Personal Safety - PowerPoint PPT Presentation

1 / 41
About This Presentation
Title:

Personal Safety

Description:

I'm a part of i-SAFE America, and we are concerned with helping you to be safe online. ... School Friends' names. Family names Age. Social Security Number Phone number ... – PowerPoint PPT presentation

Number of Views:956
Avg rating:3.0/5.0
Slides: 42
Provided by: isa127
Category:

less

Transcript and Presenter's Notes

Title: Personal Safety


1
Personal Safety
  • Level 8

2
Hey Everybody!
  • My name is Tek.
  • Im going to be your guide today!
  • Im a part of i-SAFE America, and we are
    concerned with helping you to be safe online.
  • We want you to recognize and avoid dangerous,
    destructive or unlawful online behavior, and we
    hope to empower you to communicate what you learn
    from i-SAFE with others.
  •  

3
All right Lets talk Empowerment
  • Remember - Empowerment means you own what you
    learn and can use it to teach others and make a
    difference.

4
i-SAFE includes an empowerment activity in every
lesson. By completing the activity you may be
eligible for neat incentives and prizes. Check it
out at www.isafe.org Click on the
link to contests and Incentives.
  • So not only are you learning and
    sharing, you are getting rewarded for doing so!

Empowerment is the Key to Learning!
5
In this lesson you will be learning about
personal safety on the Internet. In addition
you will be guided to complete a presentation
about Internet safety as you learn this is
called a Tier 1 activity.
The Plan
6
Procedures are included to help you take it a
step further and turn this into a Tier 2
activity hosting the i-SAFE Assembly Experience
or the Student Assembly Training session.
The Plan
Go to www.isafe.org to find about the contests
and incentives you can earn by doing I-SAFE
activities.
7
Survey Time
  • Your teacher is going to provide you with a
    survey to take.
  • When finished, discuss the results of the survey
    with your classmates.

8
True Story
  • Read the true story provided by your teacher.
  • Afterwards discuss it as a class.
  • How and Why did this happen?
  • What can we learn from this story about online
    relationships?

9
In this lesson were going to discuss how to be
safe online!
  • Follow along on the corresponding activity pages,
    and give examples of experiences youve had with
    online safety issues.

10
Be Smart Be Safe
  • The Internet is not anonymous. When you sign
    on, others have access to you. Your e-mail
    address, screen name, and password serve as
    barriers between you and others. You need to
    maintain this barrier by not giving out private
    information. There are many out there who would
    like to know more for various reasons
  • They could want to harm you.
  • They could want money
  • They could use information to conduct their
    own business - either selling your info or
    using it in an illegal manner.

11
Private Information
  • This information should not be given out on the
    Internet to maintain your safety.
  • Name Address
  • School Friends names
  • Family names Age
  • Social Security Number Phone number

12
Indirect Information Solicitation
  • Sometimes, while online, people want to find out
    more about you for illegal purposes. However,
    they go about it in different ways. They may
    trick you into giving out information. You may
    not even realize what you have told them.
    Indirect information about your school,
    activities, etc, could lead them to knowing where
    you live. Be aware of what you say at all times.

13
User Id/Screen name
  • A User Id is a nickname you select to identify
    you in e-mail, chats, etc.
  • DO NOT USE Personal Information such as
  • -Your real first name -Your real last name
    -Your location (i.e. hilliegirl, HaverhillGuy)
    -Your zip code -A suggestive name or word (i.e.
    sexyman42, hotbabygirl) -Pornographic or obscene
    words
  • For added security, always opt NOT to add your
    name or nickname to any sort of member directory.

14
Password
  • A Password is a series of letters, numbers or
    symbols used to log you into a computer system.
    Passwords are used to access email, join
    chatrooms, etc. They are usually between 6 and 8
    characters long.
  • Password Security
  • Dont tell anyone your password.
  • Don't write your password down anywhere.
  • When you decide on a password, make sure it
    can't be guessed.
  • If you think there's even a chance someone else
    might know your password, change it.
  • Make sure no one is standing near you when you
    enter your password

15
Watch out for Dangers On the Web
  • Inappropriate sites - There are some sites you
    should not go to. They can be pornographic, hate
    filled, or upsetting. When you accidentally come
    across a site you know you shouldnt be in, close
    out of it quickly. If you still have trouble,
    try logging off completely or rebooting.

16
Watch out for Dangers On the Web
  •    Faulty information sites - Dont trust
    everything you read without double-checking and
    checking references.

17
Watch out for Dangers On the Web
  • Private Information Some websites ask you for
    private information before you can access their
    stuff. Make sure you ask your parents before
    giving anyone private information.

18
Watch out for Dangers On the Web
  • Your own website Many teens now have their own
    websites. However, you have to be careful about
    what information you display.

19
Watch out for Dangers in E-mail
  • E-mail is an online form of communication,
    typically between two people. Just like in
    regular mail, users write letters and send them
    electronically.
  • Spamming many companies advertise via e-mail.
    They try to entice you to purchase items, visit
    inappropriate sites, etc. Delete these e-mails.
  • Be careful when you reply to an e-mail. You are
    including your e-mail address and you dont know
    where it will go from there.

20
Watch out for Dangers in Email
  • Inappropriate, offensive, angry e-mail should be
    reported to your Internet provider.
  • Remember - the sender of an e-mail may not be
    someone you know dont send personal
    information, photographs, etc.

21
Watch out for Dangers in Chatting
  • Chats can result in revealing information you
    wouldnt normally reveal. This can leave you
    open to online predators.

22
Here are Some Tips to Remember when Chatting
  • Keep online interaction online. Dont agree to
    meet or phone people met online.
  • Dont give out personal information. Be careful
    about indirectly saying too much like school
    mascot, game times, etc. Eventually you will
    have said enough.
  • Keep your parents or guardians informed of online
    interaction.
  • Use Chat rooms that are moderated.
  • Be suspicious of someone who wants to be your
    friend and turns you against your parents,
    teachers or friends.
  • Private chats arent always private when you
    meet offline friends online in a private chat
    room be careful. Others can often enter and
    lurk.
  • Try to choose a gender-neutral online screen name

23
Watch out forDangers in Newsgroups, Forums, and
Bulletin Boards
  • The main thing to remember is to NOT include
    personal information in postings. Dont reveal
    anything identifying about yourself.
  • Realize that by posting, you are making your
    e-mail address public.
  • Be careful not to participate in a group which
    might be illegal or hateful.

24
Resources for reporting incidents
  • Here is a general guideline for reporting
    Internet wrongdoing.
  • Call the local police and ask if they have a
    dept. affiliated with "Internet Crimes Against
    Children (ICAC). If they do, go through that
    dept.
  • 2. Simultaneously, file a report with the
    Cybertips hotline 1-800-843-5678. Reports can
    be made directly online by clicking on the
    Cybertipline at http//www.missingkids.com/ 

25
What you can do ...
  • The following are guidelines on proactive things
    you can do when you are bothered, harassed, or
    annoyed while online.
  • Use these tips to make your online experience one
    that is more fun and safe too!

26
Junk E-mail/Spam
  • Delete without opening. Report to your Internet
    provider. Do not click unsubscribe as this
    identifies you as a real person.

27
Cyber stalking
  • Report this to the local police department and to
    your local provider, who can help you change your
    online ids to protect yourself.

28
Child Luring
  • If you feel you are in danger or someone you know
    is in danger of becoming a victim of a predator,
    notify a trusted adult immediately. Call your
    local police department.

29
I hope you learned something I know I did!
30
Discussion Time
  • Who are most likely to be the most expert users
    of Cyberspace, children or adults?
  • Who are most vulnerable? (Peers, younger kids,
    siblings, parents?)
  • Who are the most qualified to get the message of
    personal safety out to others?

31
You can Make a Difference!
  • The remainder of the lesson will enable you to
    make a presentation that may be used to teach
    others about what you know about online personal
    safety.

Lets Continue On
32
  • i-SAFE mentorship - Using what you know to teach
    others!
  • As participants in this lesson, you are already
    involved in this process.
  • What do you think Does a mentor have to be
    someone who likes to get up in front of people,
    put on events, etc?
  • Many Mentors work behind the scenes use their
    technology and/or Internet know-how to provide
    materials, technical assistance, etc. for
    outreach activities.
  • You can go to the i-SAFE website at www.isafe.org
    to enter your activity from this lesson in an
    ongoing contest.
  • You can also order additional materials (videos,
    posters, etc.) to enhance the presentation
    activity or to put on the i-SAFE Assembly
    Experience.

33
Activity Time
  • Ok To get started on your presentation, we need
    to divide into groups. Your teacher will divide
    you up. (Or can be completed as one large group
    if desired)
  • You may complete this activity with computers or
    without!
  • Today we are going to do a jigsaw activity. Each
    group will contribute to the end product a final
    presentation.

34
Here are the directions to get started
  • Becoming Experts
  • Each group will have a specific topic
  • Group 1 - User IDs/Passwords
  • Group 2 - Private Information
  • Group 3 - Online Interaction
  • Group 4 - Consequences possibilities for
    danger
  • Group 5 - Resources
  • Each group reads over the worksheet, discusses
    the issue with their group, creates corresponding
    slides or materials, and develops a script for
    the section.
  • Later you will meet back as a class and put the
    final presentation together.

35
Presentations and Discussions
  • The Groups should present their information to
    the class. If using PowerPoint slides, create
    one large class presentation. You can also do
    the same with any other props you created.


36
Tier 2 Opportunity
The activities you've completed have prepared you
to create a Tier 2 Activity. You can easily host
a school assembly. Find out how at
www.isafe.org. Go to the Kids and Teens section
and find out about the I-mentor Training
network. Submit a plan online for a tier 2
activity or event and become eligible for larger
incentives. At isafe.org youll also find free
materials you can order to help you host the
event.
37
So How Do you Know When Youre Done?
  • Have you
  • 1. Completed the survey?
  • 2. Read the true life story?
  • 3. Read the overview information?
  • 4. Completed the group presentations?
  • 5. Registered online and carried out the steps
    for your empowerment activity?

38
It doesnt have to end here!
Find out about DRiVE!
39
Take Action
Its Easy with the i-Mentor Training Network!
Visit the Kids and Teens section at www.isafe.org
to learn about the i-Mentor Training Network.
Its all online!
The i-Mentor Training Network has short
informative videos that will take you step by
step through the process of accomplishing any of
the i-SAFE Outreach activities you can do in your
school and community. To watch the videos go to
the i-Mentor Network located in the Kids and
Teens section of the i-SAFE website at
www.isafe.org.
40
Take Action
Its Easy with the i-Mentor Training Network!
The i-Mentor Training Network videos were
produced for students like you, who care about
online safety and want to DRiVE the message to
other students, parents, and community members. 
By watching the training videos you will become
a Certified i-Mentor and will be able to teach
students, conduct the i-SAFE assembly experience,
or be that important link to parents and
community leaders by presenting the i-Parent
Programs and Community Leaders Meetings. 
41
Get the recognition you deserve as an i-SAFE
Mentor
  • Enroll online at www.isafe.org by clicking on
    Create an Account.
  • Go to the Kids and Teens Section and Submit the
    Online Mentor Menu.
  • Receive your own Student Toolkit and materials to
    get started.

Take Action
www.isafe.org
Write a Comment
User Comments (0)
About PowerShow.com