Cyber Safety
Lorraine Flores
What is Cyber Safety?
• Acceptable Use Policy (AUP)
–A written guideline for using school
computers
• Cyberbullying
–The use of any electronic with the intention
of intimidating others.
• Cyberpredators
– A stranger who attempts to be your best
friend electronically but who turns out to
manipulative or dangerous.
Cyber Safety (continued…)
• Identity Safety
–Your identity will be safely maintained in
the Classroom.
• Piracy & Plagiarism
–Piracy involves the unauthorized use of
other people’s materials, such as movies or
software.
–Plagiarism is the unauthorized use of other
people’s ideas or written words.
What is Acceptable Use Policy?
Acceptable Use Explained
Video
Acceptable Use Policy
• Written guidelines
• Student Agreement Form
• Computer access in the classroom, computer lab,
and media center to connect to the Internet, E-
Mail, etc.
• User Responsibilities – “Do’s and Don’ts”
• Personal Safety
• Inappropriate Use
• Serious consequences for those caught in violation
of theAcceptable Use Policy.
What is Cyberbullying?
Cyberbullying is any intimidation or
manipulation that occurs through electronic
technology; such as cell phones, computers,
tablets, etc.
What communication tools are involved in
Cyberbullying?
Social Media,Text Messaging, OnlineChat
Rooms and OnlineWebsites
Examples of Cyberbullying
• Sending mean text message or emails
• Starting rumors via texts or emails
• Posting embarrassing pictures, videos, or
information on social networking sites and or
websites without the express permission of
the people involved.
• Francis ArtVideo
What is a Cyberpredator?
A cyberpredator is a person who:
• uses the computer to “hunt” the young
person and “groom” them for an ongoing
relationship
• knows how to manipulate a young person
• may attempt to meet you face to face
• pretends to be your best friend
• tells you that it is okay to keep secrets from
your parents
Example of a Cyberpredator
• The Internet is a large gathering space, for our
example, we will use the Mall as an example.
• Sometimes meeting someone online is like
going to the Mall and meeting a stranger
there without your parents’ permission.
• Do not give personal information to any
stranger you have met online, such as your
personal email address or your phone
number
• Internet SafetyVideo
What is Identity Safety?
• Always be careful about what you share
online with your social media.
• Keep your usernames/passwords private. Do
not share any of this information with
anyone, not even your friends!
• Be suspicious about people who are trying to
connect with you via social media
Identity Safety
• What is Personal Information?Video
• If, for any reason, you feel suspicious about
something or you feel something is becoming
unsafe, please report your safety concerns to
a trusted adult: teacher , counselor, and
principal.
Piracy & Plagiarism
Piracy
– What is Piracy?Video
–Make sure all new software comes with a
licensing agreement, original disks and
original packaging.
–Do not purchase software without the
appropriate hardware
–Do not share your password with others
–Educate yourself and others about the
dangers of Piracy
Piracy & Plagiarism
• Plagiarism
–Plagiarism 101Video
–Cite all sources and give credit to original
authors, whether you are paraphrasing or
quoting
–DO NOT COPY from an author’s words,
including an author’s written words,
paragraphs poems, etc.
–Do your OWN work!
Review
Several scenarios for each:
• AUP
• Cyberbullying
• Cyberpredators
• Identity Safety
• Piracy and Plagiarism
• If you experience any kind of of physical or
online harassment, please alert your
classroom teacher, counselor, and/or
principal. These adults will follow up and will
take necessary action to find and punish the
online cyberpredator(s).
• Safety is our school's number one top priority.
• Be a good digital citizen.
References
• Ban SignCyberbullying. 2013[photograph]. Retrieved from
http://resources.uknowkids.com/blog/bid/159164/Global-Perspective-on-Cyberbullying.
• Cyber Safety for Kids.[Photograph]. 2009. Retrieved from http://mediamunchies-
courtney.blogspot.com/.
• CyberSafetyTeam Edcuation. Weebly. (n.d. ) Identity Safety. Retrieved from
http://cybersafetyteameducation422.weebly.com/identity-safety.html.
• CyberSafetyTeam Education. Weebly. (n.d. ) Retrieved from
Cybersafetyteameducation422.weebly.com/piracyplagiarism.html.
• Franis, C. (2011, Nov. 11). Anti-BullyingAwareness- Indirect, Cyber Bullying,Alienated-Lesson-School.
Retrieved from https://youtu.be/YFzay3Vm860.
• LIRC Productions. 2013, Oct. 29. Plagiarism 101 with year 6. Retrieved from
https://youtu.be/fDd7up936MQ.
More references
• Netsafeutah. (n.d.)What is Personal Information. Retrieved from
http://www.netsafeutah.org/kids/kids_videos.html.
• Orchard Hill Elementary School. Schoolwires, Inc. 2015. Retrieved from
http://www.mtsd.k12.nj.us/domain/694.
• Pham,T. 2014, July 27.What is Piracy. Retrieved from https://youtu.be/IaOGSJwzuWQ.
• RECfilms. 2007, Jun. 14. Internet Safety. Retrieved from https://youtu.be/xZHq4CQekTY.
• Ripp, P. 2010, Sept. 8. Why the Internet is like the Mall. Retrieved from
http://mrspripp.blogspot.com/2010/09/why-internet-is-like-mall.html
• Schoen, J. (2014, Sept. 17). Acceptable Use Policy Explained. Retrieved from
https://youtu.be/hKK9EYl5hdw.
• Two gold humans shake hands from the computer monitor. [Photograph].2013. Retrieved from
http://www.coetail.com/jasonc/2013/10/06/a-comparison-of-the-acceptable-use-policies-of-three-
international-schools/.

Cyber safety by Lorraine Flores

  • 1.
  • 2.
    What is CyberSafety? • Acceptable Use Policy (AUP) –A written guideline for using school computers • Cyberbullying –The use of any electronic with the intention of intimidating others. • Cyberpredators – A stranger who attempts to be your best friend electronically but who turns out to manipulative or dangerous.
  • 3.
    Cyber Safety (continued…) •Identity Safety –Your identity will be safely maintained in the Classroom. • Piracy & Plagiarism –Piracy involves the unauthorized use of other people’s materials, such as movies or software. –Plagiarism is the unauthorized use of other people’s ideas or written words.
  • 4.
    What is AcceptableUse Policy? Acceptable Use Explained Video
  • 5.
    Acceptable Use Policy •Written guidelines • Student Agreement Form • Computer access in the classroom, computer lab, and media center to connect to the Internet, E- Mail, etc. • User Responsibilities – “Do’s and Don’ts” • Personal Safety • Inappropriate Use • Serious consequences for those caught in violation of theAcceptable Use Policy.
  • 6.
    What is Cyberbullying? Cyberbullyingis any intimidation or manipulation that occurs through electronic technology; such as cell phones, computers, tablets, etc. What communication tools are involved in Cyberbullying? Social Media,Text Messaging, OnlineChat Rooms and OnlineWebsites
  • 7.
    Examples of Cyberbullying •Sending mean text message or emails • Starting rumors via texts or emails • Posting embarrassing pictures, videos, or information on social networking sites and or websites without the express permission of the people involved. • Francis ArtVideo
  • 8.
    What is aCyberpredator? A cyberpredator is a person who: • uses the computer to “hunt” the young person and “groom” them for an ongoing relationship • knows how to manipulate a young person • may attempt to meet you face to face • pretends to be your best friend • tells you that it is okay to keep secrets from your parents
  • 9.
    Example of aCyberpredator • The Internet is a large gathering space, for our example, we will use the Mall as an example. • Sometimes meeting someone online is like going to the Mall and meeting a stranger there without your parents’ permission. • Do not give personal information to any stranger you have met online, such as your personal email address or your phone number • Internet SafetyVideo
  • 10.
    What is IdentitySafety? • Always be careful about what you share online with your social media. • Keep your usernames/passwords private. Do not share any of this information with anyone, not even your friends! • Be suspicious about people who are trying to connect with you via social media
  • 11.
    Identity Safety • Whatis Personal Information?Video • If, for any reason, you feel suspicious about something or you feel something is becoming unsafe, please report your safety concerns to a trusted adult: teacher , counselor, and principal.
  • 12.
    Piracy & Plagiarism Piracy –What is Piracy?Video –Make sure all new software comes with a licensing agreement, original disks and original packaging. –Do not purchase software without the appropriate hardware –Do not share your password with others –Educate yourself and others about the dangers of Piracy
  • 13.
    Piracy & Plagiarism •Plagiarism –Plagiarism 101Video –Cite all sources and give credit to original authors, whether you are paraphrasing or quoting –DO NOT COPY from an author’s words, including an author’s written words, paragraphs poems, etc. –Do your OWN work!
  • 14.
    Review Several scenarios foreach: • AUP • Cyberbullying • Cyberpredators • Identity Safety • Piracy and Plagiarism
  • 15.
    • If youexperience any kind of of physical or online harassment, please alert your classroom teacher, counselor, and/or principal. These adults will follow up and will take necessary action to find and punish the online cyberpredator(s). • Safety is our school's number one top priority. • Be a good digital citizen.
  • 16.
    References • Ban SignCyberbullying.2013[photograph]. Retrieved from http://resources.uknowkids.com/blog/bid/159164/Global-Perspective-on-Cyberbullying. • Cyber Safety for Kids.[Photograph]. 2009. Retrieved from http://mediamunchies- courtney.blogspot.com/. • CyberSafetyTeam Edcuation. Weebly. (n.d. ) Identity Safety. Retrieved from http://cybersafetyteameducation422.weebly.com/identity-safety.html. • CyberSafetyTeam Education. Weebly. (n.d. ) Retrieved from Cybersafetyteameducation422.weebly.com/piracyplagiarism.html. • Franis, C. (2011, Nov. 11). Anti-BullyingAwareness- Indirect, Cyber Bullying,Alienated-Lesson-School. Retrieved from https://youtu.be/YFzay3Vm860. • LIRC Productions. 2013, Oct. 29. Plagiarism 101 with year 6. Retrieved from https://youtu.be/fDd7up936MQ.
  • 17.
    More references • Netsafeutah.(n.d.)What is Personal Information. Retrieved from http://www.netsafeutah.org/kids/kids_videos.html. • Orchard Hill Elementary School. Schoolwires, Inc. 2015. Retrieved from http://www.mtsd.k12.nj.us/domain/694. • Pham,T. 2014, July 27.What is Piracy. Retrieved from https://youtu.be/IaOGSJwzuWQ. • RECfilms. 2007, Jun. 14. Internet Safety. Retrieved from https://youtu.be/xZHq4CQekTY. • Ripp, P. 2010, Sept. 8. Why the Internet is like the Mall. Retrieved from http://mrspripp.blogspot.com/2010/09/why-internet-is-like-mall.html • Schoen, J. (2014, Sept. 17). Acceptable Use Policy Explained. Retrieved from https://youtu.be/hKK9EYl5hdw. • Two gold humans shake hands from the computer monitor. [Photograph].2013. Retrieved from http://www.coetail.com/jasonc/2013/10/06/a-comparison-of-the-acceptable-use-policies-of-three- international-schools/.

Editor's Notes

  • #2 What is cyber safety? It is about keeping information safe and secure by using the technology. Being responsible with that information, being respectful of other people online. Have you heard of using good etiquette? Same principal for netiquette (internet etiquette)
  • #3 Here are the five categories that we are going to cover for each term.
  • #4 Identity Safety – it’s about being safe in the classroom. Also, safe at home. Piracy – it’s about copy without permission, copy without paying fees, like stealing… Plagiarism – stealing someone’s idea or written words, will explain more on this
  • #5 What is acceptable use policy? Let’s watch this video from the YouTube.
  • #6 At the beginning of school year, each of you will receive the agreement form and follow the school policy for using the school computers. Do use the network in accordance with the school's code of conduct. Do cite the sources of information properly. Do use the network only for legal activity. Do be courteous and respectful in your messages to others. Do use appropriate language. Do not swear, use vulgarities, or any other inappropriate language. Do not degrade or disrupt equipment or system performance. Do not load personal software onto district computers. ·        Do not attempt to change computer settings or configurations. ·        Do not knowingly place a virus on any computer or in the Internet.  
  • #7 What is Cyberbullying? Bullying through electronic technology, text messaging, chat room, email, etc…
  • #8 Here’s the video clip from Francis Art: Anti-Bullying Awareness – Indirect, Cyber Bullying, Alienated – Lesson - School
  • #9 A Cyberpredator is a person who meet you online, becomes friend, asking questions, etc. You don’t know the other side of a cyberpredator. Suppose he says he’s 13 years old and you meet the person face to face, he’s not 13, he’s 50s.
  • #10 Using the analogy: The Internet is like a Mall. Going on the Internet is like going to the mall with the stranger without your parents’ supervision. Is it safe to walk with a stranger? This is same principles online. Here is the video, Internet Safety.
  • #11 What are Social Media? Facebook, My Space, Tumblr, Tweeter, Instagram, Snapchat,
  • #12 Here is the video from Net Safe Utah. There are several videos on that website. Choose “What is Personal Information?” video.
  • #13 Let’s focus on Piracy for now. Here is the short video explaining on Piracy. Let us hold the questions.
  • #14 Great video for you all to understand the meaning of Plagiarism.
  • #15 Group activities for each scenarios
  • #16 Please talk to any trusted adults here: teacher, counselor and/or principal. We are here for you. Remember be a good digital citizen! Any questions?