Ignition Discussion Questions

Size: px
Start display at page:

Download "Ignition Discussion Questions"

Transcription

1 Ignition Discussion Questions Module 1: Choosing a Computer 1. Why is it important to compare features of a computer before making a purchase? What are the different features of a computer that people should consider before making their selection? 2. What is cloud computing, and what does it enable us to do? 3. What are some of the ways computers change and evolve over time? What do you predict computers will be like 20 years from now? Module 2: Wireless Communication 1. Is owning a cell phone a big responsibility? How can people be more responsible with using or paying for their phones? 2. What are the dangers of using a cell phone while driving? 3. What can people do either as passengers or drivers to prevent texting while driving? Module 3: The Viral World 1. What kinds of risks can come with using technology? How can people reduce those risks, especially when it comes to protecting their privacy and online identities? 2. Is it possible to spend too much time with technology? What signs might indicate that someone is overusing technology? 3. How can people keep their technology use in check? Module 4: Internet Resources and Credibility 1. What does it mean to plagiarize, and what are some ways that people can make sure they are NOT plagiarizing? 2. What are the consequences of plagiarism? 3. How do we use technology in our schoolwork? When does technology use cause a problem in school? Module 5: Creating Multimedia Products 1. How can technology help people to be creative or to express themselves and their ideas? 2. Why do people need to be careful about what they post or share online?

2 3. What is the purpose of copyright? What are some examples of copyright infringement? Module 6: Digital Relationships and Respect 1. What is cyberbullying? 2. Is cyberbullying different than regular bullying? How is it different? 3. What should a person do if he or she is cyberbullied? What can you do as a friend if you see someone being cyberbullied? 4. How can people your age help put an end to cyberbullying? Module 7: The Future of Technology and You 1. What are some ways that technology has changed various professions and careers? 2. What is STEM? What are STEM careers, and why are they important? 2. What are some new jobs that have been created by of technology? 3. How can people your age start planning for a career in technology now?

3 Ignition Discussion Questions - Teacher Answer Key Module 1: Choosing a Computer 1. Why is it important to compare features of a computer before making a purchase? What are the different features of a computer that people should consider before making their selection? It s important to choose a computer that matches your wants and needs (today and at least a few years down the road). Features to consider: cost, monitor size, portability, memory capacity (or RAM), wireless capabilities, performance speed (how well it works with many programs running at once), hard drive space (how much data will be stored), and graphics and sound capabilities (how well you ll edit and experience multimedia). 2. What is cloud computing, and what does it enable us to do? Cloud computing allows people to use applications without having to install them on their hard drive. With cloud computing, people can access their personal files at any computer with internet access because it removes the need to have them stored on their computers. Some examples include social networking sites and photo sharing sites. 3. What are some of the ways computers change and evolve over time? What do you predict computers will be like 20 years from now? It is estimated that computing power and memory capacity double roughly every two years, which means that every few years, computer manufacturers release products that have even better, faster processors, larger hard drives, and improved software to go along with it. Some people predict that computers will continue to get smaller and faster over time, though we can t know for sure. Module 2: Wireless Communication 1. Is owning a cell phone a big responsibility? How can people be more responsible with using or paying for their phones? People can be responsible with their phones by choosing a cell phone plan they can afford and by sticking to that plan (e.g., not going over their minutes). People can also be responsible with their phones by choosing not to text while driving, not to share

4 inappropriate or hurtful messages with others, and not to use phones in disruptive or disrespectful ways in class. 2. What are the dangers of using a cell phone while driving? Using a phone while driving is especially dangerous because it distracts people in three different ways. By looking at your phone, using your phone to text or dial, and thinking about what you re texting or saying, your hands, mind, and eyes are taken off the road. Research shows that texting while driving increases your chances of getting into an accident, and that s why it s against the law in many states. 3. What can people do either as passengers or drivers to prevent texting while driving? As a passenger, it s important to speak up and tell the driver about the dangers of texting while driving. You can also remind the driver that there can be legal consequences of texting while driving and offer to be a designated texter. As a driver, you can discuss ahead of time with friends and family that you won t return texts or calls while driving, make a pact not to text while driving with your friends, put your phone out of sight and out of reach before starting to drive, or simply turn your phone off and take advantage of the quiet time in the car. Module 3: The Viral World 1. What kinds of risks can come with using technology? How can people reduce those risks, especially when it comes to protecting their privacy and online identities? Some risks that come with using technology include computer viruses, identity theft, threats to personal privacy and security, and technology overuse. People can protect their privacy and online identities by limiting the amount of personal information they share online, creating strong passwords and changing them every two months, never accepting friend requests from people they don t know, and never opening attachments or downloading applications from sources they don t trust.

5 2. Is it possible to spend too much time with technology? What signs might indicate that someone is overusing technology? The consequences of overusing technology can lead to academic problems, being less connected to friends or family, health issues, or missing out on other opportunities, like extracurricular activities or social outings. 3. How can people keep their technology use in check? People can keep their technology use un check by setting goals for how much time to spend with technology each day, keeping track of their time spent on the computer or phone, turning off their phone when it might be distracting (like while driving, doing homework, or eating dinner with family), and finding other things to do with their time that don t involve technology. Module 4: Internet Resources and Credibility 1. What does it mean to plagiarize, and what are some ways that people can make sure they are NOT plagiarizing? Plagiarizing is when you try to pass off other people s work, including printed or online materials, images or media, as your own. People can avoid plagiarizing by always giving credit to the source, using quotation marks, checking their work against the original text, and asking their teacher if they are ever unsure of when or how to cite a source. 2. What are the consequences of plagiarism? The consequences of plagiarizing vary by school, but may include suspension or expulsion as well as getting a failing grade on an assignment. 3. How do we use technology in our schoolwork? When does technology use cause a problem in school? Some positive uses of technology for schoolwork include using tools, like presentation software, for projects, or finding credible online sources for research projects. Some negative uses would include using devices in disruptive or disrespectful ways, like texting in class or sharing answers to an assignment or quiz. Ask your teacher when and how it s appropriate to use technology for school work.

6 Module 5: Creating Multimedia Products 1. How can technology help people to be creative or to express themselves and their ideas? Technology allows people to be creators and producers of media. People may use tools like graphic or video editing software to create their own videos, and many people are creating their own personal websites (e.g., blogs, social networking profiles). Tools, like presentation software, can also be used creatively for school projects. 2. Why do people need to be careful about what they post or share online? Creating or producing online media comes with responsibility. People cannot always control their audience, so should make sure that they don t post anything online that would embarrass or jeopardize the reputation of themselves or others. What you post online can also spread rapidly and be impossible to delete or remove, so people should think before publishing something that they might later regret. 3. What is the purpose of copyright? What are some examples of copyright infringement? A copyright is something a person purchases in order to have exclusive legal rights to reproduce, publish, sell, or distribute something. Others must ask permission to reproduce, publish, sell or distribute anything that is copyrighted. Examples of copyright infringement include: Illegally downloading or sharing media, posting a copyrighted movie on your blog, or using a company s logo on your website without that company s permission. Module 6: Digital Relationships and Respect 1. What is cyberbullying? Cyberbullying is the act of using technology in a repeated way to target a person or group of people in a way that could embarrass, hurt, or make the recipient feel threatened or unsafe. Cyberbullying comes in many forms, but may include sending an angry or threatening text message, posting a mean rumor online, or creating a fake profile in someone s name to embarrass or humiliate that person.

7 2. Is cyberbullying different than regular bullying? How is it different? Cyberbullying often happens behind closed doors which can make it more difficult to initially identify. Unlike traditional bullying, cyberbullies often say or do things that they wouldn t necessarily do face- to face because they don t have to deal with seeing the person s reaction on the other side of the screen. At the same time, victims don t always report cyberbullying, which often lets the bullying continue and escalate. Finally, because of the viral nature of the internet, acts of cyberbullying can spread more rapidly and be even more devastating for victims. 3. What should a person do if he or she is cyberbullied? What can you do as a friend if you see someone being cyberbullied? Victims of cyberbullying should always save the evidence of the cyberbullying and share it with a trusted adult. They should also avoid responding or cyberbullying back and may consider blocking the cyberbully. If your friend is being cyberbullied, you should remind your friend of these steps and assure your friend that what happened is not his or her fault. 4. How can people your age help put an end to cyberbullying? People can help put an end to cyberbullying by always stepping up and intervening when they see it going on. People should always report any incidents of cyberbullying to a trusted adult. Consider starting a pledge at your school for students to commit to stepping up and stopping cyberbullying in its tracks. Module 7: The Future of Technology and You 1. What are some ways that technology has changed various professions and careers? Technology has changed a number of careers and fields, including medicine, engineering, business, and education, to name a few. For example, teachers today have new tools to integrate into the classroom, like slideshows and interactive diagrams to illustrate discussions and feedback. With technology, many businesses expand their markets online, making their products available to people all over the world via online purchases or downloads.

8 2. What is STEM? What are STEM careers, and why are they important? STEM stands for "science, technology, engineering and mathematics. A STEM career is any career that uses any of these disciplines. Doctors, forensic scientists, biochemists, marine biologists, and architects are a few examples of STEM careers. People with STEM careers are working to improve the world we live in. From developing advanced medical treatments to protecting our aquatic life from pollution, they're working to improve technologies so that society can grow and thrive. 3. What are some new jobs that have been created by of technology? Some jobs created by technology include graphic design, digital marketing, software engineering, web design, and programming. 4. How can people your age start planning for a career in technology now? People can start planning for a career in technology now by taking relevant classes, like math and computer science, throughout high school, and participate in relevant activities to gain experience in their field of interest. Students can also talk to their guidance or college counselor about what kinds of college or university programs to pursue based on their interests.

Course Overview and Outline

Course Overview and Outline Course Overview and Outline The My Digital Life curriculum is comprised of seven modules that cover key concepts for building digital literacy. Each module contains between three and nine brief activities

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Bullying only happens in schools

Bullying only happens in schools Bullying only happens in schools Flashcard 1 Question Copyright Family Lives 2014 If you report the bullying to a teacher then you are a snitch Flashcard 2 Question Copyright Family Lives 2014 This is

More information

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes

More information

Technology Acceptable Use Policy

Technology Acceptable Use Policy Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop

More information

Portmarnock Community School ICT and Social Media Expected Use Policy. June 2013

Portmarnock Community School ICT and Social Media Expected Use Policy. June 2013 Portmarnock Community School ICT and Social Media Expected Use Policy June 2013 1.0 Introduction Portmarnock Community School recognizes that access to Information and Communication Technology (ICT) gives

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

Eanes Independent School District Responsible Use Guidelines for Technology

Eanes Independent School District Responsible Use Guidelines for Technology Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the

More information

Passwords Students should not share their assigned password, or attempt to discover the school Apple Id.

Passwords Students should not share their assigned password, or attempt to discover the school Apple Id. Alta Loma Christian School Acceptable Use Policy 1:1 ipad Program Revised January 20, 2014 Alta Loma Christian (ALCS) recognizes that access to technology in school gives students greater opportunities

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Front Range Christian School ipad Acceptable Use Policy

Front Range Christian School ipad Acceptable Use Policy Introduction Front Range Christian School ipad Acceptable Use Policy Front Range Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate,

More information

GET CONNECTED, GET IN THE KNOW

GET CONNECTED, GET IN THE KNOW GET CONNECTED, GET IN THE KNOW Online Respect and Responsibility Email the Internet cell phones BlackBerr ys instant messaging MP3 players Chances are you used at least one of these technologies today.

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

CYBER BULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING. Read this CYBERBULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING

CYBER BULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING. Read this CYBERBULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING Read this CYBER BULLYING An initiative of the Department of Basic Education If you re like most teenagers, you spend a lot of time on a cell phone or instant messenger chatting with friends and uploading

More information

Bullying 101: Guide for Middle and High School Students

Bullying 101: Guide for Middle and High School Students Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org

More information

Halifax County Public Schools K-12

Halifax County Public Schools K-12 This signed document will be effective for students from Kindergarten through Grade 12 and for employees until a new form is completed. A. In General An acceptable use policy (AUP) is a written agreement

More information

Parent / Guardian Consent for Technology Use in Schools

Parent / Guardian Consent for Technology Use in Schools Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,

More information

A Publication of the GCPS Information Management Division

A Publication of the GCPS Information Management Division GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,

More information

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives

More information

Baldwin County Public Schools. Acceptable Use Policy

Baldwin County Public Schools. Acceptable Use Policy Introduction Baldwin County Public Schools Acceptable Use Policy Baldwin County Public Schools (BCPS) recognizes that access to technology in school gives students greater opportunities to learn, engage,

More information

Administrative Procedures Memorandum A1300

Administrative Procedures Memorandum A1300 Page 1 of 8 Date of Issue October 2013 Original Date of Issue June 2012 Subject INFORMATION AND COMPUTING TECHNOLOGY - APPROPRIATE USE GUIDELINES FOR STUDENTS References This APM replaces A1160 Computing

More information

Students Acceptable Use Policy for Electronic Resources Rules Summary

Students Acceptable Use Policy for Electronic Resources Rules Summary Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must

More information

LARKS HILL JUNIOR & INFANT SCHOOL

LARKS HILL JUNIOR & INFANT SCHOOL LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Lesson Plans K-3. Bullying Response Lesson Plan Grades K-3

Lesson Plans K-3. Bullying Response Lesson Plan Grades K-3 Lesson Plans K-3 Bullying Response Lesson Plan Grades K-3 Estimated Time of Completion: Two to three classroom periods, or stretched out throughout the school year. Each activity will take between 15-30

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety Student Policy--SP004 Ventura Charter School of Arts and Global Education ("School") recognizes the

More information

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78

Code of Virginia, 1950, as amended, Sections 18.2 372, 18.2 374.1:1, 18.2 390, 22.1 70.2, and 22.1 78 Book Section Title Number Status SCS Policy Manual I INSTRUCTION Acceptable Use of Electronic Network Resources and Internet Safety IIBEA * R Active Legal 18 U.S.C. Sections 1460 and 2256 47 U.S.C. Section

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

A GUIDE TO HELP CHILDREN DEAL WITH BULLYING

A GUIDE TO HELP CHILDREN DEAL WITH BULLYING A GUIDE TO HELP CHILDREN DEAL WITH BULLYING 1 2 3 An anti-bullying initiative by The Sports Museum and the Boston sports community featuring athletes from all of Boston s professional sports teams. It

More information

THE FACTS ABOUT SEXTING

THE FACTS ABOUT SEXTING C A N Y O N S S C H O O L D I S T R I C T C I V I L R I G H T S A N D A C C O M M O D A T I O N S O F F I C E THE FACTS ABOUT SEXTING WHAT IS SEXTING? Should parents be concerned about sexting? Yes, especially

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

York Catholic District School Board ELECTRONIC COMMUNICATIONS & SOCIAL MEDIA

York Catholic District School Board ELECTRONIC COMMUNICATIONS & SOCIAL MEDIA York Catholic District School Board BOARD POLICY Policy Section Policy Number Program/Curriculum 317 Former Policy # Page 507 1 of 8 Original Approved Date: Last Approval Date: Jan 29 th, 2013 November

More information

Technology Acceptable Use Policy. Introduction

Technology Acceptable Use Policy. Introduction Technology Acceptable Use Policy Introduction Shiloh Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop skills

More information

Wakefield Public Schools Technology Acceptable Use Policy

Wakefield Public Schools Technology Acceptable Use Policy Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of

More information

Sibford School Student Computer Acceptable Use Policy

Sibford School Student Computer Acceptable Use Policy Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

More information

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour

More information

University Schools Social Media Guidelines for Employees

University Schools Social Media Guidelines for Employees University Schools Social Media Guidelines for Employees Purpose of Social Media Guidelines All University Schools Laboratory Employees are subject to the Ball State University Social Media Policy available

More information

A bigger family, a better future.

A bigger family, a better future. A bigger family, a better future. Child sponsorship is changing for the better Sponsors like you are a vital part of our big, supportive family. Like us, you want the very best for your sponsored child.

More information

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program.

Device: Refers to any technology that boys bring to use to connect to the school wireless network in the BYOD Program. Lindisfarne College INFORMATION COMMUNICATION TECHNOLOGY (ICT) and BRING YOUR OWN DEVICE (BYOD) User Agreement Terms BYOD: Bring Your Own Device refers to the program whereby boys are permitted to bring

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Cyber Bullying. Lesson Plan. Ice-Breaker. Learning Outcomes:

Cyber Bullying. Lesson Plan. Ice-Breaker. Learning Outcomes: Cyber Bullying Lesson Plan Learning Outcomes:. For the YP to define cyberbullying. To suggest ways in which YP can stay safe online.. To look at online dangers.. To identify cyberbullying and it s consequences..

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

Lee County School District

Lee County School District Lee County School District Acceptable Use Policy This Acceptable Use Policy outlines the guidelines and behaviors that users are expected to follow when using school technologies or when using personally-owned

More information

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and

More information

Vail School District Acceptable Use Policy 2015 2016

Vail School District Acceptable Use Policy 2015 2016 Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will

More information

Safer Internet Day Quiz Are you a good friend online?

Safer Internet Day Quiz Are you a good friend online? Safer Internet Day Quiz Are you a good friend online? Safer Internet Day 2015 is all about helping to create a better internet together. One way to do this is to be a good friend to others online. What

More information

Making personal safety choices in the. Grade 1. Website basics: searching an online dictionary. stories and in the real world

Making personal safety choices in the. Grade 1. Website basics: searching an online dictionary. stories and in the real world DIGITAL CITIZENSHIP: a K-5 Library Curriculum, Concord Public Schools We ARE Digital Citizens: using technology in an Appropriate, Responsible and Effective Way of personal safety and in the context of

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.

More information

DIGITAL CITIZENSHIP MODULE 1

DIGITAL CITIZENSHIP MODULE 1 Digital Etiquette DIGITAL CITIZENSHIP MODULE 1 Email, Texting, Cell Phone Usage, Ringtones, Social Networks, YouTube, Web Browsing, Shared Storage/Usage Space Define and apply the standards of use to daily

More information

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online

More information

Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016

Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 Christian Academy of Knoxville Technology Responsible Use Agreement 2015-2016 PURPOSE Christian Academy of Knoxville provides technology resources for the school community with a belief that the educational

More information

IDENTITY AND INTERNET SAFETY CURRICULUM

IDENTITY AND INTERNET SAFETY CURRICULUM IDENTITY AND INTERNET SAFETY CURRICULUM INTRODUCTION Consider the following statistics: 96 percent of teens use social networking applications such as Facebook, MySpace, Chat rooms, and blogs 1 70 percent

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

Technology Use Policy for ipads and Mobile Devices

Technology Use Policy for ipads and Mobile Devices Technology Use Policy for ipads and Mobile Devices School Mission : 1. To equip students with the required 21st century skill set to be competitive on the global stage. 2. To develop life- long learners

More information

Bring Your Own Device (BYOD) Policy

Bring Your Own Device (BYOD) Policy Bring Your Own Device (BYOD) Policy Purpose is committed to supporting student learning experiences within a highly functioning environment. Our classrooms are reliant on a range of leading-edge technologies

More information

TECHNOLOGY Understanding the laws surrounding cell phones and computers

TECHNOLOGY Understanding the laws surrounding cell phones and computers TECHNOLOGY Understanding the laws surrounding cell phones and computers Most young people have been exposed to technology such as cell phones and the Internet for most of their lives. Read on to learn

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

La Mesa-Spring Valley School District Acceptable Use of Technology Agreement for Students Grades 3 8

La Mesa-Spring Valley School District Acceptable Use of Technology Agreement for Students Grades 3 8 La Mesa-Spring Valley School District Acceptable Use of Technology Agreement for Students Grades 3 8 Introduction - La Mesa-Spring Valley School District believes that access to technology in school gives

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

Dracut Public Schools Technology Acceptable Use Policy Revised 2014

Dracut Public Schools Technology Acceptable Use Policy Revised 2014 1 Dracut Public Schools Technology Acceptable Use Policy Revised 2014 The Dracut Public Schools (DPS) encourages the use of information technology to assist staff and students with academic success, preparation

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

Now you are 18 Reputation and Social Media

Now you are 18 Reputation and Social Media Now you are 18 Reputation and Social Media Information presented (as of November 2015) is not intended as legal advice and cannot be relied on as such. YOUR REPUTATION Your reputation is what people think

More information

Brownsburg Community School Corporation Acceptable Use Policy 2012-2013

Brownsburg Community School Corporation Acceptable Use Policy 2012-2013 Introduction Brownsburg Community School Corporation Acceptable Use Policy 2012-2013 The Brownsburg Community School Corporation (BCSC) recognizes that access to technology in school gives students greater

More information

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in

More information

Grace Christian School Technology Acceptable Use Policy

Grace Christian School Technology Acceptable Use Policy Grace Christian School Technology Acceptable Use Policy Introduction Grace Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate,

More information

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

BYOD Bring Your Own Device

BYOD Bring Your Own Device BYOD Bring Your Own Device STUDENT PRESENTATION Introduction Hillsborough County Public Schools is committed to developing a technology relevant and engaging learning environment for all students by providing

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

Learner e-safety Policy

Learner e-safety Policy Learner e-safety Policy February 2013 Impact assessed: December 2012 Learner e-safety policy 1. Introduction Colchester Institute has a duty to safeguard and promote the welfare of its learners and this

More information

BULLYING. Most definitions include the idea that an imbalance of power exists between a bully

BULLYING. Most definitions include the idea that an imbalance of power exists between a bully BULlYing Y BULLYING WhYbe concerned about bullying in your child s life? After many years of research, we have learned that bullying in our schools and in our society is a much more damaging and dangerous

More information

Social Networking Policy

Social Networking Policy Social Networking Policy Policy Date June 2013 Review Date June 2015 Section 1: Introduction 1.1 Objectives 1.1.1 This policy sets out West Row Primary School s policy on social networking. New technologies

More information

BC s Digital Literacy Framework (DRAFT)

BC s Digital Literacy Framework (DRAFT) BC s Digital Literacy Framework (DRAFT) Using standards-based techniques, a collaborative teaching environment enriched through creative integration of technology tools takes learning beyond standardized

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

Teaching Digital Citizenship

Teaching Digital Citizenship 32 Government of Newfoundland and Labrador - Education I A School-Wide Approach - Positive Behaviour Supports 2013 Education Teaching Digital Citizenship Digital citizenship can be defined as the norms

More information

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents

More information

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized

More information

Maumee City School District Bylaws & Policies

Maumee City School District Bylaws & Policies Maumee City School District Bylaws & Policies 5136 - RESPONSIBLE USE POLICY FOR TECHNOLOGY AND NETWORK USE Technology tools and resources profoundly influence education, the work place, and everyday life.

More information

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan 48371 ACCEPTABLE USE POLICY 1. Purpose Oxford Community Schools (the District ) recognizes that advancements in technology affect the

More information

Rutherford County Schools Bring Your Own Device

Rutherford County Schools Bring Your Own Device Rutherford County Schools Bring Your Own Device Why BYOD (Bring Your Own Device) Rutherford County Schools is committed to ensuring students are provided an environment which maximizes the integration

More information

Bright Local Schools BYOD Acceptable Use Policy

Bright Local Schools BYOD Acceptable Use Policy Bright Local Schools BYOD Acceptable Use Policy Why Bring Your Own Device at Bright Local Schools? Bright Local is dedicated to providing 21st Century instruction to all its students. We feel we must provide

More information

Social Media Guidelines

Social Media Guidelines Purpose for Social Media Guidelines: Guilford County Schools (GCS) realizes that part of 21st century learning is adapting to the changing methods of communication. The importance of teachers, students

More information

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY

BLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY Acceptable Use Policy Educational Purpose The computer system in Blackrock College has been established for a limited educational purpose. The term "educational purpose" includes classroom activities,

More information

Networking and Social Media Policy

Networking and Social Media Policy Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools

More information

MySpace Bebo Facebook cyberbullying contact by adults with a sexual interest in children

MySpace Bebo Facebook cyberbullying contact by adults with a sexual interest in children YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING sites Social networking sites, such as MySpace, Bebo and Facebook, are very popular with children,

More information

A Guide for Parents. of Elementary and Secondary School Students

A Guide for Parents. of Elementary and Secondary School Students A Guide for Parents of Elementary and Secondary School Students Updated Spring 2011 The effects of bullying go beyond the school yard. As a parent, here s what to watch for, what you can do, and where

More information

Student Name (please print): Grade. Signature: Date: / / Parent or Guardian Name (please print): Signature: Date: / / - 5 -

Student Name (please print): Grade. Signature: Date: / / Parent or Guardian Name (please print): Signature: Date: / / - 5 - Kensington Hall/Middle School for Girls Technology Appropriate Use Policy 2014-2015 School Year PART I: SCHOOL NETWORK AND RESOURCES The Academy of the Sacred Heart Information Network (ASHNet) consists

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

CYBERBULLY Conversation Starter

CYBERBULLY Conversation Starter Privacy 1. What online rules do you make for yourself? These are not the rules that your parents/families have in place. If you don t make rules for yourself, what kind of rules would you like to start?

More information

Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy

Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy The Coventry Public Schools encourages the use of digital technology for teaching and learning, for professional responsibilities,

More information