The Internet - Dickson County School District
Download
Report
Transcript The Internet - Dickson County School District
Remember the rules of online safety.
Never disclose personal information
Full name
Home address
Phone number
Social security number
Passwords
Names of family members
Credit card numbers
Your photograph
Watch the video “Survivor Diaries”
Why?
Do you have a Facebook account?
According to the article published by Scott J. Cech, “ . . .,
a significant percentage of colleges and universities
sometimes dig into would-be undergraduates’ social
networking profiles.”
The article describes how some college admissions
officers research a potential student’s Internet
information to assist in the careful and limited selection
of students. “No school wants to give a very prestigious
scholarship to some [student] who’s going to show up in
the newspaper the next day with pictures of [student]
standing on a beer keg.”
Employers are also investigating social networking
profiles of potential employees.
Slide 3
Personal Safety – Warning Signs
What does online yelling look like?
What should you do if someone is yelling at you online?
What is a cyberbully?
What should you do if you are bullied online?
What should you do if someone sends you explicit
materials?
Watch the video “Cyberbullying: You Can’t Take it Back”
Watch the video “Your Photo Fate”
Safeguard against financial risk
If purchasing something online, make sure that the
site is secure.
The URL should begin with https:
A lock icon is displayed and is interactive – not just a
graphic image.
Does the site contain a site seal?
Many, but not all sites will contain a seal that is highly visible
and difficult to copy which indicates a safe site.
What are computer hazards?
Viruses – software that attaches to programs installed on
a computer or that are programmed to load when an email
is opened.
Spam – unwanted emails from advertisers and users that
contain malicious and explicit material or try to sell
products or services.
Spyware/Malware – malicious software designed to
take partial control of a computer’s operation without the
knowledge or consent of the user. Often used to track a
user’s browsing and spending habits while online and also
to mine for personal information.
Protect against online hazards
Beware of any emails or sites that promise you will
get rich quick.
These emails are usually a way for hackers to mine your
computer for personal or financial information.
Never open an email from someone you do not
know.
Never download programs unless you know they
are safe and contain no hidden files.