Terms of Use. i-safe lessons may NOT be duplicated for any reason except for your classroom use.
|
|
- Oscar Underwood
- 7 years ago
- Views:
Transcription
1 Terms of Use Clicking on the Agree and Print button (below) means that I agree that: isafe lessons may NOT be shared with other educators (e.g., faculty or staff) in any school or district which is not currently covered by your school s or district s Subscription and License Agreement. isafe lessons may NOT be duplicated for any reason except for your classroom use. isafe lesson handouts may be printed for students ONLY for your current classroom use. Duplication, sale, resale and any other form of unauthorized use of isafe copyrighted materials is prohibited and, therefore, a violation of law. (I understand and agree to above Terms of Use)
2 LESSON Consequences of Photo Sharing isafe Lesson Plan Recommended Grade Level 912 Lesson Guide This lesson explores the management and potential consequences of digital photo sharing. Learning Objectives Students will: Understand the positive uses and potentially negative consequences of posting and sharing photos in Cyberspace Consider consequences of public photo sharing in Cyberspace Understand risk levels in determining how to safely and responsibly manage photos while engaging in online activities Understand the potential longevity of uploaded photos Materials a copy of the activity page, Photo Sharing Going Beyond the Obvious for each student group blank paper (optional) whiteboard Discussion Engage students in a discussion about how people use photos in Cyberspace. Ask students to list the various ways photos are shared/used in Cyberspace, such as: sharing on social networking pages or other personal webpages sharing via cell phones, text messages or Twitter sharing via posting to commercial photosharing Web sites online chatting with apps like Google Talk Gadget online forums Briefly discuss levels of risk in engaging in online activities such as photo sharing. Have students define the terms: low risk, moderate risk and high risk. For example: High risk Situation or action that provides significant exposure to the probability of loss, damage or unsafe situations. Moderate risk Situation or action that provides some exposure to a chance of loss, damage or unsafe situations. Low risk Situation or action that provides little or no exposure to the chance of loss, damage or unsafe situations isafe Inc. 1
3 Activity Part 1 Divide students into small groups. Have each group be responsible for one of the photosharing formats listed in the previous discussion. Pass out the activity pages to each group and have students complete the sections in response to their topics: 1. List positive usages for this type of photo sharing format. Assign each use with a level of risk (low, moderate or high). 2. List usages for this photosharing format that can be harmful to the user or to others. Label each usage with a definition for the behavior involved, such as unthinking, irresponsible, cruel, etc. 3. For each potentially harmful usage you came up with, create a scenario to illustrate the problem. Part 2 Have groups exchange activity pages. Each group is to read the scenarios created by the original group. On the back of the page or on a blank paper, write a solution or way this negative usage can be avoided or changed into a positive usage (minimize the risk). As they consider their responses, ask students to think beyond immediate consequences of a photosharing action and to also include future implications. An example would be how a revealing photo, once posted, may be impossible to remove from Cyberspace, and could be accessed by parents, future employers, etc. Discussion Do not exchange activity pages. Have the new groups share the scenarios and their responses. Facilitate the discussion to ensure that responses are realistic, and that online interaction is being encouraged. Have students refer to the levels of risk they have assigned to the photosharing activities. If it has not been mentioned, guide the discussion to include the topic of photo tagging (marking a section of an online photo with a formatting command that enables the identification of a person or persons in a photo any user can then mouseover the photo and learn the identity of the tagged person). Ask students to determine if photo tagging is, or is not, relevant to each type of photosharing format. If so, does it change the risk level? Discuss. Legal issues: Conclude the discussion with an examination of legal issues involved in photo sharing. Do any of the scenarios illustrate potential illegal activity? Examples: Many states are enabling laws against cyber bullying. It is illegal to use a photo owned by another person without permission unless it is in the public domain or specifically noted as being available for public use. Wrap Up Once the scenarios and solutions have been shared, have students create a list of all of the negative usages they came up with in Part 2 of the activity. Write them on the board. Note: There will be some overlap, even though formats may be different. For each, have students create one or more positive concepts for minimizing the risk for this situation. Example: Posting personal photos do not post personal photos of oneself OR post personal photos only if they are password protected isafe Inc. 2
4 Empowerment Have students share what they have learned by creating a poster of guidelines that demonstrates safe and responsible photo sharing. Post it in a public area of the school. Suggestion: Post guidelines at the time when student pictures are distributed isafe Inc. 3
5 Photo Sharing Going Beyond the Obvious Photosharing format: 1. List positive usages for this type of photo sharing format. Assign each use with a level of risk (low, moderate or high). 2. List usages for this photosharing format that can be harmful to the user or to others. Label each usage with a definition for the behavior involved, such as unthinking, irresponsible, cruel, etc. 3. For each potentially harmful usage you came up with, create a scenario to illustrate the problem isafe Inc. 4
6 Activity Resource and Example Answer Key Activity: Photo Sharing Going Beyond the Obvious Students will provide positive and negative photosharing examples. All formats of digital photo sharing have common issues. Student examples should include some or all of the following: 1. Examples of positive online photo uses: Communicating with friends and family (usually low risk; can become high risk if a friend uses another s photo for an activity like bullying) Usage for academic purposes (low risk) Creating a showcase of talents and accomplishments (low moderate risk; posted creative works could potentially be stolen) Creating and storing photos or photo albums of family, friends, vacations, events, etc. (low risk if protected by privacy settings or password; high risk if unprotected) 2. Examples of negative online photo uses: If not secured by privacy settings, photos may be accessed and/or downloaded by unwanted persons. The owner may not want an unflattering photo seen by parents, teachers, potential employers, etc. Photos may be shared, forwarded and accessed by unwanted persons. Once uploaded to the Internet or sent to others, it is probable that photos will be impossible to delete. Photos can be used to cyber bully. Photos may be stolen or used for illegal purposes. 3. Example scenarios. Students should depict scenarios that describe consequences of negative uses (see #2): 1. On her Facebook page, Karen posts a photo of herself drinking at a party her parents did not give permission for her to attend. A friend shows the photo to her mother, who in turn calls Karen s mother. 2. Sasha takes a photo of herself nude and sends it to her boyfriend. He forwards it to all of his friends and it eventually is sent to her parents and the principal of her school. 3. Kira downloads a photo of Ava from Ava s social networking page. She edits the photo to make Ava look like she weighs 400 pounds and s it to all of her contacts with the message, Ava is a fat slob. 4. Garth, a parent, posts photos of his 8 and 10 yearold children on a public photo sharing site, tags the photos with their names and forgets to password protect the album. A pedophile searched the site for photos of children, downloads Garth s photos and posts to a Web site frequented by pedophiles. Wrapup Activity Students create one or more positive concepts for minimizing risks when photo sharing. Examples: Post wisely! Do not post personal photos of yourself. Or, post personal photos only if they are password protected. Think about who will see those photos BEFORE uploading. Avoid posting photos that could be embarrassing if they were circulated isafe Inc. 5
7 Think about photos of others you are posting. Do not post anything that could be embarrassing or could be considered to be bullying. Avoid posting personally identifiable photos on public Web sites, including those that show house number, street signs, etc. (Solution: edit out identifying information with graphics software.) Know how to adjust privacy settings on social networking sites so that photos are only viewable by close friends and family. Monitor tagged photos online. If a friend posts a picture of you, you might be tagged. When you are tagged in a photo, your name will appear in it. Anyone pointing their mouse at your picture will see the name that your friend has entered for you. You will get a notification when a friend tags you in a photo. You can choose to accept or reject the picture, which determines whether it will be sent to your Tagged Photos album. Remember that rejected photos will still appear in your friend s album. Monitor your tagged photos, and request that friends take down photos that you are uncomfortable with. Use caution with cell phone photos. Do not randomly send photos via cell phone to those who are not close friends or family. Consider the future of your online photos. Who will access them in 2, 5, or 10 years? Use commercial photoalbum sites to share photos in a password protected environment. Don t cyber bully especially with photos. There are many state laws against cyber bullying Information on state cyber bullying laws: isafe Inc. 6
Eanes Independent School District Responsible Use Guidelines for Technology
Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationTEACHER GUIDE. ebackpack provides a separate Administrative Guide and Student Guide through our support site at http://www.ebackpack.com/support.
TEACHER GUIDE This quick start guide will cover basic usage of ebackpack for a teacher (sharing files, assignments, comments, homework review). Don t forget, if you need any additional help, please use
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationDefense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationIPSD 204 - Web 2.0 Tools / Social Networking - Staff Expectations (Revised 7.1.15)
IPSD 204 - Web 2.0 Tools / Social Networking - Staff Expectations (Revised 7.1.15) Indian Prairie School District 204 recognizes that today s students are deeply engaged in electronic forms of communication
More informationCommon Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationSchool Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
More informationKnow the Rules Before You Use the Tools: A Student User s Guide to Project Share
Know the Rules Before You Use the Tools: A Student User s Guide to Project Share The Texas Education Agency 1 I. Welcome to Project Share Project Share is a group-learning website that lets you create,
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationDistrict Technology Guidelines. for Students and Parents/Guardians, updated for 2015-16
District Technology Guidelines for Students and Parents/Guardians, updated for 2015-16 Table of Contents Topic Page Forward... 1 Technology Guidelines... 1 Overview... 1 Acceptable Use... 1 Prohibited
More informationhttp://blog.larkin.net.au/ Setting up a Blog You can read more about why it is useful to set up an educational blog by following these links:
Page 1 Setting up a Blog Why set up a web log or blog? A blog can allow you to rapidly share your ideas, experiences and questions with others. The point is that you have an opportunity to express yourself
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationSOCIAL MEDIA GUIDELINES FOR SCHOOLS
SOCIAL MEDIA GUIDELINES FOR SCHOOLS The goal of these guidelines is to provide, staff, administrators, students, parents and the school district community direction when using social media applications
More informationThis document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
More informationParent / Guardian Consent for Technology Use in Schools
Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,
More informationHaddon Township School District Acceptable Use of Information and Communication Technology for Students
Haddon Township School District Acceptable Use of Information and Communication Technology for Students Please read the following carefully before signing the Acceptable Use Policy for Students Agreement.
More informationClassroom Mobile Device Rules & Agreement for Students
Classroom Mobile Device Rules & Agreement for Students In order to use the Google Chromebook for required class activities, you must be responsible and follow these rules and policies at all times. Remember,
More informationComprehensive i-safe Curriculum International Scope of Lessons and Language Availability
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating
More informationEducator s Guide to Digital Citizenship: Responsibility and Digital Reputations
Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Overview: Students examine their participation in digital life. They explore how information shared through digital media
More informationDeltek Touch Time & Expense for GovCon. User Guide for Triumph
Deltek Touch Time & Expense for GovCon User Guide for Triumph November 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or
More informationCOMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF
4526 COMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF Philosophy: It is the philosophy of the Great Neck Public Schools that the integration of technology with the curriculum is an essential
More informationAcceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
More informationMarlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013
Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should
More informationCAMBRIDGE ELEMENTARY - 2015-16 CONSENT CHECKLIST
CAMBRIDGE ELEMENTARY - 2015-16 CONSENT CHECKLIST Parents, please check off the appropriate consent boxes below and sign this form AFTER reviewing all the attached materials. If you have any questions or
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationHow To Use The Internet Safely
Administrative Procedure 140 DISTRICT-WIDE NETWORK AND INTERNET APPROPRIATE USE Background School District No.43 (Coquitlam)'s District-wide network provides data communication links among all District
More informationCeres Unified School District
Ceres Unified School District TECHNOLOGY USE POLICY Grades K-12 Please read this policy below carefully to be instructed in proper behavior and use regarding the Internet. This policy covers technology
More informationSimon Langton Grammar School for Boys E-Safety Policy
Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,
More informationStudent Quick Start Guide
Student Quick Start Guide Copyright 2012, Blackboard Inc. Student Quick Start Guide 1 Part 1: Requesting Enrollment and Accessing the Course 1.1 1.2 1.3 Accepting a Course Invitation and Accessing the
More informationLEBANON SPECIAL SCHOOL DISTRICT
LEBANON SPECIAL SCHOOL DISTRICT Committed to a Community of Excellence Elementary RESPONSIBLE USE POLICY (RUP) & TECHNOLOGY HANDBOOK for PARENTS and STUDENTS 2015-16 LAST UPDATE: 02.23.15 TABLE OF CONTENTS
More informationReview VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
More informationJOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT
JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.
More informationBest Practices for Managing Your Public Web Space and Private Work Spaces
Best Practices for Managing Your Public Web Space and Private Work Spaces So You re an Administrator to a Committee, Round Table, System User Group or Task Force? This Guide will introduce you to best
More informationILLINOIS LUTHERAN S CHROMEBOOK AGREEMENT
ILLINOIS LUTHERAN S CHROMEBOOK AGREEMENT Students across the junior high/high school will be issued Google Chromebooks for use in school and at home. This document provides students and their parents/guardians
More informationDauphin County Technical School
Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,
More informationTomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
More informationSOCIAL MEDIA & bet-at-home.com
SOCIAL MEDIA & bet-at-home.com 1 WHY IS THERE A GUIDELINE? The time when the internet was only used for sending e-mails and surfing the web has come and gone. Facebook, Twitter, YouTube and so on, have
More informationNortheast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
More informationICT Acceptable use Policy. Coláiste Mhuirlinne/ Merlin College Doughiska, Galway City.
ICT Acceptable use Policy. Coláiste Mhuirlinne/ Doughiska, Galway City. Ratified by the Board of Management on 27 th May, 2015 Table of Contents Introduction... 2 General... 2 Internet Use... 3 Email...
More informationBring Your Own Device (BYOD) Acceptable Use Agreement 2015
Monivae College Bring Your Own Device (BYOD) Acceptable Use Agreement 2015 This agreement is applicable to all: 1. students in Years 7, 8, 9, 10 and 11 using their own device to access the College network
More informationA Parents Guide to. 2014 ConnectSafely.org
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
More information2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.
POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive
More informationHolyoke Community College Social Media Guidelines Adopted: May 3, 2010 by the HCC Web Team Revised February 17, 2012
Holyoke Community College Social Media Guidelines Adopted: May 3, 2010 by the HCC Web Team Revised February 17, 2012 Introduction Social media offers HCC a tremendous opportunity to connect with and better
More informationCOLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY
1 The COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) a consortium of the Colusa County Office of Education (CCOE) with Colusa Unified School District, Maxwell Unified School District, Williams Unified School
More informationBYOD (ipads) Acceptable Use and Care Policy
BYOD (ipads) Acceptable Use and Care Policy Related Policies Computer Facilities and External Networks (ICT) Policy, including the Student Acceptable Use Agreement Communication Policy Mobile Phone and
More informationHow to Protect Your Privacy on Facebook: A Step-by-Step Guide. (Originally published May 3, 2007; most recently updated March 17, 2009)
How to Protect Your Privacy on Facebook: A Step-by-Step Guide (Originally published May 3, 2007; most recently updated March 17, 2009) March 2009 How to Protect Your Privacy on Facebook: A Step-by-Step
More informationStudent use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
More informationADMIN GUIDE. The Breakdown
ADMIN GUIDE This Administrator Quick Start Guide will help walk you through the process of getting your ebackpack account up and running. Don t forget, if you need any additional help, please contact us
More informationMINNETONKA PUBLIC SCHOOLS
MINNETONKA PUBLIC SCHOOLS Policy #470: Employee Use of Social Media I. PURPOSE As a national leader in using technology as an accelerator of learning, the Minnetonka School District recognizes the value
More informationLutheran Education Association of Houston Acceptable Use Policy (Students)
Lutheran Education Association of Houston Acceptable Use Policy (Students) With the use of technology, including the Internet, Intranet, hardware and software, the Lutheran Education Association of Houston
More informationCelly FAQ. inbox cells people help. celly help. Common Support Questions. celly company. General. celly @ school. policies. About Cells.
Celly FAQ Common Support Questions inbox cells people help How do I change my username? How do I change the phone number on my Celly account? How do I set my password/reset my password? How can I mass
More informationAuthorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
More informationOverexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect
More informationDigital Literacy: Theoretical Framework
Digital Literacy: Theoretical Framework September 2014 Table of Contents Definition... 1 Key Concepts... 1 Digital Literacy Competencies... 2 Digital Literacy and Student Centered Learning... 9 Generous
More informationToday s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
More informationParker School s ipad Reference Manual
Parker School s ipad Reference Manual Introduction Contents Acceptable Use Policy Overview Parker School s Network Guidelines Introduction User Requirements ipad and ipad Accessory Requirements How to
More informationLesson Plan for Senior Secondary
Lesson Plan for Senior Secondary Introduction Purpose Introduce the National Day of Action against Bullying and Violence (NDA) campaign Explore the role of bystanders to bullying Investigate the theme
More informationCyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
More informationWakefield Public Schools Technology Acceptable Use Policy
Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of
More informationDigital Design Class Overview/Rules
Digital Design 1 4 Ms. Fuller, instructor Digital Design Class Overview/Rules Class procedures, policies, and information: Class Rules Passes Handouts Safety and Security ID Badges Lockdown Procedures
More informationPolicy for Social Media Usage in Catawba County
Policy for Social Media Usage in Catawba County Adopted March 1, 2010 Revised September 7,2010 1. PURPOSE The role of technology in the 21 st century workplace is constantly expanding and now includes
More informationStudents Acceptable Use Policy for Electronic Resources Rules Summary
Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must
More informationAuburn University at Montgomery Policies and Procedures
Auburn University at Montgomery Policies and Procedures Title: Responsible Office: Social Media Policy University Relations I. PURPOSE This policy outlines the procedures governing social media pages created
More informationFIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
More informationDIGITAL CITIZENSHIP MODULE 1
Digital Etiquette DIGITAL CITIZENSHIP MODULE 1 Email, Texting, Cell Phone Usage, Ringtones, Social Networks, YouTube, Web Browsing, Shared Storage/Usage Space Define and apply the standards of use to daily
More informationSussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009
Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009 Access to Electronic Media and other Technologies Terms and Conditions REASONS FOR PROVIDING ELECTRONIC
More informationAppropriate Boundaries in the World of Social Networking
Appropriate Boundaries in the World of Social Networking SAIS annual conference 2011 caryn pass and heather broadwater 1 Social networking evolving area protection of all constituencies students, faculty,
More informationACCEPTABLE/ RESPONSIBLE USE POLICY IIBE
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.
More informationBacking Up Your Files. External Hard Drives
Backing Up Your Files As we become more and more dependent on technology to help accomplish our everyday tasks, we tend to forget how easily the information stored on our computers can be lost. Imagine
More information2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
More informationCRIMES AND CONSEQUENCES
2006 CRIMES AND CONSEQUENCES OUTCOMES At the end of this lesson, students will be able to: Define the terms crime and consequence Identify the four categories of crime Analyze possible consequences of
More informationJGSC Laptop Agreement
JGSC Laptop Agreement The mission of the 1:1 program at JGSC is to create an innovative, collaborative learning environment for students and teachers. Together, they will implement creative uses of educational
More informationGrand Canyon Council - Social Media Policy
INTRODUCTION It s an exciting time to be part of the BSA for many reasons. One of those is that new communication vehicles now enable current and past Scouts and Scouters, as well those who are interested
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationRevelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
More informationPT AVENUE GUIDE OVERVIEW
PT AVENUE GUIDE OVERVIEW WSPTA is currently undertaking a database conversion from imis (the previous membership database) to a cloud based service called PT Avenue. The primary reason for this conversion
More informationPolicies & Procedures. Moat Community College E-Safety Policy
Moat Community College E-Safety Policy Vision Statement Moat Community College embraces the positive impact and educational benefits that can be achieved through appropriate use of the Internet and associated
More informationPortage Township Schools
Portage Township Schools Student/Parent BYOD Technology Handbook 1.1 BYOD Description: BYOD stands for Bring Your Own Device. Students will be encouraged to bring a recommended device to school to be used
More informationRevised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
More informationVideo #3 Creating Google Accounts Free SEO Training Roadmap Video Training Series
Do you find yourself in the position of trying to play catch up by learning, understanding and perhaps integrating Google, Facebook and other online services into your business and feel a little bit overwhelmed?
More informationColumbia Public Schools Student, Teacher and Parent Guide to Bring Your Own Device (BYOD)
Columbia Public Schools Student, Teacher and Parent Guide to Bring Your Own Device (BYOD) Contents PURPOSE AND PLAN... 3 FREQUENTLY ASKED QUESTIONS... 4 STUDENTS... 4 STAFF... 5 PARENTS... 6 POLICY REFERENCES
More informationA Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk
A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the
More informationeportfolio Student Guide
Overview...2 The eportfolio...2 Folio Thinking...2 Collecting...2 Selecting...2 Reflecting...3 Connecting...3 Collecting...4 Adding Files to Resources...4 Public Files...5 Organizing Resource Files...6
More informationSocial Media Policy For Staff
Social Media Policy For Staff 1 Owlswick School and Home Social Media Policy Introduction The Internet provides a range of social media tools that allow users to interact with one another, for example
More informationRICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
More information2015 2016 RESA Frequently Asked Questions
2015 2016 RESA Frequently Asked Questions Table of Contents I. General Questions... 2 II. Registering for the RESA and Completing the Profile... 5 III. Task Modification for Special Circumstances and Accommodations
More informationHow To Use Social Media At St James Anglican School
P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :
More informationStep 1: check & update your details ---------------------------------------------------------------------------------------------------------- 2
This guide is an overview of how our system works. It gives you general instructions on how to set up your account. For more specific functions, the contextual help will give you detailed instructions
More informationGUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE
GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE Defense Media Activity TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING
More informationElectronic Resource Policy and Acceptable Use Guidelines. Kent School District
Electronic Resource Policy and Acceptable Use Guidelines Kent School District General Guidelines for Technology Use All use of technology must support education. All use of technology must follow local,
More informationOnline Tutoring & Mentoring Program
Online Tutoring & Mentoring Program Engineering Science Corps, UCLA Tutorial for Teachers Welcome to the UCLA Henry Samueli School of Engineering & Applied Science (HSSEAS), Engineering Science Corps Online
More informationPrivate Today, Public Tomorrow
Estimated time: 40 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy
More informationA Parents' Guide to. 2014 ConnectSafely.org
A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram
More informationMeasurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716
Measurabl, Inc. ( Company ) is committed to protecting your privacy. We have prepared this Privacy Policy to describe to you our practices regarding the Personal Data (as defined below) we collect from
More informationPasswords Students should not share their assigned password, or attempt to discover the school Apple Id.
Alta Loma Christian School Acceptable Use Policy 1:1 ipad Program Revised January 20, 2014 Alta Loma Christian (ALCS) recognizes that access to technology in school gives students greater opportunities
More information