Terms of Use. i-safe lessons may NOT be duplicated for any reason except for your classroom use.

Size: px
Start display at page:

Download "Terms of Use. i-safe lessons may NOT be duplicated for any reason except for your classroom use."

Transcription

1 Terms of Use Clicking on the Agree and Print button (below) means that I agree that: isafe lessons may NOT be shared with other educators (e.g., faculty or staff) in any school or district which is not currently covered by your school s or district s Subscription and License Agreement. isafe lessons may NOT be duplicated for any reason except for your classroom use. isafe lesson handouts may be printed for students ONLY for your current classroom use. Duplication, sale, resale and any other form of unauthorized use of isafe copyrighted materials is prohibited and, therefore, a violation of law. (I understand and agree to above Terms of Use)

2 LESSON Consequences of Photo Sharing isafe Lesson Plan Recommended Grade Level 912 Lesson Guide This lesson explores the management and potential consequences of digital photo sharing. Learning Objectives Students will: Understand the positive uses and potentially negative consequences of posting and sharing photos in Cyberspace Consider consequences of public photo sharing in Cyberspace Understand risk levels in determining how to safely and responsibly manage photos while engaging in online activities Understand the potential longevity of uploaded photos Materials a copy of the activity page, Photo Sharing Going Beyond the Obvious for each student group blank paper (optional) whiteboard Discussion Engage students in a discussion about how people use photos in Cyberspace. Ask students to list the various ways photos are shared/used in Cyberspace, such as: sharing on social networking pages or other personal webpages sharing via cell phones, text messages or Twitter sharing via posting to commercial photosharing Web sites online chatting with apps like Google Talk Gadget online forums Briefly discuss levels of risk in engaging in online activities such as photo sharing. Have students define the terms: low risk, moderate risk and high risk. For example: High risk Situation or action that provides significant exposure to the probability of loss, damage or unsafe situations. Moderate risk Situation or action that provides some exposure to a chance of loss, damage or unsafe situations. Low risk Situation or action that provides little or no exposure to the chance of loss, damage or unsafe situations isafe Inc. 1

3 Activity Part 1 Divide students into small groups. Have each group be responsible for one of the photosharing formats listed in the previous discussion. Pass out the activity pages to each group and have students complete the sections in response to their topics: 1. List positive usages for this type of photo sharing format. Assign each use with a level of risk (low, moderate or high). 2. List usages for this photosharing format that can be harmful to the user or to others. Label each usage with a definition for the behavior involved, such as unthinking, irresponsible, cruel, etc. 3. For each potentially harmful usage you came up with, create a scenario to illustrate the problem. Part 2 Have groups exchange activity pages. Each group is to read the scenarios created by the original group. On the back of the page or on a blank paper, write a solution or way this negative usage can be avoided or changed into a positive usage (minimize the risk). As they consider their responses, ask students to think beyond immediate consequences of a photosharing action and to also include future implications. An example would be how a revealing photo, once posted, may be impossible to remove from Cyberspace, and could be accessed by parents, future employers, etc. Discussion Do not exchange activity pages. Have the new groups share the scenarios and their responses. Facilitate the discussion to ensure that responses are realistic, and that online interaction is being encouraged. Have students refer to the levels of risk they have assigned to the photosharing activities. If it has not been mentioned, guide the discussion to include the topic of photo tagging (marking a section of an online photo with a formatting command that enables the identification of a person or persons in a photo any user can then mouseover the photo and learn the identity of the tagged person). Ask students to determine if photo tagging is, or is not, relevant to each type of photosharing format. If so, does it change the risk level? Discuss. Legal issues: Conclude the discussion with an examination of legal issues involved in photo sharing. Do any of the scenarios illustrate potential illegal activity? Examples: Many states are enabling laws against cyber bullying. It is illegal to use a photo owned by another person without permission unless it is in the public domain or specifically noted as being available for public use. Wrap Up Once the scenarios and solutions have been shared, have students create a list of all of the negative usages they came up with in Part 2 of the activity. Write them on the board. Note: There will be some overlap, even though formats may be different. For each, have students create one or more positive concepts for minimizing the risk for this situation. Example: Posting personal photos do not post personal photos of oneself OR post personal photos only if they are password protected isafe Inc. 2

4 Empowerment Have students share what they have learned by creating a poster of guidelines that demonstrates safe and responsible photo sharing. Post it in a public area of the school. Suggestion: Post guidelines at the time when student pictures are distributed isafe Inc. 3

5 Photo Sharing Going Beyond the Obvious Photosharing format: 1. List positive usages for this type of photo sharing format. Assign each use with a level of risk (low, moderate or high). 2. List usages for this photosharing format that can be harmful to the user or to others. Label each usage with a definition for the behavior involved, such as unthinking, irresponsible, cruel, etc. 3. For each potentially harmful usage you came up with, create a scenario to illustrate the problem isafe Inc. 4

6 Activity Resource and Example Answer Key Activity: Photo Sharing Going Beyond the Obvious Students will provide positive and negative photosharing examples. All formats of digital photo sharing have common issues. Student examples should include some or all of the following: 1. Examples of positive online photo uses: Communicating with friends and family (usually low risk; can become high risk if a friend uses another s photo for an activity like bullying) Usage for academic purposes (low risk) Creating a showcase of talents and accomplishments (low moderate risk; posted creative works could potentially be stolen) Creating and storing photos or photo albums of family, friends, vacations, events, etc. (low risk if protected by privacy settings or password; high risk if unprotected) 2. Examples of negative online photo uses: If not secured by privacy settings, photos may be accessed and/or downloaded by unwanted persons. The owner may not want an unflattering photo seen by parents, teachers, potential employers, etc. Photos may be shared, forwarded and accessed by unwanted persons. Once uploaded to the Internet or sent to others, it is probable that photos will be impossible to delete. Photos can be used to cyber bully. Photos may be stolen or used for illegal purposes. 3. Example scenarios. Students should depict scenarios that describe consequences of negative uses (see #2): 1. On her Facebook page, Karen posts a photo of herself drinking at a party her parents did not give permission for her to attend. A friend shows the photo to her mother, who in turn calls Karen s mother. 2. Sasha takes a photo of herself nude and sends it to her boyfriend. He forwards it to all of his friends and it eventually is sent to her parents and the principal of her school. 3. Kira downloads a photo of Ava from Ava s social networking page. She edits the photo to make Ava look like she weighs 400 pounds and s it to all of her contacts with the message, Ava is a fat slob. 4. Garth, a parent, posts photos of his 8 and 10 yearold children on a public photo sharing site, tags the photos with their names and forgets to password protect the album. A pedophile searched the site for photos of children, downloads Garth s photos and posts to a Web site frequented by pedophiles. Wrapup Activity Students create one or more positive concepts for minimizing risks when photo sharing. Examples: Post wisely! Do not post personal photos of yourself. Or, post personal photos only if they are password protected. Think about who will see those photos BEFORE uploading. Avoid posting photos that could be embarrassing if they were circulated isafe Inc. 5

7 Think about photos of others you are posting. Do not post anything that could be embarrassing or could be considered to be bullying. Avoid posting personally identifiable photos on public Web sites, including those that show house number, street signs, etc. (Solution: edit out identifying information with graphics software.) Know how to adjust privacy settings on social networking sites so that photos are only viewable by close friends and family. Monitor tagged photos online. If a friend posts a picture of you, you might be tagged. When you are tagged in a photo, your name will appear in it. Anyone pointing their mouse at your picture will see the name that your friend has entered for you. You will get a notification when a friend tags you in a photo. You can choose to accept or reject the picture, which determines whether it will be sent to your Tagged Photos album. Remember that rejected photos will still appear in your friend s album. Monitor your tagged photos, and request that friends take down photos that you are uncomfortable with. Use caution with cell phone photos. Do not randomly send photos via cell phone to those who are not close friends or family. Consider the future of your online photos. Who will access them in 2, 5, or 10 years? Use commercial photoalbum sites to share photos in a password protected environment. Don t cyber bully especially with photos. There are many state laws against cyber bullying Information on state cyber bullying laws: isafe Inc. 6

Eanes Independent School District Responsible Use Guidelines for Technology

Eanes Independent School District Responsible Use Guidelines for Technology Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

TEACHER GUIDE. ebackpack provides a separate Administrative Guide and Student Guide through our support site at http://www.ebackpack.com/support.

TEACHER GUIDE. ebackpack provides a separate Administrative Guide and Student Guide through our support site at http://www.ebackpack.com/support. TEACHER GUIDE This quick start guide will cover basic usage of ebackpack for a teacher (sharing files, assignments, comments, homework review). Don t forget, if you need any additional help, please use

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

IPSD 204 - Web 2.0 Tools / Social Networking - Staff Expectations (Revised 7.1.15)

IPSD 204 - Web 2.0 Tools / Social Networking - Staff Expectations (Revised 7.1.15) IPSD 204 - Web 2.0 Tools / Social Networking - Staff Expectations (Revised 7.1.15) Indian Prairie School District 204 recognizes that today s students are deeply engaged in electronic forms of communication

More information

Common Facebook issues

Common Facebook issues Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

Know the Rules Before You Use the Tools: A Student User s Guide to Project Share

Know the Rules Before You Use the Tools: A Student User s Guide to Project Share Know the Rules Before You Use the Tools: A Student User s Guide to Project Share The Texas Education Agency 1 I. Welcome to Project Share Project Share is a group-learning website that lets you create,

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

District Technology Guidelines. for Students and Parents/Guardians, updated for 2015-16

District Technology Guidelines. for Students and Parents/Guardians, updated for 2015-16 District Technology Guidelines for Students and Parents/Guardians, updated for 2015-16 Table of Contents Topic Page Forward... 1 Technology Guidelines... 1 Overview... 1 Acceptable Use... 1 Prohibited

More information

http://blog.larkin.net.au/ Setting up a Blog You can read more about why it is useful to set up an educational blog by following these links:

http://blog.larkin.net.au/ Setting up a Blog You can read more about why it is useful to set up an educational blog by following these links: Page 1 Setting up a Blog Why set up a web log or blog? A blog can allow you to rapidly share your ideas, experiences and questions with others. The point is that you have an opportunity to express yourself

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

SOCIAL MEDIA GUIDELINES FOR SCHOOLS

SOCIAL MEDIA GUIDELINES FOR SCHOOLS SOCIAL MEDIA GUIDELINES FOR SCHOOLS The goal of these guidelines is to provide, staff, administrators, students, parents and the school district community direction when using social media applications

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

Parent / Guardian Consent for Technology Use in Schools

Parent / Guardian Consent for Technology Use in Schools Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,

More information

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

Haddon Township School District Acceptable Use of Information and Communication Technology for Students Haddon Township School District Acceptable Use of Information and Communication Technology for Students Please read the following carefully before signing the Acceptable Use Policy for Students Agreement.

More information

Classroom Mobile Device Rules & Agreement for Students

Classroom Mobile Device Rules & Agreement for Students Classroom Mobile Device Rules & Agreement for Students In order to use the Google Chromebook for required class activities, you must be responsible and follow these rules and policies at all times. Remember,

More information

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating

More information

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Overview: Students examine their participation in digital life. They explore how information shared through digital media

More information

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

Deltek Touch Time & Expense for GovCon. User Guide for Triumph Deltek Touch Time & Expense for GovCon User Guide for Triumph November 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or

More information

COMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF

COMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF 4526 COMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF Philosophy: It is the philosophy of the Great Neck Public Schools that the integration of technology with the curriculum is an essential

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should

More information

CAMBRIDGE ELEMENTARY - 2015-16 CONSENT CHECKLIST

CAMBRIDGE ELEMENTARY - 2015-16 CONSENT CHECKLIST CAMBRIDGE ELEMENTARY - 2015-16 CONSENT CHECKLIST Parents, please check off the appropriate consent boxes below and sign this form AFTER reviewing all the attached materials. If you have any questions or

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

How To Use The Internet Safely

How To Use The Internet Safely Administrative Procedure 140 DISTRICT-WIDE NETWORK AND INTERNET APPROPRIATE USE Background School District No.43 (Coquitlam)'s District-wide network provides data communication links among all District

More information

Ceres Unified School District

Ceres Unified School District Ceres Unified School District TECHNOLOGY USE POLICY Grades K-12 Please read this policy below carefully to be instructed in proper behavior and use regarding the Internet. This policy covers technology

More information

Simon Langton Grammar School for Boys E-Safety Policy

Simon Langton Grammar School for Boys E-Safety Policy Background to the Policy Simon Langton Grammar School for Boys E-Safety Policy The E Safety Policy and its implementation will be reviewed annually. Our E Safety Policy has been written by the school,

More information

Student Quick Start Guide

Student Quick Start Guide Student Quick Start Guide Copyright 2012, Blackboard Inc. Student Quick Start Guide 1 Part 1: Requesting Enrollment and Accessing the Course 1.1 1.2 1.3 Accepting a Course Invitation and Accessing the

More information

LEBANON SPECIAL SCHOOL DISTRICT

LEBANON SPECIAL SCHOOL DISTRICT LEBANON SPECIAL SCHOOL DISTRICT Committed to a Community of Excellence Elementary RESPONSIBLE USE POLICY (RUP) & TECHNOLOGY HANDBOOK for PARENTS and STUDENTS 2015-16 LAST UPDATE: 02.23.15 TABLE OF CONTENTS

More information

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour: #300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital

More information

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.

More information

Best Practices for Managing Your Public Web Space and Private Work Spaces

Best Practices for Managing Your Public Web Space and Private Work Spaces Best Practices for Managing Your Public Web Space and Private Work Spaces So You re an Administrator to a Committee, Round Table, System User Group or Task Force? This Guide will introduce you to best

More information

ILLINOIS LUTHERAN S CHROMEBOOK AGREEMENT

ILLINOIS LUTHERAN S CHROMEBOOK AGREEMENT ILLINOIS LUTHERAN S CHROMEBOOK AGREEMENT Students across the junior high/high school will be issued Google Chromebooks for use in school and at home. This document provides students and their parents/guardians

More information

Dauphin County Technical School

Dauphin County Technical School Dauphin County Technical School Acceptable Use Agreement 2015-2016 General Information The Dauphin County Technical School, more commonly known as DCTS, provides computer equipment, computer services,

More information

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users

More information

SOCIAL MEDIA & bet-at-home.com

SOCIAL MEDIA & bet-at-home.com SOCIAL MEDIA & bet-at-home.com 1 WHY IS THERE A GUIDELINE? The time when the internet was only used for sending e-mails and surfing the web has come and gone. Facebook, Twitter, YouTube and so on, have

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

ICT Acceptable use Policy. Coláiste Mhuirlinne/ Merlin College Doughiska, Galway City.

ICT Acceptable use Policy. Coláiste Mhuirlinne/ Merlin College Doughiska, Galway City. ICT Acceptable use Policy. Coláiste Mhuirlinne/ Doughiska, Galway City. Ratified by the Board of Management on 27 th May, 2015 Table of Contents Introduction... 2 General... 2 Internet Use... 3 Email...

More information

Bring Your Own Device (BYOD) Acceptable Use Agreement 2015

Bring Your Own Device (BYOD) Acceptable Use Agreement 2015 Monivae College Bring Your Own Device (BYOD) Acceptable Use Agreement 2015 This agreement is applicable to all: 1. students in Years 7, 8, 9, 10 and 11 using their own device to access the College network

More information

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students. POLICY TITLE: Acceptable Use of Internet, Computer and Network Resources for Employees POLICY NO: 491 PAGE 1 of 5 Wendell School District No. 232 recognizes the importance of providing positive, productive

More information

Holyoke Community College Social Media Guidelines Adopted: May 3, 2010 by the HCC Web Team Revised February 17, 2012

Holyoke Community College Social Media Guidelines Adopted: May 3, 2010 by the HCC Web Team Revised February 17, 2012 Holyoke Community College Social Media Guidelines Adopted: May 3, 2010 by the HCC Web Team Revised February 17, 2012 Introduction Social media offers HCC a tremendous opportunity to connect with and better

More information

COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY

COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY 1 The COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) a consortium of the Colusa County Office of Education (CCOE) with Colusa Unified School District, Maxwell Unified School District, Williams Unified School

More information

BYOD (ipads) Acceptable Use and Care Policy

BYOD (ipads) Acceptable Use and Care Policy BYOD (ipads) Acceptable Use and Care Policy Related Policies Computer Facilities and External Networks (ICT) Policy, including the Student Acceptable Use Agreement Communication Policy Mobile Phone and

More information

How to Protect Your Privacy on Facebook: A Step-by-Step Guide. (Originally published May 3, 2007; most recently updated March 17, 2009)

How to Protect Your Privacy on Facebook: A Step-by-Step Guide. (Originally published May 3, 2007; most recently updated March 17, 2009) How to Protect Your Privacy on Facebook: A Step-by-Step Guide (Originally published May 3, 2007; most recently updated March 17, 2009) March 2009 How to Protect Your Privacy on Facebook: A Step-by-Step

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

ADMIN GUIDE. The Breakdown

ADMIN GUIDE. The Breakdown ADMIN GUIDE This Administrator Quick Start Guide will help walk you through the process of getting your ebackpack account up and running. Don t forget, if you need any additional help, please contact us

More information

MINNETONKA PUBLIC SCHOOLS

MINNETONKA PUBLIC SCHOOLS MINNETONKA PUBLIC SCHOOLS Policy #470: Employee Use of Social Media I. PURPOSE As a national leader in using technology as an accelerator of learning, the Minnetonka School District recognizes the value

More information

Lutheran Education Association of Houston Acceptable Use Policy (Students)

Lutheran Education Association of Houston Acceptable Use Policy (Students) Lutheran Education Association of Houston Acceptable Use Policy (Students) With the use of technology, including the Internet, Intranet, hardware and software, the Lutheran Education Association of Houston

More information

Celly FAQ. inbox cells people help. celly help. Common Support Questions. celly company. General. celly @ school. policies. About Cells.

Celly FAQ. inbox cells people help. celly help. Common Support Questions. celly company. General. celly @ school. policies. About Cells. Celly FAQ Common Support Questions inbox cells people help How do I change my username? How do I change the phone number on my Celly account? How do I set my password/reset my password? How can I mass

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect

More information

Digital Literacy: Theoretical Framework

Digital Literacy: Theoretical Framework Digital Literacy: Theoretical Framework September 2014 Table of Contents Definition... 1 Key Concepts... 1 Digital Literacy Competencies... 2 Digital Literacy and Student Centered Learning... 9 Generous

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

Parker School s ipad Reference Manual

Parker School s ipad Reference Manual Parker School s ipad Reference Manual Introduction Contents Acceptable Use Policy Overview Parker School s Network Guidelines Introduction User Requirements ipad and ipad Accessory Requirements How to

More information

Lesson Plan for Senior Secondary

Lesson Plan for Senior Secondary Lesson Plan for Senior Secondary Introduction Purpose Introduce the National Day of Action against Bullying and Violence (NDA) campaign Explore the role of bystanders to bullying Investigate the theme

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Wakefield Public Schools Technology Acceptable Use Policy

Wakefield Public Schools Technology Acceptable Use Policy Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of

More information

Digital Design Class Overview/Rules

Digital Design Class Overview/Rules Digital Design 1 4 Ms. Fuller, instructor Digital Design Class Overview/Rules Class procedures, policies, and information: Class Rules Passes Handouts Safety and Security ID Badges Lockdown Procedures

More information

Policy for Social Media Usage in Catawba County

Policy for Social Media Usage in Catawba County Policy for Social Media Usage in Catawba County Adopted March 1, 2010 Revised September 7,2010 1. PURPOSE The role of technology in the 21 st century workplace is constantly expanding and now includes

More information

Students Acceptable Use Policy for Electronic Resources Rules Summary

Students Acceptable Use Policy for Electronic Resources Rules Summary Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must

More information

Auburn University at Montgomery Policies and Procedures

Auburn University at Montgomery Policies and Procedures Auburn University at Montgomery Policies and Procedures Title: Responsible Office: Social Media Policy University Relations I. PURPOSE This policy outlines the procedures governing social media pages created

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

DIGITAL CITIZENSHIP MODULE 1

DIGITAL CITIZENSHIP MODULE 1 Digital Etiquette DIGITAL CITIZENSHIP MODULE 1 Email, Texting, Cell Phone Usage, Ringtones, Social Networks, YouTube, Web Browsing, Shared Storage/Usage Space Define and apply the standards of use to daily

More information

Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009

Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009 Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009 Access to Electronic Media and other Technologies Terms and Conditions REASONS FOR PROVIDING ELECTRONIC

More information

Appropriate Boundaries in the World of Social Networking

Appropriate Boundaries in the World of Social Networking Appropriate Boundaries in the World of Social Networking SAIS annual conference 2011 caryn pass and heather broadwater 1 Social networking evolving area protection of all constituencies students, faculty,

More information

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.

More information

Backing Up Your Files. External Hard Drives

Backing Up Your Files. External Hard Drives Backing Up Your Files As we become more and more dependent on technology to help accomplish our everyday tasks, we tend to forget how easily the information stored on our computers can be lost. Imagine

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

CRIMES AND CONSEQUENCES

CRIMES AND CONSEQUENCES 2006 CRIMES AND CONSEQUENCES OUTCOMES At the end of this lesson, students will be able to: Define the terms crime and consequence Identify the four categories of crime Analyze possible consequences of

More information

JGSC Laptop Agreement

JGSC Laptop Agreement JGSC Laptop Agreement The mission of the 1:1 program at JGSC is to create an innovative, collaborative learning environment for students and teachers. Together, they will implement creative uses of educational

More information

Grand Canyon Council - Social Media Policy

Grand Canyon Council - Social Media Policy INTRODUCTION It s an exciting time to be part of the BSA for many reasons. One of those is that new communication vehicles now enable current and past Scouts and Scouters, as well those who are interested

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Revelstoke Board of Education Policy Manual

Revelstoke Board of Education Policy Manual Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS

More information

PT AVENUE GUIDE OVERVIEW

PT AVENUE GUIDE OVERVIEW PT AVENUE GUIDE OVERVIEW WSPTA is currently undertaking a database conversion from imis (the previous membership database) to a cloud based service called PT Avenue. The primary reason for this conversion

More information

Policies & Procedures. Moat Community College E-Safety Policy

Policies & Procedures. Moat Community College E-Safety Policy Moat Community College E-Safety Policy Vision Statement Moat Community College embraces the positive impact and educational benefits that can be achieved through appropriate use of the Internet and associated

More information

Portage Township Schools

Portage Township Schools Portage Township Schools Student/Parent BYOD Technology Handbook 1.1 BYOD Description: BYOD stands for Bring Your Own Device. Students will be encouraged to bring a recommended device to school to be used

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

Video #3 Creating Google Accounts Free SEO Training Roadmap Video Training Series

Video #3 Creating Google Accounts Free SEO Training Roadmap Video Training Series Do you find yourself in the position of trying to play catch up by learning, understanding and perhaps integrating Google, Facebook and other online services into your business and feel a little bit overwhelmed?

More information

Columbia Public Schools Student, Teacher and Parent Guide to Bring Your Own Device (BYOD)

Columbia Public Schools Student, Teacher and Parent Guide to Bring Your Own Device (BYOD) Columbia Public Schools Student, Teacher and Parent Guide to Bring Your Own Device (BYOD) Contents PURPOSE AND PLAN... 3 FREQUENTLY ASKED QUESTIONS... 4 STUDENTS... 4 STAFF... 5 PARENTS... 6 POLICY REFERENCES

More information

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the

More information

eportfolio Student Guide

eportfolio Student Guide Overview...2 The eportfolio...2 Folio Thinking...2 Collecting...2 Selecting...2 Reflecting...3 Connecting...3 Collecting...4 Adding Files to Resources...4 Public Files...5 Organizing Resource Files...6

More information

Social Media Policy For Staff

Social Media Policy For Staff Social Media Policy For Staff 1 Owlswick School and Home Social Media Policy Introduction The Internet provides a range of social media tools that allow users to interact with one another, for example

More information

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois 6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission

More information

2015 2016 RESA Frequently Asked Questions

2015 2016 RESA Frequently Asked Questions 2015 2016 RESA Frequently Asked Questions Table of Contents I. General Questions... 2 II. Registering for the RESA and Completing the Profile... 5 III. Task Modification for Special Circumstances and Accommodations

More information

How To Use Social Media At St James Anglican School

How To Use Social Media At St James Anglican School P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :

More information

Step 1: check & update your details ---------------------------------------------------------------------------------------------------------- 2

Step 1: check & update your details ---------------------------------------------------------------------------------------------------------- 2 This guide is an overview of how our system works. It gives you general instructions on how to set up your account. For more specific functions, the contextual help will give you detailed instructions

More information

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE Defense Media Activity TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING

More information

Electronic Resource Policy and Acceptable Use Guidelines. Kent School District

Electronic Resource Policy and Acceptable Use Guidelines. Kent School District Electronic Resource Policy and Acceptable Use Guidelines Kent School District General Guidelines for Technology Use All use of technology must support education. All use of technology must follow local,

More information

Online Tutoring & Mentoring Program

Online Tutoring & Mentoring Program Online Tutoring & Mentoring Program Engineering Science Corps, UCLA Tutorial for Teachers Welcome to the UCLA Henry Samueli School of Engineering & Applied Science (HSSEAS), Engineering Science Corps Online

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow Estimated time: 40 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy

More information

A Parents' Guide to. 2014 ConnectSafely.org

A Parents' Guide to. 2014 ConnectSafely.org A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram

More information

Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716

Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716 Measurabl, Inc. ( Company ) is committed to protecting your privacy. We have prepared this Privacy Policy to describe to you our practices regarding the Personal Data (as defined below) we collect from

More information

Passwords Students should not share their assigned password, or attempt to discover the school Apple Id.

Passwords Students should not share their assigned password, or attempt to discover the school Apple Id. Alta Loma Christian School Acceptable Use Policy 1:1 ipad Program Revised January 20, 2014 Alta Loma Christian (ALCS) recognizes that access to technology in school gives students greater opportunities

More information