California Technology Assistance Project, Region 10
The Chavez Bill (AB307) requires the guidelines and criteria to include a component to educate pupils and teachers on the appropriate and ethical use of information technology in the classroom, Internet safety, avoiding plagiarism, the concept, purpose, and significance of a copyright so that pupils can distinguish between lawful and unlawful online downloading, and the implications of illegal peer-to-peer network file sharing.
AUP stands for Acceptable Use Policy. Alldistricts should have a policy that is signedannually by students and parents.ResourcesThis presentation (.ppt) was created to review your districts AcceptableUse Policy (AUP) and discuss with students what they are agreeing to bysigning this document. Instructors should have copies of their districtsStudent AUP available for this discussion.AUP links from myctap.org
Students will understand the importance offollowing copyright guidelines, see how studentscan take advantage of Fair Use Guidelines, learnwhat plagiarism means, and see the need to citesources.ResourcesPresenation to review copyright and fair use policies as theyapply to students.Copyright and Fair Use Lesson from Read, Write, ThinkB4UCopy.org - The B4UCopy educational program from theBusiness Software Alliance has a goal of raising awareness ofcopyright laws and reinforce responsible behavior online.Download the free curriculum for elementary and middle schoolstudents [B4UCopy.com/kids] or the high school curriculum [B4UCopy.org/teens] on copyright laws.
A "cyber predator" is someone who uses theinternet to exploit someone else: financially,sexually, emotionally, or psychologically. Theanonymity of the internet allows online predatorsto establish relationships of trust with youngpeople where none should exist.ResourcesPresentation with linked video (internet required) allows forclassroom exploration and discussion of online safety. NetSmartz Real Life StoriesState CTAP Cyber Predator linksShort Online Safety QuizFBI-SOS: Safe Online Searching
Software that allows anyone with the same software to copy files from your PC. Peer-2-peer files-haring, or P2P, is using software to share files with anyone over the internet. Kazaa, Limewire, and BitTorrent are some examples of file-sharing software. The original Napster was also a file-sharing program that gained wide-spread attention.Resources Presentation reviews the legality and dangers of downloading and P2P file sharing. State CTAP Piracy links
Personal information can be used to identify you, your location or your financial assets. Obvious: your name, age, sex, picture, phone number, address/location. Less obvious: hobbies, interests, school mascot, online group memberships Too much personal information puts users at risk, can lead to physical harm or identity theft . The information can also be used for scamming, spamming and phishing.Resources Thats Not Cool State CTAP Website: Identity Safety
Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery, exclusion and stalking. Cyberbullies may use email, chat rooms, discussion forums, instant messaging, cell phone text messaging or popular teen web sites such as MySpace or Facebook.Resources Cyberbullying Videos from NetSmartz Cyberbullying: Feathers in the Wind Cyberbullying: You Cant Take it Back Cyberbullying: Broken Friendship NetSmart Teens State CTAP Website - Cyberbullying- visit the State CTAP Cyberbullying site for a range of resources for educators, parents, and students.
http://kids.yahoo.com/parents/online-safety http://kids.yahoo.com/parents/online-safety/1701--TheA Parents Guide to Internet Safety - FBI Parents Guide State CTAP Site - Administrator Resources for PTA Meetings
Lingo Bingo What internet chat terms do you know? (The answers are included on page two.) A PowerPoint(TM) game on safe and appropriate intenet use, created by CTAP Region IV. All files and links contained in this presentation can be found at this CTAP website: http://ctap10.org/easi-u