SlideShare a Scribd company logo
1 of 10
California Technology Assistance
              Project, Region 10
 The Chavez Bill (AB307) requires the
 guidelines and criteria to include a
 component to educate pupils and teachers
 on the appropriate and ethical use of
 information technology in the classroom,
 Internet safety, avoiding plagiarism, the
 concept, purpose, and significance of a
 copyright so that pupils can distinguish
 between lawful and unlawful online
 downloading, and the implications of illegal
 peer-to-peer network file sharing.
AUP stands for Acceptable Use Policy. All
districts should have a policy that is signed
annually by students and parents.

Resources
This presentation (.ppt) was created to review your district's Acceptable
Use Policy (AUP) and discuss with students what they are agreeing to by
signing this document. Instructors should have copies of their district's
Student AUP available for this discussion.
AUP    links from myctap.org
Students will understand the importance of
following copyright guidelines, see how students
can take advantage of Fair Use Guidelines, learn
what plagiarism means, and see the need to cite
sources.

Resources
Presenation  to review copyright and fair use policies as they
apply to students.
Copyright and Fair Use Lesson from Read, Write, Think
B4UCopy.org  - The B4UCopy educational program from the
Business Software Alliance has a goal of raising awareness of
copyright laws and reinforce responsible behavior online.
Download the free curriculum for elementary and middle school
students [B4UCopy.com/kids] or the high school curriculum [
B4UCopy.org/teens] on copyright laws.
A "cyber predator" is someone who uses the
internet to exploit someone else: financially,
sexually, emotionally, or psychologically. The
anonymity of the internet allows online predators
to establish relationships of trust with young
people where none should exist.

Resources
Presentation with linked video (internet required) allows for
classroom exploration and discussion of online safety. 
NetSmartz Real Life Stories
State CTAP Cyber Predator links
Short Online Safety Quiz
FBI-SOS: Safe Online Searching
 Software  that allows anyone with the same
  software to copy files from your PC.
 Peer-2-peer files-haring, or P2P, is using
  software to share files with anyone over the
  internet.
 Kazaa, Limewire, and BitTorrent are some
  examples of file-sharing software. The
  original Napster was also a file-sharing
  program that gained wide-spread attention.
Resources
   Presentation reviews the legality and dangers of downloading and
    P2P file sharing.
   State CTAP Piracy links
 Personal information can be used to identify you,
  your location or your financial assets. Obvious:
  your name, age, sex, picture, phone number,
  address/location. Less obvious: hobbies,
  interests, school mascot, online group
  memberships
 Too much personal information puts users at
  risk, can lead to physical harm or identity theft .
  The information can also be used for scamming,
  spamming and phishing.

Resources
   That's Not Cool
   State CTAP Website: Identity Safety
   Cyberbullying is the use of technology for social cruelty,
    which can include harassment, impersonation,
    denigration, trickery, exclusion and stalking.
   Cyberbullies may use email, chat rooms, discussion
    forums, instant messaging, cell phone text messaging or
    popular teen web sites such as MySpace or Facebook.

Resources
   Cyberbullying Videos from NetSmartz
     Cyberbullying: Feathers in the Wind
     Cyberbullying: You Can't Take it Back
     Cyberbullying: Broken Friendship
   NetSmart Teens 
   State CTAP Website - Cyberbullying- visit the State CTAP Cyberbullying
    site for a range of resources for educators, parents, and students.
 http://kids.yahoo.com/parents/online-safety
 http://kids.yahoo.com/parents/online-safety/1701--The


A  Parent's Guide to Internet Safety - FBI
  Parent's Guide
 State CTAP Site - Administrator Resources for
  PTA Meetings
 Lingo  Bingo What internet chat terms do you
  know? (The answers are included on page
  two.)
 A PowerPoint(TM) game on safe and
  appropriate intenet use, created by CTAP
  Region IV.
 All files and links contained in this
  presentation can be found at this CTAP
  website: http://ctap10.org/easi-u

More Related Content

What's hot

Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
Areeb Khan
 
Internet safety cyberbullying
Internet safety cyberbullyingInternet safety cyberbullying
Internet safety cyberbullying
JMFarkas
 

What's hot (20)

How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Lis580 seminargroup3
Lis580 seminargroup3Lis580 seminargroup3
Lis580 seminargroup3
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Internet safety cyberbullying
Internet safety cyberbullyingInternet safety cyberbullying
Internet safety cyberbullying
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
 
Advantage and disadvantage of the internet
Advantage and disadvantage of the internetAdvantage and disadvantage of the internet
Advantage and disadvantage of the internet
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Viewers also liked (6)

Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)
 
Meagan mason powerp
Meagan mason powerpMeagan mason powerp
Meagan mason powerp
 
Tech project pp
Tech project ppTech project pp
Tech project pp
 
Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher Education
 
ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16
 
Social media used in higher education
Social media used in higher educationSocial media used in higher education
Social media used in higher education
 

Similar to Ethical and safe internet use

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
Parent meeting
Parent meetingParent meeting
Parent meeting
lightb
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
mribera87
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 

Similar to Ethical and safe internet use (20)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
EMPOWERMENT.pptx
EMPOWERMENT.pptxEMPOWERMENT.pptx
EMPOWERMENT.pptx
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Ethical and safe internet use

  • 1. California Technology Assistance Project, Region 10
  • 2.  The Chavez Bill (AB307) requires the guidelines and criteria to include a component to educate pupils and teachers on the appropriate and ethical use of information technology in the classroom, Internet safety, avoiding plagiarism, the concept, purpose, and significance of a copyright so that pupils can distinguish between lawful and unlawful online downloading, and the implications of illegal peer-to-peer network file sharing.
  • 3. AUP stands for Acceptable Use Policy. All districts should have a policy that is signed annually by students and parents. Resources This presentation (.ppt) was created to review your district's Acceptable Use Policy (AUP) and discuss with students what they are agreeing to by signing this document. Instructors should have copies of their district's Student AUP available for this discussion. AUP links from myctap.org
  • 4. Students will understand the importance of following copyright guidelines, see how students can take advantage of Fair Use Guidelines, learn what plagiarism means, and see the need to cite sources. Resources Presenation to review copyright and fair use policies as they apply to students. Copyright and Fair Use Lesson from Read, Write, Think B4UCopy.org  - The B4UCopy educational program from the Business Software Alliance has a goal of raising awareness of copyright laws and reinforce responsible behavior online. Download the free curriculum for elementary and middle school students [B4UCopy.com/kids] or the high school curriculum [ B4UCopy.org/teens] on copyright laws.
  • 5. A "cyber predator" is someone who uses the internet to exploit someone else: financially, sexually, emotionally, or psychologically. The anonymity of the internet allows online predators to establish relationships of trust with young people where none should exist. Resources Presentation with linked video (internet required) allows for classroom exploration and discussion of online safety.  NetSmartz Real Life Stories State CTAP Cyber Predator links Short Online Safety Quiz FBI-SOS: Safe Online Searching
  • 6.  Software that allows anyone with the same software to copy files from your PC.  Peer-2-peer files-haring, or P2P, is using software to share files with anyone over the internet.  Kazaa, Limewire, and BitTorrent are some examples of file-sharing software. The original Napster was also a file-sharing program that gained wide-spread attention. Resources  Presentation reviews the legality and dangers of downloading and P2P file sharing.  State CTAP Piracy links
  • 7.  Personal information can be used to identify you, your location or your financial assets. Obvious: your name, age, sex, picture, phone number, address/location. Less obvious: hobbies, interests, school mascot, online group memberships  Too much personal information puts users at risk, can lead to physical harm or identity theft . The information can also be used for scamming, spamming and phishing. Resources  That's Not Cool  State CTAP Website: Identity Safety
  • 8. Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery, exclusion and stalking.  Cyberbullies may use email, chat rooms, discussion forums, instant messaging, cell phone text messaging or popular teen web sites such as MySpace or Facebook. Resources  Cyberbullying Videos from NetSmartz  Cyberbullying: Feathers in the Wind  Cyberbullying: You Can't Take it Back  Cyberbullying: Broken Friendship  NetSmart Teens   State CTAP Website - Cyberbullying- visit the State CTAP Cyberbullying site for a range of resources for educators, parents, and students.
  • 9.  http://kids.yahoo.com/parents/online-safety  http://kids.yahoo.com/parents/online-safety/1701--The A Parent's Guide to Internet Safety - FBI Parent's Guide  State CTAP Site - Administrator Resources for PTA Meetings
  • 10.  Lingo Bingo What internet chat terms do you know? (The answers are included on page two.)  A PowerPoint(TM) game on safe and appropriate intenet use, created by CTAP Region IV.  All files and links contained in this presentation can be found at this CTAP website: http://ctap10.org/easi-u