YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org
|
|
- Matilda Horton
- 8 years ago
- Views:
Transcription
1 CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology Coordinator St. Thomas the Apostle School Dr. Julia VanderMolen Director of Health Sciences Online Davenport University TODAY S WORLD Full of wonder fun scary places scary people Need to stay safe even when having fun
2 The three key components all Internet users should understand and promise to use whenever they go online to keep themselves, others, and their computer safe! Created by the National Cyber Security Alliance in Washington, DC WHICH IS THE CORRECT DEFINITION FOR CYBER SAFETY? 1. Responsible rules and behaviors designed to keep individuals safe whenever connected to the Internet 2. Informal code of positive conduct used whenever someone is using the Internet 3. The protection of information and computer systems and networks while connected to the Internet CYBER SAFETY Responsible rules and behaviors designed to keep individuals safe whenever connected to the Internet What can you do? Ask student what are some examples of safety rules that parents ask them to follow while using the Internet Do you follow those rules? What happens when you break a rule?
3 CYBER SAFETY TERMS Privacy In relation to internet use this refers to personal information you are entitled to protect from others accessing online. Social networking sites have special privacy controls that all children should set to high so that information they post is only by those they wish to share it Children s Online Privacy Protection Act (COPPA) A national law that protects the privacy of children under the age of 13 by requesting parental consent for the collection or use of any personal information of the users Cyber Safety Contract A contract you design with your parents or guardian AND COMMIT TO FOLLOW that outlines specific rules and guidelines for computer use in the home, at school, or at another location SELECT THE BEST DEFINITION OF CYBER SECURITY 0% 0% 0% 1. Responsible rules and behaviors designed to keep individuals safe whenever connected to the Internet 2. Informal code of positive conduct used whenever someone is using the Internet 3. The protection of information and computer systems and networks while connected to the Internet CYBER SECURITY The protection of information and computer systems and networks while connected to the Internet Common strategies that people use to protect their computer and personal information Antivirus Firewalls Malware protection Never give out personal information Always use a secure site when doing any transactions What can you do? List some security tips that people should know
4 CYBER SECURITY TERMS Adware A type of software that often comes with free downloads. Some adware displays ads on your computer, while some monitors your computer use (including websites visited) and displays targeted ads based on your use. Anti-virus software Protects your computer from viruses that can destroy your data, slow your computer s performance, cause a crash, or even allow spammers to send through your account. Browser hijacker A common spyware program that changes your web browser s home page without the user s knowledge, even if you change it back Exposure When sensitive information on your computer is released to someone without authorization SELECT THE BEST DEFINITION FOR CYBER ETHICS 0% 0% 0% 1. Responsible rules and behaviors designed to keep individuals safe whenever connected to the Internet 2. Informal code of positive conduct used whenever someone is using the Internet 3. The protection of information and computer systems and networks while connected to the Internet CYBER ETHICS Informal code of positive conduct used whenever someone is using the Internet Doing the right thing even when no one is looking or watching What can you do? Ask students of wise and poor Internet use choices and discuss What are some good strategies for being a good digital citizen who behaves ethically online.
5 CYBER ETHICS TERMS Cyber Smart Citizen A computer user who follows all of the C 3 Concepts and commits to always acting safely, ethically, and responsibly while using the Internet Copyright Laws Laws that protect the online material of a creator or composer from a computer user illegally downloading, copying, scanning or otherwise distributing their material without prior approval or consent Illegal Downloads Information (most commonly songs or music) downloaded by an individual either for themselves or to share with others that is not authorized by the original creator or composer s license. Netiquette The informal rules of Internet courtesy, enforced exclusively by other internet users. HOW CAN WE TEACH THIS TO OUR KIDS REGARDLESS OF AGE OR BACKGROUND Three Main Groups Kindergartners through 2 nd grade 3 rd 5 th grade (upper elementary age students) Middle/High School students KINDERGARTNERS THROUGH 2 ND GRADE Ask questions like: How many of you like to use computers? Where are some places you use the computer regularly? What is the Internet? What kinds of things do you like to do on the Internet? Do you have special rules for using the computer and the Internet? What rules do you have at home when you are on the computer?
6 KINDERGARTEN 2ND GRADE Techno-Kat story BEFORE WE GO TO THE HIGHER GRADES WE NEED TO DEFINE ONE SET OF TOOLS WWW DECISION TOOL Decision checklist to help reinforce strategies to behave responsibly and remain safe and secure during all Internet activities W Who is asking for this personal information? W What information is being requested? W Why do they need this personal information?
7 3 RD TO 5 TH GRADERS Large Group Ask similar questions that you asked to the Kindergarten to 2 nd grade group and add the following: How many of you use it every day? Where is the main computer in the house? Do you have a computer in your bedroom? Have students define the three terms that make up C 3 Cyber Safety Cyber Ethics Cyber Security Do you remember the definitions? 3 RD TO 5 TH GRADERS Large Group Ask similar questions that you asked to the Kindergarten to 2 nd grade group and add the following: How many of you use it every day? Where is the main computer in the house? Do you have a computer in your bedroom? Have students define the three terms that make up C 3 Cyber Safety Cyber Ethics Cyber Security Do you remember the definitions? 3RD TO 5TH GRADERS (CONT) Large Group (cont) Have the students answer the following questions: What are some examples of safety rules your parents ask you to follow while using the Internet? What are some wise and poor Internet use choices? What might be some good strategies for good digital citizens who behave ethically online? What are some common strategies that people use to protect their computer and personal information? What are some security tips users should know to keep the computer safe and protect their personal information whenever they go online? Read a scenario to the class Ask students to identify the red flags that Scott almost passed by in the hope of getting a free iphone
8 SCOTT AND HIS IPHONE Scott is a Fourth Grade student at Honors Elementary School where his class is doing research in the school s computer lab on ways to stay safe and secure while online. The computers at school are all connected to the same network, which holds student s personal information. During Scott s research on the Internet that day he receives several pop-up ads offering free iphones with 12 months of free mobile services including text messages if you accept the free trial subscription of TechIsCool online magazine. Scott knows the school s Acceptable User Policy is very clear about not downloading anything on school computers to protect the network. He knows he shouldn/t but he wants an iphone so badly and doesn t want to miss the opportunity to get the phone for free. Scott clicks on the link offering the free download. Scott gets suspicious when he starts getting additional pop-up ads asking for detailed personal information. He returns to the StaySafeOnline website and reads all about the potential harm in accepting free downloads. Scott changes his mind, doesn t provide personal information, and returns to his research on cyber security. WHICH MAJOR C3 CONCEPT DID SCOTT ALMOST VIOLATE? 1. Cyber Safety 2. Cyber Security 3. Cyber Ethics 0% RD TO 5 TH GRADERS (CONT) Small group exercise Break into groups of 3 or 4 Read the scenario assigned Answer the questions at the end of each scenario on the forms provided.
9 MIDDLE/HIGH SCHOOL STUDENTS Same steps as for the previous group except the scenarios are more indepth Large Group exercise same as Upper Elementary Small Group similar but must fill out a chart instead of answering questions. Responses may be different due to the experiences of the students involved. MIDDLE/HIGH SCHOOL SCENARIO Brian has a research paper due next week on the impact of cyber security threats to our national security. He was supposed to have been doing research on this project for the past month, but kept putting it off, and is now in a crunch for time! Rather than find the research, read through it, and paraphrase the key points, Brian thinks it is easier to simply cut and paste some of the paragraphs directly into his paper. He fails to cite many of the publications he copies the information from directly into his paper, thinking there is now way that his teacher will ever know the difference. WHICH MAJOR C3 CONCEPT DID BRIAN VIOLATE? 1. Cyber Safety 2. Cyber Security 3. Cyber Ethics 0% 0% 0% 1 2 3
10 TERMS THAT STUDENTS SHOULD KNOW NATIONAL CYBER SECURITY ALLIANCE (NCSA) A Washington DC based national non-profit organization that collaborates with the federal government, corporate, nonprofit and academic sectors, to create a culture of cyber security and safety awareness by providing the knowledge and tools necessary to prevent cyber crime and attacks to ensure that everyone remains safe while online. LET S DO THIS OURSELVES Break into groups Each group will have a scenario to read and evaluate Write down your findings Report back to the group Open ended discussion
11 ALL OTHER GRADES Divide into groups 3 to 4 per group Decide primarily which grade level you want to work with (upper elementary or middle/high school) Identify a team reported that reads the scenario to the rest of the class and report your teams answers and responses when done You will have 10 minutes to complete this project ADDITIONAL SOURCES NCSA ( technology-syber-security Cyber security NCSA has teamed up with USA Today Education Foundation and the Department of Homeland Security to develop four lesson plans using recent news stories about cyber security issues. These lesson plans are targeted to 8 th through 12 th grade ADDITIONAL RESOURCES CyberSmart! ( Safety and Security Online Manners, Bullying and Ethics The free CyberSmart! Student Curriculum empowers students to use the Internet safely, responsibly, and effectively. The free CyberSmart! Educator Toolbar puts 21 st century skills into practice every day, with just-in-time 24/7 access to annotated essential resources to support student learning.
12 ADDITIONAL RESOURCES Department of Justice ( The Department of Justice has developed a kids page focused on lesson plans for elementary and middle school children ADDITIONAL RESOURCES IKEEPSAFE ( Internet Keep Safe Coalition Faux Paw the Techno Cat Internet Safety basics How to handle cyber-bullying Balancing real life with screen time The risks and dangers of downloading The Faux Paw curriculum is based on research from Harvard s Center on Media and Child Health and created in partnership with the ikeepsafe Global Research Team, Penn State University Department of Education, and the University of Maryland. Most ikeepsafe resources are available for free download ADDITIONAL RESOURCES i-safe ( Personal safety Predator Identification Intellectual Property Cyber Citizenship Cyber Bullying i-safe offers internet safety curriculum for grades K-8 and webcasts for grades 9. Lessons are broken down by grades (K-8) and each grade s lesson focuses on a different topic.
13 ADDITIONAL RESOURCES James Madison University ( A guide to responsible technology use Safety Security Ethics ADDITIONAL RESOURCES NetSmartz Workship ( Internet Safety Cyber Bullying NetSmartz offers free, multimedia Internet safety presentations for use with children of all ages and adults. Resources include a Back to School kit, videos, worksheets and activity cards on online safety, texting, and cyberbullying. The NetSmartz Workshop is an interactive, educational safety resource from the National Center for Missing and Exploited Children (NCMEC) and Boys & Girls Clubs of America (BGCA). ADDITIONAL RESOURCES Play It CyberSafe ( Cyber ethics Cyber crime The Business Software Alliance has developed a web site that teaches how to prevent cyber crime through knowledge of the law, their rights, and how to avoid misuse of the Internet.
14 ADDITIONAL RESOURCES WebWise Kids ( Online safety Cyber security Spyware Bullying Ethics Social Networking Cell phone dangers Emerging technology Chat rooms and instant messaging safety Personal website Danger Zones Web Wise Kids is a unique organization that offers fun, challenging and interactive simulations based on real-life criminal cases. Each program has been designed specifically for use with young people in classrooms and computer labs (special version of the programs are also available for home use) FOR FURTHER INFORMATION: Maryly Skallos mskallos@stthomasgr.org Dr. Julia VanderMolen Julia.vandermolen@davenport.edu This presentation is available at
STRATEGIC PLAN. For implementing safety training within communities of Symantec employees. All Rights Reserved
STRATEGIC PLAN For implementing safety training within communities of Symantec employees Executive Summary Identifying additional ways to reach and teach consumers about online safety, security, privacy
More informationComprehensive i-safe Curriculum International Scope of Lessons and Language Availability
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating
More informationi-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5
i-safe CURRICULUM SCOPE 2008-09 Elementary Grades K - 5 Scope of curriculum i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction
More informationC-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
More informationNational Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
More informationCyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationOnly talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
More informationTECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus
Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationi-safe K 12 CURRICULUM SCOPE 06-07
i-safe K 12 CURRICULUM SCOPE 06-07 GRADES K 4 Scope and sequence i-safe materials are available in topic modules to provide the teacher with flexibility in creating a program of instruction that best suits
More informationColonial Heights Public Schools Internet Safety Curriculum
Colonial Heights Public Schools Internet Safety Curriculum Overview The Internet is a powerful tool and a wonderful resource but as with any tool, we must use it safely. Legislation in Virginia requires
More informationNational Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationEducation as a defense strategy. Jeannette Jarvis Group Program Manager PSS Security Microsoft
Education as a defense strategy Jeannette Jarvis Group Program Manager PSS Security Microsoft Introduction to End User Security Awareness End User Security Awareness Challenges Understanding End User
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationThe State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States
The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States National Cyber Security Alliance Microsoft Corporation Zogby/463 May 2011 Methodology Zogby/463 surveyed a statistically
More informationDigital Citizenship Lesson
Digital Citizenship Lesson Categories: School Environment and Student Behavior/ Student Life Outside of School Environment Element: Digital Security Lesson: Malware Grade Level: 6-12 Part I Introduction
More informationRISKS OF SPYWARE. Lesson Procedures
i-safe Lesson Plan Suggested Grade Levels Middle Grades RISKS OF SPYWARE Learning Objectives Students will: understand the term spyware and the types of programs it applies to understand the security risks
More informationCyber Safety For Parents
Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting
More informationDIGITAL CITIZENSHIP MODULE 1
Digital Etiquette DIGITAL CITIZENSHIP MODULE 1 Email, Texting, Cell Phone Usage, Ringtones, Social Networks, YouTube, Web Browsing, Shared Storage/Usage Space Define and apply the standards of use to daily
More informationSocial Media Curriculum Overview
Lessons in K 2 Social Media Curriculum Overview 1. Going Places Safely ( KINDERGARTEN) https://www.commonsensemedia.org/educators/lesson/going places safely k 2 How do I go places safely on the computer?
More informationC-SAVE. Level Middle/High School Ethics-copyright. Scenario #2 - Scott s Sorry Slumdog Choice
Grade Level- Middle/High School Ethics-plagiarism Scenario #1 - Brian and His Research Paper Brian has a research paper due next week on the impact of cyber security threats to our national security. He
More informationF-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
More informationMalware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services
Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the
More informationANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationParenting & Technology: The Internet, Texting & Social Networks
Parenting & Technology: The Internet, Texting & Social Networks Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety online Instant messaging,
More informationLt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
More informationMusic and the Internet. A guide for parents and teachers
Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,
More informationDiocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016
Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives
More informationTeaching Digital Citizenship
32 Government of Newfoundland and Labrador - Education I A School-Wide Approach - Positive Behaviour Supports 2013 Education Teaching Digital Citizenship Digital citizenship can be defined as the norms
More informationSchool Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
More informationMusic, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
More informationCyber-safety, Cyber-security, Cyber-ethics, (C3) Digital Literacy Skills
A Companion to the Augmented Technology Literacy Standards for Students INTRODUCTION The ikeepsafe Digital Citizenship C3 Matrix is designed to assist educators in integrating the concepts of cyber-safety,
More informationWhat's the difference between spyware and a virus? What is Scareware?
What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials
More informationAbout Carnegie Cadets: The MySecure Cyberspace Game
Introduction About Carnegie Cadets: The MySecureCyberspace Game Carnegie Cadets: The MySecureCyberspace Game is an interactive Flash game designed for fourth and fifth graders that teaches Internet safety
More informationesmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2
Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...
More informationINTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY
INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY Note: This section can be taught by the technology teacher or classroom teachers with support from the librarian. Contents: 1. Introduction and Essential
More informationCybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
More informationGuideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
More informationCourse Overview and Outline
Course Overview and Outline The My Digital Life curriculum is comprised of seven modules that cover key concepts for building digital literacy. Each module contains between three and nine brief activities
More informationWebliography: Cyber Safety Online Resources
Webliography: Cyber Safety Online Resources Acronyms Slang Terminology/Online Chat Abbreviations Define your world. Urban Dictionary. http://www.urbandictionary.com. The Urban Dictionary will provide individuals
More informationKeeping you and your computer safe in the digital world.
Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats
More informationClass 2: Manage Your Digital Footprint. Student Handbook
Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal
More information2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
More informationSoftware Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS
Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: gillrr@mcmaster.ca Due: Tuesday April 5, 2005
More informationCOPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act
The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview
More informationMonitoring Technology Misuse & Abuse
Print Article Close Monitoring Technology Misuse & Abuse By Mike S. Ribble and Gerald D. Bailey, Kansas State University August 2004 - Feature A Five-Step Plan for Creating a Digital Citizenship Program
More informationEducators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety
Educators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety The Intel Security Digital Safety Program: Think Before You Link is an interactive digital-safety program
More informationSafe Practices for Online Banking
November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationInternet Safety Guidelines
Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can
More informationInternet Safety & Awareness. Dan Tomlinson 02/23/2013
Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer
More informationCyber Safety Education in High Schools
2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.21 Cyber Safety Education in High Schools
More informationInternet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
More informationActivities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
More informationNortheast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
More informationF-Secure Anti-Virus for Mac. User's Guide
F-Secure Anti-Virus for Mac User's Guide F-Secure Anti-Virus for Mac TOC 3 Contents Chapter 1: Getting started...5 What to do after installation...6 Manage subscription...6 Open the product...6 How to
More informationEducator s Guide to Digital Citizenship: Responsibility and Digital Reputations
Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Overview: Students examine their participation in digital life. They explore how information shared through digital media
More informationBRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 4.3.14 04/03/2014 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective
More informationWelcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?
Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review
More informationMaryland Technology Literacy Standards for Students
Standard 1.0 Technology Systems: Develop foundations in the understanding and uses of technology systems Pre-kindergarten Kindergarten Grade 1 Grade 2 Grade 3 A. Systems A. Systems A. Systems A. Systems
More informationMusic, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationMercy School. Internet Safety Policy
Mercy School. Internet Safety Policy School name: Mercy School School Address: St. John s Road, Wexford : 053 9123294 : mercyschoolwexford@gmail.com Website Address: mercywexford.scoilnet.ie Internet Usage
More informationBRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5
BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 5 08/25/2015 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective
More informationHector s World Lesson plan Episode: Computer security: Oops Upper primary
Hector s World Lesson plan Episode: Computer security: Oops Upper primary BACKGROUND Students of this age are emerging users of internet-enabled computers. They may be involved in a range of online activities
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationPrivate Today, Public Tomorrow
Estimated time: 45 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy
More informationYOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO
YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO DIGITAL MUSIC: THE KEY FACTS Music is an important part of young people
More informationInformation security education for students in Japan
Information security education for students in Japan Introduction This article aims to introduce the current situation of elementary and secondary school education on information security in Japan, as
More informationInternet Safety Plan for Your Family
The Mcafee 10-Step Internet Safety Plan for Your Family How to talk to kids, tweens, teens, and novices of any age about online security 10 Table of Contents 3 Introduction 4 5 Today s Internet: Proceed
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationCyberbullying. Welcome!
Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also
More informationEmmett School District, Idaho - Policy & Regulation
POLICY TITLE: Acceptable Internet Use Policy PAGE 1 of 5 An account on the Emmett School District computer network and subsequently, access to the Internet, is provided for all students, unless otherwise
More information3.28F LICENSED PERSONNEL EMPLOYEE INTERNET USE AGREEMENT
3.28F LICENSED PERSONNEL EMPLOYEE INTERNET USE AGREEMENT Acceptable Use Policy: Staff The Benton School District provides technology to support teaching, enhance learning, and improve productivity. This
More informationStudents Acceptable Use Policy for Electronic Resources Rules Summary
Students Acceptable Use Policy for Electronic Resources Rules Summary This document summarizes the rules for acceptable use of CAG electronic resources (known collectively as CAGNet). All students must
More informationInternet Scout Patch Workbook
Workbook This workbook can help you but you still need to read the program guide. The work space provided for each requirement should be used by the Scout to make notes for discussing the item with his
More informationThe webcast will begin shortly. Please stand by.
The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone
More informationSONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY
SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY Date Approved: 4/16/2015 New technologies are modifying the way in which information may be accessed, communicated and transferred. Those changes
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationCybersecurity Protecting Yourself, Your Business, Your Clients
Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric
More informationACCEPTABLE/ RESPONSIBLE USE POLICY IIBE
ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.
More informationE-safety: Protecting your child online. Information for parents
E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools
More informationNetDay Cyber Security Kit for Schools
NetDay Cyber Security Kit for Schools : A Story about Cyber Security for Children Introduction: This short, entertaining story discusses the importance of computer security and online safety for children.
More informationDIGITAL WELLNESS ONLINE CHALLENGE
DIGITAL WELLNESS ONLINE CHALLENGE 1 st July - 8 th July 2015 Information Manual With Support From Table of Contents Introduction 1 Objectives of the Digital Wellness Online Challenge 2 Brief Overview 3
More informationCOMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF
4526 COMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF Philosophy: It is the philosophy of the Great Neck Public Schools that the integration of technology with the curriculum is an essential
More informationElectronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc)
Electronic Devices Non Negotiables Policy (Laptops, Mobile Phones, etc) The non negotiables listed below direct your use of electronic devices for educational purposes at Holy Cross College. You need to
More informationINTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT
INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT 1. Introduction and essential information 2. Required lesson 3. Optional lessons and activities 4. Additional resources 5. Standards
More informationRisks REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012
Minimizing Technology-Related Risks NAN STENZEL NAN STENZEL REGIONAL IT COORDINATOR UNIVERSITY OF MARYLAND EXTENSION FEBRUARY 2012 Current Computer Topics Buying a New Computer In-home Wireless Security
More informationInformation Security. Louis Morgan, CISSP Information Security Officer
Information Security By Louis Morgan, CISSP Information Security Officer Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long
More informationMelville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students
Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3
More informationProtect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationHaddon Township School District Acceptable Use of Information and Communication Technology for Students
Haddon Township School District Acceptable Use of Information and Communication Technology for Students Please read the following carefully before signing the Acceptable Use Policy for Students Agreement.
More informationEmerging Trends in Malware - Antivirus and Beyond
Malware White Paper April 2011 Emerging Trends in Malware - Antivirus and Beyond One need only listen to the news or read the latest Twitter and media updates to hear about cyber crime and be reminded
More informationYPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)
YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in
More informationNATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
More information