SlideShare a Scribd company logo
Personal Safety Unit - Level 5
Today you will be learning about personal safety when online.  This unit consists of four mini lessons. The PPT covers all lessons in the unit, with a spacer slide between the lessons. The Plan ,[object Object],[object Object],[object Object],[object Object]
Lesson 1 Safeguarding Your Identity Online: Screen Names and Passwords
Cyberspace What is Cyberspace, and how do we get there? What are some of the ways we communicate in Cyberspace?
Online ID – What can you tell ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion ,[object Object],[object Object],[object Object],[object Object]
Screen Names ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[email_address] marcy14inSanFran tiger1234
Password Protection   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion ,[object Object],[object Object],[object Object],[object Object],[object Object],What types of dangers are involved when others know or can guess  your password?
Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Remember ,[object Object],[object Object],[object Object]
Lesson 2 Protecting Personal Information
Make sure you have a copy of the resource page to review:  The FBI Internet Safety Tips   i-SAFE’s 4’R’s R ECOGNIZE R EFUSE R ESPOND R EPORT
N ever give out personal information such as your name, home address, school name, or telephone number in a chat room or on bulletin boards. (Includes IMs, blogs, etc.) Never write to someone who has made you feel uncomfortable or scared, even if you or your parents know who they are. The FBI Internet Safety Tips
  Do not meet someone you have only met on the Internet without the permission of your parents.  That includes having them visit you.   Tell your parents right away if you read anything on the Internet that makes you feel uncomfortable. The FBI Internet Safety Tips Remember that people online may not be who they say they are.
Remember that people online may not be who they say they are.
Brainstorm ,[object Object],[object Object],[object Object],[object Object]
One-way to stay safe, is to avoid revealing any information about oneself online   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Lesson 3 Online Strangers, Predators, and the Grooming Process
Talk About It ,[object Object],[object Object],[object Object],[object Object],[object Object]
Strangers ,[object Object],[object Object],[object Object]
Online Predators ,[object Object],[object Object],[object Object]
Predators and Prey KEY point: A  predator  is one who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.  KEY point:   One who is a victim or one who is vulnerable to victimization by a  predator  is  prey . How do these terms apply to the online environment?
Minimize Dangers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Review ,[object Object],[object Object],[object Object],[object Object]
Lesson 4 Online Personal Safety Review and Action
Cyber Bullying  Sending or posting harmful or cruel text or images using the Internet or other digital media source. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Theft  ,[object Object],[object Object],[object Object],[object Object]
A Little Prevention… ,[object Object],[object Object],[object Object],[object Object],[object Object]
That’s a wrap! ,[object Object]

More Related Content

What's hot

Types of bullying with pic
Types of bullying with picTypes of bullying with pic
Types of bullying with pic
brlewis1971
 
Conflict resolution youth version power point
Conflict resolution youth version power pointConflict resolution youth version power point
Conflict resolution youth version power point
Jeff Hunter
 
Anger Management
Anger ManagementAnger Management
Anger Managementkktv
 
6th Grade Bullying Presentation
6th Grade Bullying Presentation6th Grade Bullying Presentation
6th Grade Bullying Presentation
babsreed
 
Lesson 80 area of a rectangle and a square
Lesson 80 area of a rectangle and a squareLesson 80 area of a rectangle and a square
Lesson 80 area of a rectangle and a square
SAO Soft
 
Responding to Academically Distressed Students
Responding to Academically Distressed StudentsResponding to Academically Distressed Students
Responding to Academically Distressed Students
Mr. Ronald Quileste, PhD
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying PowerpointUSAteacher
 
Castle powerpoint
Castle powerpoint Castle powerpoint
Castle powerpoint cczulada
 
Bullying
BullyingBullying
Bullying
SJHubler
 
Personality Test
Personality TestPersonality Test
Personality Test
pggohel
 
Exam Preparation And stress
Exam Preparation And stressExam Preparation And stress
Exam Preparation And stress
Northampton College
 
Inappropriate language.pptx
Inappropriate language.pptxInappropriate language.pptx
Inappropriate language.pptx
Gambhir5
 
Managing Emotions (EQ)
Managing Emotions (EQ)Managing Emotions (EQ)
Managing Emotions (EQ)
Seta Wicaksana
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
Queens Library
 
Assertive Communication Skills: How To Be Assertive Without Losing Your Cool
Assertive Communication Skills: How To Be Assertive Without Losing Your CoolAssertive Communication Skills: How To Be Assertive Without Losing Your Cool
Assertive Communication Skills: How To Be Assertive Without Losing Your Cool
Michael Lee
 
Healthy and unhealthy relationships
Healthy and unhealthy relationshipsHealthy and unhealthy relationships
Healthy and unhealthy relationships
JoshuaDaniel63
 
Bullying slideshow
Bullying slideshowBullying slideshow
Bullying slideshowLeelarn
 
Preventing School Bullying
Preventing School BullyingPreventing School Bullying
Preventing School BullyingEDITHA HONRADEZ
 
safe and unsafe touch.pptx
safe and unsafe touch.pptxsafe and unsafe touch.pptx
safe and unsafe touch.pptx
kawal20
 

What's hot (20)

Types of bullying with pic
Types of bullying with picTypes of bullying with pic
Types of bullying with pic
 
Conflict resolution youth version power point
Conflict resolution youth version power pointConflict resolution youth version power point
Conflict resolution youth version power point
 
Anger Management
Anger ManagementAnger Management
Anger Management
 
6th Grade Bullying Presentation
6th Grade Bullying Presentation6th Grade Bullying Presentation
6th Grade Bullying Presentation
 
Bullying
BullyingBullying
Bullying
 
Lesson 80 area of a rectangle and a square
Lesson 80 area of a rectangle and a squareLesson 80 area of a rectangle and a square
Lesson 80 area of a rectangle and a square
 
Responding to Academically Distressed Students
Responding to Academically Distressed StudentsResponding to Academically Distressed Students
Responding to Academically Distressed Students
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 
Castle powerpoint
Castle powerpoint Castle powerpoint
Castle powerpoint
 
Bullying
BullyingBullying
Bullying
 
Personality Test
Personality TestPersonality Test
Personality Test
 
Exam Preparation And stress
Exam Preparation And stressExam Preparation And stress
Exam Preparation And stress
 
Inappropriate language.pptx
Inappropriate language.pptxInappropriate language.pptx
Inappropriate language.pptx
 
Managing Emotions (EQ)
Managing Emotions (EQ)Managing Emotions (EQ)
Managing Emotions (EQ)
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Assertive Communication Skills: How To Be Assertive Without Losing Your Cool
Assertive Communication Skills: How To Be Assertive Without Losing Your CoolAssertive Communication Skills: How To Be Assertive Without Losing Your Cool
Assertive Communication Skills: How To Be Assertive Without Losing Your Cool
 
Healthy and unhealthy relationships
Healthy and unhealthy relationshipsHealthy and unhealthy relationships
Healthy and unhealthy relationships
 
Bullying slideshow
Bullying slideshowBullying slideshow
Bullying slideshow
 
Preventing School Bullying
Preventing School BullyingPreventing School Bullying
Preventing School Bullying
 
safe and unsafe touch.pptx
safe and unsafe touch.pptxsafe and unsafe touch.pptx
safe and unsafe touch.pptx
 

Similar to Personal safety gr5 unit ppt

DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
Leon Letkeman
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
INTERNET-SAFETY-DEMO.pptx
INTERNET-SAFETY-DEMO.pptxINTERNET-SAFETY-DEMO.pptx
INTERNET-SAFETY-DEMO.pptx
ErinRoelle
 
Heads up!
Heads up!Heads up!
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
jesusmlaz
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
Manjula Sridhar
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
Amanda lee
 
Internet safety
Internet safetyInternet safety
Internet safety
erinmarkus
 
Internet Safety St Mary's Wollongong
Internet Safety St Mary's WollongongInternet Safety St Mary's Wollongong
Internet Safety St Mary's Wollongong
Magdalene Catholic High School
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dudeguesta2b256
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
JEcomputing
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Jackie McMahon
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Parenting & Education
 

Similar to Personal safety gr5 unit ppt (20)

DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
INTERNET-SAFETY-DEMO.pptx
INTERNET-SAFETY-DEMO.pptxINTERNET-SAFETY-DEMO.pptx
INTERNET-SAFETY-DEMO.pptx
 
Heads up!
Heads up!Heads up!
Heads up!
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety St Mary's Wollongong
Internet Safety St Mary's WollongongInternet Safety St Mary's Wollongong
Internet Safety St Mary's Wollongong
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 

Recently uploaded

Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 

Recently uploaded (20)

Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 

Personal safety gr5 unit ppt

  • 2.
  • 3. Lesson 1 Safeguarding Your Identity Online: Screen Names and Passwords
  • 4. Cyberspace What is Cyberspace, and how do we get there? What are some of the ways we communicate in Cyberspace?
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Lesson 2 Protecting Personal Information
  • 13. Make sure you have a copy of the resource page to review: The FBI Internet Safety Tips i-SAFE’s 4’R’s R ECOGNIZE R EFUSE R ESPOND R EPORT
  • 14. N ever give out personal information such as your name, home address, school name, or telephone number in a chat room or on bulletin boards. (Includes IMs, blogs, etc.) Never write to someone who has made you feel uncomfortable or scared, even if you or your parents know who they are. The FBI Internet Safety Tips
  • 15. Do not meet someone you have only met on the Internet without the permission of your parents. That includes having them visit you. Tell your parents right away if you read anything on the Internet that makes you feel uncomfortable. The FBI Internet Safety Tips Remember that people online may not be who they say they are.
  • 16. Remember that people online may not be who they say they are.
  • 17.
  • 18.
  • 19. Lesson 3 Online Strangers, Predators, and the Grooming Process
  • 20.
  • 21.
  • 22.
  • 23. Predators and Prey KEY point: A predator is one who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them. KEY point: One who is a victim or one who is vulnerable to victimization by a predator is prey . How do these terms apply to the online environment?
  • 24.
  • 25.
  • 26. Lesson 4 Online Personal Safety Review and Action
  • 27.
  • 28.
  • 29.
  • 30.

Editor's Notes

  1. Cyber Bullies are another unfortunate danger many kids face online. Sometimes it can come across as harmless, but to kids any type of bullying can have adverse effects and result in low self esteem, depression, etc. Students use chat, IM, websites, and more to joke, poke fun of, and threaten others. Online one can find sites devoted to ranking the ugliest student at school. Sometimes after a fight a friend will become an enemy as what was meant to be a private email is forwarded to others. Indeed some people say things which are meant to be taken one way but with only a computer screen facing the receiver, they are taken completely wrong. Bullying escalates and becomes a bigger problem. Perhaps more so then schoolyard bullying ever was because ANYONE can do it or be on the receiving end of it.
  2. Identity theft has gone high tech. Pretending to be your bank, ebay, paypal, or other institution, identity thieves mimic the logos, email address, etc. to request you to confirm personal information, etc. Even typing in your personal information and credit card number online presents a risk to thieves. Another way to access personal info is through old fashioned hacking. If you are online you should be running firewalls and other security software to protect your computer and your information.
  3. It is best to act smartly when online. These 4 R’s can apply to many online safety hazards. For example – being aware of how a predator finds the victim and understanding that people online are strangers, allows one to act appropriately when faced with those situations: R ECOGNIZE techniques used by online predators to deceive or intimidate their victims. R EFUSE requests for personal information or a face-to-face meeting. R ESPOND assertively by exiting the program, logging off, or turning off the computer. R EPORT any suspicious or dangerous contact that makes you or your child feel uncomfortable. The 4 R’s also hold true for cyber bullying: R ECOGNIZE ‘flaming’ and cyber bullying techniques and the bully’s screen name or address. R EFUSE to open or read any message from a cyber bully. R ESPOND assertively by leaving the chat room without responding or the letter unopened. R EPORT cyber bullying to the ISP, the school, or law enforcement as needed to stop it immediately. And it is also true for identity theft scams. By being aware of the latest ploys such as phishing emails (sending what looks like a reputable email asking for personal information) one is better equipped to deal appropriately with them. R ECOGNIZE techniques used by identity thieves to obtain people’s personal information. R EFUSE to provide personal information by phone or email if you didn’t initiate the communication. R ESPOND assertively by contacting the three U.S. credit bureaus and put a fraud alert on your credit. R EPORT any unusual, suspicious, or fraudulent activities to law enforcement authorities.