Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Online Safety

1,575 views

Published on

Online safety concerns

Published in: Education, Technology
  • Be the first to comment

Online Safety

  1. 1. Online Safety<br />Janetta Garton<br />Technology Curriculum Director<br />Willard R-II School District<br />http://www.willard.k12.mo.us/co/tech/safety.htm<br />
  2. 2. District Policy<br />Policy that must be signed by students, parents, and staff prior to gaining access to the school’s network and the Internet. <br />Unfortunately, to be legally binding, these policies often are written in a language unfamiliar to students. <br />It is important to discuss this policy with your students in terms they can understand. <br />Image Credit: School Rules by Zac-Attack<br />
  3. 3. Image Credit: Alleke by kellyandapril<br />
  4. 4. Access to Inappropriate Content<br />We do have a district filter. This software is used to strain out inappropriate sites. However, you cannot depend solely on this filter to insure that your students are visiting only appropriate web sites. <br />Inappropriate content could be:<br />hate sites <br />sites that promote delinquency (weapons, drugs, fake ids, explosives)<br />pornography sites<br />gambling sites<br />Gates to Inappropriate Content<br />advertisements: click the blinking banner<br />searching: inappropriate sites appear in the search results<br />typo squatting: a site’s url uses a misspelling of an appropriate sites (funbrain.com & funbrian.com) or slight variation (whitehouse.gov & whitehouse.com) <br />spam messages<br />Image Credit: Kintana by Matt & Helen Hamm<br />
  5. 5. Internet Offenders manipulate young people into criminal sexual relationships by appealing to young people’s desire to be appreciated, understood, take risks, and find out about sex.<br />Predators will:<br />use chat rooms<br />look at profiles targeting kids who are looking for attention, don’t have much attention from parent’s at home, and parents that aren’t too tech savy<br />try to get as much personal information as possible<br />send an invitation to a private chat<br />want to move on to email and phone<br />work toward a face to face meeting<br />establish a common ground by pretending to like the same things (music, movies, hobbies, sports, etc)<br />work to build trust by showing interest in everything discussed in chat, agreeing always with child’s opinions and viewpoints<br />may pose as a sponsor to recruit individuals for a competition, event, club, etc<br />discourage discussing this relationship with anyone<br />start introducing sexual content<br />Signs that may a child be involved with predator:<br />watch for diminished communication about what they are doing online<br />minimizing of screen when you approach <br />unexplained phone calls or absences<br />Image Credit: 2366008863_2edb503a94_o by DarthAbraham<br />
  6. 6. Cyberbullying <br />use of technology to spread rumors and gossip <br />post pictures of someone without their consent <br />steal passwords to assume someone else’s identity <br />disseminate private information <br />and threaten or harass with offensive language <br />Cyberthreats <br />threats or “distressing material” <br />statements that make it sound like the writer is emotionally upset and <br />may be considering harming someone else, or him/herself.<br />Schools <br />place restrictions on student speech that appears to be sponsored by the school, <br />or that is necessary to maintain an appropriate school climate. <br />This applies to student speech through the district Internet system or via cell phones used at school. <br />For online speech posted when off-campus, <br />there must be a substantial and material threat of disruption on campus.<br />Law enforcement officials should be contacted when the situation involves: <br />Making threats of violence to people or their property.<br />Engaging in coercion <br />obscene or harassing calls/messages<br />Harassment or stalking.<br />Hate or bias crimes<br />Creating or sending sexually explicit images <br />Sexual exploitation.<br />Taking a photo of someone in place where privacy is expected (like a locker room)<br />Addressing Cyber Bullying and Threats<br />Safe School Committee Needs Assessment<br />Policy & Practice<br />Professional Development<br />Parent/Community Education<br />Student Education<br />See the 2 flowcharts in the handout: Cyberbullying or Cyberthreat Situation Review Process & School Actions and Options<br />Image Credit: Predator & Alien by Maigh<br />
  7. 7. Intellectual property <br />refers to creations of the mind such as: musical, literary, and artistic work; inventions; and symbols, names, images, and designs. <br />The holder of this property has certain exclusive rights, copyright, which is automatic upon creation. <br />Just because something is online doesn’t mean it’s legal to copy, download, or use. <br />Piracy <br />Piracy is the unauthorized use of material which is covered by copyright law<br />Piracy causes economic harm to the copyright holders. <br />Plagiarism <br />Copying and pasting text from on-line<br />Transcribing text <br />Using photographs, video or audio without permission or acknowledgment <br />Using another person&apos;s work and claiming it as your own, even with permission  <br />Acquiring work from commercial sources<br />Translation from one language to another <br />Using an essay that you wrote for another class/another purpose without getting permission from the teacher/professor of both the current class and the class for which the original work was used<br />Peer to Peer Network<br />uses connectivity and the cumulative bandwidth of participants in a network, as opposed to servers providing the service. <br />Some illegally distribute copyrighted materials. <br />Virus, spyware, and pornography are also available <br />Often these files are labeled so as to attract students to download them. <br />Users of the site can be held accountable for copyright infringement. <br />Image Credit: Shhh, It Be the Little Lass&apos; Treasure I Be Steal&apos;n by Cayusa<br />
  8. 8. Malicious code <br />software created to cause damage, steal information, or use up resources on a computer or a network.<br />Viruses<br />programs that alter the way a computer operates without the permission or knowledge of the user. <br />can impair and seriously damage your computer (or network server) by executing random text, audio and video messages; draining memory; deleting files; corrupting programs; erasing the contents of your hard disk. <br />Worms<br />replicate themselves without the use a host file. <br />can overload networks and shut down communication<br />Trojan Horses<br />imposter files that claim to be something desirable<br />to spread, you must open email attachment or a downloaded file<br />Spyware <br />hide on your computer to steal information such as credit card numbers, email addresses, home addresses, and surfing habits<br />majority of it is adware, designed to capture “anonymous” data for targeted advertising. <br />usually just an annoyance<br />often bundled in other software that you install, but can also be acquired by simply accessing a webpage. <br />Signs of Spyware<br />You receive more pop-ups than usual.<br />Your computer runs slowly.<br />Icons appear on your desktop or task bar.<br />Your default browser is changed. Spyware <br />hide on your computer to steal information such as credit card numbers, email addresses, home addresses, and surfing habits<br />majority of it is adware, designed to capture “anonymous” data for targeted advertising. <br />usually just an annoyance<br />often bundled in other software that you install, but can also be acquired by simply accessing a webpage. <br />Signs of Spyware<br />You receive more pop-ups than usual.<br />Your computer runs slowly.<br />Icons appear on your desktop or task bar.<br />Your default browser is changed.<br />You hear your hard drive running even when you are not using the computer.<br />Firewalls, anti-virus, and anti-spyware software address these issues. <br />Keeping your operating system and other software up-to-date, and <br />setting your browser’s security settings to medium or higher is important. <br />You hear your hard drive running even when you are not using the computer.<br />Firewalls, anti-virus, and anti-spyware software address these issues. <br />Keeping your operating system and other software up-to-date, and <br />setting your browser’s security settings to medium or higher is important. <br />Image Credit: Credit Card Theft by d70focus<br />
  9. 9. Identity Theft <br />theft of personal identifying information (name, address, credit card number, social security number) <br />and use of that data to open new charge accounts, order merchandise, or borrow money.<br />Phishing<br />seemingly credible e-mail/text message/popup that I<br />nstructs the user to visit a Web site where they are prompted to enter or update their personal information <br />May say your account has come under review, may be in danger of being suspended and/or cancelled, and some piece of information needs to be verified or updated. <br />often contain spelling or grammar errors.<br />Contact your merchant right away to ask for clarification<br />Spoofing<br />appears to have been sent from one source when it actually was sent from another <br />Any replies go legitimate e-mail account, not the real sender. <br />Legitimate user can find their Inbox bombarded with viruses, bounced e-mail, and in some cases can have their account suspended for violating its anti-spam policy. <br />Send a copy of the spoofed e-mail to the spoofed e-mail sender&apos;s ISP. <br />Spamming<br />unsolicited or undesired bulk messages <br />district has a spam filter <br />ePALs there is a spam control setting that teachers can calibrate <br />Willard Tiger Webmail has a Spam filter that you can activiate<br />Shopping Online<br />time saving convenience<br />Helpful consumer reviews <br />can put you at risk <br />Image Credit: Identity Thief as Paris by CarbonNYC<br />

×