EADS up. stop think connect

Similar documents
Anti-Cyber Bullying Policy.

Circle Link 1 "Know Before You Go" Web Literacy Tips:

Cyber Safety Awareness in Schools. A Delhi Police Initiative

Cyber Smarts Using Social Media Wisely

Lambton Primary School

ONLINE SAFETY. Messaging, , Vlogging and Sexting

Student E-Safety Induction

Social Media Reputation Management

A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST

Technology Safety Quick Tips

ETIQUETTE TIPS. Traci Kasten. Executive Assistant Chief Operations Office x179

The purchaser of the ebook is licensed to copy ebook for use with immediate family members only.

Digital Safety and Digital Citizenship

(c) IKSC 2010 Copying allowed for incidental, classroom purposes. Workshop 2: Playing and Staying Safe Online Student Handouts

ONLINE SAFETY FOR KIDS TIPS FOR PARENTS

Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi

NORTON WI-FI RISK REPORT: U.S. Results

Introduction to

Social Media and Cyber Safety

Suggested Facebook Privacy Settings

Facebook Basics (for individuals)

Family Technology Boundaries:

Online Dangers. According to the National Center for Missing and Exploited Children.

It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar

So, you re child wants to sign up for Myspace...

Key Stage 1: Computing

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

NETIQUETTE GUIDE FOR ONLINE LEARNING GADSDEN STATE COMMUNITY COLLEGE TEACHING & LEARNING CENTER

The ICT4me Curriculum

The ICT4me Curriculum

STUDENT ICT ACCEPTABLE USE POLICY

Staying Safe on the Internet. Mark Schulman

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Online Scams. Ready to get started? Click on the green button to continue.

PUPIL ICT ACCEPTABLE USE POLICY

PARENT & TEACHER GUIDE TO THE INTE. This book belongs to:

What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996.

HOW TO TEXT OUT THE VOTE (TOTV)

ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

Session Booklet Facebook part 2

Table of Contents. Starting a Thread. Replying to a Post. Searching for new threads/discussions and Posts. Reporting a Post

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Creating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia

What is epals SchoolMail? Student Accounts. Passwords. Safety. Flag Attachment

Welcome to Facebook. Presented by Suzi Huisman

Netiquette. IT Engineering II Instructor: Ali B. Hashemi

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

It pays to stop and think

When representing Girl Scouts on social media channels make safety a priority.

FAQ: Privacy, Security, and Data Protection at Libraries

LEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive.

Norton Online Reputation Report: Why Millennials should manage their online footprint

PACT Analysis. People. Windows 8 phone: TWEENS: girls aged years old, inbetween child and teen

Guide to your Northumbria Student

Common iphone problems, tips and tricks

The Table Privacy Policy Last revised on August 22, 2012

Why isn t your chapter on Facebook?

Text 1 Cell Phones Raise Security Concerns at School

My Digital Footprint. A guide to digital footprint awareness and management

Getting started with social media and comping

Facebook Guide. How many Facebook friends should I have?

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

INTERNET SAFETY IS IMPORTANT

Agenda. 1. Cyberwellness Talk 2. How to Login to LMS

LEARN HOW TO USE FACEBOOK

INSTRUCTIONS FOR COACHES AND FAMILIES ON HOW TO GET THE MOST BENEFIT OUT OF THE JYBSA WEBSITE S NOTIFICATION FEATURES

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with

Key Learning in Computing: Years 5 and 6 Information Technology

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

Guide to Controlling Your Information on Facebook

Your security on click Jobs

TELSTRA TECH SAVVY SENIORS - BEGINNERS GUIDE INTRODUCTION TO SOCIAL MEDIA - PART 1

2013 edition (version 1.1)

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

The 21 WORD . That Can Get You More Clients. Ian Brodie

Introduction to

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

The Basics of Netiquette

Click on a link below for additional information.

Creating and Using an Account

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

South Central Power Stop Scams

Easy Registration Renewal for GSCWM Parents/Guardians. Step-by-Step Instructions & Tips

Sky Social Media Guidelines for Contributors

Computing skills per term ( ) (for full breakdown of computing skills see the computing curriculum in the teacher s shared area)

Holy Family Catholic Primary School Computing Progression Map Year 1

Overview: Students explore how they can use to communicate with real people within their schools, families, and communities.

News English.com Ready-to-use ESL / EFL Lessons

Cyber Security Guide. For Politicians and Political Parties

EDULEADERSHIP. Handle Every Kind of for Maximum Productivity HOW TO: JUSTIN BAEDER ON HIGH-PERFORMANCE INSTRUCTIONAL LEADERSHIP

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Electronic Network Acceptable Use Policy

THE TEXTING 10 COMMANDMENTS WORKBOOK

Your message is sent from your computer to a server (like the post office) where the

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Staff AUP (Acceptable Use Policy)

Internet Fundamentals - Assignment #1


Your profile contains your contact information. This is what other members will use when they want to get in touch.

Transcription:

EADS up stop think connect

You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online connected through some sort of device is how you live your life. And as you spend more of your time there, it can be easy to over-share, embarrass yourself, mess up your computer and possibly get messages from creepy people. The truth is there are some risks involved in socializing, playing and communicating online. table of contents Regardless of how fast your fingers fly on a keyboard or cell phone, the best tool you have to help avoid risks online is your brain. When you re ready to post or send a message or a photo, download a file, game or program, or shop for something stop for a second. Think about things like: Do you know and trust who you re dealing with or what you re sharing or downloading? 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search How will you feel if your information ends up somewhere you didn t intend? Asking a few key questions first can help you protect yourself, your friends and your computer. Flip through and find more things to stop and think about before you click. 1

SHARE WITH CARE Your online actions can have real-world consequences. The pictures you post and the words you write can affect the people in your life. Think before you post and share. What you post could have a bigger audience than you think. Even if you use privacy settings, it s impossible to completely control who sees your social networking profile, pictures, videos or texts. Before you click send, think about how you will feel if your family, teachers, coaches or neighbors find it. Once you post information online, you can t take it back. You may think that you ve deleted information from a site or that you will delete it later. Know that older versions may exist on other people s computers. That means your posts could live somewhere permanently. Were you ever sorry you shared something online? SEXTING You may have heard stories at school or in the news about people sexting sending nude photos from mobile phones. Don t do it. Period. People who create, forward or even save sexually explicit photos, videos or messages put their friendships and reputations at risk. Worse yet, they could be breaking the law. Get someone s okay before you share photos or videos they re in. Online photo albums are great for storing and sharing pictures of special events, and camera phones make it easy to capture every moment. Stop and think about your own privacy and other people s before you share photos and videos online. It can be embarrassing, unfair and even unsafe to send or post photos and videos without getting permission from the people in them. 2 3

INTERACT WITH TACT Have you seen something online that made you angry? Politeness counts. Texting is just another way for people to have a conversation, and texters are just like people talking face-to-face or on the phone: they appreciate please and thank you (or pls and ty). Tone it down. In online conversations, using all CAPS, long rows of exclamation points or large bolded fonts is the same as shouting. Use Cc: and Reply all: sparingly. Before you hit send on an email, stop and think about whether everyone needs to see that message. Avatars are people too. When you re playing a game or exploring an online world where you can create a character and interact with others, remember real people are behind those characters on the screen. Respect their feelings just 4 like you would in person. Remember that your character or avatar is a virtual version of you what does it tell people about you and your interests? Don t impersonate. It s wrong and can be hurtful to create sites, pages or posts that seem to come from someone else, like someone in your class or a teacher. Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using Report Abuse links can help keep sites fun for everyone. Don t stand for bullying online or off. Treat others the way you want to be treated whether you re interacting with them online, on your phone or in person. 5

CYBErBULLYING Cyberbullying is bullying that happens online. It can happen in an email, a text message, an online game or on a social networking site. It might involve rumors or images posted on someone s profile or passed around for other people to see. You know that, right? So you know that cyberbullying is a lose-lose proposition: it often makes the person being harassed feel bad and it makes the bully look bad. It also might lead to punishment from school authorities or the police. What do you do if someone harasses you online? Keep a cool head, and don t respond in kind. Most people realize that bullying is wrong. Sometimes you can stop bullying if you ignore or block the person. You also can report abuse to the website where it s taking place. If it continues, save the evidence and ask for help from an adult you trust. What do you do if you witness cyberbullying? Tell the bully to stop. Most kids don t bully, and there s no reason for anyone to put up with it. This mean behavior usually stops pretty quickly when somebody stands up for the person being bullied. If something online bothers you, who do you tell? 6 7

THE PROTECTION CONNECTION PROTECT YOURSELF Use privacy settings to restrict who can see and post on your profile. Many social networking sites, chat rooms and blogs have privacy settings. Find out how to turn these settings on, and then do it. Limit your online friends to people you actually know. Learn about social mapping. Many mobile phones have GPS technology, and there are applications that allow you to find your friends and allow them to find you. Use GPS and social mapping apps only with people you know personally and trust. Take advantage of privacy features in apps and on your phone. Trust your gut if you feel threatened or uncomfortable because of someone or something you find online. Tell someone who can help you report your concerns to the police and other people who can help. 8 9

PROTECT YOUR INFORMATION Some information should stay private. Your Social Security number and family financial information like your parents bank account or credit card numbers should stay in the family. Keep your passwords private. The longer your password, the harder it is to crack. Don t share your passwords with anybody, including your best friends or your boyfriend or girlfriend. Don t reply to text, email or pop-up messages that ask you to reply with personal information even if the message looks like it comes from a person, company or organization you know, or threatens that something bad will happen if you don t reply. These messages may be fakes, sent to steal your information. Have you ever downloaded something that turned out to be different than you expected? Protect YOUR COMPUTER Be cautious about opening attachments or clicking on links. They may contain viruses or spyware. Learn about security software and how your home computer is protected. Remember that sometimes, free stuff like games, ring tones or screen savers can hide viruses or spyware. Don t download unless you trust the source and scan the file with security software. Use peer-to-peer (P2P) file-sharing services with caution. Make sure you install file-sharing software properly, and scan downloaded files with security software before you open or play them. Otherwise, you could be sharing information your family expects to keep private, like financial records. 10 11

WORD SEARCH APPS PRIVACY RESPECT DOWNLOAD TEXTING POLITENESS PROFILE VIRTUAL SECURITY SPYWARE 12 13

Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. OnGuardOnline.gov provides practical tips from the federal government and the technology community to help you guard against internet fraud, secure your computers, and protect your privacy. To order free copies of this brochure, visit bulkorder.ftc.gov.