Ethical and safe internet use

  • 818 views
Uploaded on

 

More in: Technology , Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
818
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
10
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. California Technology Assistance Project, Region 10
  • 2.  The Chavez Bill (AB307) requires the guidelines and criteria to include a component to educate pupils and teachers on the appropriate and ethical use of information technology in the classroom, Internet safety, avoiding plagiarism, the concept, purpose, and significance of a copyright so that pupils can distinguish between lawful and unlawful online downloading, and the implications of illegal peer-to-peer network file sharing.
  • 3. AUP stands for Acceptable Use Policy. Alldistricts should have a policy that is signedannually by students and parents.ResourcesThis presentation (.ppt) was created to review your districts AcceptableUse Policy (AUP) and discuss with students what they are agreeing to bysigning this document. Instructors should have copies of their districtsStudent AUP available for this discussion.AUP links from myctap.org
  • 4. Students will understand the importance offollowing copyright guidelines, see how studentscan take advantage of Fair Use Guidelines, learnwhat plagiarism means, and see the need to citesources.ResourcesPresenation to review copyright and fair use policies as theyapply to students.Copyright and Fair Use Lesson from Read, Write, ThinkB4UCopy.org  - The B4UCopy educational program from theBusiness Software Alliance has a goal of raising awareness ofcopyright laws and reinforce responsible behavior online.Download the free curriculum for elementary and middle schoolstudents [B4UCopy.com/kids] or the high school curriculum [B4UCopy.org/teens] on copyright laws.
  • 5. A "cyber predator" is someone who uses theinternet to exploit someone else: financially,sexually, emotionally, or psychologically. Theanonymity of the internet allows online predatorsto establish relationships of trust with youngpeople where none should exist.ResourcesPresentation with linked video (internet required) allows forclassroom exploration and discussion of online safety. NetSmartz Real Life StoriesState CTAP Cyber Predator linksShort Online Safety QuizFBI-SOS: Safe Online Searching
  • 6.  Software that allows anyone with the same software to copy files from your PC. Peer-2-peer files-haring, or P2P, is using software to share files with anyone over the internet. Kazaa, Limewire, and BitTorrent are some examples of file-sharing software. The original Napster was also a file-sharing program that gained wide-spread attention.Resources Presentation reviews the legality and dangers of downloading and P2P file sharing. State CTAP Piracy links
  • 7.  Personal information can be used to identify you, your location or your financial assets. Obvious: your name, age, sex, picture, phone number, address/location. Less obvious: hobbies, interests, school mascot, online group memberships Too much personal information puts users at risk, can lead to physical harm or identity theft . The information can also be used for scamming, spamming and phishing.Resources Thats Not Cool State CTAP Website: Identity Safety
  • 8.  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery, exclusion and stalking. Cyberbullies may use email, chat rooms, discussion forums, instant messaging, cell phone text messaging or popular teen web sites such as MySpace or Facebook.Resources Cyberbullying Videos from NetSmartz  Cyberbullying: Feathers in the Wind  Cyberbullying: You Cant Take it Back  Cyberbullying: Broken Friendship NetSmart Teens  State CTAP Website - Cyberbullying- visit the State CTAP Cyberbullying site for a range of resources for educators, parents, and students.
  • 9.  http://kids.yahoo.com/parents/online-safety http://kids.yahoo.com/parents/online-safety/1701--TheA Parents Guide to Internet Safety - FBI Parents Guide State CTAP Site - Administrator Resources for PTA Meetings
  • 10.  Lingo Bingo What internet chat terms do you know? (The answers are included on page two.) A PowerPoint(TM) game on safe and appropriate intenet use, created by CTAP Region IV. All files and links contained in this presentation can be found at this CTAP website: http://ctap10.org/easi-u