Online Safety 2.02 Remember the rules of online safety.
Never   disclose personal information <ul><li>Full name  </li></ul><ul><li>Home address </li></ul><ul><li>Phone number </l...
Do you have a My Space account? <ul><li>According to the article published by Scott J. Cech,  “ . . ., a significant perce...
Personal Safety – Warning Signs <ul><li>What does online yelling look like? </li></ul><ul><ul><li>What should you do if so...
Safeguard against financial risk <ul><li>If purchasing something online, make sure that the site is secure. </li></ul><ul>...
What are computer hazards? <ul><li>Viruses  –  software that attaches to programs installed on a computer or that are prog...
Protect against online hazards <ul><li>Beware of any emails or sites that promise you will get rich quick. </li></ul><ul><...
Upcoming SlideShare
Loading in...5
×

Online Safety

576

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
576
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • 2.02 Online Safety
  • 2.02 Online Safety
  • 2.02 Online Safety
  • 2.02 Online Safety
  • 2.02 Online Safety
  • 2.02 Online Safety
  • 2.02 Online Safety
  • Online Safety

    1. 1. Online Safety 2.02 Remember the rules of online safety.
    2. 2. Never disclose personal information <ul><li>Full name </li></ul><ul><li>Home address </li></ul><ul><li>Phone number </li></ul><ul><li>Social security number </li></ul><ul><li>Passwords </li></ul><ul><li>Names of family members </li></ul><ul><li>Credit card numbers </li></ul><ul><li>Your photograph </li></ul>2.02 Rememberl the rules of online safety. Slide Watch the video “Tracking Teresa” at http://www.netsmartz.org/resources/reallife.htm Watch the video Teens PSA: “Promises” at http://www.netsmartz.org/resources/psas.htm . Why?
    3. 3. Do you have a My Space account? <ul><li>According to the article published by Scott J. Cech, “ . . ., a significant percentage of colleges and universities sometimes dig into would-be undergraduates’ social networking profiles.” </li></ul><ul><li>The article describes how some college admissions officers research a potential student’s Internet information to assist in the careful and limited selection of students. “No school wants to give a very prestigious scholarship to some [student] who’s going to show up in the newspaper the next day with pictures of [student] standing on a beer keg.” </li></ul><ul><li>Employers are also investigating social networking profiles of potential employees. </li></ul>2.02 Rememberl the rules of online safety. Slide <ul><li>View the article at http://www.edweek.org/ew/articles/2007/12/19/16applicants.h27.html?tmp=582024897 </li></ul>
    4. 4. Personal Safety – Warning Signs <ul><li>What does online yelling look like? </li></ul><ul><ul><li>What should you do if someone is yelling at you online? </li></ul></ul><ul><li>What is a cyberbully? </li></ul><ul><ul><li>What should you do if you are bullied online? </li></ul></ul><ul><li>What should you do if someone sends you explicit materials? </li></ul>2.02 Rememberl the rules of online safety. Slide Watch the cyberbullying videos at http://www.netsmartz.org/resources/reallife.htm View the article about the fatal result of bullying at http://stcharlesjournal.stltoday.com/articles/2007/11/26/news/sj2tn20071110-1111stc_pokin_1.ii1.txt
    5. 5. Safeguard against financial risk <ul><li>If purchasing something online, make sure that the site is secure. </li></ul><ul><ul><li>The URL should begin with http s : </li></ul></ul><ul><ul><li>A lock icon is displayed and is interactive – not just a graphic image. </li></ul></ul><ul><ul><li>Does the site contain a site seal? </li></ul></ul><ul><ul><ul><li>Many, but not all sites will contain a seal that is highly visible and difficult to copy which indicates a safe site. </li></ul></ul></ul>2.02 Rememberl the rules of online safety. Slide
    6. 6. What are computer hazards? <ul><li>Viruses – software that attaches to programs installed on a computer or that are programmed to load when an email is opened. </li></ul><ul><li>Spam – unwanted emails from advertisers and users that contain malicious and explicit material or try to sell products or services . </li></ul><ul><li>Spyware – malicious software designed to take partial control of a computer’s operation without the knowledge or consent of the user. Often used to track a user’s browsing and spending habits while online and also to mine for personal information. </li></ul>2.02 Rememberl the rules of online safety. Slide
    7. 7. Protect against online hazards <ul><li>Beware of any emails or sites that promise you will get rich quick. </li></ul><ul><ul><li>These emails are usually a way for hackers to mine your computer for personal or financial information. </li></ul></ul><ul><li>Never open an email from someone you do not know. </li></ul><ul><li>Never download programs unless you know they are safe and contain no hidden files. </li></ul>2.02 Rememberl the rules of online safety. Slide
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×