2. The Chavez Bill (AB307) requires the
guidelines and criteria to include a
component to educate pupils and teachers
on the appropriate and ethical use of
information technology in the classroom,
Internet safety, avoiding plagiarism, the
concept, purpose, and significance of a
copyright so that pupils can distinguish
between lawful and unlawful online
downloading, and the implications of illegal
peer-to-peer network file sharing.
3. AUP stands for Acceptable Use Policy. All
districts should have a policy that is signed
annually by students and parents.
Resources
This presentation (.ppt) was created to review your district's Acceptable
Use Policy (AUP) and discuss with students what they are agreeing to by
signing this document. Instructors should have copies of their district's
Student AUP available for this discussion.
AUP links from myctap.org
4. Students will understand the importance of
following copyright guidelines, see how students
can take advantage of Fair Use Guidelines, learn
what plagiarism means, and see the need to cite
sources.
Resources
Presenation to review copyright and fair use policies as they
apply to students.
Copyright and Fair Use Lesson from Read, Write, Think
B4UCopy.org - The B4UCopy educational program from the
Business Software Alliance has a goal of raising awareness of
copyright laws and reinforce responsible behavior online.
Download the free curriculum for elementary and middle school
students [B4UCopy.com/kids] or the high school curriculum [
B4UCopy.org/teens] on copyright laws.
5. A "cyber predator" is someone who uses the
internet to exploit someone else: financially,
sexually, emotionally, or psychologically. The
anonymity of the internet allows online predators
to establish relationships of trust with young
people where none should exist.
Resources
Presentation with linked video (internet required) allows for
classroom exploration and discussion of online safety.
NetSmartz Real Life Stories
State CTAP Cyber Predator links
Short Online Safety Quiz
FBI-SOS: Safe Online Searching
6. Software that allows anyone with the same
software to copy files from your PC.
Peer-2-peer files-haring, or P2P, is using
software to share files with anyone over the
internet.
Kazaa, Limewire, and BitTorrent are some
examples of file-sharing software. The
original Napster was also a file-sharing
program that gained wide-spread attention.
Resources
Presentation reviews the legality and dangers of downloading and
P2P file sharing.
State CTAP Piracy links
7. Personal information can be used to identify you,
your location or your financial assets. Obvious:
your name, age, sex, picture, phone number,
address/location. Less obvious: hobbies,
interests, school mascot, online group
memberships
Too much personal information puts users at
risk, can lead to physical harm or identity theft .
The information can also be used for scamming,
spamming and phishing.
Resources
That's Not Cool
State CTAP Website: Identity Safety
8. Cyberbullying is the use of technology for social cruelty,
which can include harassment, impersonation,
denigration, trickery, exclusion and stalking.
Cyberbullies may use email, chat rooms, discussion
forums, instant messaging, cell phone text messaging or
popular teen web sites such as MySpace or Facebook.
Resources
Cyberbullying Videos from NetSmartz
Cyberbullying: Feathers in the Wind
Cyberbullying: You Can't Take it Back
Cyberbullying: Broken Friendship
NetSmart Teens
State CTAP Website - Cyberbullying- visit the State CTAP Cyberbullying
site for a range of resources for educators, parents, and students.
10. Lingo Bingo What internet chat terms do you
know? (The answers are included on page
two.)
A PowerPoint(TM) game on safe and
appropriate intenet use, created by CTAP
Region IV.
All files and links contained in this
presentation can be found at this CTAP
website: http://ctap10.org/easi-u