Your SlideShare is downloading. ×
0
Ethical and safe internet use
Ethical and safe internet use
Ethical and safe internet use
Ethical and safe internet use
Ethical and safe internet use
Ethical and safe internet use
Ethical and safe internet use
Ethical and safe internet use
Ethical and safe internet use
Ethical and safe internet use
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Ethical and safe internet use

876

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
876
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. California Technology Assistance Project, Region 10
  • 2.  The Chavez Bill (AB307) requires the guidelines and criteria to include a component to educate pupils and teachers on the appropriate and ethical use of information technology in the classroom, Internet safety, avoiding plagiarism, the concept, purpose, and significance of a copyright so that pupils can distinguish between lawful and unlawful online downloading, and the implications of illegal peer-to-peer network file sharing.
  • 3. AUP stands for Acceptable Use Policy. Alldistricts should have a policy that is signedannually by students and parents.ResourcesThis presentation (.ppt) was created to review your districts AcceptableUse Policy (AUP) and discuss with students what they are agreeing to bysigning this document. Instructors should have copies of their districtsStudent AUP available for this discussion.AUP links from myctap.org
  • 4. Students will understand the importance offollowing copyright guidelines, see how studentscan take advantage of Fair Use Guidelines, learnwhat plagiarism means, and see the need to citesources.ResourcesPresenation to review copyright and fair use policies as theyapply to students.Copyright and Fair Use Lesson from Read, Write, ThinkB4UCopy.org  - The B4UCopy educational program from theBusiness Software Alliance has a goal of raising awareness ofcopyright laws and reinforce responsible behavior online.Download the free curriculum for elementary and middle schoolstudents [B4UCopy.com/kids] or the high school curriculum [B4UCopy.org/teens] on copyright laws.
  • 5. A "cyber predator" is someone who uses theinternet to exploit someone else: financially,sexually, emotionally, or psychologically. Theanonymity of the internet allows online predatorsto establish relationships of trust with youngpeople where none should exist.ResourcesPresentation with linked video (internet required) allows forclassroom exploration and discussion of online safety. NetSmartz Real Life StoriesState CTAP Cyber Predator linksShort Online Safety QuizFBI-SOS: Safe Online Searching
  • 6.  Software that allows anyone with the same software to copy files from your PC. Peer-2-peer files-haring, or P2P, is using software to share files with anyone over the internet. Kazaa, Limewire, and BitTorrent are some examples of file-sharing software. The original Napster was also a file-sharing program that gained wide-spread attention.Resources Presentation reviews the legality and dangers of downloading and P2P file sharing. State CTAP Piracy links
  • 7.  Personal information can be used to identify you, your location or your financial assets. Obvious: your name, age, sex, picture, phone number, address/location. Less obvious: hobbies, interests, school mascot, online group memberships Too much personal information puts users at risk, can lead to physical harm or identity theft . The information can also be used for scamming, spamming and phishing.Resources Thats Not Cool State CTAP Website: Identity Safety
  • 8.  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery, exclusion and stalking. Cyberbullies may use email, chat rooms, discussion forums, instant messaging, cell phone text messaging or popular teen web sites such as MySpace or Facebook.Resources Cyberbullying Videos from NetSmartz  Cyberbullying: Feathers in the Wind  Cyberbullying: You Cant Take it Back  Cyberbullying: Broken Friendship NetSmart Teens  State CTAP Website - Cyberbullying- visit the State CTAP Cyberbullying site for a range of resources for educators, parents, and students.
  • 9.  http://kids.yahoo.com/parents/online-safety http://kids.yahoo.com/parents/online-safety/1701--TheA Parents Guide to Internet Safety - FBI Parents Guide State CTAP Site - Administrator Resources for PTA Meetings
  • 10.  Lingo Bingo What internet chat terms do you know? (The answers are included on page two.) A PowerPoint(TM) game on safe and appropriate intenet use, created by CTAP Region IV. All files and links contained in this presentation can be found at this CTAP website: http://ctap10.org/easi-u

×