Copyright and Fair Use

Download Report

Transcript Copyright and Fair Use

Personal Safety Unit - Level 6
The Plan
Today you will be learning about personal safety
when online.
This unit consists of four mini lessons. The PPT
covers all lessons in the unit, with a spacer slide
between the lessons. The lesson activity: Identity
Theft is NOT covered in this PPT. A spacer slide is
in place for this lesson.
• Safeguarding Your Identity Online: Screen Names and
Passwords
• Protecting Personal Information
• Online Strangers, Predators, and the Grooming Process
• Online Personal Safety Review and Action
Lesson 1
Safeguarding Your Identity Online:
Screen Names and Passwords
Resource Pages
Read and review the resources pages as a class.
Think About It
• Is a person really anonymous if they
have provided personal information in a
screen name?
• How can a safe screen/user name
and/or password help you avoid danger
on the Internet?
The Internet is not anonymous. When you sign on,
others have access to you. Your e-mail address,
screen name, and password serve as barriers
between you and others. You need to maintain this
barrier by not giving out private information. There
are many out there who would like to know more for
various reasons:
They could want to harm you.
They could want money
They could use information to conduct their
own business - either selling your info or using
it in an illegal manner.
One way to stay safe is to avoid revealing
any personal information online.
Avoid telling anyone your:
name
address
phone number
age
gender
school
Never give a stranger your picture
These are all considered to be identifying or personal information.
Screen Names
Screen names should never contain or refer to:
–
–
–
–
–
–
–
–
first and/or last name
address
phone number
date of birth (complete or partial) or age
social security number
email address
combinations of personal information such as listed above
combinations of personal information such as listed above
plus descriptions such as (but not limited to ) gender, school
name, favorite sport, favorite celebrity, family member
names
Passwords
Follow these rules for creating a safe passwords:
• be lengthy – at least 8 characters
• contain a combination of letters, numbers, and
symbols
• be changed when its secrecy is in doubt
–
–
–
–
should not contain personal information
should not be shared
should not be easily guessed
should not be provided in an email, even if requested
Group Activity
Directions: Arrange the screen names on the following slide in two lists to show those
that contain identifying (or potentially identifying) information and those that do not.
–
–
–
–
–
–
–
–
–
GTaylorplaysGuitar
[email protected]
REMforever
Miamisue13
canarielover
nymets29
brandonclassof09
wellesleygirl
namelessjester9
The Answers
Contain identifying (or potentially identifying)
information
–
–
–
–
andersonMJ (initials and last name)
[email protected] (email address)
Miamisue13 (name, location, age)
brandonclassof09 (name and graduation year –
tells age)
– GTaylorplaysGuitar (initial, name, hobby)
– wellesleygirl (location, gender)
The Answers
DO NOT contain identifying information:
–
–
–
–
REMforever
canarielover
nymets29
namelessjester9
Personal Challenge
Take a moment and
create a screen name
and password that
follows the rules to be
safe and secure.
Share
Take time to share the screen names
and passwords you created.
Can any of the screen names and/or
passwords you use be changed to be
safer?
Think About It…
• It is important to select safe and secure
screen names and passwords.
• Think about it: What should you NEVER
reveal in either?
• Think about it: What is your screen
name and password? Do you think you
need to change it? Why/Why not?
Lesson 2
Protecting Personal Information
Brainstorm

Why do students feel safe on the Internet?

What are some dangers on the Internet?

What are some good things on the Internet?

How can you stay away from the dangerous
things?
Article
Your teacher is going to read an article
to you. Pay close attention because
afterwards, you’re going to discuss it!
The Article
According to events in the
article, how could what
happened have been
prevented?
Reference Page
• Refer to the reference page.
• Cover the information as a class.
Review – Personal Information
This information should not be given out
on the Internet to maintain your safety.
Name
School
Family names
Social Security Number
Address
Friends’ names
Age
Phone number
Review – User Id/Screen name
A User Id is a “nickname” you select to identify you in
e-mail, chats, etc.
• DO NOT USE Personal Information such as:
-Your real first name
-Your real last name
-Your location (i.e. hilliegirl, HaverhillGuy)
-Your zip code
-A suggestive name or word (i.e. sexyman42, hotbabygirl)
-Pornographic or obscene words
• For added security, always opt NOT to add your
name or nickname to any sort of member
directory.
Indirect Information Solicitation
Sometimes, while online, people want to find
out more about you for illegal purposes.
However, they go about it in different ways.
You may be tricked into giving out
information. You may not even realize what
you have revealed. Indirect information about
your school, activities, etc, could lead
someone to know where you live. Be aware
of what you say at all times.
Watch out for…
Dangers On the Web
Inappropriate sites - There are some sites
you should not go to. They can be
pornographic, hate filled, or upsetting.
When you accidentally come across a
site you know you shouldn’t be in, close
out of it quickly. If you still have trouble,
try logging off completely or rebooting.
Watch out for…
Dangers On the Web
Faulty information sites Don’t trust everything you
read without checking and
double-checking references.
Watch out for…
Dangers On the Web
Private/personal Information – Some websites
ask you for private information before you
can access their stuff.
Make sure you ask
your parents before
giving anyone private
information.
Watch out for…
Dangers On the Web
Your own website –
Many teens now have
their own websites.
However, you have to be
careful about what
information you display.
Watch out for…
Dangers in E-mail
1. E-mail is an online form of communication, typically
between two people. Just like in regular mail, users
write letters and send them electronically.
2. Spamming – many companies advertise via e-mail.
They try to entice you to purchase items, visit
inappropriate sites, etc. Delete these e-mails.
3. Be careful when you reply to an e-mail. You are
including your e-mail address and you don’t know
where it will go from there.
Watch out for…
Dangers in Email
4. Inappropriate, offensive, angry e-mail
should be reported to your Internet
provider.
5. Remember - the sender of an e-mail
may not be someone you know – don’t
send personal information,
photographs, etc.
Watch out for…
Dangers in Chatting and
Socializing
Chats and blogs can
result in revealing
information you wouldn’t
normally reveal.
This can leave you open
to someone who might
want to harm you.
Here are Some Tips to Remember when Chatting
1.
Keep online interaction online. Don’t agree to meet or phone
people met online.
2.
Don’t give out personal information. Be careful about indirectly
saying too much – like school mascot, game times, etc.
Eventually you will have said enough.
3.
Keep your parents or guardians informed of online interaction.
4.
Use Chat rooms that are moderated.
5.
Be suspicious of someone who wants to be your friend and
turns you against your parents, teachers or friends.
6.
Private chats aren’t always private – when you meet offline
friends online in a private chat room be careful. Others can
often enter and lurk.
7.
Try to choose a gender-neutral online screen name
Watch out for…
Dangers in Newsgroups, Forums,
and Social Networking Sites
1. The most important thing to remember is to
AVOID including personal information in
postings. Don’t reveal anything identifying about
yourself.
2. Realize that by posting something, you are
making it public.
3. Be careful not to participate in a group, which
might be illegal or hateful.
Resources for reporting incidents:
Here is a general guideline for reporting Internet
wrongdoing.
1. Call the local police and ask if they have a dept.
affiliated with "Internet Crimes Against Children
(ICAC). If they do, go through that dept.
2. Simultaneously, file a report with the Cybertips
hotline: 1-800-843-5678. Reports can be made
directly online by clicking on the Cybertipline at
http://www.missingkids.com/
Return to the Article
• Your teacher will hand out a copy of the
article read at the beginning of the
lesson.
• Review it and answer the questions on
the following slide.
The Questions
– What mistakes did Brittany make that lead
her into potential danger?
– What are some potential problems
students could find themselves in
concerning:
•
•
•
•
Screen name
Password
Revealing personal information
Not asking for adult help
Bingo Review
You are now going to
play a Bingo Review
game.
All right –
Everyone Have a Card?
Good! Fill in your card with
the following terms.
Words to Use
1. LMSmith14
3. Chat rooms
5. Address
7. Internet Service Provider
9. Police
11. Cyber Stalking
13. Inappropriate
15. Moderated
17. References
19. Cyber tipline
21. False
23. “.exe”
2. Singin4fun
4. Predator
6. Password
8. Spam
10. Indirect
12. Online nickname
14. Public
16. Private Information
18. Picture
20. Change it
22. True
24. Flame
Here are the directions to get started
• Use the vocabulary words to fill in your
bingo card randomly.
• Your teacher will ask you a question.
• Find the correct answer on your card and
mark it off.
• When you have five in a row – horizontally,
vertically, or diagonally – call out Bingo.
ALL Finished???
Let’s Review!
Remember: It is important that anytime you
are asked to post personal information online
you need to ask permission from a parent or
supervising adult. This includes entering
websites, filling out profiles, forms, etc.
Lesson 3
Identity Theft – NO
corresponding PPT
Lesson 4
Online Strangers, Predators, and
the Grooming Process
Talk About It
•
•
•
•
How many of you use the internet?
How many of you go online alone?
What do you like to do online?
Is it your intention to be talking to adults
while online?
• How do you know if someone is your
own age when online?
Pause for Activity
Your teacher is going to give you
directions on how to play a mini game!
Review the Activity
• Raise your hand if you found it easy or if you got
your answers.
• How did you get your answer if not able to ask
the question?
• Discuss some of the strategies used to uncover
answers.
• Who had a difficult time? Why?
• Did some people resist giving information? Did
this make the assignment more difficult? Would
it also make it difficult for someone online to find
information?
Strangers
What is your definition of a stranger?
What are common rules/advice for
dealing with strangers in the
physical world?
Strangers Online
Those rules also apply to
communication online! People
met online are STRANGERS!
Online Predators
Some people lie about who they are and what
they want on the Internet for various reasons.
Sometimes it is to steal an identity or to bully.
Other times it is to meet children and teens to
form an inappropriate relationship. These
people are known as online predators.
Key Point
A predator is one who stalks or uses
lies, secrecy, or stealth, to get close
enough to another person in order to
easily hurt or harm them.
Key Point
One who is a victim or one who is vulnerable
to victimization by a predator is prey, no
matter what their age is.
Online Predators and Prey
How do these
terms apply to the
online
environment?
Minimize Dangers
• Choose screen name carefully
• Don’t reveal information online
• Choose people to communicate with
online carefully
• No matter what – Tell an adult if you are
made to feel uncomfortable online or are
approached by someone who discusses
inappropriate things or wants to meet you
offline.
Grooming Flyer
You should receive a flyer on the
grooming process now from your
teacher.
As a class review and discuss the steps
in the grooming process.
Make sure you take your flyer home and share with your
parents. Discuss what you’ve learned today!
Let’s Review
• Anyone met online is a stranger.
• What are the steps a predator uses to groom
a potential victim?
• Remember: It is important to avoid revealing
personal information online and have safe
screen names so that you are not targeted by
strangers online.
• Remember: It is important to report stranger
behavior online that makes you
uncomfortable, asks for personal information,
or requests a face to face meeting.
Lesson 5
Online Personal Safety Review
and Action
Make sure you have a copy of the resource page to
review:
The FBI Internet Safety Tips
i-SAFE’s 4’R’s
RECOGNIZE
REFUSE
RESPOND
REPORT
#1
Avoid giving out personal information
such as your name, home address,
school name, or telephone number in
chats or on profiles.
(Includes IMs, blogs, etc.)
#2
Never write to someone who has made
you feel uncomfortable or scared, even if
you or your parents know who they are.
#3
Do not meet someone or have
them visit you without the
permission of your parents.
#4
Tell your parents right away if you
read anything on the Internet that
makes you feel uncomfortable.
#5
Remember that people online may
not be who they say they are.
Review
Share what you
know about..
• Screen names
• Passwords
• Online personal information
What would you do….
• If a website you want to enter requests
personal information?
• If you are presented with a profile for IM
or chat that requests personal
information?
• If you are talking to someone online who
requests personal information?
Remember: Never reveal
information online without a
parent’s knowledge or
permission.
What About Others
If you could make mistakes online, do you
think others do also?
Who else could benefit from learning this
information?
Friends?
Parents?
Teachers?
What are some good ways to relay this
information to others?
Teacher’s choice:
Will you do the next activity on
computers or paper?
To use a computer activity,
Go to the lesson folder for this
lesson and select the HTML
Activity. Otherwise, continue on…
Build a Brochure
• You will be building a brochure to
educate others about online personal
safety.
• Use what you have learned today to
help others!
• You will either be building your brochure
using paper or a computer.
• Let’s meet back here when you finish it!
Brochures Completed!
• As a class decide which brochure is the most
informative and creative.
• Make plans to copy the brochure and
distribute. (Another option is to have multiple
brochures utilizing all brochures students
have created.)
• Where will your brochure have the most
impact?
• Plan a distribution day. Ideas: distribute at
lunch, in library, with report cards, etc.
Let i-SAFE Help!
• Go to www.isafe.org
• Click on Implementation Plan
• Select Brochure Distribution.
You will receive additional materials
automatically from i-SAFE for this
activity.
That’s a wrap!
You now know the tips and tools that
can help keep you safe online! Just
remember, when you’re online you
aren’t invincible. Rules can keep
you safe.
It doesn’t have to end here!
Find out about DRiVE!
Take Action
It’s Easy with the i-Mentor Training Network!
Visit the X-BLOCK - http://xblock.isafe.org to learn
about the i-Mentor Training Network.
It’s all online!
The i-Mentor Training Network has short
informative videos that will take you step by step
through the process of accomplishing any of the iSAFE Outreach activities you can do in your
school and community.
To watch the videos go to the i-Mentor Network
located in the X-BLOCK – http://xblock.isafe.org
Get the recognition you deserve
as an i-SAFE Mentor
• Enroll online at www.isafe.org by clicking on
Create an Account.
• Go to the X-BLOCK and submit the Online
Mentor Menu.
• Download your own Student Toolkit and
materials to get started.
Take Action
www.isafe.org