Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Size: px
Start display at page:

Download "Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law."

Transcription

1 Thank you for your interest in e-safety, and for teaching safe and responsible Internet use to your students. Educators are invited to access and download i-safe curriculum AT NO CHARGE under the following conditions: Only educators who have attended an i-safe Professional Development Program and are i-safe Certified are allowed to access this i-safe grade-specific lesson plan PDF file. Further, clicking on the button (below) means i-safe Certified educators agree that: i-safe lessons may only be taught by i-safe Certified educators. i-safe lessons may NOT be shared with other educators. i-safe lessons may NOT be duplicated for any reason except for classroom use. i-safe lesson hand-outs may be printed for students ONLY for current classroom use. Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law. (I agree to above Terms of Use)

2 LESSON Spam, Scams, and Phishing Suggested grade level 3-4 Protecting Your Personal Information When Using Lesson Guide This lesson focuses on the personal-safety issues brought about by , including phishing s, spam, and scams. Learning objectives Students will: be introduced to the terms: phishing, spam, and scam understand the basic ways phishing, spam, and scam s solicit personal information learn age-appropriate ways to deal with phishing, spam, and scam s Materials materials to create posters parent page for each student Procedures Discussion Review the term . Adjust the discussion to your students experience levels with . Explain that is a great way to communicate with friends and relatives, but that sometimes people you don t know will send s to try to trick you into giving away personal information. Explain the term personal information (information like your name, address, address, parents names, etc., that can be used to find you or contact you). Introduce terms the phishing, spam, and scam as s that may try to steal personal information for bad purposes. Read the topics, definitions, and tips from the activity Topics and Tips list to the class. Activity Select from the following options depending on the reading and experience levels of the students. Option 1 Divide the class into small groups, and provide each group with a topic from the topic list (the topics can be copied and cut into sections for each group). Topics can be used by more than one group. Have each group read about the topic and create a poster to tell others about how to avoid giving up personal information when receiving phishing, spam, or scam s. Option 2 Select one topic (phishing, spam, or scam), and go over it in detail with the class. Have each student create a small poster to tell others about how to avoid giving out personal information when receiving that type of .

3 Review Review the personal-information issues you have covered in this lesson. Have students share their posters. Students take their posters home and share what they have learned. Topics and Tips Phishing s Phishing s are messages that try to trick people into sending someone their personal information. These s look like they are from real businesses, like banks or stores. They ask the person who gets the to reply to the message giving them personal information, such as name and bank information. These s are called phishing because the person sending them is fishing for information from you, and they re hoping you ll bite. Don t answer s that ask for personal information. Notify an adult when you see an from someone you don t know. Spam Spam is known as garbage. It s all that you get that you don t want. Most is advertising products, etc. Spam is mainly just annoying. It can clutter your inbox and sometimes trick you into buying products. But spam can also ask you to send back information that will ultimately make you get more spam . It is important to remember that any time you give out your address on a Web site or in a store you are probably going to get spam. Delete spam s: Hold down the shift key on your computer, and press the delete key. NEVER click on the link at the bottom of spam that says to remove your address. Scams To scam someone is to trick them, and many times the scam is to trick someone into giving away money. A scam may promise you prizes or money if you follow the instructions and send back personal information. Remember that a scam is a trick. Don t fall for scams delete the s. Don t believe everything you read in an . Get help from an adult when you get an that seems like a trick. Children who participate in activities and share what they have learned about Internet safety are more likely to practice safe habits online. Additional materials and support for students, teachers, and parents on Internet safety topics are available from i-safe Inc.

4 PARENT PAGE Cyber Security Tips Cyber communication is crucial to the operation of governments, businesses, and private citizens. Computers and networks are vital for national defense, economic security, public health and safety, and more. Therefore, cyber security should be of concern to everyone. By doing your part in keeping your computer secure, you are also aiding in maintaining the entire infrastructure. Use the following steps (listed in order of importance) and tips to make sure you are cyber security savvy. Firewall: Make sure a firewall is installed on your computer. If you aren t sure, ask your parents. A firewall prevents information from entering your computer without your permission. Computer Updates: Keep your computer updated (download updates for your operating system regularly). Antivirus Software: Install antivirus software on your computer, keep it updated, and, most importantly, use it. Antispyware Software: Install antispyware software on your computer, and run it periodically. Use Caution: that has been forwarded FW: or has an attachment with the suffix of.exe,.scr, or.vbs should be considered a red flag for possible virus infection. If you do want to open an attachment, scan it through the virus software first. To do this, save all attachments before opening them. Select Downloads Carefully: Make informed decisions about what you download from the Internet. Do you really trust what you are downloading? > You may not always receive what you think you are downloading. > Downloaded materials may contain spyware. > Downloaded materials may contain computer viruses that can damage your system. Children who participate in activities and share what they have learned about Internet safety are more likely to practice safe habits online. Additional materials and support for students, teachers, and parents on Internet safety topics are available from i-safe Inc.

5

Online Scams. Ready to get started? Click on the green button to continue.

Online Scams. Ready to get started? Click on the green button to continue. Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,

More information

Bring in several pieces of junk mail that have been opened and spread the mail around the classroom.

Bring in several pieces of junk mail that have been opened and spread the mail around the classroom. LESSON PLAN You ve Won a Prize! GRADES 3-5 UNIT 2 Essential Question What is spam, and what can you do about it? Lesson Overview Students learn what spam is, the forms it takes, and then identify strategies

More information

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk Ages 11-14 Donʼt Fall for : Activity 1 Don t bite that phishing hook! Children play a game where they study various emails and texts and try to decide which messages are legit and which are phishing scams.

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Staying Safe on the Internet. Mark Schulman

Staying Safe on the Internet. Mark Schulman Staying Safe on the Internet Mark Schulman 1 Your Presenter Mark Schulman IT professional for almost 40 years No affiliation with any product 2 What We ll Talk About Passwords Email Safety Staying Safe

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning Review Ch. 3 Connecting to the World s Information 2010, 2006 South-Western, Cengage Learning Networks Two linked computers is a network A network of computers located within a short distance is called

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy? Unit 9 Tech savvy? Lesson A Tech support 1 I have no idea why... A Unscramble the questions. 1. which battery / Do you know / should / buy / I? Do you know which battery I should buy? 2. they / where /

More information

Online Security and Safety Protect Your Computer - and Yourself!

Online Security and Safety Protect Your Computer - and Yourself! Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your

More information

Digital Safety and Digital Citizenship

Digital Safety and Digital Citizenship Digital Safety and Digital Citizenship A Guide for Students The laptop has been given to you as a tool for learning. Use it for that. While doing so, here are some important rules for keeping yourself

More information

Communication using

Communication using Lesson 7 A m In this lesson you will learn: How to communicate by using email. How to create email accounts. Communication using E-mail Tejas: Today we made a poster on Communication old and new. Tejas

More information

EDULEADERSHIP. Handle Every Kind of for Maximum Productivity HOW TO: JUSTIN BAEDER ON HIGH-PERFORMANCE INSTRUCTIONAL LEADERSHIP

EDULEADERSHIP. Handle Every Kind of  for Maximum Productivity HOW TO: JUSTIN BAEDER ON HIGH-PERFORMANCE INSTRUCTIONAL LEADERSHIP EDULEADERSHIP JUSTIN BAEDER ON HIGH-PERFORMANCE INSTRUCTIONAL LEADERSHIP HOW TO: Handle Every Kind of Email for Maximum Productivity Email can be a great tool for school leaders, yet it can also be a terrible

More information

Day 5- there is quite a bit of prep for days 5 and 7 Objectives Learners will be able to. Materials Computer skill: Literacy skills:

Day 5- there is quite a bit of prep for days 5 and 7 Objectives Learners will be able to. Materials Computer skill: Literacy skills: Email: Day 5- there is quite a bit of prep for days 5 and 7 Objectives Learners will be able to Materials Computer skill: Literacy skills: Make Student Copies Day 5 SWAT Props, Technology or Other Resources

More information

Circle Link 1 "Know Before You Go" Web Literacy Tips:

Circle Link 1   Know Before You Go Web Literacy Tips: 5 th Grade Scavenger Hunt Content Circle Link 1 http://pbskids.org/privacy/literacytips.html "Know Before You Go" Web Literacy Tips: You know not to talk to strangers on the street but what about on the

More information

Newcomer Finances Toolkit. Fraud. Worksheets

Newcomer Finances Toolkit. Fraud. Worksheets Newcomer Finances Toolkit Fraud Worksheets Ottawa Community Loan Fund Fonds d emprunt Communautaire d Ottawa 22 O Meara St., Causeway Work Centre, Ottawa, ON K1Y 4N6 Tel: 613-594-3535 Fax: 613-594-8118

More information

Why isn t your chapter on Facebook?

Why isn t your chapter on Facebook? Why isn t your chapter on Facebook? Last Updated February 2011 Why Facebook? Interact with other Women of Today members Recruit members for your chapter Connect with younger generation Facebook is the

More information

Ackworth Howard Church of England (VC) Junior and Infant School. Child-friendly GDPR privacy notice

Ackworth Howard Church of England (VC) Junior and Infant School. Child-friendly GDPR privacy notice Child-friendly GDPR privacy notice Child-friendly GDPR privacy notice What s this about? A new law has been made that keeps your information safe things like your address, date of birth and phone number.

More information

BRING SPEAR PHISHING PROTECTION TO THE MASSES

BRING SPEAR PHISHING PROTECTION TO THE MASSES E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put

More information

Train employees to avoid inadvertent cyber security breaches

Train employees to avoid inadvertent cyber security breaches Train employees to avoid inadvertent cyber security breaches TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 2 How much do you know about cyber security? Small business owners often lack

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

De Montfort Students Union Student Data Privacy Statement

De Montfort Students Union Student Data Privacy Statement De Montfort Students Union Student Data Privacy Statement Introduction De Montfort Students Union (DSU) promises to respect any personal data you share with us, or that we get from other organisations

More information

McAfee S DO s AnD DOn ts Of Online Shopping

McAfee S DO s AnD DOn ts Of Online Shopping McAfee s Do s and don ts OF Online Shopping Table of Contents Foreword by Parry Aftab, 3 Online Safety Expert Online Shopping: The Real Deal 4 The DO s and DON Ts 5 Summary 17 Resources 18 Happy Online

More information

UNIT 13: SPAM LESSON 3: SPAM ATTACHMENTS

UNIT 13: SPAM LESSON 3: SPAM ATTACHMENTS UNIT 13: SPAM LESSON 3: SPAM ATTACHMENTS LESSON OVERVIEW Some spam emails may have attachments. These attachments can contain viruses. A virus can damage your computer or be used to steal your personal

More information

South Central Power Stop Scams

South Central Power Stop Scams Don t get tricked. People around the country have been receiving emails and phone calls from scammers. South Central Power wants to help you keep your money and prevent scams. Review the helpful tips below.

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

SPAM UNDERSTANDING & AVOIDING

SPAM UNDERSTANDING & AVOIDING SPAM UNDERSTANDING & AVOIDING Modified: March 8, 2016 SPAM UNDERSTANDING & AVOIDING... 5 What is Spam?... 6 How to avoid Spam... 6 How to view message headers... 8 Checking and emptying Junk E-mail...

More information

Course Outline (version 2)

Course Outline (version 2) Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

Keeping Your Computer Secure Quick Reference Guide

Keeping Your Computer Secure Quick Reference Guide Keeping Your Computer Secure Quick Reference Guide Created: 3/16/2010 Page 1 of 1 Table Of Contents 1. Introduction... 3 2. Keeping Your Computer Up to Date... 4 2.1 Windows... 4 2.2 Mac... 6 3. Malware

More information

Easy Registration Renewal for GSCWM Parents/Guardians. Step-by-Step Instructions & Tips

Easy Registration Renewal for GSCWM Parents/Guardians. Step-by-Step Instructions & Tips Easy Registration Renewal for GSCWM Parents/Guardians Step-by-Step Instructions & Tips Thank you, so much for choosing to spend this time with Girl Scouts. We would love to have you back for another year

More information

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

Internet and  Mini.K.G Senior Scientist, FRAD, CMFRI Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several

More information

IT Coordinator/Lecturer. Do you encounter computer problems?

IT Coordinator/Lecturer. Do you encounter computer problems? Systems Tech 1 IT Coordinator/Lecturer Do you encounter computer problems? 2 Ever felt like this guy? The Threat Spyware infections prompted 545,000 households to replace computers in the past six months.

More information

Internet Safety Utilize the Internet without Fear

Internet Safety Utilize the Internet without Fear Internet Safety Utilize the Internet without Fear Khou Yang Noah Fish Eliza Summerlin 1 One-to-One Computer Help Labs Mondays 12-2pm (White Bear Lake) 3-5 (Maplewood) Wednesdays 5-7 (Roseville) Thursdays

More information

Recipes. Marketing For Bloggers. List Building, Traffic, Money & More. A Free Guide by The Social Ms Page! 1 of! 24

Recipes.  Marketing For Bloggers. List Building, Traffic, Money & More. A Free Guide by The Social Ms Page! 1 of! 24 16 Recipes Email Marketing For Bloggers List Building, Traffic, Money & More A Free Guide by The Social Ms Page 1 of 24 Brought to you by: Jonathan Gebauer, Susanna Gebauer INTRODUCTION Email Marketing

More information

PHS BYOD Frequently Asked. Question

PHS BYOD Frequently Asked. Question PHS BYOD Frequently Asked Questions We are fully implementing BYOD again at Pickens High School this year. This program will allow students to use their mobile devices at school as an educational tool.

More information

MARKETING VOL. 1

MARKETING VOL. 1 EMAIL MARKETING VOL. 1 TITLE: Email Promoting: What You Need To Do Author: Iris Carter-Collins Table Of Contents 1 Email Promoting: What You Need To Do 4 Building Your Business Through Successful Marketing

More information

Text 1 Cell Phones Raise Security Concerns at School

Text 1 Cell Phones Raise Security Concerns at School Text 1 Cell Phones Raise Security Concerns at School Many people think that students having cell phones in school is a great idea 1 idea. Many parents feel that they don t have to worry as much about their

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

The Table Privacy Policy Last revised on August 22, 2012

The Table Privacy Policy Last revised on August 22, 2012 The Table Privacy Policy Last revised on August 22, 2012 The Table, an online venue through which your organization and its members/employees can connect to better fulfill its mission respects and is committed

More information

2 User Guide. Contents

2  User Guide. Contents E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an

More information

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

Each member of the St. Margaret s Community has the privilege to access Google Apps  provided by the school s network NETWORK APPROPRIATE USE AGREEMENT 2018-2019 We are pleased to offer students of St. Margaret s School access to our computer network for electronic mail and the Internet. To gain access to e-mail and the

More information

Organising . page 1 of 8. bbc.co.uk/webwise/accredited-courses/level-one/using- /lessons/your- s/organising-

Organising  . page 1 of 8. bbc.co.uk/webwise/accredited-courses/level-one/using- /lessons/your- s/organising- Organising email Reading emails When someone sends you an email it gets delivered to your inbox, which is where all your emails are stored. Naturally the first thing you ll want to do is read it. In your

More information

PROTECTING YOUR BUSINESS ASSETS

PROTECTING YOUR BUSINESS ASSETS PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

SUMMARIES OF INTERACTIVE MULTIMEDIA

SUMMARIES OF INTERACTIVE MULTIMEDIA SUMMARIES OF INTERACTIVE MULTIMEDIA GRADE 10-12 INTERNET TECHNOLOGIES 1. Introduction to Electronic Communications Use this lesson to: Understand the differences between the various e-communications modes

More information

Google Docs Tipsheet. ABEL Summer Institute 2009

Google Docs Tipsheet. ABEL Summer Institute 2009 Google Docs Tipsheet ABEL Summer Institute 2009 Contents Logging in to Google Apps for CollaborativeSchools.net for the First Time... 2 Text Documents Creating a New Text Document in Google Docs... 5 Uploading

More information

Anti-Cyber Bullying Policy.

Anti-Cyber Bullying Policy. Anti-Cyber Bullying Policy. Bullying, in any form, is an issue that we all take very seriously at Bredon School. We accept that victims can become depressed and suicidal, and even take their own lives.

More information

Cyber Security Guide for NHSmail

Cyber Security Guide for NHSmail Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,

More information

Student Portal. A guide for students. Department of Education and Training, Western Australia,

Student Portal. A guide for students. Department of Education and Training, Western Australia, Student Portal A guide for students Department of Education and Training, Western Australia, 2009 1 Table of Contents What is the Portal?...3 What will I need to access the portal?...3 Safety and responsibility

More information

Spring II 2019 Welcome to TechConnections, the City of Sacramento s technology program for adults ages 50+, based at Hart Senior Center.

Spring II 2019 Welcome to TechConnections, the City of Sacramento s technology program for adults ages 50+, based at Hart Senior Center. Spring II 2019 Welcome to TechConnections, the City of Sacramento s technology program for adults ages 50+, based at Hart Senior Center. The program is staffed primarily by volunteers. TechConnections

More information

Electronic Identity Theft and Basic Security

Electronic Identity Theft and Basic Security Electronic Identity Theft and Basic Security Prepared for DACS By Philip Chen CCSP, NSA infosec Professional 10-2-2007 Pchen@hi-link.com Agenda Introduction Examples Effective Security Defenses for Enterprises

More information

ClassDojo Guide for Parents

ClassDojo Guide for Parents ClassDojo Guide for Parents Contents What is ClassDojo?... 1 How Do I Set-Up My child s Account?... 2 How does my child log in at home?... 4 Create a Parent Account... 6 Adding Multiple Students or Classes

More information

A Beginner s Guide to Successful Marketing

A Beginner s Guide to Successful  Marketing You ve got mail. A Beginner s Guide to Successful Email Marketing We believe that building successful email marketing campaigns has never been more important than it is now. But there s a problem; most

More information

Firewall Antivirus For Windows Xp Full Version 2013

Firewall Antivirus For Windows Xp Full Version 2013 Firewall Antivirus For Windows Xp Full Version 2013 Advanced Firewall, Antivirus & Anti-spyware Engine, Advanced Real-Time Antivirus, Enhanced Browser Protection, Identity Protection, Anti-Keylogging,

More information

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to

More information

ONLINE SAFETY FOR KIDS TIPS FOR PARENTS

ONLINE SAFETY FOR KIDS TIPS FOR PARENTS ONLINE SAFETY FOR KIDS TIPS FOR PARENTS Together we can make the web a safer place for you and your tech savvy kids ACTIONS Use friends-only settings Make sure all posts and profiles on social networking

More information

Lesson Share TEACHER'S NOTES LESSON SHARE. ing by Olya Sergeeva. Overview. Preparation. Procedure

Lesson Share TEACHER'S NOTES LESSON SHARE.  ing by Olya Sergeeva. Overview. Preparation. Procedure Lesson Share TEACHER'S NOTES Age: Adults Level: Intermediate + Time: 1 hour 40 minutes Objective: to practise writing work-related emails Key skills: writing Materials: one copy of the worksheet per student;

More information

21 Lessons Learned From Sending Over 110,000 s

21 Lessons Learned From Sending Over 110,000  s 21 Lessons Learned From Sending Over 110,000 Emails By Stuart Walker http://www.nichehacks.com DISCLAIMER / LEGAL NOTICES: Although the author and publisher have made every effort to ensure that the information

More information

How to Use Your Autoresponder Series for Maximum Affiliate Profits

How to Use Your Autoresponder Series for Maximum Affiliate Profits How to Use Your Autoresponder Series for Maximum Affiliate Profits This report is brought to by AllPrivateLabelContent.com your source for pre-made content just waiting for your monetization! Building

More information

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program How to find out if malware--a Trojan, virus, or worm got past your anti-virus and firewall, how to remove the malicious code manually.

More information

(c) IKSC 2010 Copying allowed for incidental, classroom purposes. Workshop 2: Playing and Staying Safe Online Student Handouts

(c) IKSC 2010 Copying allowed for incidental, classroom purposes. Workshop 2: Playing and Staying Safe Online Student Handouts Workshop 2: Playing and Staying Safe Online Student Handouts Table of Contents Lesson 1: I Know/I Want to Know 1 Lesson 1: Video Summary: Staying Safe Online, Part 1 2 Lesson 1: Guidelines for Creating

More information

Milton State School BYOD Frequently Asked Questions

Milton State School BYOD Frequently Asked Questions Milton State School BYOD Frequently Asked Questions What is BYOD? BYOD stands for Bring Your Own Device. BYOD is an initiative that will allow students who have personal technology devices to bring them

More information

How to use in the business environment. By XXXX XXXX

How to use  in the business environment. By XXXX XXXX How to use email in the business environment By XXXX XXXX Sending a message more than one recipient (Part one) You only have to do it once. Step1: You have to click on new.. when you want to send a message

More information

Chapter 10: Security and Ethical Challenges of E-Business

Chapter 10: Security and Ethical Challenges of E-Business Chapter 10: Security and Ethical Challenges of E-Business Learning Objectives Identify several ethical issues in IT that affect employment, individuality, working condition, privacy, crime health etc.

More information

Welcome to Moodle! How To Moodle

Welcome to Moodle! How To Moodle Welcome to Moodle! The MH Vicars School Moodle site is where you ll find all the online components of your Vicars curriculum. For the following year, this will include quizzes and access to multimedia

More information

Spam Protection Guide

Spam  Protection Guide Spam Email Protection Guide Version 1.0 Last Modified 5/29/2014 by Mike Copening Contents Overview of Spam at RTS... 1 Types of Spam... 1 Spam Tricks... 2 Imitation of 3 rd Party Email Template... 2 Spoofed

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

A quick guide to... Split-Testing

A quick guide to... Split-Testing A quick guide to... Split-Testing In this guide... Learn how you can get the best results from your email campaign by testing it first! Just create up to five messages, with different personalization techniques,

More information

Cyber Safety Awareness in Schools. A Delhi Police Initiative

Cyber Safety Awareness in Schools. A Delhi Police Initiative Cyber Safety Awareness in Schools A Delhi Police Initiative 1 INTRODUCTION Concerns: You all are very inquisitive; The Internet offers a world of opportunities to you; But it is also full of risks: Inappropriate

More information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security

More information

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps 2018 By: RemoveVirus.net Remove A Virus From Your PC In 5 Simple Steps PCs, like Macs and Mobile Devices are susceptible to different types of malware. Avoid panicking when you realize that your PC has

More information

ICT Acceptable Use Policy for Students

ICT Acceptable Use Policy for Students ICT Acceptable Use Policy for Students a 52 Eurobin Avenue, Manly NSW 2095 t +61 2 9977 5144 f +61 2 9976 2753 cricos 03290E e administration@stellamaris.nsw.edu.au w www.stellamaris.nsw.edu.au abn 88

More information

commtech Online Holiday Shopping Tips A Guide Presented by: CommTech Industries

commtech Online Holiday Shopping Tips A Guide Presented by: CommTech Industries Online Holiday Shopping Tips A Guide Presented by: CommTech Industries Holiday season is already upon us and that means high traffic for online shopping and higher risk for internet scams. The scammers

More information

Lesson Guides PRE-INTERMEDIATE

Lesson Guides PRE-INTERMEDIATE Lesson Guides PRE-INTERMEDIATE British Council 2018 The British Council is the United Kingdom s international organisation for cultural relations and educational opportunities. PRE-INTERMEDIATE LESSON

More information

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

KSI/KAI Cyber Security Policy / Procedures For Registered Reps KSI/KAI Cyber Security Policy / Procedures For Registered Reps Password Protection 1) All electronic devices used in any way for KSI/KAI business must be password protected. 2) Passwords, where applicable,

More information

It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar

It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar You Won!!! It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar To Process and deliver your Car and Villa

More information

PRACTICING SAFE COMPUTING AT HOME

PRACTICING SAFE COMPUTING AT HOME PRACTICING SAFE COMPUTING AT HOME WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED PATCHLINK ENGINEER ENTERPRISE INFORMATION SYSTEMS

More information

TRAINER MOODLE QUICK GUIDE

TRAINER MOODLE QUICK GUIDE TRAINER MOODLE QUICK GUIDE Update 2-2018 Maine Roads to Quality Professional Development Network PO Box 9300, 34 Bedford Street, Portland, ME 04104 1-888-900-0055 www.muskie.usm.maine.edu/maineroads Table

More information

Policy recommendations. Technology fraud and online exploitation

Policy recommendations. Technology fraud and online exploitation Policy recommendations Technology fraud and online The opportunity Cloud computing is revolutionizing how people work, learn, interact, and play. Education is just one example as a new generation of cloud-based

More information

University of Tennessee at Chattanooga ARCS, Michael Ward, Basic Windows Security

University of Tennessee at Chattanooga ARCS, Michael Ward, Basic Windows Security University of Tennessee at Chattanooga ARCS, Michael Ward, 2005-7-27 Basic Windows Security Nothing, besides turning off the power, can insure that your PC will be completely protected from hazards such

More information

2016 All Rights Reserved

2016 All Rights Reserved 2016 All Rights Reserved Table of Contents Chapter 1: The Truth About Safelists What is a Safelist Safelist myths busted Chapter 2: Getting Started What to look for before you join a Safelist Best Safelists

More information

Retail/Consumer Client Internet Banking Awareness and Education Program

Retail/Consumer Client Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 1) E-mail Risk... 3 2) Internet Risks... 4 3) Telephone

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

Why use Remind? Get students and parents to sign up for your Remind class! How is Remind safe?

Why use Remind? Get students and parents to sign up for your Remind class! How is Remind safe? remind.com Why use Remind? Remind helps you connect instantly with students and parents on their mobile devices. SAVE TIME Send or schedule quick Announcements to your class, sports team, school club,

More information

Overview: Students explore how they can use to communicate with real people within their schools, families, and communities.

Overview: Students explore how they can use  to communicate with real people within their schools, families, and communities. Sending Email LESSON PLAN Essential Question: How do you connect with others through email? Learning Overview and Objectives Overview: Students explore how they can use email to communicate with real people

More information

Class#9 in the Pre-Core Mathematics Program. It s time to pass along a stack of tips related to using the ALEKS system and .

Class#9 in the Pre-Core Mathematics Program. It s time to pass along a stack of tips related to using the ALEKS system and  . Class#9 in the Pre-Core Mathematics Program It s time to pass along a stack of tips related to using the ALEKS system and email. 1 ALEKS Tip #1 Let s start with the # ALEKS calculator. # Did you know that

More information

>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE?

>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE? >MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE? >CONTENTS >WHAT IS MESSAGING AND WEB SECURITY? >P1 >EMAIL THREATS >P1 >VIRUSES

More information

Parent. Portal. User. Manual

Parent. Portal. User. Manual EDUCATIONAL SERVICES Parent Portal User Manual Version 3.0 GENESIS STUDENT INFORMATION SYSTEM PARENT PORTAL Introduction 3 Logging In & Logging Out 4 Student Summary Dashboard The Dashboard Selecting a

More information

STUDENT ICT ACCEPTABLE USE POLICY

STUDENT ICT ACCEPTABLE USE POLICY The Olive School, Blackburn This policy is in line with the Mission Statement of the School To promote a culture of educational excellence, from within a caring and secure Islamic environment enriched

More information

The essential guide to creating a School Bring Your Own Device Policy. (BYOD)

The essential guide to creating a School Bring Your Own Device Policy. (BYOD) The essential guide to creating a School Bring Your Own Device Policy. (BYOD) Contents Introduction.... 3 Considerations when creating a BYOD policy.... 3 General Guidelines for use (Acceptable Use Policy)....

More information

Top 5 Tips To Take A Stand Against Telephone Scams

Top 5 Tips To Take A Stand Against Telephone Scams Scammers often use the telephone as a method to gain personal details and con people out of their life savings. Avoid being one of them, protect yourself. Top 5 Tips To Take A Stand Against Telephone Scams

More information

Cyber Security Basics. Presented by Darrel Karbginsky

Cyber Security Basics. Presented by Darrel Karbginsky Cyber Security Basics Presented by Darrel Karbginsky What s to come In the following slides I am going to discuss amongst other things and in no particular order things to enlighten, frighten, educate,

More information

Edmodo for Teachers Guide (Taken directly from Edmodo s site.)

Edmodo for Teachers Guide (Taken directly from Edmodo s site.) Edmodo for Teachers Guide (Taken directly from Edmodo s site.) Table of Contents: 1. Teacher Sign Up 2. Create a Group 3. Manage Your Groups 4. Small Group 5. Co-Teaching 6. Student Sign up 7. Post a Message

More information

Colburn Community Primary School ICT and Computing Policy

Colburn Community Primary School ICT and Computing Policy Colburn Community Primary School ICT and Computing Policy Introduction The use of information and communication technology is an integral part of the national curriculum and is a key skill for everyday

More information

, such as xyz5000, that

, such as xyz5000, that Your Penn State Access Account user ID and password are the key to a host of Internet services: Help Desks, elion, the Web, Penn State e-mail, University Libraries, ITS-managed Student Computing Labs,

More information

COMPUTER MERIT BADGE TROOP 301 HUTCHINSON

COMPUTER MERIT BADGE TROOP 301 HUTCHINSON COMPUTER MERIT BADGE TROOP 301 HUTCHINSON SEARCH ENGINES ONLINE SAFETY 1. Follow your family s rules for going online 2. Protect your privacy 3. Do not open emails or files you receive from people you

More information

Online Threats. This include human using them!

Online Threats.   This include human using them! Online Threats There are many dangers from using the web (and computer in general). One should watch out for malware, automated programs designed to cause harm to you, your data, and your system. You are

More information