Digital Citizenship Lesson Plan
|
|
|
- Elwin Houston
- 10 years ago
- Views:
Transcription
1 Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. OBJECTIVES: To help participants identify risky behavior when going online To teach methods to reduce risk when online To explore resources that cover the topics of identity theft, cyber bullying and other threats To engage in coversation that helps to raise awareness of the risks Lesson Plan The topic of Digital Citizenship is an important one, but may not be one that your participants choose when deciding which workshops to attend. It is that reason that we have created the Internet Safety Tips handouts that you can use at your trainings. Each topic should be delivered in minutes at either the beginning or end of your training. That way we are still delivering these important messages without dedicating an entire session to the topic. For each topic there is a 1-page handout with facts and information, as well as links to resources on the TechTECS website. There are also infographics on the website that you can review with the group if there is time. These topics can generate lots of good conversation, so if you have an engaged group it may be good to go over the Tips sheet at the end of the training so that it doesn t take up too much training time. Internet Safety Tips Topics Identity Theft Protecting Future Reputations Password Tips and Tricks CyberBullying A Parents Guide to Mobile Device Security CyberPredators
2
3 Identity Theft Identity theft has been a problem for many years, but with the influx of online shopping, mobile devices, social media and the amount of information available online, the ID theft problem keeps multiplying. ID theft doesn t always mean financial exposure, it could also impact your reputation if someone is pretending to be you on social media sites, or when using your mobile device. It is important for you to understand the risks and to inform your loved ones as well. To learn more about identity theft, explore resources and access quizzes to see if you are at risk for identity theft, visit: TechTECS.com/digital-citizenship Who is most at risk for identity theft? Children Are being targeted 35 times more often than adults. People with social media profiles Due to the personal information they put on their profiles. Smartphone Owners 7% of smartphone owners were victims of ID fraud. This is 1/3 higher incident rate compared to the general public. Deceased people Nearly 3 million of stolen identities are that of deceased people College students More often college students have good credit scores, making them an ideal target. Victims of data breaches Are 9.5 times more likely to be a victim of ID fraud. Higher income individuals Those with higher incomes are more likely to be victimized Did you know? In the US more than 11.6 million adults became victims of identity theft. 62% of smartphone owners do not use a password on their home screen 32% of smartphone owners save log-in information on their device. Every three seconds someone s identity is stolen. Victims who found out about their identity theft more than six months after it happened incurred costs four times higher than the average 58 hours is the average amount of time victims spent repairing the damage done to existing accounts 43% of identity theft occurrs from stolen wallets, check-books, credit cards, billing statements, or other physical documents Facts and Statistics from
4 Protecting Future Reputations Social media, can be a good, positive tool if used responsibly. It is those that choose to put reputation damaging photos and comments on their feed or profile pages that need to think about how that will affect their futures. Colleges, scholarship readers, employers, coaches, teachers and family members access the Internet to gather information on people they are interested in. How you portray yourself online today will follow you into the future. To learn more about protecting your online reputation and explore resources visit: TechTECS.com/digital-citizenship How do you protect your digital self? Join social media sites- This may seem counter productive, but by having a clean profile, you show you can be a responsible user of the technology. No profile at all may raise flags that you had to delete it all. Think before you post! - If you wouldn t say it at a Thanksgiving table or during a staff meeting at work, then don t say it online. Use the 80/20 Rule - If you have a professional Facebook page or Twitter feed, keep the content 80% professional and 20% personal. The 20% personal can help people get to know you better, just be sure to not get TOO personal! Google Yourself - It really doesn t matter which search engine you use, just be sure to search for yourself, your children and your company to see what others see when looking you up online. In 2010, 57% of adult internet users now use search engines to find information about themselves online, up from 47% in In 2010, 46% of online adults have created their own profile on a social networking site, up from just 20% in In 2010, 46% of internet users search online to find information about people from their past, up from 36% in Likewise, 38% have sought information about their friends, up from 26% in Facts and Statistics from
5 Password Tips and Tricks For the most part, your data is only as secure as you are. If you aren t using a secure password, then you are opening yourself up to identity theft, fraud and financial loss. Creating and maintaining a unique, secure password for all of your web based sites may seem like a daunting task, but a few tips and tricks may help you to keep your information safe. To learn more password tips and tricks and explore resources visit: TechTECS.com/digital-citizenship How do you create a good password? Use a variety of character types- Use upper and lower case letters, numbers & symbols when creating a strong password. Don t use words found in the dictionary - You may think you have a clever password, however, if the word can be found in the dictionary, or in the dictionary written backwards, then the password can be easily hacked. Don t use numbers or names that identify you - Your pets or kids names, your birthday or your phone number are all examples of poorly chosen passwords that can be easily guessed. Don t write them down and place in an obvious location- A sticky note on your monitor or under your keyboard is not a good place to put passwords. If you must write them down, put them in a secure spot, such as in a safe. Create a password scheme you will stick to- Choose a scheme that you will remember, such as using 3 for E or $ for S ($pagh3tti) Use a phrase or lyrics instead of a word- Using this method you could use the entire phrase, or just the first letter of each word. For example, ilov3th3gr33nbaypack3rs or iltgbp. A computer loaded with the latest virtualization software and high powered graphics cards can now crack an eight-character password in 5 1/2 hours. The average internet user has 25 online accounts, 6.5 passwords and waits an average of 3.1 months before changing passwords. 66% of people online utilize only 1 or 2 passwords for all of their accounts. Facts and Statistics from
6 Cyberbullying Cyber bullying is defined as a young person tormenting, threatening, harassing, or embarrassing another young person using the Internet or other technologies, like cell phones. At first thought, it may seem like less of an issue if the bully is hiding behind a screen, however, studies have shown this type of bullying can be just as dangerous, if not more, as the face-to-face kind. To learn more about cyber-bullying and explore resources visit: TechTECS.com/digital-citizenship/ How do you identify and stop cyberbullying? Talk to your kids- Have a conversation about bullying, sometime kids may think they are just teasing, and not realize the impact they may be having on another child. Keep a record- There are antibullying laws in many states. If your child is being bullied and the bully won t back down, the transcripts of the comments can help if law enforcement gets involved. Nearly 43% of kids have been bullied online. 1 in 4 has had it happen more than once. 70% of students report seeing frequent bullying online. 81% of young people think bullying online is easier to get away with than bullying in person. 53% of kids admit having said something mean or hurtful to another person online. More than 1 in 3 have done it more than once. Over 80% of teens use a cell phone regularly, making it the most common medium for cyberbullying. Over 25% of teens have been bullied repeatedly through text messages. 68% of teens agree that cyber bullying is a serious problem. Girls are about twice as likely as boys to be victims and perpetrators of cyber bullying. Only 1 in 10 victims will inform a parent or trusted adult of their abuse. 1 in 6 parents know their child has been bullied online. Cyberbullying victims are 2 to 9 times more likely to consider committing suicide. Facts and Statistics from
7 Taking Back Control: A Parents Guide to Managing Technology at Home Generally speaking, kids today know more about technology than their parents do. Even though the kids may know more about the technology, it doesn t mean parents should remain in the dark when it comes to the latest devices. Parents are still the ones in charge and they should remain that way by setting some rules and guidelines for their kids to follow. To learn more about managing devices and exploring resources, visit: TechTECS.com/digital-citizenship/ How do you manage your kids and their devices? Set some ground rules- Many kids are given a laptop, ipad or cellphone by those who love them and no ground rules are set. Remember, these devices access the world and there should be some rules in place to keep your kids safe. Limit Online Access- Nothing good happens after midnight, so there is no reason for kids to be online that late at night. You can set your wireless router to deactivate at certain hours, such as from 11:00 PM to 6:00 AM. If they have smartphones with data plans, have them turn them in at a certain time to be charged for the night. Plus, your kids need their sleep! Know what devices go online- Many video gaming units have internet access. Friend your kids on social media- If everyone else who are friends with your child knows what they are up to, you should too. It isn t an invasion of privacy. They are minors and your responsibility; your house, your rules. 93% of teens ages go online 69% of teens have their own computer 24% of teens with a game console use it to go online 73% of teens are on a social network 37% send messages to friends every day As many as 7.5 million Facebook users in the U.S. are under age a violation of Facebook s user policies A 2010 Pew Internet Project survey found that 75% of those ages have cell phones, up from 45% in Facts and Statistics from
8 CyberPredators We all remember when 20/20: To Catch a Predator aired on TV. People were shocked to see the predators that were trying to meet and take advantage of young kids. What was even more disturbing when the facts came out was that many of these people were from respectable professions, such as doctors and teachers. So how can we keep our kids safe from those who look for prey online? Here are some tips that may help you. To learn more about cyberpredators and to explore resources, visit: TechTECS.com/digital-citizenship/ How do you keep your kids safe from predators? Make sure your child s online friends are friends they know in person- If they wouldn t walk up and say hi to that person on the street, then they shouldn t be friends with them on Facebook or other social media sites. Talk about what information is private- Kids need to know what information to share online and what not to share. Report inappropriate behavior- Many sites allow you to report abusers and they will ban them from sites. Let your kids know it is ok to tell a trusted adult if someone makes them feel uncomfortable. Follow the rules- Social media sites such as Facebook have a minimum age. Make sure you are enforcing these rules as a parent. One in five U.S. teenagers who regularly log on to the Internet says they have received an unwanted sexual solicitation via the Web. (only 25% of those told a parent!) About 30% of the victims of Internet sexual exploitation are boys. Internet sexual predators tend to fall between the ages of 18 and 55, although some are older or younger. Their targets tend to be between the ages of 11 and 15 In 100% of the cases, teens that are the victims of sexual predators have gone willingly to meet with them. Teens are willing to meet with strangers: 16% of teens considered meeting someone they ve only talked to online and 8% have actually met someone they only knew online. 75% of children are willing to share personal information online about themselves and their family in exchange for goods and services. Statistics from
Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
Affirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
A Parents Guide to. 2014 ConnectSafely.org
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
Internet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk
A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the
National Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Youth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
Today s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
HEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
HOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
Today s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
EADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
Cyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Class 2: Manage Your Digital Footprint. Student Handbook
Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
e-safety for Parents
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
Teens, Online Stranger Contact and Cyberbullying What the research is telling us
Teens, Online Stranger Contact and Cyberbullying What the research is telling us Amanda Lenhart Internet Safety Task Force April 30, 2008 Washington, DC Methodology Interviewed 700 parent-child pairs in
Contents. NetSafe 3. Facebook 4. YouTube 6. Google 7. Microsoft 8. Yahoo! 10. Trade Me 12. Twitter 14. Further Reading 17
Contents NetSafe 3 Facebook 4 YouTube 6 Google 7 Microsoft 8 Yahoo! 10 Trade Me 12 Twitter 14 Further Reading 17 The internet is a part of everyday life for New Zealanders. Four out of five of us spend
The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens
The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
2014 Teen Internet Safety Survey. Conducted by The Futures Company
2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
Teen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications [email protected] 404-269-8057 Cox Communications
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
A Parents' Guide to. 2014 ConnectSafely.org
A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
Cyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS
DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS Foreword We love technology, and with good reason. It offers so much to the home in terms of entertainment, education, as well improving the functionality
Class 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
Related KidsHealth Links
Grades 6 to 8 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards
ONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
Internet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
Related KidsHealth Links. Discussion Questions
Grades 6 to 8 Personal Health Series Online Safety and Cyberbullying KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible
Internet Safety Guide for Parents
Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both
Social Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
Staying Safe.....on social media and online
Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or
Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online
Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012
A Parents' Guide to. Snapchat. 2013 ConnectSafely.org
A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
Guideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
e-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
Digital Design Class Overview/Rules
Digital Design 1 4 Ms. Fuller, instructor Digital Design Class Overview/Rules Class procedures, policies, and information: Class Rules Passes Handouts Safety and Security ID Badges Lockdown Procedures
Internet basics 2.2 Staying safe online. Beginner s guide to. Basics
Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and
Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
RCNA Social Media Guidelines for Nurses. CEO Foreword (with Photo) RCNA Social Media Guidelines for Nurses 0
RCNA Social Media Guidelines for Nurses CEO Foreword (with Photo) RCNA Social Media Guidelines for Nurses 0 Foreword The nursing profession is no stranger to change. Transformation and growth are essential
The Digital Divide: How the Online Behavior of Teens is Getting Past Parents
June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents
Social Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
Top 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
Safety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
15 Dangerous Apps Every Parent Should Know About
15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges
Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
Fraud Protection module
Fraud Protection module Trainer s Introduction While the vast majority of financial transactions are legitimate and honest, the few fraudulent ones can be costly and damaging. By recognizing the warning
Chapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
Teacher Guide TEEN SAFETY
The Vulnerable Teacher Guide TEEN SAFETY This companion to the online course provides questions and topics for classroom discussion and activities. 2012 ShieldTheVulnerable.org 1277 Treat Blvd #530 Walnut
A Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
How To Teach Your Students To Be Respectful
E-RATE TOOLKIT Show Respect Online LESSON PLAN Essential Question: How can I make sure my emails are clear and respectful? Learning Overview and Objectives Overview: Students explore the similarities and
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned
