YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org"

Transcription

1 CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology Coordinator St. Thomas the Apostle School Dr. Julia VanderMolen Director of Health Sciences Online Davenport University TODAY S WORLD Full of wonder fun scary places scary people Need to stay safe even when having fun

2 The three key components all Internet users should understand and promise to use whenever they go online to keep themselves, others, and their computer safe! Created by the National Cyber Security Alliance in Washington, DC WHICH IS THE CORRECT DEFINITION FOR CYBER SAFETY? 1. Responsible rules and behaviors designed to keep individuals safe whenever connected to the Internet 2. Informal code of positive conduct used whenever someone is using the Internet 3. The protection of information and computer systems and networks while connected to the Internet CYBER SAFETY Responsible rules and behaviors designed to keep individuals safe whenever connected to the Internet What can you do? Ask student what are some examples of safety rules that parents ask them to follow while using the Internet Do you follow those rules? What happens when you break a rule?

3 CYBER SAFETY TERMS Privacy In relation to internet use this refers to personal information you are entitled to protect from others accessing online. Social networking sites have special privacy controls that all children should set to high so that information they post is only by those they wish to share it Children s Online Privacy Protection Act (COPPA) A national law that protects the privacy of children under the age of 13 by requesting parental consent for the collection or use of any personal information of the users Cyber Safety Contract A contract you design with your parents or guardian AND COMMIT TO FOLLOW that outlines specific rules and guidelines for computer use in the home, at school, or at another location SELECT THE BEST DEFINITION OF CYBER SECURITY 0% 0% 0% 1. Responsible rules and behaviors designed to keep individuals safe whenever connected to the Internet 2. Informal code of positive conduct used whenever someone is using the Internet 3. The protection of information and computer systems and networks while connected to the Internet CYBER SECURITY The protection of information and computer systems and networks while connected to the Internet Common strategies that people use to protect their computer and personal information Antivirus Firewalls Malware protection Never give out personal information Always use a secure site when doing any transactions What can you do? List some security tips that people should know

4 CYBER SECURITY TERMS Adware A type of software that often comes with free downloads. Some adware displays ads on your computer, while some monitors your computer use (including websites visited) and displays targeted ads based on your use. Anti-virus software Protects your computer from viruses that can destroy your data, slow your computer s performance, cause a crash, or even allow spammers to send through your account. Browser hijacker A common spyware program that changes your web browser s home page without the user s knowledge, even if you change it back Exposure When sensitive information on your computer is released to someone without authorization SELECT THE BEST DEFINITION FOR CYBER ETHICS 0% 0% 0% 1. Responsible rules and behaviors designed to keep individuals safe whenever connected to the Internet 2. Informal code of positive conduct used whenever someone is using the Internet 3. The protection of information and computer systems and networks while connected to the Internet CYBER ETHICS Informal code of positive conduct used whenever someone is using the Internet Doing the right thing even when no one is looking or watching What can you do? Ask students of wise and poor Internet use choices and discuss What are some good strategies for being a good digital citizen who behaves ethically online.

5 CYBER ETHICS TERMS Cyber Smart Citizen A computer user who follows all of the C 3 Concepts and commits to always acting safely, ethically, and responsibly while using the Internet Copyright Laws Laws that protect the online material of a creator or composer from a computer user illegally downloading, copying, scanning or otherwise distributing their material without prior approval or consent Illegal Downloads Information (most commonly songs or music) downloaded by an individual either for themselves or to share with others that is not authorized by the original creator or composer s license. Netiquette The informal rules of Internet courtesy, enforced exclusively by other internet users. HOW CAN WE TEACH THIS TO OUR KIDS REGARDLESS OF AGE OR BACKGROUND Three Main Groups Kindergartners through 2 nd grade 3 rd 5 th grade (upper elementary age students) Middle/High School students KINDERGARTNERS THROUGH 2 ND GRADE Ask questions like: How many of you like to use computers? Where are some places you use the computer regularly? What is the Internet? What kinds of things do you like to do on the Internet? Do you have special rules for using the computer and the Internet? What rules do you have at home when you are on the computer?

6 KINDERGARTEN 2ND GRADE Techno-Kat story BEFORE WE GO TO THE HIGHER GRADES WE NEED TO DEFINE ONE SET OF TOOLS WWW DECISION TOOL Decision checklist to help reinforce strategies to behave responsibly and remain safe and secure during all Internet activities W Who is asking for this personal information? W What information is being requested? W Why do they need this personal information?

7 3 RD TO 5 TH GRADERS Large Group Ask similar questions that you asked to the Kindergarten to 2 nd grade group and add the following: How many of you use it every day? Where is the main computer in the house? Do you have a computer in your bedroom? Have students define the three terms that make up C 3 Cyber Safety Cyber Ethics Cyber Security Do you remember the definitions? 3 RD TO 5 TH GRADERS Large Group Ask similar questions that you asked to the Kindergarten to 2 nd grade group and add the following: How many of you use it every day? Where is the main computer in the house? Do you have a computer in your bedroom? Have students define the three terms that make up C 3 Cyber Safety Cyber Ethics Cyber Security Do you remember the definitions? 3RD TO 5TH GRADERS (CONT) Large Group (cont) Have the students answer the following questions: What are some examples of safety rules your parents ask you to follow while using the Internet? What are some wise and poor Internet use choices? What might be some good strategies for good digital citizens who behave ethically online? What are some common strategies that people use to protect their computer and personal information? What are some security tips users should know to keep the computer safe and protect their personal information whenever they go online? Read a scenario to the class Ask students to identify the red flags that Scott almost passed by in the hope of getting a free iphone

8 SCOTT AND HIS IPHONE Scott is a Fourth Grade student at Honors Elementary School where his class is doing research in the school s computer lab on ways to stay safe and secure while online. The computers at school are all connected to the same network, which holds student s personal information. During Scott s research on the Internet that day he receives several pop-up ads offering free iphones with 12 months of free mobile services including text messages if you accept the free trial subscription of TechIsCool online magazine. Scott knows the school s Acceptable User Policy is very clear about not downloading anything on school computers to protect the network. He knows he shouldn/t but he wants an iphone so badly and doesn t want to miss the opportunity to get the phone for free. Scott clicks on the link offering the free download. Scott gets suspicious when he starts getting additional pop-up ads asking for detailed personal information. He returns to the StaySafeOnline website and reads all about the potential harm in accepting free downloads. Scott changes his mind, doesn t provide personal information, and returns to his research on cyber security. WHICH MAJOR C3 CONCEPT DID SCOTT ALMOST VIOLATE? 1. Cyber Safety 2. Cyber Security 3. Cyber Ethics 0% RD TO 5 TH GRADERS (CONT) Small group exercise Break into groups of 3 or 4 Read the scenario assigned Answer the questions at the end of each scenario on the forms provided.

9 MIDDLE/HIGH SCHOOL STUDENTS Same steps as for the previous group except the scenarios are more indepth Large Group exercise same as Upper Elementary Small Group similar but must fill out a chart instead of answering questions. Responses may be different due to the experiences of the students involved. MIDDLE/HIGH SCHOOL SCENARIO Brian has a research paper due next week on the impact of cyber security threats to our national security. He was supposed to have been doing research on this project for the past month, but kept putting it off, and is now in a crunch for time! Rather than find the research, read through it, and paraphrase the key points, Brian thinks it is easier to simply cut and paste some of the paragraphs directly into his paper. He fails to cite many of the publications he copies the information from directly into his paper, thinking there is now way that his teacher will ever know the difference. WHICH MAJOR C3 CONCEPT DID BRIAN VIOLATE? 1. Cyber Safety 2. Cyber Security 3. Cyber Ethics 0% 0% 0% 1 2 3

10 TERMS THAT STUDENTS SHOULD KNOW NATIONAL CYBER SECURITY ALLIANCE (NCSA) A Washington DC based national non-profit organization that collaborates with the federal government, corporate, nonprofit and academic sectors, to create a culture of cyber security and safety awareness by providing the knowledge and tools necessary to prevent cyber crime and attacks to ensure that everyone remains safe while online. LET S DO THIS OURSELVES Break into groups Each group will have a scenario to read and evaluate Write down your findings Report back to the group Open ended discussion

11 ALL OTHER GRADES Divide into groups 3 to 4 per group Decide primarily which grade level you want to work with (upper elementary or middle/high school) Identify a team reported that reads the scenario to the rest of the class and report your teams answers and responses when done You will have 10 minutes to complete this project ADDITIONAL SOURCES NCSA ( technology-syber-security Cyber security NCSA has teamed up with USA Today Education Foundation and the Department of Homeland Security to develop four lesson plans using recent news stories about cyber security issues. These lesson plans are targeted to 8 th through 12 th grade ADDITIONAL RESOURCES CyberSmart! ( Safety and Security Online Manners, Bullying and Ethics The free CyberSmart! Student Curriculum empowers students to use the Internet safely, responsibly, and effectively. The free CyberSmart! Educator Toolbar puts 21 st century skills into practice every day, with just-in-time 24/7 access to annotated essential resources to support student learning.

12 ADDITIONAL RESOURCES Department of Justice ( The Department of Justice has developed a kids page focused on lesson plans for elementary and middle school children ADDITIONAL RESOURCES IKEEPSAFE ( Internet Keep Safe Coalition Faux Paw the Techno Cat Internet Safety basics How to handle cyber-bullying Balancing real life with screen time The risks and dangers of downloading The Faux Paw curriculum is based on research from Harvard s Center on Media and Child Health and created in partnership with the ikeepsafe Global Research Team, Penn State University Department of Education, and the University of Maryland. Most ikeepsafe resources are available for free download ADDITIONAL RESOURCES i-safe ( Personal safety Predator Identification Intellectual Property Cyber Citizenship Cyber Bullying i-safe offers internet safety curriculum for grades K-8 and webcasts for grades 9. Lessons are broken down by grades (K-8) and each grade s lesson focuses on a different topic.

13 ADDITIONAL RESOURCES James Madison University ( A guide to responsible technology use Safety Security Ethics ADDITIONAL RESOURCES NetSmartz Workship ( Internet Safety Cyber Bullying NetSmartz offers free, multimedia Internet safety presentations for use with children of all ages and adults. Resources include a Back to School kit, videos, worksheets and activity cards on online safety, texting, and cyberbullying. The NetSmartz Workshop is an interactive, educational safety resource from the National Center for Missing and Exploited Children (NCMEC) and Boys & Girls Clubs of America (BGCA). ADDITIONAL RESOURCES Play It CyberSafe ( Cyber ethics Cyber crime The Business Software Alliance has developed a web site that teaches how to prevent cyber crime through knowledge of the law, their rights, and how to avoid misuse of the Internet.

14 ADDITIONAL RESOURCES WebWise Kids ( Online safety Cyber security Spyware Bullying Ethics Social Networking Cell phone dangers Emerging technology Chat rooms and instant messaging safety Personal website Danger Zones Web Wise Kids is a unique organization that offers fun, challenging and interactive simulations based on real-life criminal cases. Each program has been designed specifically for use with young people in classrooms and computer labs (special version of the programs are also available for home use) FOR FURTHER INFORMATION: Maryly Skallos Dr. Julia VanderMolen This presentation is available at

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating

More information

STRATEGIC PLAN. For implementing safety training within communities of Symantec employees. All Rights Reserved

STRATEGIC PLAN. For implementing safety training within communities of Symantec employees. All Rights Reserved STRATEGIC PLAN For implementing safety training within communities of Symantec employees Executive Summary Identifying additional ways to reach and teach consumers about online safety, security, privacy

More information

i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5

i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 Scope of curriculum i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

i-safe K 12 CURRICULUM SCOPE 06-07

i-safe K 12 CURRICULUM SCOPE 06-07 i-safe K 12 CURRICULUM SCOPE 06-07 GRADES K 4 Scope and sequence i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction that best suits

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

Colonial Heights Public Schools Internet Safety Curriculum

Colonial Heights Public Schools Internet Safety Curriculum Colonial Heights Public Schools Internet Safety Curriculum Overview The Internet is a powerful tool and a wonderful resource but as with any tool, we must use it safely. Legislation in Virginia requires

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Education as a defense strategy. Jeannette Jarvis Group Program Manager PSS Security Microsoft

Education as a defense strategy. Jeannette Jarvis Group Program Manager PSS Security Microsoft Education as a defense strategy Jeannette Jarvis Group Program Manager PSS Security Microsoft Introduction to End User Security Awareness End User Security Awareness Challenges Understanding End User

More information

The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States

The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States National Cyber Security Alliance Microsoft Corporation Zogby/463 May 2011 Methodology Zogby/463 surveyed a statistically

More information

DIGITAL CITIZENSHIP MODULE 1

DIGITAL CITIZENSHIP MODULE 1 Digital Etiquette DIGITAL CITIZENSHIP MODULE 1 Email, Texting, Cell Phone Usage, Ringtones, Social Networks, YouTube, Web Browsing, Shared Storage/Usage Space Define and apply the standards of use to daily

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

RISKS OF SPYWARE. Lesson Procedures

RISKS OF SPYWARE. Lesson Procedures i-safe Lesson Plan Suggested Grade Levels Middle Grades RISKS OF SPYWARE Learning Objectives Students will: understand the term spyware and the types of programs it applies to understand the security risks

More information

Digital Citizenship Lesson

Digital Citizenship Lesson Digital Citizenship Lesson Categories: School Environment and Student Behavior/ Student Life Outside of School Environment Element: Digital Security Lesson: Malware Grade Level: 6-12 Part I Introduction

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

Social Media Curriculum Overview

Social Media Curriculum Overview Lessons in K 2 Social Media Curriculum Overview 1. Going Places Safely ( KINDERGARTEN) https://www.commonsensemedia.org/educators/lesson/going places safely k 2 How do I go places safely on the computer?

More information

C-SAVE. Level Middle/High School Ethics-copyright. Scenario #2 - Scott s Sorry Slumdog Choice

C-SAVE. Level Middle/High School Ethics-copyright. Scenario #2 - Scott s Sorry Slumdog Choice Grade Level- Middle/High School Ethics-plagiarism Scenario #1 - Brian and His Research Paper Brian has a research paper due next week on the impact of cyber security threats to our national security. He

More information

ANDRA ZAHARIA MARCOM MANAGER

ANDRA ZAHARIA MARCOM MANAGER 10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal

More information

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

F-Secure Anti-Virus for Mac 2015

F-Secure Anti-Virus for Mac 2015 F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Parenting & Technology: The Internet, Texting & Social Networks

Parenting & Technology: The Internet, Texting & Social Networks Parenting & Technology: The Internet, Texting & Social Networks Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety online Instant messaging,

More information

Teaching Digital Citizenship

Teaching Digital Citizenship 32 Government of Newfoundland and Labrador - Education I A School-Wide Approach - Positive Behaviour Supports 2013 Education Teaching Digital Citizenship Digital citizenship can be defined as the norms

More information

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives

More information

Music and the Internet. A guide for parents and teachers

Music and the Internet. A guide for parents and teachers Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,

More information

Music, Film, TV and the Internet. A guide for parents and teachers

Music, Film, TV and the Internet. A guide for parents and teachers Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally

More information

What's the difference between spyware and a virus? What is Scareware?

What's the difference between spyware and a virus? What is Scareware? What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials

More information

Introduction. Topics. ü c ü a & b ü a ü a & d. ü c ü c ü all subtopics ü a & d. Lesson 1 The Internet ü c ü all subtopics ü a

Introduction. Topics. ü c ü a & b ü a ü a & d. ü c ü c ü all subtopics ü a & d. Lesson 1 The Internet ü c ü all subtopics ü a Introduction About Carnegie Cadets: The MySecureCyberspace Game Carnegie Cadets: The MySecureCyberspace Game is an interactive Flash game designed for fourth and fifth graders that teaches Internet safety

More information

Keeping you and your computer safe in the digital world.

Keeping you and your computer safe in the digital world. Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats

More information

INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY

INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY Note: This section can be taught by the technology teacher or classroom teachers with support from the librarian. Contents: 1. Introduction and Essential

More information

Cyber-safety, Cyber-security, Cyber-ethics, (C3) Digital Literacy Skills

Cyber-safety, Cyber-security, Cyber-ethics, (C3) Digital Literacy Skills A Companion to the Augmented Technology Literacy Standards for Students INTRODUCTION The ikeepsafe Digital Citizenship C3 Matrix is designed to assist educators in integrating the concepts of cyber-safety,

More information

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2 Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...

More information

Educators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety

Educators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety Educators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety The Intel Security Digital Safety Program: Think Before You Link is an interactive digital-safety program

More information

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.

More information

Class 2: Manage Your Digital Footprint. Student Handbook

Class 2: Manage Your Digital Footprint. Student Handbook Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal

More information

Course Overview and Outline

Course Overview and Outline Course Overview and Outline The My Digital Life curriculum is comprised of seven modules that cover key concepts for building digital literacy. Each module contains between three and nine brief activities

More information

Webliography: Cyber Safety Online Resources

Webliography: Cyber Safety Online Resources Webliography: Cyber Safety Online Resources Acronyms Slang Terminology/Online Chat Abbreviations Define your world. Urban Dictionary. http://www.urbandictionary.com. The Urban Dictionary will provide individuals

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

Internet Safety & Awareness. Dan Tomlinson 02/23/2013

Internet Safety & Awareness. Dan Tomlinson 02/23/2013 Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer

More information

F-Secure Anti-Virus for Mac. User's Guide

F-Secure Anti-Virus for Mac. User's Guide F-Secure Anti-Virus for Mac User's Guide F-Secure Anti-Virus for Mac TOC 3 Contents Chapter 1: Getting started...5 What to do after installation...6 Manage subscription...6 Open the product...6 How to

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

Internet Safety Guidelines

Internet Safety Guidelines Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can

More information

Activities for Protecting Your Identity and Computer for Middle and High School Students

Activities for Protecting Your Identity and Computer for Middle and High School Students Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be

More information

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: gillrr@mcmaster.ca Due: Tuesday April 5, 2005

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview

More information

Hector s World Lesson plan Episode: Computer security: Oops Upper primary

Hector s World Lesson plan Episode: Computer security: Oops Upper primary Hector s World Lesson plan Episode: Computer security: Oops Upper primary BACKGROUND Students of this age are emerging users of internet-enabled computers. They may be involved in a range of online activities

More information

Monitoring Technology Misuse & Abuse

Monitoring Technology Misuse & Abuse Print Article Close Monitoring Technology Misuse & Abuse By Mike S. Ribble and Gerald D. Bailey, Kansas State University August 2004 - Feature A Five-Step Plan for Creating a Digital Citizenship Program

More information

Music, Film, TV and the Internet. A guide for parents and teachers

Music, Film, TV and the Internet. A guide for parents and teachers Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow Estimated time: 45 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy

More information

Safe Practices for Online Banking

Safe Practices for Online Banking November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.

More information

Cyber Safety Education in High Schools

Cyber Safety Education in High Schools 2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.21 Cyber Safety Education in High Schools

More information

YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO

YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO DIGITAL MUSIC: THE KEY FACTS Music is an important part of young people

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Overview: Students examine their participation in digital life. They explore how information shared through digital media

More information

Maryland Technology Literacy Standards for Students

Maryland Technology Literacy Standards for Students Standard 1.0 Technology Systems: Develop foundations in the understanding and uses of technology systems Pre-kindergarten Kindergarten Grade 1 Grade 2 Grade 3 A. Systems A. Systems A. Systems A. Systems

More information

Terms of Use. i-safe lessons may NOT be duplicated for any reason except for your classroom use.

Terms of Use. i-safe lessons may NOT be duplicated for any reason except for your classroom use. Terms of Use Clicking on the Agree and Print button (below) means that I agree that: i-safe lessons may NOT be shared with other educators (e.g., faculty or staff) in any school or district which is not

More information

Internet Safety Plan for Your Family

Internet Safety Plan for Your Family The Mcafee 10-Step Internet Safety Plan for Your Family How to talk to kids, tweens, teens, and novices of any age about online security 10 Table of Contents 3 Introduction 4 5 Today s Internet: Proceed

More information

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014 BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective

More information

3.28F LICENSED PERSONNEL EMPLOYEE INTERNET USE AGREEMENT

3.28F LICENSED PERSONNEL EMPLOYEE INTERNET USE AGREEMENT 3.28F LICENSED PERSONNEL EMPLOYEE INTERNET USE AGREEMENT Acceptable Use Policy: Staff The Benton School District provides technology to support teaching, enhance learning, and improve productivity. This

More information

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review

More information

POLICY TITLE: Computer and Network Service: POLICY NO: 698 POLICY TITLE: Acceptable Internet Use Policy PAGE 1 of 5

POLICY TITLE: Computer and Network Service: POLICY NO: 698 POLICY TITLE: Acceptable Internet Use Policy PAGE 1 of 5 POLICY TITLE: Acceptable Internet Use Policy PAGE 1 of 5 An account on the Emmett School District computer network and subsequently, access to the Internet, is provided for all students, unless otherwise

More information

Mercy School. Internet Safety Policy

Mercy School. Internet Safety Policy Mercy School. Internet Safety Policy School name: Mercy School School Address: St. John s Road, Wexford : 053 9123294 : mercyschoolwexford@gmail.com Website Address: mercywexford.scoilnet.ie Internet Usage

More information

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5 BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 5 08/25/2015 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective

More information

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012

Risks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Minimizing Technology-Related Risks NAN STENZEL NAN STENZEL REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Current Computer Topics Buying a New Computer In-home Wireless Security

More information

Information security education for students in Japan

Information security education for students in Japan Information security education for students in Japan Introduction This article aims to introduce the current situation of elementary and secondary school education on information security in Japan, as

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

Haddon Township School District Acceptable Use of Information and Communication Technology for Students Haddon Township School District Acceptable Use of Information and Communication Technology for Students Please read the following carefully before signing the Acceptable Use Policy for Students Agreement.

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Internet Scout Patch Workbook

Internet Scout Patch Workbook Workbook This workbook can help you but you still need to read the program guide. The work space provided for each requirement should be used by the Scout to make notes for discussing the item with his

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

IDENTITY AND INTERNET SAFETY CURRICULUM

IDENTITY AND INTERNET SAFETY CURRICULUM IDENTITY AND INTERNET SAFETY CURRICULUM INTRODUCTION Consider the following statistics: 96 percent of teens use social networking applications such as Facebook, MySpace, Chat rooms, and blogs 1 70 percent

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

Students Acceptable Use Policy for Electronic Resources Rules Summary

Students Acceptable Use Policy for Electronic Resources Rules Summary Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must

More information

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

The webcast will begin shortly. Please stand by.

The webcast will begin shortly. Please stand by. The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone

More information

Saheel KHOYRATTY. Partner Technology Advisor

Saheel KHOYRATTY. Partner Technology Advisor Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment

More information

NetDay Cyber Security Kit for Schools

NetDay Cyber Security Kit for Schools NetDay Cyber Security Kit for Schools : A Story about Cyber Security for Children Introduction: This short, entertaining story discusses the importance of computer security and online safety for children.

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

DIGITAL WELLNESS ONLINE CHALLENGE

DIGITAL WELLNESS ONLINE CHALLENGE DIGITAL WELLNESS ONLINE CHALLENGE 1 st July - 8 th July 2015 Information Manual With Support From Table of Contents Introduction 1 Objectives of the Digital Wellness Online Challenge 2 Brief Overview 3

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

Cybersecurity Protecting Yourself, Your Business, Your Clients

Cybersecurity Protecting Yourself, Your Business, Your Clients Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric

More information

Emerging Trends in Malware - Antivirus and Beyond

Emerging Trends in Malware - Antivirus and Beyond Malware White Paper April 2011 Emerging Trends in Malware - Antivirus and Beyond One need only listen to the news or read the latest Twitter and media updates to hear about cyber crime and be reminded

More information

INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT

INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT 1. Introduction and essential information 2. Required lesson 3. Optional lessons and activities 4. Additional resources 5. Standards

More information

THE LONG EATON SCHOOL

THE LONG EATON SCHOOL THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3

More information

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes

More information

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in

More information

Information Security. Louis Morgan, CISSP Information Security Officer

Information Security. Louis Morgan, CISSP Information Security Officer Information Security By Louis Morgan, CISSP Information Security Officer Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long

More information