Your SlideShare is downloading. ×
0
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Personal safety gr5 unit ppt
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Personal safety gr5 unit ppt

2,003

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,003
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
21
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Cyber Bullies are another unfortunate danger many kids face online. Sometimes it can come across as harmless, but to kids any type of bullying can have adverse effects and result in low self esteem, depression, etc. Students use chat, IM, websites, and more to joke, poke fun of, and threaten others. Online one can find sites devoted to ranking the ugliest student at school. Sometimes after a fight a friend will become an enemy as what was meant to be a private email is forwarded to others. Indeed some people say things which are meant to be taken one way but with only a computer screen facing the receiver, they are taken completely wrong. Bullying escalates and becomes a bigger problem. Perhaps more so then schoolyard bullying ever was because ANYONE can do it or be on the receiving end of it.
  • Identity theft has gone high tech. Pretending to be your bank, ebay, paypal, or other institution, identity thieves mimic the logos, email address, etc. to request you to confirm personal information, etc. Even typing in your personal information and credit card number online presents a risk to thieves. Another way to access personal info is through old fashioned hacking. If you are online you should be running firewalls and other security software to protect your computer and your information.
  • It is best to act smartly when online. These 4 R’s can apply to many online safety hazards. For example – being aware of how a predator finds the victim and understanding that people online are strangers, allows one to act appropriately when faced with those situations: R ECOGNIZE techniques used by online predators to deceive or intimidate their victims. R EFUSE requests for personal information or a face-to-face meeting. R ESPOND assertively by exiting the program, logging off, or turning off the computer. R EPORT any suspicious or dangerous contact that makes you or your child feel uncomfortable. The 4 R’s also hold true for cyber bullying: R ECOGNIZE ‘flaming’ and cyber bullying techniques and the bully’s screen name or address. R EFUSE to open or read any message from a cyber bully. R ESPOND assertively by leaving the chat room without responding or the letter unopened. R EPORT cyber bullying to the ISP, the school, or law enforcement as needed to stop it immediately. And it is also true for identity theft scams. By being aware of the latest ploys such as phishing emails (sending what looks like a reputable email asking for personal information) one is better equipped to deal appropriately with them. R ECOGNIZE techniques used by identity thieves to obtain people’s personal information. R EFUSE to provide personal information by phone or email if you didn’t initiate the communication. R ESPOND assertively by contacting the three U.S. credit bureaus and put a fraud alert on your credit. R EPORT any unusual, suspicious, or fraudulent activities to law enforcement authorities.
  • Transcript

    • 1. Personal Safety Unit - Level 5
    • 2. Today you will be learning about personal safety when online. This unit consists of four mini lessons. The PPT covers all lessons in the unit, with a spacer slide between the lessons. The Plan
      • Safeguarding Your Identity Online: Screen Names and Passwords
      • Protecting Personal Information
      • Online Strangers, Predators, and the Grooming Process
      • Online Personal Safety Review and Action
    • 3. Lesson 1 Safeguarding Your Identity Online: Screen Names and Passwords
    • 4. Cyberspace What is Cyberspace, and how do we get there? What are some of the ways we communicate in Cyberspace?
    • 5. Online ID – What can you tell ?
      • Directions: Look at the user names below. As a class, brainstorm what each says about the person who chose it. Then put the names in order from least informative to most informative.
              • Jessica4dance
              • Smithstealshome
              • Bayareababe
              • dancinfun
              • Fred14
    • 6. Discussion
      • Think about your own screen name. What does it say about you?
      • When you choose a screen name you want something that allows you to remain anonymous, or unknown. Don’t include personal information.
      • Why do you think you shouldn’t include personal information?
      • What are some of the dangers?
    • 7. Screen Names
      • Screen names should never contain or refer to:
        • first and/or last name
        • address
        • phone number
        • date of birth (complete or partial) or age
        • social security number
        • email address
        • combinations of personal information such as listed above
        • combinations of personal information such as listed above plus descriptions such as (but not limited to ) gender, school name, favorite sport, favorite celebrity, family member names
      [email_address] marcy14inSanFran tiger1234
    • 8. Password Protection
      • Directions : Look at the information about each person below. What are some common and obvious guesses as to what their passwords might be? Brainstorm a list for each one.
      •  
      • John – John lives in the Tampa Bay area where the Bucs play. He is a really big fan. He loves football.
      • 2. Jessica – Jessica loves all the popular music groups. She is head over heels in love with Justin Timberlake.
      • 3. Ali – Ali is afraid to forget her password. She wanted something simple she could always remember.
    • 9. Discussion
      • Think about your own password.
      • - Is it something obvious?
      • - Could someone easily guess it?
      • - Does anyone else know it?
      • When someone knows or can guess your password you could be in trouble. This allows them access to you. They could pretend to be you.
      What types of dangers are involved when others know or can guess your password?
    • 10. Passwords
      • Follow these rules for creating a safe passwords:
      • be lengthy – at least 8 characters
      • contain a combination of letters, numbers, and symbols
      • be changed when its secrecy is in doubt
        • should not contain personal information
        • should not be shared
        • should not be easily guessed
        • should not be provided in an email, even if requested
    • 11. Remember
      • It is important to select safe and secure screen names and passwords.
      • Think about it: What should you NEVER reveal in either?
      • Think about it: What is your screen name and password? Do you think you need to change it? Why/Why not?
    • 12. Lesson 2 Protecting Personal Information
    • 13. Make sure you have a copy of the resource page to review: The FBI Internet Safety Tips i-SAFE’s 4’R’s R ECOGNIZE R EFUSE R ESPOND R EPORT
    • 14. N ever give out personal information such as your name, home address, school name, or telephone number in a chat room or on bulletin boards. (Includes IMs, blogs, etc.) Never write to someone who has made you feel uncomfortable or scared, even if you or your parents know who they are. The FBI Internet Safety Tips
    • 15. Do not meet someone you have only met on the Internet without the permission of your parents. That includes having them visit you. Tell your parents right away if you read anything on the Internet that makes you feel uncomfortable. The FBI Internet Safety Tips Remember that people online may not be who they say they are.
    • 16. Remember that people online may not be who they say they are.
    • 17. Brainstorm
      •          Why do students feel safe on the Internet?
      •          What are some dangers on the Internet?
      •          What are some good things on the Internet?
      •          How can you stay away from the dangerous things?
    • 18. One-way to stay safe, is to avoid revealing any information about oneself online
      • Never tell anyone:
      • Your name
      • Address
      •         Phone number
      •       Age
      •         Gender
      •        Family Names
      •         School
      •         Never give a stranger your picture
      • These are all considered to be identifying or personal information.
    • 19. Lesson 3 Online Strangers, Predators, and the Grooming Process
    • 20. Talk About It
      • How many of you use the internet?
      • How many of you go online alone?
      • What do you like to do online?
      • Is it your intention to be talking to adults while online?
      • How do you know if someone is your own age when online?
    • 21. Strangers
      • What is your definition of a stranger?
      • What are common rules/advice for dealing
      • with strangers in the physical world?
    • 22. Online Predators
      • Some people lie about who they are and what they want on the Internet for various reasons.
      • Sometimes it is to steal an identity or to bully.
      • Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators .
    • 23. Predators and Prey KEY point: A predator is one who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them. KEY point: One who is a victim or one who is vulnerable to victimization by a predator is prey . How do these terms apply to the online environment?
    • 24. Minimize Dangers
      • Choose screen name carefully
      • Don’t reveal information online
      • Choose people to communicate with online carefully
      • No matter what – Tell an adult if you are made to feel uncomfortable online.
      • Tell an adult if you are approached by someone who discusses inappropriate things or wants to meet you offline.
    • 25. Review
      • Anyone met online is a stranger.
      • What are the steps a predator uses to groom a potential victim?
      • It is important to avoid revealing personal information online so that you are not targeted by strangers online.
      • It is important to report online strangers that make you feel uncomfortable, ask for personal information, or request a face to face meeting.
    • 26. Lesson 4 Online Personal Safety Review and Action
    • 27. Cyber Bullying Sending or posting harmful or cruel text or images using the Internet or other digital media source.
      • The Facts:
      • The Internet is a tool used to bully
      • People feel removed from what they say online – they feel anonymous.
      • Unexpected participants – anyone can join in.
      • 1 in 5 youth will be faced with a hurtful or mean message while online.
    • 28. Identity Theft
      • The Facts:
      • Posting personal information online makes it available for others to steal.
      • With your personal information, someone can pretend to be you – use your credit card or bank account to buy things that you don’t know about.
      • Personal information can also be stolen from you if you respond to emails from strangers.
    • 29. A Little Prevention…
      • Prepare yourself - Many online problems can be avoided or dealt with safely. Keep in mind the 4 R’s
          • R ECOGNIZE
          • R EFUSE
          • R ESPOND
          • R EPORT
    • 30. That’s a wrap!
      • You now know the tips and tools that can help keep you safe online! Just remember, when you’re online you aren’t invincible.

    ×