Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:



Similar documents
Online Safety for Middle and High School

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

Affirmative Action Presentation

Digital Life 102 LESSON PLAN UNIT 1. Essential Question What is the place of digital media in our lives?

Parent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009

E-Safety Issues and Online Safety

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

Internet Safety/CIPA Lesson Plan

HEADS up. stop think connect

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online

Digital Citizenship Lesson Plan

Guideline on Windows 7 Parental Controls

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Social Media Guidelines Resource

Teen Online Safety & Digital Reputation Survey

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

15 Dangerous Apps Every Parent Should Know About

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority

For parents and carers of children with autism

TALKING POINTS HIGH SCHOOL STUDENTS PRESENTED BY JEAN CHATZKY AND PASS FROM AMERICAN EXPRESS SM

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

Cyber safety Parent Easy Guide 63

Teen Online & Wireless Safety Survey

A Publication of the GCPS Information Management Division

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

A Job Seeker s Guide to Discovery

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

National Cybersecurity Awareness Campaign. Kids Presentation

CyberbullyNOT Student Guide to Cyberbullying

SOCIAL NETWORKING SITES

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D.

Learning English with CBC Radio Living in Alberta. Social Media: How Kids Use the Internet

National Cybersecurity Awareness Campaign Families Presentation

Cyber Security Awareness. Internet Safety Intro.

ONLINE SAFETY TEACHER S GUIDE:

Bullying 101: Guide for Middle and High School Students

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Protect Your Privacy Online

A Guide to Social Media Marketing for Contractors

A Parents' Guide to. Snapchat ConnectSafely.org

Social Networking Sites like Facebook, MSN

Basic lesson time includes activity only. Introductory and Wrap-Up suggestions can be used

Cyberbullying. How common is cyberbullying?

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Safety Tips for Social Networking

Table of Contents. Money Smart for Adults Curriculum Page 2 of 21

Mill Hill Years 9 &10 E-Safety / Social Media: Risk Danger - Harm Safely Navigating Uncharted Waters

Social Media Curriculum Overview

HOW TO STAY SAFE. Smartphones

Teen Success Agreement

Safer Internet Day Quiz

Staying Safe Online. A Practical Guide for Parents and Children.

Becoming a Pilot. Questions Answered by a Professional Pilot.

Main Question 1: How and where do you or your family use the Internet - whether on a computer or a cell phone? Follow up questions for INTERNET USERS

MoneySmart Rookie Community educator guide. Financial literacy for young people

EASY $65 PAYDAY FREE REPORT

Application: See Individual project

West Ada School District Bring Your Own Device (BYOD) Program. BYOD Guide August 2014 PURPOSE ACCESS THEFT, LOSS OR DAMAGE

Virtual Spirits control panel V5

We will discuss how to manage your own ecommerce booking through your website rather than through a booking agent and how this can integrate.

2 nd - Watch My Online Neighborhood Video: online- neighborhood

Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations

Bring Your Own Device (BYOD) Guidelines Gettys Middle School

How to Bank and Save In Canada

The Online Generation Gap. Contrasting attitudes and behaviors of parents and teens

Hiring a Support Worker. A guide for Ontarians with a developmental disability

Helping you find and get on in work

Social Care Jargon Buster. 52 of the most commonly used social care words and phrases and what they mean

10 warning signs of alzheimer s disease

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Take Charge of your Online Reputation

Executive Summary Key Findings

Transcription:

#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital footprint? 2. List three routine events you might do during a typical day where digital data is collected. Learning ZoneXpress www.learningzonexpress.com 888.455.7003

3. How is your digital footprint like cookie crumbs? Sharing and Scaring The Dangers of Sexting 4. What are sexts? 5. In a national survey, % of teens ages 12-17 who own a cell phone say they have sent sexually suggestive, nude, or nearly nude images of themselves to someone else via text messaging. 6. % of cell phone owning teens say they have received a sext. 7. What teens are more likely to send sexts? 8. What are the three main sexting scenarios? 9. How are sexts and child pornography related? Social Networking Safe Steps 10. What tips should you consider to keep yourself safe while using a social networking site like Facebook? page 2

11. Why should you think twice before posting comments or photos online? Cleaning Up Putting Your Best Digital Foot Forward 12. According to a Pew Research survey, % of people have searched their name online, but only % of those say they do it on a regular basis. 13. How can you keep an eye on your digital footprint? 14. Why is it important to manage your digital footprint? 15. What three steps can you take to improve your digital footprint? page 3

#300005 Name: Hour: TEACHER S KEY Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital footprint? A digital footprint is the data trace left by your activity in a digital environment including your TV, cell phone, Internet, smart phone, credit card, debit card, library card, etc. 2. List three routine events you might do during a typical day where digital data is collected. Possible answers could include: Surfing the Internet Driving a car Using a GPS Paying with a debit card Being captured on a security camera Driving in a HOV lane Getting money from an ATM Making a call on a cell phone Writing an e-mail Recording a TV show on TiVo Learning ZoneXpress www.learningzonexpress.com 888.455.7003

3. How is your digital footprint like cookie crumbs? Your digital footprint is like cookie crumbs because they are little bits of information we leave when we use some form of digital service, application, appliance, object or device, or in some cases, as we pass through or by a location and it happens regardless of whether we are actually aware of it. Sharing and Scaring The Dangers of Sexting 4. What are sexts? Private photos that are sexually suggestive that are sent by text message. 4 5. In a national survey, % of teens ages 12-17 who own a cell phone say they have sent sexually suggestive, nude, or nearly nude images of themselves to someone else via text messaging. 6. % 15 of cell phone owning teens say they have received a sext. 7. What teens are more likely to send sexts? Teens who pay their own phone bills are more likely to send sexts. 8. What are the three main sexting scenarios? Exchange of images solely between two romantic partners Exchange of images between sexual partners that is shared with others outside the relationship Exchange of images between people who are not in a relationship, but at least one of them hopes to be 9. How are sexts and child pornography related? If the people in the suggestive photos are under 18, the person in possession of the images could be charged with child pornography. Social Networking Safe Steps 10. What tips should you consider to keep yourself safe while using a social networking site like Facebook? Avoid using your full name, street address, or job location Never post your date of birth, social security number or driver s license number Don t chat or IM with anyone you don t know in real life Don t post your phone number Don t post your e-mail or blog address page 5

11. Why should you think twice before posting comments or photos online? Bad language and bad photos can harm your ability to get a good job You can get in trouble and lose trust of parents and family members Damage relationships Exposure to dangerous people (pedophiles and stalkers) Harm chance of getting into colleges or obtaining scholarships Open yourself to identity theft and privacy loss Cleaning Up Putting Your Best Digital Foot Forward 47 3 12. According to a Pew Research survey, % of people have searched their name online, but only % of those say they do it on a regular basis. 13. How can you keep an eye on your digital footprint? Use Google or another search engine to search for yourself. Make sure you continue to search for yourself regularly so that you know what others will find. You may have not added anything new but your friends and family might have. 14. Why is it important to manage your digital footprint? By managing your digital footprint, you create an up-to-date positive online presence that will help hide any earlier less desirable content about you. 15. What three steps can you take to improve your digital footprint? Discover your existing digital footprint Add positive footprints Manage your social footprint page 6