Ethical and safe internet use


Published on

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Ethical and safe internet use

  1. 1. California Technology Assistance Project, Region 10
  2. 2.  The Chavez Bill (AB307) requires the guidelines and criteria to include a component to educate pupils and teachers on the appropriate and ethical use of information technology in the classroom, Internet safety, avoiding plagiarism, the concept, purpose, and significance of a copyright so that pupils can distinguish between lawful and unlawful online downloading, and the implications of illegal peer-to-peer network file sharing.
  3. 3. AUP stands for Acceptable Use Policy. Alldistricts should have a policy that is signedannually by students and parents.ResourcesThis presentation (.ppt) was created to review your districts AcceptableUse Policy (AUP) and discuss with students what they are agreeing to bysigning this document. Instructors should have copies of their districtsStudent AUP available for this discussion.AUP links from
  4. 4. Students will understand the importance offollowing copyright guidelines, see how studentscan take advantage of Fair Use Guidelines, learnwhat plagiarism means, and see the need to citesources.ResourcesPresenation to review copyright and fair use policies as theyapply to students.Copyright and Fair Use Lesson from Read, Write, Think  - The B4UCopy educational program from theBusiness Software Alliance has a goal of raising awareness ofcopyright laws and reinforce responsible behavior online.Download the free curriculum for elementary and middle schoolstudents [] or the high school curriculum [] on copyright laws.
  5. 5. A "cyber predator" is someone who uses theinternet to exploit someone else: financially,sexually, emotionally, or psychologically. Theanonymity of the internet allows online predatorsto establish relationships of trust with youngpeople where none should exist.ResourcesPresentation with linked video (internet required) allows forclassroom exploration and discussion of online safety. NetSmartz Real Life StoriesState CTAP Cyber Predator linksShort Online Safety QuizFBI-SOS: Safe Online Searching
  6. 6.  Software that allows anyone with the same software to copy files from your PC. Peer-2-peer files-haring, or P2P, is using software to share files with anyone over the internet. Kazaa, Limewire, and BitTorrent are some examples of file-sharing software. The original Napster was also a file-sharing program that gained wide-spread attention.Resources Presentation reviews the legality and dangers of downloading and P2P file sharing. State CTAP Piracy links
  7. 7.  Personal information can be used to identify you, your location or your financial assets. Obvious: your name, age, sex, picture, phone number, address/location. Less obvious: hobbies, interests, school mascot, online group memberships Too much personal information puts users at risk, can lead to physical harm or identity theft . The information can also be used for scamming, spamming and phishing.Resources Thats Not Cool State CTAP Website: Identity Safety
  8. 8.  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery, exclusion and stalking. Cyberbullies may use email, chat rooms, discussion forums, instant messaging, cell phone text messaging or popular teen web sites such as MySpace or Facebook.Resources Cyberbullying Videos from NetSmartz  Cyberbullying: Feathers in the Wind  Cyberbullying: You Cant Take it Back  Cyberbullying: Broken Friendship NetSmart Teens  State CTAP Website - Cyberbullying- visit the State CTAP Cyberbullying site for a range of resources for educators, parents, and students.
  9. 9. A Parents Guide to Internet Safety - FBI Parents Guide State CTAP Site - Administrator Resources for PTA Meetings
  10. 10.  Lingo Bingo What internet chat terms do you know? (The answers are included on page two.) A PowerPoint(TM) game on safe and appropriate intenet use, created by CTAP Region IV. All files and links contained in this presentation can be found at this CTAP website: