HEADS up. stop think connect

Similar documents
EADS up. stop think connect

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

STOP. THINK. CONNECT. Online Safety Quiz

NET CETERA Chatting with Kids About Being Online

STOP.THINK.CONNECT.TM. Chatting with Kids About Being Online

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET


NET CETERA. Chatting with Kids About Being Online

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

THE STOP.THINK.CONNECT. CAMPAIGN: GEORGE MASON UNIVERSITY CYBERSECURITY AWARENESS EVENT

Federal Trade Commission ftc.gov/livinglifeonline

Digital Citizenship Lesson Plan

Internet Safety/CIPA Lesson Plan

Cyber Security Awareness. Internet Safety Intro.

National Cybersecurity Awareness Campaign Families Presentation

Staying Safe.....on social media and online

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

HOW TO STAY SAFE. Smartphones

Online Safety for Middle and High School

A Parents' Guide to. Snapchat ConnectSafely.org

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

CyberbullyNOT Student Guide to Cyberbullying

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Cyber safety Parent Easy Guide 63

Federal Trade Commission ftc.gov/livinglifeonline

Class 2: Manage Your Digital Footprint. Student Handbook

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

A Parents Guide to ConnectSafely.org saferinternet.org.uk

Cybersecurity Protecting Yourself, Your Business, Your Clients

Social Networking Sites like Facebook, MSN

E-Safety Issues and Online Safety

A Parents Guide to ConnectSafely.org

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

UNSUPERVISED AND ONLINE

National Cybersecurity Awareness Campaign. Kids Presentation

Teen Online & Wireless Safety Survey

Safety Tips for Social Networking

Youth Online Behavior

National Cyber Security Month 2015: Daily Security Awareness Tips

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

TAVISTOCK COLLEGE POLICIES & PROCEDURES

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

September A Anti Bullying (Cyber Bullying) version 9

FIRBANK GRAMMAR SCHOOL

THE LITTLE BIG BOOK OF BADNESS

Guideline on Windows 7 Parental Controls

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at

E-Safety Issues and Online Safety

e-rate toolkit Cyberbullying: Crossing the Line

2011 NCSA / McAfee Internet Home Users Survey

A Parents' Guide to ConnectSafely.org

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

Internet Safety Guidelines

i-safe America Internet Safety Tips for Parents

Seven Practices for Computer Security

Affirmative Action Presentation

Protect yourself online

Today s teens use technology more than ever. Most have

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)

Social Media Guidelines Resource

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

E-Safety Issues and Online Safety. Parents Evening

Eanes Independent School District Responsible Use Guidelines for Technology

A Publication of the GCPS Information Management Division

WISE Online: An Internet and Mobile Phone Guide.

Saheel KHOYRATTY. Partner Technology Advisor

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

Cyberbullying. Understanding and Addressing Online Cruelty. Students Handouts and Supporting Materials for Teachers

Mill Hill Years 9 &10 E-Safety / Social Media: Risk Danger - Harm Safely Navigating Uncharted Waters

Today s mobile ecosystem means shared responsibility

Online Security Tips

Facebook Guidelines For Parents

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

E-safety: Protecting your child online. Information for parents

Chapter 3. Online Bullying

Internet Safety & Awareness. Dan Tomlinson 02/23/2013

How To Teach Kids To Be Safe Online

Safer Internet Day Quiz

Staying Safe Online. A Practical Guide for Parents and Children.

Case study: What the? Online scams and identity theft

2 nd - Watch My Online Neighborhood Video: online- neighborhood

STOP.THINK.CONNECT A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION

Cyber Safety For Parents

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media

Common Facebook issues

Understand What s Going On

Cybersafety and protocols for conducting online life?

Educators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D.

Predators will use information obtained from children to gain trust and friendship

Bullying 101: Guide for Middle and High School Students

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

Social Media and Cyber Safety

STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION

Internet Safety Plan for Your Family

section 15 Computers, , Internet, and Communications

Bradford On Avon Area Board Report 5 th January, 2015

Transcription:

HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. OnGuardOnline.gov provides practical tips from the federal government and the technology community to help you guard against Internet fraud, secure your computers, and protect your privacy. Please visit www.dhs.gov/stopthinkconnect for more information on Stop.Think.Connect. programs and opportunities. The Stop.Think.Connect. toolkit contains the intellectual property of FTC.

WORD SEARCH T T L N A S T O P E E T L R S I E I D G A R P R I V A C Y P N T A V W S A G Y O R R S T R Y A G O F A I N X X E P K P O L I T E N E S S 2 Share with Care N R P P N Y Y W T P V 4 Interact with Tact I P V S W W S P P E T H R8 The E LProtection I F OConnection R P C T table of D I P L A U T R I contents T 12 C Word E N Search N O C D R T P 12 You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through some sort of device is how you live your life. And as you spend more of your time there, it can be easy to over-share, embarrass yourself, mess up your computer, and possibly get messages from creepy people. The truth is there are some risks involved in socializing, playing, and communicating online. Regardless of how fast your fingers fly on a keyboard or cell phone, the best tool you have to help avoid risks online is your brain. When you re ready to post or send a message or a photo, download a file, game or program, or shop for something stop for a second. Think about things like: Do you know and trust who you re dealing with or what you re sharing STOP or downloading? THINK CONNECT How will you feel if your APPS information ends up PRIVACY somewhere you didn t intend? RESPECT Asking a few DOWNLOAD key questions first can help you protect yourself, your friends and TEXTING your computer. Flip through and find more things to stop POLITENESS and think about before you connect. PROFILE VIRTUAL SECURITY SPYWARE 13 1

SHARE WITH CARE PROTECT YOUR INFORMATION Your Some online information actions should can have stay real-world private. Your consequences. Social Security Number The pictures and family you post financial and information the words you like your write parents can affect bank the account people in or your credit life. card Think numbers should before you post stay in and the share. family. What Keep passwords you post could private. have The a bigger longer and more audience than you think. Even if you use privacy complex your password, the harder it is to crack. Don t share your settings, passwords it s impossible with anybody, to completely including control your best who friends sees your or your social boyfriend networking girlfriend. profile, pictures, videos, or texts. Before you click send, think about how you will feel if your family, teachers, coaches, or neighbors find it. Don t reply to text, email or pop-up messages that ask you to reply with personal information even Once if the you message post looks information like it comes online, from a person, you can t company or organization you know, or threatens that something bad will take it back. You may think that you ve deleted information happen if you don t reply. These messages may be fakes, sent to steal from a your site or information. that you will delete it later. Know that older versions may exist on other people s computers. That means your posts could live somewhere permanently. Get someone s okay before you share photos or videos they re in. Have you ever Online photo albums are great for storing and sharing pictures downloaded of special events, something and camera phones make it easy to capture that every turned moment. out Stop to be and think about your own privacy and different other people s before than you you share photos and videos online. It can be embarrassing, expected? unfair, and even unsafe to send or post photos and videos without getting permission from the people in them. 210 Were you ever sorry you shared something online? Protect YOUR COMPUTER SEXTING Be cautious about opening attachments or clicking on links. They may contain viruses or spyware. You may have heard stories at school or in Learn about security the news about software people sexting sending and how your nude photos from mobile phones. Don t do home computer, the kids laptop, and their it. Period. People who create, forward or computer tablets even are save protected. sexually explicit Maintain photos, videos up-todate antivirus software or on messages all your devices put their that friendships connect and to the Internet to increase your reputations devices security. at risk. Worse yet, they could be breaking the law. Remember that, sometimes, free stuff like games, ring tones, or screen savers can hide viruses or spyware. Don t download unless you trust the source and scan the file with security software. Use peer-to-peer (P2P) file-sharing services with caution. Make sure you install file-sharing software properly, and scan downloaded files with security software before you open or play them. Otherwise, you could be sharing information your family expects to keep private, like financial records. 113

INTERACT THE PROTECTION WITH TACT CONNECTION PROTECT YOURSELF Use privacy settings to restrict who can see and post on your profile. Many social networking sites, chat rooms, and blogs have privacy settings. Find out how to turn these settings on, and then do it. Have you seen something online that made you angry? Limit your online friends to people you actually know. The people you meet on the Internet may not be who they appear to be. Politeness counts. Texting is just another way for Learn about social mapping. Many mobile phones people to have a conversation, and texters are just like people have talking GPS face-to-face technology, or and on there phone: are applications they appreciate that allow please you to find and your thank friends and you (or pls allow and them ty). to find you. Use GPS and social mapping apps only with people you know personally and trust. Take Tone advantage it down. of privacy In online features conversations, in apps and using on your ALL phone. CAPS, long rows of exclamation points, or large, bolded fonts is the same as shouting. Trust your gut if you feel threatened or uncomfortable because of someone or something Use Cc: and you Reply find online. All: sparingly. Tell someone who Before can you help hit send you on report an email, your concerns stop and to think the about proper whether authorities everyone and other needs people to see who that can message. help. Avatars are people too. When you re playing a game or exploring an online world where you can create a character and interact with others, remember real people are behind those characters on the screen. Respect their feelings just 84 like you would in person. Remember that your character or avatar is a virtual version of you what does it tell people about you and your interests? Don t impersonate. It s wrong and can be hurtful to create sites, pages, or posts that seem to come from someone else, like someone in your class or a teacher. Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using Report Abuse links can help keep sites fun for everyone. Don t stand for bullying online or off. Treat others the way you want to be treated whether you re interacting with them online, on your phone or in person. 59

CYBErBULLYING Cyberbullying is bullying that happens online. It can happen in an email, a text message, an online game, or on a social networking site. It might involve rumors or images posted on someone s profile or passed around for other people to see. You know that, right? So you know that cyberbullying is a lose-lose proposition: it often makes the person being harassed feel bad and it makes the bully look bad. It also might lead to punishment from school authorities or the police. What do you do if you witness cyberbullying? Tell the bully to stop. Most kids don t bully, and there s no reason for anyone to put up with it. This mean behavior usually stops pretty quickly when somebody stands up for the person being bullied. Avoid being a cyberbully and practice good cyber ethics. Follow the Golden Rule: Be nice online and in real life. Don t say or do anything online that you wouldn t do in person. Own what you say and do online. If something online bothers you, who do you tell? 6 7

INTERACT THE PROTECTION WITH TACT CONNECTION PROTECT YOURSELF Use privacy settings to restrict who can see and post on your profile. Many social networking sites, chat rooms, and blogs have privacy settings. Find out how to turn these settings on, and then do it. Have you seen something online that made you angry? Limit your online friends to people you actually know. The people you meet on the Internet may not be who they appear to be. Politeness counts. Texting is just another way for Learn about social mapping. Many mobile phones people to have a conversation, and texters are just like people talking have GPS face-to-face technology, or and on the there phone: are applications they appreciate that allow please you to and find thank your friends and you (or pls allow and them ty). to find you. Use GPS and social mapping apps only with people you know personally and trust. Tone Take advantage it down. of privacy In online features conversations, in apps and using on your ALL phone. CAPS, long rows of exclamation points, or large, bolded fonts is the same as shouting. Trust your gut if you feel threatened or uncomfortable because of someone or Use something Cc: and you Reply find online. All: sparingly. Tell someone Before who can you hit help send you on report an email, your concerns stop and think to the about proper whether authorities everyone and needs other people to see who that message. can help. Avatars are people too. When you re playing a game or exploring an online world where you can create a character and interact with others, remember real people are behind those characters on the screen. Respect their feelings just 48 like you would in person. Remember that your character or avatar is a virtual version of you what does it tell people about you and your interests? Don t impersonate. It s wrong and can be hurtful to create sites, pages, or posts that seem to come from someone else, like someone in your class or a teacher. Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using Report Abuse links can help keep sites fun for everyone. Don t stand for bullying online or off. Treat others the way you want to be treated whether you re interacting with them online, on your phone or in person. 95

SHARE WITH CARE PROTECT YOUR INFORMATION Your Some online information actions should can have stay real-world private. consequences. Your Social Security Number The pictures and family you post financial and the information words you like your write parents can affect bank the account people in or your credit life. card Think numbers should before you post stay in and the share. family. What Keep passwords you post could private. have The a bigger longer and more audience than you think. Even if you use privacy complex your password, the harder it is to crack. Don t share settings, your passwords it s impossible with anybody, to completely including control your best who sees friends your or social your boyfriend networking girlfriend. profile, pictures, videos, or texts. Before you click send, think about how you will feel if your family, teachers, coaches, or neighbors find it. Don t reply to text, email or pop-up messages that ask you to reply with personal information Once even if the you message post looks information like it comes online, from a person, you can t company or organization you know, or threatens that something bad will take it back. You may think that you ve deleted information happen if you don t reply. These messages may be fakes, sent to from steal a your site or information. that you will delete it later. Know that older versions may exist on other people s computers. That means your posts could live somewhere permanently. Get someone s okay before you share photos or videos they re in. Have you ever Online photo albums are great for storing and sharing pictures downloaded of special events, something and camera phones make it easy to capture that every turned moment. out Stop to be and think about your own privacy and different other people s before than you you share photos and videos online. It can be embarrassing, expected? unfair, and even unsafe to send or post photos and videos without getting permission from the people in them. 210 Were you ever sorry you shared something online? Protect YOUR COMPUTER SEXTING Be cautious about opening attachments or clicking on links. They may contain viruses or spyware. You may have heard stories at school or in the news about people sexting sending nude photos from mobile phones. Don t do home computer, the kids laptop, and their it. Period. People who create, forward or computer tablets even are save protected. sexually explicit Maintain photos, videos up-todate antivirus software or on messages all your devices put their that friendships connect and to the Internet to increase your reputations devices security. at risk. Worse yet, they could be breaking the law. Learn about security software and how your Remember that, sometimes, free stuff like games, ring tones, or screen savers can hide viruses or spyware. Don t download unless you trust the source and scan the file with security software. Use peer-to-peer (P2P) file-sharing services with caution. Make sure you install file-sharing software properly, and scan downloaded files with security software before you open or play them. Otherwise, you could be sharing information your family expects to keep private, like financial records. 113

WORD SEARCH T T L N A S T O P E E T L R S I E I D G A R P R I V A C Y P N T A D I P L A U T R I V W S A G Y O R R S T R Y contents A G O F A I N X X E P K P O L I T E N E S S 2 Share with Care N R P P N Y Y W T P V 4 Interact with Tact I P V S W W S P P E T H R8 The E LProtection I F OConnection R P C T T 12 C Word E N Search N O C D R T P table of 12 You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through some sort of device is how you live your life. And as you spend more of your time there, it can be easy to over-share, embarrass yourself, mess up your computer, and possibly get messages from creepy people. The truth is there are some risks involved in socializing, playing, and communicating online. Regardless of how fast your fingers fly on a keyboard or cell phone, the best tool you have to help avoid risks online is your brain. When you re ready to post or send a message or a photo, download a file, game or program, or shop for something stop for a second. Think about things like: Do you know and trust who you re dealing with or what you re sharing STOP or downloading? THINK CONNECT How will you feel if your APPS information ends up PRIVACY somewhere you didn t intend? RESPECT Asking a few DOWNLOAD key questions first can help you protect yourself, your friends and TEXTING your computer. Flip through and find more things to stop POLITENESS and think about before you connect. PROFILE VIRTUAL SECURITY SPYWARE 131