SlideShare una empresa de Scribd logo
1 de 10
California Technology Assistance
              Project, Region 10
 The Chavez Bill (AB307) requires the
 guidelines and criteria to include a
 component to educate pupils and teachers
 on the appropriate and ethical use of
 information technology in the classroom,
 Internet safety, avoiding plagiarism, the
 concept, purpose, and significance of a
 copyright so that pupils can distinguish
 between lawful and unlawful online
 downloading, and the implications of illegal
 peer-to-peer network file sharing.
AUP stands for Acceptable Use Policy. All
districts should have a policy that is signed
annually by students and parents.

Resources
This presentation (.ppt) was created to review your district's Acceptable
Use Policy (AUP) and discuss with students what they are agreeing to by
signing this document. Instructors should have copies of their district's
Student AUP available for this discussion.
AUP    links from myctap.org
Students will understand the importance of
following copyright guidelines, see how students
can take advantage of Fair Use Guidelines, learn
what plagiarism means, and see the need to cite
sources.

Resources
Presenation  to review copyright and fair use policies as they
apply to students.
Copyright and Fair Use Lesson from Read, Write, Think
B4UCopy.org  - The B4UCopy educational program from the
Business Software Alliance has a goal of raising awareness of
copyright laws and reinforce responsible behavior online.
Download the free curriculum for elementary and middle school
students [B4UCopy.com/kids] or the high school curriculum [
B4UCopy.org/teens] on copyright laws.
A "cyber predator" is someone who uses the
internet to exploit someone else: financially,
sexually, emotionally, or psychologically. The
anonymity of the internet allows online predators
to establish relationships of trust with young
people where none should exist.

Resources
Presentation with linked video (internet required) allows for
classroom exploration and discussion of online safety. 
NetSmartz Real Life Stories
State CTAP Cyber Predator links
Short Online Safety Quiz
FBI-SOS: Safe Online Searching
 Software  that allows anyone with the same
  software to copy files from your PC.
 Peer-2-peer files-haring, or P2P, is using
  software to share files with anyone over the
  internet.
 Kazaa, Limewire, and BitTorrent are some
  examples of file-sharing software. The
  original Napster was also a file-sharing
  program that gained wide-spread attention.
Resources
   Presentation reviews the legality and dangers of downloading and
    P2P file sharing.
   State CTAP Piracy links
 Personal information can be used to identify you,
  your location or your financial assets. Obvious:
  your name, age, sex, picture, phone number,
  address/location. Less obvious: hobbies,
  interests, school mascot, online group
  memberships
 Too much personal information puts users at
  risk, can lead to physical harm or identity theft .
  The information can also be used for scamming,
  spamming and phishing.

Resources
   That's Not Cool
   State CTAP Website: Identity Safety
   Cyberbullying is the use of technology for social cruelty,
    which can include harassment, impersonation,
    denigration, trickery, exclusion and stalking.
   Cyberbullies may use email, chat rooms, discussion
    forums, instant messaging, cell phone text messaging or
    popular teen web sites such as MySpace or Facebook.

Resources
   Cyberbullying Videos from NetSmartz
     Cyberbullying: Feathers in the Wind
     Cyberbullying: You Can't Take it Back
     Cyberbullying: Broken Friendship
   NetSmart Teens 
   State CTAP Website - Cyberbullying- visit the State CTAP Cyberbullying
    site for a range of resources for educators, parents, and students.
 http://kids.yahoo.com/parents/online-safety
 http://kids.yahoo.com/parents/online-safety/1701--The


A  Parent's Guide to Internet Safety - FBI
  Parent's Guide
 State CTAP Site - Administrator Resources for
  PTA Meetings
 Lingo  Bingo What internet chat terms do you
  know? (The answers are included on page
  two.)
 A PowerPoint(TM) game on safe and
  appropriate intenet use, created by CTAP
  Region IV.
 All files and links contained in this
  presentation can be found at this CTAP
  website: http://ctap10.org/easi-u

Más contenido relacionado

La actualidad más candente

How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
Social media risk
Social media riskSocial media risk
Social media riskMosoco Ltd
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technologypizonaim
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterMark Moran
 
Internet safety cyberbullying
Internet safety cyberbullyingInternet safety cyberbullying
Internet safety cyberbullyingJMFarkas
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Christina Gagnier
 
Advantage and disadvantage of the internet
Advantage and disadvantage of the internetAdvantage and disadvantage of the internet
Advantage and disadvantage of the internetkramm_01
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesDeped
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullyingseswear9388
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 

La actualidad más candente (20)

How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Lis580 seminargroup3
Lis580 seminargroup3Lis580 seminargroup3
Lis580 seminargroup3
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Internet safety cyberbullying
Internet safety cyberbullyingInternet safety cyberbullying
Internet safety cyberbullying
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
Understanding "Cyber" Bullying: California Law & Proactive Steps for School D...
 
Advantage and disadvantage of the internet
Advantage and disadvantage of the internetAdvantage and disadvantage of the internet
Advantage and disadvantage of the internet
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Destacado

Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)Anne Arendt
 
Meagan mason powerp
Meagan mason powerpMeagan mason powerp
Meagan mason powerpmeaganrm85
 
Tech project pp
Tech project ppTech project pp
Tech project ppBurkeV
 
Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationAnne Arendt
 
ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16Anne Arendt
 
Social media used in higher education
Social media used in higher educationSocial media used in higher education
Social media used in higher educationAnne Arendt
 

Destacado (6)

Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)Social Media and You (for tweeners/teens)
Social Media and You (for tweeners/teens)
 
Meagan mason powerp
Meagan mason powerpMeagan mason powerp
Meagan mason powerp
 
Tech project pp
Tech project ppTech project pp
Tech project pp
 
Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher Education
 
ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16ISETL presentation: Cafeteria Style Grading 10/13/16
ISETL presentation: Cafeteria Style Grading 10/13/16
 
Social media used in higher education
Social media used in higher educationSocial media used in higher education
Social media used in higher education
 

Similar a Ethical and safe internet use

ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Parent meeting
Parent meetingParent meeting
Parent meetinglightb
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxamandaschilling75
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety edtecher
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatRaudhat-Rahma Shittu-Agbetola
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 

Similar a Ethical and safe internet use (20)

Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
EMPOWERMENT.pptx
EMPOWERMENT.pptxEMPOWERMENT.pptx
EMPOWERMENT.pptx
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
MISD Cyber Safety
MISD Cyber Safety MISD Cyber Safety
MISD Cyber Safety
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 

Último

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Ethical and safe internet use

  • 1. California Technology Assistance Project, Region 10
  • 2.  The Chavez Bill (AB307) requires the guidelines and criteria to include a component to educate pupils and teachers on the appropriate and ethical use of information technology in the classroom, Internet safety, avoiding plagiarism, the concept, purpose, and significance of a copyright so that pupils can distinguish between lawful and unlawful online downloading, and the implications of illegal peer-to-peer network file sharing.
  • 3. AUP stands for Acceptable Use Policy. All districts should have a policy that is signed annually by students and parents. Resources This presentation (.ppt) was created to review your district's Acceptable Use Policy (AUP) and discuss with students what they are agreeing to by signing this document. Instructors should have copies of their district's Student AUP available for this discussion. AUP links from myctap.org
  • 4. Students will understand the importance of following copyright guidelines, see how students can take advantage of Fair Use Guidelines, learn what plagiarism means, and see the need to cite sources. Resources Presenation to review copyright and fair use policies as they apply to students. Copyright and Fair Use Lesson from Read, Write, Think B4UCopy.org  - The B4UCopy educational program from the Business Software Alliance has a goal of raising awareness of copyright laws and reinforce responsible behavior online. Download the free curriculum for elementary and middle school students [B4UCopy.com/kids] or the high school curriculum [ B4UCopy.org/teens] on copyright laws.
  • 5. A "cyber predator" is someone who uses the internet to exploit someone else: financially, sexually, emotionally, or psychologically. The anonymity of the internet allows online predators to establish relationships of trust with young people where none should exist. Resources Presentation with linked video (internet required) allows for classroom exploration and discussion of online safety.  NetSmartz Real Life Stories State CTAP Cyber Predator links Short Online Safety Quiz FBI-SOS: Safe Online Searching
  • 6.  Software that allows anyone with the same software to copy files from your PC.  Peer-2-peer files-haring, or P2P, is using software to share files with anyone over the internet.  Kazaa, Limewire, and BitTorrent are some examples of file-sharing software. The original Napster was also a file-sharing program that gained wide-spread attention. Resources  Presentation reviews the legality and dangers of downloading and P2P file sharing.  State CTAP Piracy links
  • 7.  Personal information can be used to identify you, your location or your financial assets. Obvious: your name, age, sex, picture, phone number, address/location. Less obvious: hobbies, interests, school mascot, online group memberships  Too much personal information puts users at risk, can lead to physical harm or identity theft . The information can also be used for scamming, spamming and phishing. Resources  That's Not Cool  State CTAP Website: Identity Safety
  • 8. Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery, exclusion and stalking.  Cyberbullies may use email, chat rooms, discussion forums, instant messaging, cell phone text messaging or popular teen web sites such as MySpace or Facebook. Resources  Cyberbullying Videos from NetSmartz  Cyberbullying: Feathers in the Wind  Cyberbullying: You Can't Take it Back  Cyberbullying: Broken Friendship  NetSmart Teens   State CTAP Website - Cyberbullying- visit the State CTAP Cyberbullying site for a range of resources for educators, parents, and students.
  • 9.  http://kids.yahoo.com/parents/online-safety  http://kids.yahoo.com/parents/online-safety/1701--The A Parent's Guide to Internet Safety - FBI Parent's Guide  State CTAP Site - Administrator Resources for PTA Meetings
  • 10.  Lingo Bingo What internet chat terms do you know? (The answers are included on page two.)  A PowerPoint(TM) game on safe and appropriate intenet use, created by CTAP Region IV.  All files and links contained in this presentation can be found at this CTAP website: http://ctap10.org/easi-u