Circle Link 1 "Know Before You Go" Web Literacy Tips:

Similar documents
EADS up. stop think connect

Anti-Cyber Bullying Policy.

Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi

Netiquette. IT Engineering II Instructor: Ali B. Hashemi

What is epals SchoolMail? Student Accounts. Passwords. Safety. Flag Attachment

ONLINE SAFETY. Messaging, , Vlogging and Sexting

Digital Safety and Digital Citizenship

(c) IKSC 2010 Copying allowed for incidental, classroom purposes. Workshop 2: Playing and Staying Safe Online Student Handouts

A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST

Online Dangers. According to the National Center for Missing and Exploited Children.

Bring in several pieces of junk mail that have been opened and spread the mail around the classroom.

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Student E-Safety Induction

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

Lambton Primary School

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

2.4.2 List out the Dos and Don ts while communicating online.

Social Media and Cyber Safety

Cyber Safety Awareness in Schools. A Delhi Police Initiative

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?

Introduction to

(electronic mail) is the exchange of computer-stored messages by telecommunication.

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

The purchaser of the ebook is licensed to copy ebook for use with immediate family members only.

So, you re child wants to sign up for Myspace...

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience

Spam. Time: five years from now Place: England

Cyber Smarts Using Social Media Wisely

Netiquette Vocabulary

Glossary

Meet our Example Buyer Persona Adele Revella, CEO

It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar

The Basics of Netiquette

ETIQUETTE TIPS. Traci Kasten. Executive Assistant Chief Operations Office x179

ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014

Facebook Guide. How many Facebook friends should I have?

2013 edition (version 1.1)

Getting started with social media and comping

Social Media E-Safety Guide. For more help and advice visit:

What is netiquette? K34#%^**(11`IJN+}}C>ET34KH<D>Q!:DL=+szd$R4457DGFG^U%*%&^YDFG#$CV%&58w[SRSBFy>

Online Scams. Ready to get started? Click on the green button to continue.

Your message is sent from your computer to a server (like the post office) where the

Spam Protection Guide

Text 1 Cell Phones Raise Security Concerns at School

NETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER

STUDENT ICT ACCEPTABLE USE POLICY

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with

The ICT4me Curriculum

The ICT4me Curriculum

Walsall Adult and Community College

Understanding the digital world: LEVEL 1

Welcome to the world of .

Newcomer Finances Toolkit. Fraud. Worksheets

Internet Safety by Kathy Staugler Illustrated by Travis Schaeffer

News English.com Ready-to-use ESL / EFL Lessons

Student Portal. A guide for students. Department of Education and Training, Western Australia,

PUPIL ICT ACCEPTABLE USE POLICY

Computer Foundation Skills. Internet Webmail

Brochure for Information Security

The Benefits of SMS as a Marketing and Communications Channel From The Chat Bubble written by Michael

(Photos and Instructions Based on Microsoft Outlook 2007, Gmail, Yahoo! Mail, and Hotmail)

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk


Security Awareness. Presented by OSU Institute of Technology

South Central Power Stop Scams

Sky Social Media Guidelines for Contributors

Taking Control of Your . Terry Stewart Lowell Williamson AHS Computing Monday, March 20, 2006

LEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive.

The Table Privacy Policy Last revised on August 22, 2012

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

Computer Basics 4 Basics Revision 3 ( )

Dumas ISD. Acceptable Use Policy

Successful Implementation

News English.com Ready-to-use ESL / EFL Lessons

Agenda. 1. Cyberwellness Talk 2. How to Login to LMS

PARENT & TEACHER GUIDE TO THE INTE. This book belongs to:

Session Booklet Facebook part 2

Communication using

Using Gmail. Created by the Columbia Basin Alliance for Literacy. Margaret Sutherland

poetry.com Web Safety Ratings from McAfee SiteAdvisor What our inbox looked like after we signed up here:

HOW TO CONFIGURE SOCIAL MEDIA PRIVACY SETTINGS

GETTING STARTED PAGE 2 Prerequisites You Will Be Able To. INTRODUCTION PAGE 3 What is ? Pros, Cons and Tips Text Speak Dictionary

101 Etiquette Tips

Family Technology Boundaries:

Subject Cooperative activities. Explain the commands of HTML Use the HTML commands. Add textbox-radio button

How to Open a Free Yahoo! Account & Basics

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

ICT Acceptable Use Policy for Students

Recipes. Marketing For Bloggers. List Building, Traffic, Money & More. A Free Guide by The Social Ms Page! 1 of! 24

2016 All Rights Reserved

INTERNET SAFETY IS IMPORTANT

Social Networking Applied

DER GOBBLE. Good Secure Crypto Wallet Practices. What is your wallet?

3.5 SECURITY. How can you reduce the risk of getting a virus?

Using web-based

Doctorate of Commissioner Science Thesis on Starting an Online Commissioner Forum. Jim Gray

Original photo by Jonathan Fadden

Contributing to a Community

Staying Safe on the Internet. Mark Schulman

Transcription:

5 th Grade Scavenger Hunt Content Circle Link 1 http://pbskids.org/privacy/literacytips.html "Know Before You Go" Web Literacy Tips: You know not to talk to strangers on the street but what about on the Web? You wouldn't want strange people on the Internet to know where you live, either. Never give out your last name, address, or phone number without your parents saying its okay. Don't be fooled by free prizes! Before you enter a contest or give out any personal information, ask a parent for help. Free prizes may be a tricky way of finding out where you live so companies can sell you their products. You know that some sites are good for kids, but not all of them are safe places. If you get scared or worried by a Web site, just click "Back" or log off. It's not always best to follow instructions. Even if a club or chat room tells you to enter your address or other personal information so you can join, don't do it! Look for another kid-safe club that respects your privacy. Finder s keepers, and anyone who finds your email address on the Web can use it to send you mail you don't want or to find out where you live. If you get a message from someone you don't know, tell your parents right away. The Internet is a great way to learn about other people that like the same things you do, but meeting your Internet friend in person could be dangerous. Let your parents know right away before you make any plans. Attention big brothers and sisters! You may know how to safely surf, but little ones don't. Help them out by showing them how to find Web sites that are good for kids. Did you ever hear someone tell a tale that you didn't quite believe? On the Internet, it's easy to make up stories about who you are. Remember that people you meet in chat rooms or on email may not be playing safely. Trick or treat? Some sites use "cookies," or bits of recorded text, to either (1) gather information about the Web sites you like to visit, or (2) target potential buyers for their advertisers. You may block cookies through the preferences folder of your Web browser. Web sites should always tell you (1) why they are collecting personal information and (2) what they're going to do with that information. If they don't, leave and go to a Web site you and your parents trust.

2 http://www.bpl.org/kids/netiquette.htm Netiquette for Kids 1. Avoid hurting someone's feelings with e-mail. Sometimes, online, people can't tell that you are joking. When you write an e-mail message, make sure the person you're sending it to will know whether you are happy, sad, angry, joking, etc. You can do this by using smileys, such as :). 2. Respect other people's online rights. People on the Internet have rights just as they do in everyday life. If someone sends you a threatening letter, or makes crank phone calls to your house, it can be annoying and sometimes very scary. The same is true on the Internet. If someone sends you e-mail which threatens you or makes you feel uncomfortable, talk to a parent or other adult right away. 3. Avoid insulting someone unless you want to start a flame war. A flame war is when angry people try to punish each other with e-mail. Sometimes this can be done by sending so many messages that a mailbox gets jammed, and sometimes this is done by sending a few very nasty messages meant to hurt someone's feelings. If you insult someone with e-mail, they will probably get angry just as they would if you insulted them face to face. 4. If someone insults you, be calm. Starting a flame war is serious business on the Net. Even if you are angry with someone, you don't need to take things any further. Try being calm, ignoring the message, or sending a polite message asking for them to explain what they meant. It may have been a misunderstanding. 5. Avoid "crashing" discussion groups or forums. People on the Net frequently get together online to talk about things they may have in common. This can be done on a listserv, a bulletin board, a chat group, etc. If you join the discussion just for the fun of "crashing" it, or ruining it, people will definitely get angry. 6. Respect the privacy of other people. If someone tells you something secret, it should be kept secret. This includes passwords, full names, addresses, or interests. Sharing your own password with someone else, even someone you like, is never a good idea. Passwords and personal information are private, and are never safe to share with others. 7. Be responsible online. When you are at the computer, you are in control. Avoid using the computer to harm other people. Taking things which are not yours (such as files, passwords, or credit card numbers), spreading rumors about other people online, and infecting other computers with viruses (on purpose) are examples of harming other people online. 8. Help other people learn more about the Net. Chances are someone else taught you a lot of what you know about the Internet. The Net is growing quickly, and it's difficult to keep up. Other kids, or even your parents and teachers, may need help understanding what it's all about. Try to help them if you can. Who knows? They might show you a thing or two someday!

3 http://www.mcgruff.org/advice/cyberbullies.php Cyberbullies A cyberbully uses the Internet, cell phone, or other device to send or post text or images to try to hurt or embarrass another person. It's a lot like the bullying that happens at recess or on the school bus, and it can hurt just as much. Help stop cyberbullying from happening to you: Keep your password safe! You can tell your parents about it, but not anyone else not even your best friend! Don t share secrets, photos, or anything online that might be embarrassing if someone found out (like your entire school!). Set up email and instant messenger accounts with your parents. Make sure not to put your name, age, address, or phone number in your profile or screen name. Don't send messages when you're angry. Wait until you cool off so you don't say something you'll regret. Remember Scruff s steps for getting along. Let bullies know that cyberbullying is not OK. If your friends are cyberbullying, tell them that it s not funny and that cyberbullying hurts people. Be as nice online as you are offline. If a cyberbully is bothering you: Don't respond to emails or messages that are mean to you or your friends. Don t forward emails or messages that are mean or that spread rumors about other people. Don't open emails or messages from someone you know is a bully. Block anyone who acts like a cyberbully. Save or print all messages from bullies. Show the messages to an adult you trust like a parent or a teacher and ask for help. If the first adult you tell doesn't help you, keep telling until someone does.

4 http://home.disney.com.au/activities/surfswellisland/ Virus Cave Computer viruses can destroy your computer and your files. Computers get viruses from infected files sent to them by other computers. You always need to be careful of viruses when receiving and downloading anything from the Internet, even if you are using a wireless device. If you get an email that you weren t expecting, you should delete it right away. And you should always use an antivirus program. Sometimes computer viruses can email themselves from your friend s computer to your computer. You should delete links and files sent to you by strangers, because they might contain viruses that could damage your computer. 5 http://www.wiredkids.org/kids/personal_information_safety/email_safety/index.html Email Safety A few quick tips to remember about using e-mail: Change your password often (and keep it in a safe place). Don t share the password with anyone. Don t open any attachments unless they are run through an antivirus program. Log off when done. Don t reply to spam, harassing, or offensive e-mail. Use common sense and keep personal information personal. Delete all e-mails, unread, from people you don t know. Don t be caught by the spammers favorite trick, Remember me?

6 http://www.ikeepsafe.org/assets/videos/?vid=fauxpaw_video Adventures in the Internet Never give your name, address, phone number or the name of your school to anyone online. Never agree to meet with anyone you ve connected with online. If you feel uncomfortable about anything you see on a computer, tell a parent or adult right away. 7 http://kidshealth.org/kid/feeling/school/plagiarism.html What is Plagiarism? Plagiarism is when you use someone else's words or ideas and pass them off as your own. Plagiarism is not allowed in school, college, or beyond, so it's a good idea to learn the proper way to use resources, such as websites, books, and magazines. Anytime you use thoughts or ideas that aren t your own, or information you didn t know before you went to a website, you must give the author and the website credit for that information. Plagiarism is wrong because you are stealing a person's ideas or writing. Most schools are pretty strict about plagiarism. If you're caught, you can wind up suspended, you may fail the assignment and possibly even be expelled. To avoid plagiarism, always make it clear where the information comes from. If you do not cite sources, you are breaking copyright rules. A bibliography is a list of the sources you used for a project or report. To make one, you'll need to know the author, the title, and the date it was published.

8 http://www.netsmartzkids.org/videos/index.htm?page=ktr_beatthetricks_400k.htm Real World Smarts Some people will pretend to be a friend to try to trick you to go with them or get you to do something you don t want to do. Never leave with anyone without asking your parent or guardian first. If you are home alone or your parent is in another room, never answer the door without checking first. Remember the four rules: 1) Check first with an adult you trust. 2) Take a friend with you. 3) Tell people No. 4) Tell a trusted adult. 9 http://www.fbi-sos.org/hunt/online_predator.cfm Online Predators An online predator is an internet user who exploits* people, usually for sexual or financial purposes. Online predators think of others as prey. They try to trick young people into meeting with them face to face so they can harm them. They can also try to trick people into giving them their personal information so they can steal from them. Predators will use chat rooms, peer to peer forums, and IM to find victims+. They will try to get their victims to trust them by acting like they care about the same things. Often they will bring up sexual topics and/or send pictures to their victims before asking to meet with them face to face. * exploit - to take advantage of unfairly + victim - one who is harmed by another TIPS TO PROTECT YOURSELF FROM AN ONLINE PREDATOR: When someone threatens you or asks for too much information, talk to your parents, a teacher or the local police. Chat with people you know from the real world, from school, band, community groups, your family. Keep PII (what adults call personally identifiable information) private. That's your name, school, social security number, address, age, birthday, phone number and family or friends names to yourself. Make sure your screen name doesn't say too much, don't include stuff like your name, age or hobbies that predators can use. Adapted from www.staysafe.org. REPORT IT: If anyone you don't know asks you or a friend for personal information, photos or videos, tell an adult you trust and report it to the National Center for Missing & Exploited Children's CyberTipline. Reports may be made 24-hours a day, 7 days a week online at www.cybertipline.com or by calling 1-800-843-5678.

10 http://www.wiredsafety.org/internet101/netiquette.html Netiquette There are rules for proper behavior in cyberspace called Netiquette. Everything you say should be said with the understanding that others will know, sooner or later, that you said it. Nothing is ever truly anonymous online. Get to know the rules before you say or do anything on-line. Some discussion boards and chat rooms have special rules about what you can and can t say or do. Think before you type. Make sure that what you say is appropriate. Don t be critical of others, especially newbies, even if they break the rules. If you need to help or correct someone, do it by e-mail, not in a public forum like a chat room or newsgroup. Remember, everyone was a newbie once. Don t waste others time or bandwidth. Don t send chain e-mail, pass cyber rumors or hoaxes, or spam others (posting a message in many places at once). Don t carbon copy (Cc:) people just because you can. Copy only those who need to read something. Protect the privacy of others. Don t openly list someone s e-mail address in a large Cc: without their permission. Instead, use a Bcc: (blind carbon copy) to protect their privacy. Don t use anyone s password without their permission. Don t take things without paying for them, like shareware. These are all no-no's. Remember that just because you re hiding out behind a computer monitor, you aren t exempt from correct and thoughtful communications: Using ALL CAPITAL LETTERS - it s considered shouting and is hard on the eyes. Flaming - inciting or provoking an argument. Posting false or rude information about someone else. Sending a large attachment without asking if it s okay first. Referring to someone by their real name in a chat room or channel. Sending e-mail to people you don t know, advertising something. (It s another kind of spam.) Talking about something off-topic in a special topic chat room Not waiting your turn or following the chat room or channel rules in a special online event.