SlideShare a Scribd company logo
Internet Safety
Be Responsible!
Make sure you report any
uncomfortable or unusual
situations to an adult!
What kind of information should we
keep private?
What is “PERSONAL”?
What do we mean by “PERSONAL INFORMATION”?
Source: buzzle.com
your home address your phone number
where you go to school
your passwords
Source: www.onextrapixel.com
Ask a parent before you create a username
Never include private information
TIPS:
Use the name of something
that will help
you remember your username:
Favorite Animal Toy CharacterFood
Always be sure your parents or an adult knows you are
using the Internet
Say “NO!” to anything that makes you uncomfortable
Keep personal information private
INFORM: Tell us something we want or need to know.
ADVERTISE: Feature a product (a toy or food or other item)
that somebody wants us to buy.
Websites usually are designed to inform or advertise.
1. Wash and dry a plastic berry
basket. ChooseCrayola Model
Magic® colorsto create a pattern
or design you like. These are some
ideas on how to decorate baskets to
give as gifts or use on your desk.
Source: www.crayola.com
What happens when we click on LINKS, POP-UPS or ADVERTISEMENTS?
Etiquette in person!
Netiquette online!
Source: http://teasleyes.typepad.com
3rd gradeinternetsafety

More Related Content

Similar to 3rd gradeinternetsafety

2008 Cyber Safety
2008 Cyber Safety2008 Cyber Safety
2008 Cyber Safety
reideva
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
kwazy
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
uKnow.com
 
Advertising Techniques
Advertising TechniquesAdvertising Techniques
Advertising Techniques
geepatty
 
Net Safety For Nss
Net Safety For NssNet Safety For Nss
Net Safety For Nss
guest84141f
 
Ask Without Fear! Fundraising Training in 20 minutes
Ask Without Fear! Fundraising Training in 20 minutesAsk Without Fear! Fundraising Training in 20 minutes
Ask Without Fear! Fundraising Training in 20 minutes
Marc A. Pitman
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 
From Car Seats to Car Keys
From Car Seats to Car KeysFrom Car Seats to Car Keys
From Car Seats to Car Keys
lexleeoverton
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
apieper
 
Common Advertising Strategies
Common Advertising StrategiesCommon Advertising Strategies
Common Advertising Strategies
kjhatzi
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
Amit Pal Singh
 
Internet safety
Internet safetyInternet safety
Internet safety
dsansford
 
Writing Killer PPC Ad Copy
Writing Killer PPC Ad CopyWriting Killer PPC Ad Copy
Writing Killer PPC Ad Copy
BrightEdge
 
Writing Killer Ad Copy
Writing Killer Ad CopyWriting Killer Ad Copy
Writing Killer Ad Copy
Elizabeth Marsten
 
Kiddies Alert Informed Children
Kiddies Alert   Informed ChildrenKiddies Alert   Informed Children
Kiddies Alert Informed Children
Deighton Gooden
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
peterhitch
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
Daniel Hanttula
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
CM Blog Slideshare TMyers.pptx
CM Blog Slideshare TMyers.pptxCM Blog Slideshare TMyers.pptx
CM Blog Slideshare TMyers.pptx
introtodigital
 
Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
Katherine Lyddon
 

Similar to 3rd gradeinternetsafety (20)

2008 Cyber Safety
2008 Cyber Safety2008 Cyber Safety
2008 Cyber Safety
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
 
Advertising Techniques
Advertising TechniquesAdvertising Techniques
Advertising Techniques
 
Net Safety For Nss
Net Safety For NssNet Safety For Nss
Net Safety For Nss
 
Ask Without Fear! Fundraising Training in 20 minutes
Ask Without Fear! Fundraising Training in 20 minutesAsk Without Fear! Fundraising Training in 20 minutes
Ask Without Fear! Fundraising Training in 20 minutes
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
From Car Seats to Car Keys
From Car Seats to Car KeysFrom Car Seats to Car Keys
From Car Seats to Car Keys
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
 
Common Advertising Strategies
Common Advertising StrategiesCommon Advertising Strategies
Common Advertising Strategies
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Writing Killer PPC Ad Copy
Writing Killer PPC Ad CopyWriting Killer PPC Ad Copy
Writing Killer PPC Ad Copy
 
Writing Killer Ad Copy
Writing Killer Ad CopyWriting Killer Ad Copy
Writing Killer Ad Copy
 
Kiddies Alert Informed Children
Kiddies Alert   Informed ChildrenKiddies Alert   Informed Children
Kiddies Alert Informed Children
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
CM Blog Slideshare TMyers.pptx
CM Blog Slideshare TMyers.pptxCM Blog Slideshare TMyers.pptx
CM Blog Slideshare TMyers.pptx
 
Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
 

More from GittaDenning

3rd gradeinternetsafety
3rd gradeinternetsafety3rd gradeinternetsafety
3rd gradeinternetsafety
GittaDenning
 
3rd gradedeweyreflection
3rd gradedeweyreflection3rd gradedeweyreflection
3rd gradedeweyreflection
GittaDenning
 
3rd gradeinternetsafety
3rd gradeinternetsafety3rd gradeinternetsafety
3rd gradeinternetsafety
GittaDenning
 
Forum3 udl progress
Forum3 udl progressForum3 udl progress
Forum3 udl progress
GittaDenning
 
5th gradeinferringplan
5th gradeinferringplan5th gradeinferringplan
5th gradeinferringplan
GittaDenning
 
Islma list serv_screenshot
Islma list serv_screenshotIslma list serv_screenshot
Islma list serv_screenshotGittaDenning
 
Islma list serv_screenshot
Islma list serv_screenshotIslma list serv_screenshot
Islma list serv_screenshotGittaDenning
 
7th gradebookselectionresourceslesson
7th gradebookselectionresourceslesson7th gradebookselectionresourceslesson
7th gradebookselectionresourceslesson
GittaDenning
 
7th gradebookselectionresourceslesson
7th gradebookselectionresourceslesson7th gradebookselectionresourceslesson
7th gradebookselectionresourceslesson
GittaDenning
 

More from GittaDenning (9)

3rd gradeinternetsafety
3rd gradeinternetsafety3rd gradeinternetsafety
3rd gradeinternetsafety
 
3rd gradedeweyreflection
3rd gradedeweyreflection3rd gradedeweyreflection
3rd gradedeweyreflection
 
3rd gradeinternetsafety
3rd gradeinternetsafety3rd gradeinternetsafety
3rd gradeinternetsafety
 
Forum3 udl progress
Forum3 udl progressForum3 udl progress
Forum3 udl progress
 
5th gradeinferringplan
5th gradeinferringplan5th gradeinferringplan
5th gradeinferringplan
 
Islma list serv_screenshot
Islma list serv_screenshotIslma list serv_screenshot
Islma list serv_screenshot
 
Islma list serv_screenshot
Islma list serv_screenshotIslma list serv_screenshot
Islma list serv_screenshot
 
7th gradebookselectionresourceslesson
7th gradebookselectionresourceslesson7th gradebookselectionresourceslesson
7th gradebookselectionresourceslesson
 
7th gradebookselectionresourceslesson
7th gradebookselectionresourceslesson7th gradebookselectionresourceslesson
7th gradebookselectionresourceslesson
 

Recently uploaded

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 

Recently uploaded (20)

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 

3rd gradeinternetsafety

  • 2. Make sure you report any uncomfortable or unusual situations to an adult!
  • 3. What kind of information should we keep private? What is “PERSONAL”? What do we mean by “PERSONAL INFORMATION”? Source: buzzle.com
  • 4. your home address your phone number where you go to school your passwords
  • 5. Source: www.onextrapixel.com Ask a parent before you create a username Never include private information TIPS: Use the name of something that will help you remember your username: Favorite Animal Toy CharacterFood
  • 6. Always be sure your parents or an adult knows you are using the Internet Say “NO!” to anything that makes you uncomfortable Keep personal information private
  • 7. INFORM: Tell us something we want or need to know. ADVERTISE: Feature a product (a toy or food or other item) that somebody wants us to buy. Websites usually are designed to inform or advertise.
  • 8. 1. Wash and dry a plastic berry basket. ChooseCrayola Model Magic® colorsto create a pattern or design you like. These are some ideas on how to decorate baskets to give as gifts or use on your desk. Source: www.crayola.com
  • 9. What happens when we click on LINKS, POP-UPS or ADVERTISEMENTS?
  • 10. Etiquette in person! Netiquette online! Source: http://teasleyes.typepad.com

Editor's Notes

  1. Make list on dry erase board with input from students
  2. Based on list developed on previous page, reveal one by one to see if we covered everything.
  3. Overall checklist – addressing the need to have a parent or adult available to supervise and help you navigate.