The Ultimate 41-Word Cyber Bullying Prevention Crossword Puzzle Young Teen version Brought to you by STOPNOTinmySchool.org and Spectrum Diversity LLC
|
|
- Margery Shelton
- 7 years ago
- Views:
Transcription
1 % The Ultimate Brought to you by STOPNOTinmySchool.org and Spectrum Diversity LLC This crossword puzzle was designed as an educational tool to teach both teens and adults about cyber bullying. It is recommended for individuals age 13-14; please preview the entries in the crossword puzzle before using it with younger populations to determine appropriateness. Additional versions of this crossword puzzle are available for other age groups. The clues to the puzzle contain safety messages designed to teach young teens what cyber bullying is, how damaging cyber bullying can be, how to avoid being cyber bullies themselves, and what to do if they know someone who is being cyber bullied, or if they are being cyber bullied themselves. The value of this tool is increased if an adult reviews the clues and the answers with the youth, to ensure that the safety messages contained in the puzzle are fully understood and taken to heart. Permission is granted for educators, counselors, and parents to duplicate this crossword puzzle, and to further distribute it for educational purposes, as long as the source information located at the bottom of each page remains intact on each copy. Copies of pages 2-6 (blank puzzle and clues) may be distributed without page 1 (this cover page) and/or page 7 (the answer key). This puzzle is the sole creation of Dr. Paula C. Rodríguez Rust, owner, Spectrum Diversity, LLC. No puzzle making software was used in the creation of this puzzle. Please send comments and suggestions for this activity, or suggestions regarding other activities that you would find useful, to spectrumdiversity@comcast.net "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% # "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% $013456(1/ "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% %#"$%# 74**86%9/ "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% # "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "()##*/ "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% %#"$%" 01$1("/ "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% 2+))# &'()*# "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%#"()"*+##,-'./% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%#"&'"()##*+,-./ Page 1
2 The Ultimate Brought to you by STOPNOTinmySchool.org and Spectrum Diversity LLC " # $ % & ' ( ) * "+ "" "# "$ "% "& "' "( ") "* #+ #" ## #$ #% #& #' #( #) #* $+ $" $# $$ $% $& $' $( $) $* "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# Page 2
3 CLUES TO The Ultimate Notes for the Clues: A user is a user of electronic technology. This includes individuals who use cell phones, gaming systems, and the internet. Some entries in the crossword puzzle consist of more than one word, or of hyphenated words. To fit the entries in the puzzle, leave out any blanks between words. For example, if the answer to a clue were peach tree, you would write peachtree in the crossword puzzle, and if the answer were multi- layered, you would write multilayered. ACROSS 5. To copy something from a website onto one s own computer, usually by transferring a file containing the information, photo, video, etc. to one s computer. 6. A string of letters and/or numbers that allows the owner of an account to gain legitimate access to that account. To prevent bullying by impersonation, users should keep this string of letters and/or numbers private, and not reveal it even to their best friends. 8. To copy something from one s computer to a website, usually by transferring a file containing the information to the website, and usually for the purpose of making the information available or visible to others who visit the website. 10. Information that is secret, i.e., that another person does not have the right to pass on to others without permission from the owner of the information. 12. A message that is sent, with instructions for the recipient to forward it to a certain number of other people. Sometimes, a promise of a reward is offered for forwarding the message to the correct number of people, sometimes a time limit is imposed for the forwarding, and sometimes a threat is made in case the message is not forwarded as instructed. Sending such a message can be a crime. 13. Oh My God or Oh My Goodness 14. The information an account holder provides that is made visible by the host to other users is called the user s. For example, the information on a Facebook page about the owner of the page that is visible to people who visit the page. 19. Abbreviated IM, this is a type of message that is transmitted directly from one user s computer to the other, bypassing the filtering, logging, and Page 3
4 monitoring functions of a host server. Youth are more likely to use services to communicate with their friends, than to use e- mail services. 21. In Real Life 22. A list of the individuals with whom an instant message user has established ongoing channels of communication. When one of these individuals is online, an icon might appear to indicate their availability, thus facilitating communication. 24. A popular web application used to broadcast comments to one s followers. Often used to let one s circle of friends know where one is and what one is doing or thinking at the moment. 25. In My Opinion, similar to the more frequently used In My Humble Opinion 28. Acronym for internet service provider. Each message sent using a computer connection to the internet contains an electronic address assigned by the internet service provider, called the address that allows the police to identify a person who committed a crime online, even if that person made an effort to disguise their identity online. 30. is a statement made by a person indicating that s/he will do harm to another person, or that harm will come to another person. Many users make s without realizing that, even if the act described is not carried out, that the act of making itself does harm, and is often illegal. Many chain letters/e- mails contain s about what will happen to a recipient if the chain e- mail is not forwarded, and people who forward these messages often do not realize that they have made to someone else. 32. Laughing Out Loud. 33. Pretending to be someone else online, including sending messages or posting information online under someone else s name, or logging onto someone else s account using their password without their permission. This is a form of cyber bullying that can be partly avoided if users keep their passwords private. 34. What people who harass others online are usually seeking, because they do not feel they have enough of it in their everyday lives. If others do not react to the bullying, sometimes the bully will stop because they are not getting the feeling of that they are trying to get by bullying. 35. Also called revenge, is the act of getting back at someone for something they did that was hurtful. 36. Passing information about someone around to others behind the person s back. Usually, the information is untrue, and often it is hurtful or derogatory. is sometimes also called gossip. 37. A name, which might or might not reflect a user s real name, that is used to represent the user online. Messages sent by the user and postings made by the user are received or posted under this name, and this name is part of Page 4
5 one s profile, which is visible to others. The might be the same as the user name one uses to sign onto an account, or it might be different. Also called a tag or a handle,, it is important that young people choose s that do not reveal their real name, gender, age, or location. 38. The act of harassing another player within an online game. Gamers sometimes excuse this behavior by saying that psyching out the other player is an expected part of the game, and might or might not be aware that, in fact, a line has been crossed and the behavior has become harassment. 39. To another player in a game means to try to win an electronic online game by attacking the opponent psychologically; this behavior often crosses the line and becomes bullying, but gamers sometimes excuse their actions by claiming that it is an expected part of the game. DOWN 1. Many kinds of cyber bullying are illegal. When a crime is committed online, the become involved to conduct an investigation and criminal charges might be filed. 2. Young people who run into trouble online, or who know that a friend is being bullied or has run into other trouble online, should tell a trusted immediately. 3. Someone who use their physical or social power, or technological knowledge of digital communications, to do or say things that harass or bother other people. 4. It is unsafe to allow anyone whom you do not already know in real life to find out who you are, that is, to be able to you. Therefore, you should never give out ing information such as your name, age, address, or phone number online. 5. of character is the act of spreading rumors or other information that impunes another person s character or damages their reputation. This activity is covered under civil law, because it violates the individual s civil rights and might be grounds for a lawsuit. 7. Posting or messaging without revealing one s real name. One reason some people do things online that they would not do to someone else F2F is because, online, they feel even if they know that, in fact, the police would be able to identify them if they commit a crime online. 9. A person who witnesses or knows that someone is being bullied. This person can help, either by telling a trusted adult, by being a friend to the person who is being bullied, or by helping that person stop the bullying. 11. A person who seeks out victims for the purpose of taking advantage of them. A cyber uses information gathered online to identify and locate victims. Page 5
6 15. An important civil right which is often used by cyber bullies to excuse their actions, but harassing and harming others is not, in fact, covered by this right. 16. A security setting in which not only the members of one s own friend list on a social networking site can view a piece of information, but the members of those individuals friends lists can also view the information. This setting is less private than the friends only setting, and only slightly more private than the everyone setting. 17. When one s cyber activity violates someone else s civil rights, for example by invading their privacy or spreading damaging rumors, the injured person might file a against the person who hurt them online. 18. A way to view a conversation between two people who are writing to each other on their walls on Facebook, in which the comments of both participants are visible. 20. Many types of cyber bullying are, for which individuals can be prosecuted under criminal law, leading to prison time and other consequences. 23. To visit a chatroom or forum invisibly, so that other participants do not know that you are listening to the conversation. When you participate in a chatroom or forum, you should always be aware that there might be ers; do not give out any personal information. 24. Written shorthand language used to send messages between cell phones, designed to reduce the number of keystrokes required for a message. Young people are usually much faster at using this shorthand language than adults are. 26. Because experiences and spaces that exist in cyber space are sometimes called reality as opposed to IRL experiences and places- - users sometimes develop the impression that what is said or done online is somehow not quite real. 27. A very popular social networking site among both youth and adults, about which a movie was made. 29. The right to is a civil right under which people have the right to keep certain kinds of information about themselves private, and to expect others to keep their confidential information confidential, and not to pass that information including photos or videos of them on to others without their consent. Violations of this right are illegal, and can lead to lawsuits against someone who does not maintain the confidentiality of another person s information or image. 31. I was only is a favorite excuse of cyber bullies. Many do not realize that if their actions hurt another person, the argument that they were only will not excuse them and they will still be responsible for the hurt they caused to another person. Page 6
7 ANSWERS TO The Ultimate Brought to you by STOPNOTinmySchool.org and Spectrum Diversity LLC " " # # $ $ % % & & ' ( ) * ' # & + ' " ( #,, ( ' - &. * ) + " * ' # & ). / * $ % * * "+ 0 ' ) / % &. ) 1 % # * ) 1 3,. "" " 2 "# 0 4 # % ) # 1 - "$ ' 3 5 / 1 # "% " - ' "& / % *. ' "' / 2 % ) - & + "( * - ' & ") (. #, # "* % ), 1 # ) 1 3.,, # 5. 1 #+ 0 (. - *, ' -, ) * " #" % - * % ## $ + & & 2 #$ * %, 1 #% 1 ( % #& % 3 ' %, + 6 '.. 1 ' - #' 7 1 ( 0 #( / #) %, #* " / 8 % $+ # # 1 - / - $" 9 $# * ' * 0 $$ % 3 ". -, ' ) # 1 % ' ) * $% " ' (. - 7 % + 8 $ # $& -. 1 # * % # 1 % ' ) $' ' - $(, ) * ) ' 2 & $) 5 - %. / % ) 5 8 $* ", ' + 1 $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " $* " Page 7
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationStudents are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.
Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationComputer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
More informationInternet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
More informationThis document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
More informationCYBERBULLYING TEACHER S GUIDE:
TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies
More informationIdaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents
stalking Most victims are stalked by someone they know. Stalking is serious, often violent, and can escalate over time. This handbook provides information on stalking and available resources. Idaho Coalition
More informationYPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)
YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationC-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
More informationSchool Bullying Survey
School Bullying Survey This survey is not required for your class. If you choose not to complete this survey, your grade in the class will not be affected in any way. If this is your decision, just leave
More informationJOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT
JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.
More informationBullying 101: Guide for Middle and High School Students
Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org
More informationPrivacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction
Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we
More informationPRIVACY POLICY. I. Introduction. II. Information We Collect
PRIVACY POLICY school2life, Inc. ( school2life ) Privacy Policy is designed to provide clarity about the information we collect and how we use it to provide a better social gaming experience. By accepting
More informationFIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
More informationTechnology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
More informationAuthorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy
Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using
More informationChapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationNational Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
More informationCyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
More informationLt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
More informationPortmarnock Community School ICT and Social Media Expected Use Policy. June 2013
Portmarnock Community School ICT and Social Media Expected Use Policy June 2013 1.0 Introduction Portmarnock Community School recognizes that access to Information and Communication Technology (ICT) gives
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationA Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationGrand Canyon Council - Social Media Policy
INTRODUCTION It s an exciting time to be part of the BSA for many reasons. One of those is that new communication vehicles now enable current and past Scouts and Scouters, as well those who are interested
More informationTWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY
TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message
More informatione-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationFinchley Catholic High School. Anti Bullying Policy
Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can
More informationPrivacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
More informationSocial Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
More informationGirls & Cyber- bullying
MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts
More informationContents Security Centre
Contents Security Centre... 1 1. Search Engines... 2 2. Online Applications... 2 3. Virgin Money Credit Card Online Banking Security Measures... 2 3.1 Access Number, PIN and Password... 2 3.2 Keypad...
More informationClass 2: Manage Your Digital Footprint. Student Handbook
Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal
More informationCoventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy
Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy The Coventry Public Schools encourages the use of digital technology for teaching and learning, for professional responsibilities,
More informationGuidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
More informationACCEPTABLE/ RESPONSIBLE USE POLICY IIBE
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.
More informationDIGITAL TECHNOLOGY POLICY St Example s School
DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationSocial Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
More informationTomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
More informationHAZING AND BULLYING (Harassment, Intimidation and Dating Violence)
HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications
More informationBy Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
More informationLutheran Education Association of Houston Acceptable Use Policy (Students)
Lutheran Education Association of Houston Acceptable Use Policy (Students) With the use of technology, including the Internet, Intranet, hardware and software, the Lutheran Education Association of Houston
More informationesmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2
Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...
More informationE Safety Policy. 6 th March 2013. Annually. 26 th February 2014
E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to
More informationDiocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016
Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives
More informationOverexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect
More informationeffects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
More informationUSES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?
TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to
More informationWakefield Public Schools Technology Acceptable Use Policy
Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of
More informationUnderstand What s Going On
Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationTechnology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
More informationParent Guide to Cyber bullying and Cyber threats
School Address: 4450 S Mendenhall Rd Memphis, TN 38141 Tel: (901) 367 7814 Fax: (901) 367 7816 www.sememphis.org MEMPHIS SCHOOL OF EXCELLENCE Parent Guide to Cyber bullying and Cyber threats Young people
More informationMedford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
More informationCYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito
CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)
More informationOnly talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
More informationCyberbullying. How common is cyberbullying?
Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:
More informationCyber-bullying. Cyber-bullying: A Digital Epidemic White Paper
Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents
More informationSalisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media
What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online
More informationSaint Martin s Catholic Academy
Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin
More informationZero-knowledge games. Christmas Lectures 2008
Security is very important on the internet. You often need to prove to another person that you know something but without letting them know what the information actually is (because they could just copy
More informationUNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
More informationAcceptable Use Policy Holy Spirit Catholic School
Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,
More informationHandbook on Conducting Research on Social-Networking Websites in California 1
Handbook on Conducting Research on Social-Networking Websites in California 1 Created by David Lee and Shane Witnov 2 Samuelson Law, Technology & Public Policy Clinic, UC Berkeley School of Law for The
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationPractical tips for a. Safe Christmas
Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see
More informationLesson Plan for Senior Secondary
Lesson Plan for Senior Secondary Introduction Purpose Introduce the National Day of Action against Bullying and Violence (NDA) campaign Explore the role of bystanders to bullying Investigate the theme
More informationHow To Behave At A School
THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationDCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY
DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained
More informationSocial Media Guidebook. by Kevin Lawrie Sport Law & Strategy Group krl@sportlaw.ca
Social Media Guidebook by Kevin Lawrie Sport Law & Strategy Group krl@sportlaw.ca What is Social Media? Social media has become the catch-all term that we apply broadly to new computer-mediated communication
More informationCYBERSAFETY USE AGREEMENT for Cambridge High School Students
CYBERSAFETY USE AGREEMENT for Cambridge High School Students Cambridge High School This document is comprised of this cover page and three sections: Section A: Introduction Section B: Cybersafety Rules
More informationOCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875
OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
More informationDisability Hate Crime 04-03-09 9/3/09 12:03 Page 1. Disability Hate Crime. Reporting Book
Disability Hate Crime 04-03-09 9/3/09 12:03 Page 1 Disability Hate Crime Reporting Book Disability Hate Crime 04-03-09 9/3/09 12:06 Page 2 This book is about Disability Hate Crime and how to Report it
More informationArt-list License Agreement
Art-list License Agreement 1. General 1.1. The Agreement herein is made between you and Art list (or by any other name), the owner of the site: www.art list.io, and it settles the terms and conditions
More informationInternet Safety. A guide to staying smart & safe online
Internet Safety A guide to staying smart & safe online What you will learn Privacy how to keep your information safe & secure Safety how to protect yourself & your family online It s not just about computers
More informationNotice of Privacy Practices Walter L Cohen High School School-based Health Center. Effective as of August 6, 2004
Effective as of August 6, 2004 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. We are required
More informationTHE TRUTH ABOUT BULLIES
THE TRUTH ABOUT BULLIES OVERVIEW: The goal of this activity is to inform and educate students about bullying. The lesson plan asks students to consider a list of statements about bullies and to decide
More informationWhat Is the Olweus Bullying Prevention Program?
Dear Parent/Guardians, Your child s school will be using the Olweus Bullying Prevention Program. This research-based program reduces bullying in schools. It also helps to make school a safer, more positive
More informationTable of Contents. 1. Basic Netiquette Pg. 3-4. 2. Copyright Pg. 5. 3. Plagiarism Pg. 6. 4. Privacy Pg. 6
Computer Ethics 1 Table of Contents Computer ethics is a term used to describe the ethical principles and moral dilemmas that you encounter in today s computer-based society. It makes us think about the
More information2012 NCSA / McAfee Online Safety Survey
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
More informationNortheast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationLeonardo Hotels Group Page 1
Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes
More informationACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Please Note: This is the Eastern School District policy in its entirety. Not all regulations are relevant to a K-6 school. Policy Statement ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY All
More informationThe Respectful Workplace: You Can Stop Harassment: Opening the Right Doors. Taking Responsibility
The Respectful Workplace: Opening the Right Doors You Can Stop Harassment: Taking Responsibility Statewide Training and Development Services Human Resource Services Division Department of Administrative
More informationA Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk
A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the
More information