in class. 2. What are the dangers of using a cell phone while driving? Using a phone while driving is especially dangerous because it distracts people in three different ways. By looking at your phone, using your phone to text or dial, and thinking about what you re texting or saying, your hands, mind, and eyes are taken off the road. Research shows that texting while driving increases your chances of getting into an accident, and that s why it s against the law in many states. 3. What can people do either as passengers or drivers to prevent texting while driving? As a passenger, it s important to speak up and tell the driver about the dangers of texting while driving. You can also remind the driver that there can be legal consequences of texting while driving and offer to be a designated texter. As a driver, you can discuss ahead of time with friends and family that you won t return texts or calls while driving, make a pact not to text while driving with your friends, put your phone out of sight and out of reach before starting to drive, or simply turn your phone off and take advantage of the quiet time in the car. Module 3: The Viral World 1. What kinds of risks can come with using technology? How can people reduce those risks, especially when it comes to protecting their privacy and online identities? Some risks that come with using technology include computer viruses, identity theft, threats to personal privacy and security, and technology overuse. People can protect their privacy and online identities by limiting the amount of personal information they share online, creating strong passwords and changing them every two months, never accepting friend requests from people they don t know, and never opening attachments or downloading applications from sources they don t trust.

5 2. Is it possible to spend too much time with technology? What signs might indicate that someone is overusing technology? The consequences of overusing technology can lead to academic problems, being less connected to friends or family, health issues, or missing out on other opportunities, like extracurricular activities or social outings. 3. How can people keep their technology use in check? People can keep their technology use un check by setting goals for how much time to spend with technology each day, keeping track of their time spent on the computer or phone, turning off their phone when it might be distracting (like while driving, doing homework, or eating dinner with family), and finding other things to do with their time that don t involve technology. Module 4: Internet Resources and Credibility 1. What does it mean to plagiarize, and what are some ways that people can make sure they are NOT plagiarizing? Plagiarizing is when you try to pass off other people s work, including printed or online materials, images or media, as your own. People can avoid plagiarizing by always giving credit to the source, using quotation marks, checking their work against the original text, and asking their teacher if they are ever unsure of when or how to cite a source. 2. What are the consequences of plagiarism? The consequences of plagiarizing vary by school, but may include suspension or expulsion as well as getting a failing grade on an assignment. 3. How do we use technology in our schoolwork? When does technology use cause a problem in school? Some positive uses of technology for schoolwork include using tools, like presentation software, for projects, or finding credible online sources for research projects. Some negative uses would include using devices in disruptive or disrespectful ways, like texting in class or sharing answers to an assignment or quiz. Ask your teacher when and how it s appropriate to use technology for school work.

6 Module 5: Creating Multimedia Products 1. How can technology help people to be creative or to express themselves and their ideas? Technology allows people to be creators and producers of media. People may use tools like graphic or video editing software to create their own videos, and many people are creating their own personal websites (e.g., blogs, social networking profiles). Tools, like presentation software, can also be used creatively for school projects. 2. Why do people need to be careful about what they post or share online? Creating or producing online media comes with responsibility. People cannot always control their audience, so should make sure that they don t post anything online that would embarrass or jeopardize the reputation of themselves or others. What you post online can also spread rapidly and be impossible to delete or remove, so people should think before publishing something that they might later regret. 3. What is the purpose of copyright? What are some examples of copyright infringement? A copyright is something a person purchases in order to have exclusive legal rights to reproduce, publish, sell, or distribute something. Others must ask permission to reproduce, publish, sell or distribute anything that is copyrighted. Examples of copyright infringement include: Illegally downloading or sharing media, posting a copyrighted movie on your blog, or using a company s logo on your website without that company s permission. Module 6: Digital Relationships and Respect 1. What is cyberbullying? Cyberbullying is the act of using technology in a repeated way to target a person or group of people in a way that could embarrass, hurt, or make the recipient feel threatened or unsafe. Cyberbullying comes in many forms, but may include sending an angry or threatening text message, posting a mean rumor online, or creating a fake profile in someone s name to embarrass or humiliate that person.

7 2. Is cyberbullying different than regular bullying? How is it different? Cyberbullying often happens behind closed doors which can make it more difficult to initially identify. Unlike traditional bullying, cyberbullies often say or do things that they wouldn t necessarily do face- to face because they don t have to deal with seeing the person s reaction on the other side of the screen. At the same time, victims don t always report cyberbullying, which often lets the bullying continue and escalate. Finally, because of the viral nature of the internet, acts of cyberbullying can spread more rapidly and be even more devastating for victims. 3. What should a person do if he or she is cyberbullied? What can you do as a friend if you see someone being cyberbullied? Victims of cyberbullying should always save the evidence of the cyberbullying and share it with a trusted adult. They should also avoid responding or cyberbullying back and may consider blocking the cyberbully. If your friend is being cyberbullied, you should remind your friend of these steps and assure your friend that what happened is not his or her fault. 4. How can people your age help put an end to cyberbullying? People can help put an end to cyberbullying by always stepping up and intervening when they see it going on. People should always report any incidents of cyberbullying to a trusted adult. Consider starting a pledge at your school for students to commit to stepping up and stopping cyberbullying in its tracks. Module 7: The Future of Technology and You 1. What are some ways that technology has changed various professions and careers? Technology has changed a number of careers and fields, including medicine, engineering, business, and education, to name a few. For example, teachers today have new tools to integrate into the classroom, like slideshows and interactive diagrams to illustrate discussions and feedback. With technology, many businesses expand their markets online, making their products available to people all over the world via online purchases or downloads.

8 2. What is STEM? What are STEM careers, and why are they important? STEM stands for "science, technology, engineering and mathematics. A STEM career is any career that uses any of these disciplines. Doctors, forensic scientists, biochemists, marine biologists, and architects are a few examples of STEM careers. People with STEM careers are working to improve the world we live in. From developing advanced medical treatments to protecting our aquatic life from pollution, they're working to improve technologies so that society can grow and thrive. 3. What are some new jobs that have been created by of technology? Some jobs created by technology include graphic design, digital marketing, software engineering, web design, and programming. 4. How can people your age start planning for a career in technology now? People can start planning for a career in technology now by taking relevant classes, like math and computer science, throughout high school, and participate in relevant activities to gain experience in their field of interest. Students can also talk to their guidance or college counselor about what kinds of college or university programs to pursue based on their interests.

Course Overview and Outline

Course Overview and Outline Course Overview and Outline The My Digital Life curriculum is comprised of seven modules that cover key concepts for building digital literacy. Each module contains between three and nine brief activities

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Portmarnock Community School ICT and Social Media Expected Use Policy. June 2013

Portmarnock Community School ICT and Social Media Expected Use Policy. June 2013 Portmarnock Community School ICT and Social Media Expected Use Policy June 2013 1.0 Introduction Portmarnock Community School recognizes that access to Information and Communication Technology (ICT) gives

More information

Bullying 101: Guide for Middle and High School Students

Bullying 101: Guide for Middle and High School Students Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org

More information

A bigger family, a better future.

A bigger family, a better future. A bigger family, a better future. Child sponsorship is changing for the better Sponsors like you are a vital part of our big, supportive family. Like us, you want the very best for your sponsored child.

More information

Eanes Independent School District Responsible Use Guidelines for Technology

Eanes Independent School District Responsible Use Guidelines for Technology Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes

More information

Technology Acceptable Use Policy

Technology Acceptable Use Policy Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

GET CONNECTED, GET IN THE KNOW

GET CONNECTED, GET IN THE KNOW GET CONNECTED, GET IN THE KNOW Online Respect and Responsibility Email the Internet cell phones BlackBerr ys instant messaging MP3 players Chances are you used at least one of these technologies today.

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

CYBERBULLYING TEACHER S GUIDE:

CYBERBULLYING TEACHER S GUIDE: TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Passwords Students should not share their assigned password, or attempt to discover the school Apple Id.

Passwords Students should not share their assigned password, or attempt to discover the school Apple Id. Alta Loma Christian School Acceptable Use Policy 1:1 ipad Program Revised January 20, 2014 Alta Loma Christian (ALCS) recognizes that access to technology in school gives students greater opportunities

More information

Parent / Guardian Consent for Technology Use in Schools

Parent / Guardian Consent for Technology Use in Schools Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,

More information

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.

More information

Front Range Christian School ipad Acceptable Use Policy

Front Range Christian School ipad Acceptable Use Policy Introduction Front Range Christian School ipad Acceptable Use Policy Front Range Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate,

More information

Wakefield Public Schools Technology Acceptable Use Policy

Wakefield Public Schools Technology Acceptable Use Policy Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

A Publication of the GCPS Information Management Division

A Publication of the GCPS Information Management Division GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,

More information

Students Acceptable Use Policy for Electronic Resources Rules Summary

Students Acceptable Use Policy for Electronic Resources Rules Summary Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

ISD. What is BYOD? Hooks Independent School District

ISD. What is BYOD? Hooks Independent School District ISD What is BYOD? BYOD stands for Bring Your Own Device. BYOD is an initiative that will allow students who have personal technology devices to bring them to school to use them for educational purposes

More information

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4 Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Parent Survey Question Bank

Parent Survey Question Bank State Model for Educator Evaluation 1. Adults at this school challenge my child to do better. 2. Adults at this school treat students with respect. 3. Bullying is a problem at my child s school. 4. Classroom

More information

BYOD Bring Your Own Device

BYOD Bring Your Own Device BYOD Bring Your Own Device STUDENT PRESENTATION Introduction Hillsborough County Public Schools is committed to developing a technology relevant and engaging learning environment for all students by providing

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Baldwin County Public Schools. Acceptable Use Policy

Baldwin County Public Schools. Acceptable Use Policy Introduction Baldwin County Public Schools Acceptable Use Policy Baldwin County Public Schools (BCPS) recognizes that access to technology in school gives students greater opportunities to learn, engage,

More information

Administrative Procedures Memorandum A1300

Administrative Procedures Memorandum A1300 Page 1 of 8 Date of Issue October 2013 Original Date of Issue June 2012 Subject INFORMATION AND COMPUTING TECHNOLOGY - APPROPRIATE USE GUIDELINES FOR STUDENTS References This APM replaces A1160 Computing

More information

Rutherford County Schools Bring Your Own Device

Rutherford County Schools Bring Your Own Device Rutherford County Schools Bring Your Own Device Why BYOD (Bring Your Own Device) Rutherford County Schools is committed to ensuring students are provided an environment which maximizes the integration

More information

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives

More information

Instructional Design Final Paper. TeaM 3J: Melissa Ferry, Terri Golden, Jaclyn Hawkins, Jennifer Lanza, Jenna Ward. University of Akron

Instructional Design Final Paper. TeaM 3J: Melissa Ferry, Terri Golden, Jaclyn Hawkins, Jennifer Lanza, Jenna Ward. University of Akron TeaM 3J 1 Running head: INSTRUCTIONAL DESIGN FINAL PAPER Instructional Design Final Paper TeaM 3J: Melissa Ferry, Terri Golden, Jaclyn Hawkins, Jennifer Lanza, Jenna Ward University of Akron INSTRUCTIONAL

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78 Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

Making personal safety choices in the. Grade 1. Website basics: searching an online dictionary. stories and in the real world

Making personal safety choices in the. Grade 1. Website basics: searching an online dictionary. stories and in the real world DIGITAL CITIZENSHIP: a K-5 Library Curriculum, Concord Public Schools We ARE Digital Citizens: using technology in an Appropriate, Responsible and Effective Way of personal safety and in the context of

More information

THE TRUTH ABOUT BULLIES

THE TRUTH ABOUT BULLIES THE TRUTH ABOUT BULLIES OVERVIEW: The goal of this activity is to inform and educate students about bullying. The lesson plan asks students to consider a list of statements about bullies and to decide

More information

Georgia Performance Standards. Health Education

Georgia Performance Standards. Health Education FIRST GRADE Students in first grade learn about their body s systems and various health topics. They begin to understand how their decisions can impact their health and well-being now and in the future.

More information

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online

More information

Technology Acceptable Use Policy. Introduction

Technology Acceptable Use Policy. Introduction Technology Acceptable Use Policy Introduction Shiloh Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop skills

More information

REPUTATION MANAGEMENT SURVIVAL GUIDE. A BEGINNER S GUIDE for managing your online reputation to promote your local business.

REPUTATION MANAGEMENT SURVIVAL GUIDE. A BEGINNER S GUIDE for managing your online reputation to promote your local business. REPUTATION MANAGEMENT SURVIVAL GUIDE A BEGINNER S GUIDE for managing your online reputation to promote your local business. About Main Street Hub: Main Street Hub is the voice for more local businesses

More information

DIGITAL CITIZENSHIP MODULE 1

DIGITAL CITIZENSHIP MODULE 1 Digital Etiquette DIGITAL CITIZENSHIP MODULE 1 Email, Texting, Cell Phone Usage, Ringtones, Social Networks, YouTube, Web Browsing, Shared Storage/Usage Space Define and apply the standards of use to daily

More information

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.

More information

Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12

Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12 Digital Citizenship: Etiquette My Online code & Breaking Down Hate Speech Grades 9-12 Essential Question: What does it mean to do the right thing online? How can you create a community culture in which

More information

Social Networking Policy

Social Networking Policy Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful

More information

1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division.

1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division. PAGE: 1 of 7 1. GENERAL 1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division. 1.2 The Winnipeg School Division

More information

The Ideal Classroom Community Member: Establishing Expectations for Classroom Behavior

The Ideal Classroom Community Member: Establishing Expectations for Classroom Behavior The Ideal Classroom Community Member: Establishing Expectations for Classroom Behavior Collaborative rule making promotes mutual respect, cooperation, self discipline and personal responsibility while

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Bullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander

Bullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander Bullying Prevention When Your Child Is the Victim, the Bully, or the Bystander What Is Bullying? Bullying is not a conflict or a fight. Bullying is physical, verbal, or emotional abuse that is deliberate,

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Websites & Copyright. INFORMATION SHEET G057v12 April 2014. info@copyright.org.au www.copyright.org.au

Websites & Copyright. INFORMATION SHEET G057v12 April 2014. info@copyright.org.au www.copyright.org.au INFORMATION SHEET G057v12 April 2014 Websites & Copyright This information sheet is for web developers, bloggers, website designers, startups, businesses and anyone interested in copyright issues relevant

More information

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and

More information

Vail School District Acceptable Use Policy 2015 2016

Vail School District Acceptable Use Policy 2015 2016 Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program. Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

Talking to our children about Violence and Terrorism: Living in Anxious times

Talking to our children about Violence and Terrorism: Living in Anxious times Talking to our children about Violence and Terrorism: Living in Anxious times Living in Anxious Times: Introductory Remarks Since the September 11 attack America has changed. Children and adults alike

More information

Cyberbullying. How common is cyberbullying?

Cyberbullying. How common is cyberbullying? Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:

More information

Making a Video Year Six

Making a Video Year Six Making a Video Year Six Unit Overview This children introduces the idea of using photos and videos within a multimedia presentation. Children will cover: - Using a digital camera to take photographs and

More information

INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF

INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF go.qub.ac.uk/socialmedia WHY ARE SOCIAL MEDIA TOOLS IMPORTANT TO QUEEN S UNIVERSITY? The term social media is used to describe a range of communication

More information

Traffic Safety Quiz Show. Grade level: 4/5

Traffic Safety Quiz Show. Grade level: 4/5 Traffic Safety Quiz Show Grade level: 4/5 Introduction: In this activity, students play a game that allows them to demonstrate and develop bicycle and pedestrian safety knowledge. The game is based on

More information

Clare Middle School. Which should I bring? PLAN

Clare Middle School. Which should I bring? PLAN Clare Middle School BYOD Wish you could take notes on your lap top? Need your ipad to help you research? Why can t you use your calculator app on your cell phone in math? Starting September 4, 2012, Clare

More information

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

Lee County School District

Lee County School District Lee County School District Acceptable Use Policy This Acceptable Use Policy outlines the guidelines and behaviors that users are expected to follow when using school technologies or when using personally-owned

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

4. The Importance of Internet Use in the Primary Curriculum

4. The Importance of Internet Use in the Primary Curriculum Policy Contents 1. Introduction 2. Disability 3. Writing and Reviewing the e-safety Policy 4. The Importance of Internet Use in the Primary Curriculum 5. The Benefits of Using the Internet in Education

More information

Internet Acceptable Use Policy

Internet Acceptable Use Policy 1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth

More information

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in

More information

Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016

Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 PURPOSE Christian Academy of Knoxville provides technology resources for the school community with a belief that the educational

More information

Archbishop Beck Catholic Sports College

Archbishop Beck Catholic Sports College Archbishop Beck Catholic Sports College E Safety Policy Ratified: May 2014 Ratified by: Governors Staffing Committee Review: May 2017-1 - - 2 - 1. Development/Monitoring/Review of this Policy This e-safety

More information

UTMB s Guide for Social Media Do s and Don ts

UTMB s Guide for Social Media Do s and Don ts UTMB s Guide for Social Media Do s and Don ts Introduction UTMB understands the role of social media as a way to facilitate communication amongst our university community and the world. Social media use

More information

Springfield Public Schools

Springfield Public Schools Springfield Public Schools BULLYING POLICY Approved by School Committee May 13, 2010 Amended March 6, 2014 Amended December 5, 2014 SPRINGFIELD PUBLIC SCHOOLS BULLYING PREVENTION POLICY INTRODUCTION Bullying

More information

University Schools Social Media Guidelines for Employees

University Schools Social Media Guidelines for Employees University Schools Social Media Guidelines for Employees Purpose of Social Media Guidelines All University Schools Laboratory Employees are subject to the Ball State University Social Media Policy available

More information

Understand What s Going On

Understand What s Going On Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud

More information

Social Networking Policy

Social Networking Policy Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies

More information

Plagiarism and Cheating: Definitions, Examples and Consequences. Woodgrove High School

Plagiarism and Cheating: Definitions, Examples and Consequences. Woodgrove High School Plagiarism and Cheating: Definitions, Examples and Consequences Woodgrove High School What is Plagiarism? According to the Merriam-Webster Online Dictionary, to "plagiarize" means to steal and pass off

More information

Basic lesson time includes activity only. Introductory and Wrap-Up suggestions can be used

Basic lesson time includes activity only. Introductory and Wrap-Up suggestions can be used U UNPLUGGED Digital Citizenship Lesson time: 30 Minutes to delve deeper when time allows. Basic lesson time includes activity only. Introductory and Wrap-Up suggestions can be used LESSON OVERVIEW In collaboration

More information

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour: #300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Purpose is committed to supporting student learning experiences within a highly functioning environment. Our classrooms are reliant on a range of leading-edge technologies

More information

BC s Digital Literacy Framework (DRAFT)

BC s Digital Literacy Framework (DRAFT) BC s Digital Literacy Framework (DRAFT) Using standards-based techniques, a collaborative teaching environment enriched through creative integration of technology tools takes learning beyond standardized

More information

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE

BUILDING DIGITAL LITERACY PURPOSE DEFINING DIGITAL LITERACY USING THIS GUIDE BUILDING PURPOSE In today s society, it is critical for students to be able to use the vast amount of technology available to them. Computer literacy will provide students with skills they need to succeed

More information

Dracut Public Schools Technology Acceptable Use Policy Revised 2014

Dracut Public Schools Technology Acceptable Use Policy Revised 2014 1 Dracut Public Schools Technology Acceptable Use Policy Revised 2014 The Dracut Public Schools (DPS) encourages the use of information technology to assist staff and students with academic success, preparation

More information

Related KidsHealth Links Articles for Kids:

Related KidsHealth Links Articles for Kids: Grades 3 to 5 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards

More information

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

Home-School Agreement

Home-School Agreement Home-School Agreement Why do we have a Home-School Agreement? As a School we aim to provide an outstanding education, both within and beyond the classroom, which enables all our students to realise and

More information