Title: Personal Safety
1Personal Safety
2Hey Everybody!
- My name is Tek.
- Im going to be your guide today!
- Im a part of i-SAFE America, and we are
concerned with helping you to be safe online. - We want you to recognize and avoid dangerous,
destructive or unlawful online behavior, and we
hope to empower you to communicate what you learn
from i-SAFE with others. -
3All right Lets talk Empowerment
- Remember - Empowerment means you own what you
learn and can use it to teach others and make a
difference.
4i-SAFE includes an empowerment activity in every
lesson. By completing the activity you may be
eligible for neat incentives and prizes. Check it
out at www.isafe.org Click on the
link to contests and Incentives.
- So not only are you learning and
sharing, you are getting rewarded for doing so!
Empowerment is the Key to Learning!
5In this lesson you will be learning about
personal safety on the Internet. In addition
you will be guided to complete a presentation
about Internet safety as you learn this is
called a Tier 1 activity.
The Plan
6Procedures are included to help you take it a
step further and turn this into a Tier 2
activity hosting the i-SAFE Assembly Experience
or the Student Assembly Training session.
The Plan
Go to www.isafe.org to find about the contests
and incentives you can earn by doing I-SAFE
activities.
7Survey Time
- Your teacher is going to provide you with a
survey to take. - When finished, discuss the results of the survey
with your classmates.
8True Story
- Read the true story provided by your teacher.
- Afterwards discuss it as a class.
- How and Why did this happen?
- What can we learn from this story about online
relationships?
9In this lesson were going to discuss how to be
safe online!
- Follow along on the corresponding activity pages,
and give examples of experiences youve had with
online safety issues.
10Be Smart Be Safe
- The Internet is not anonymous. When you sign
on, others have access to you. Your e-mail
address, screen name, and password serve as
barriers between you and others. You need to
maintain this barrier by not giving out private
information. There are many out there who would
like to know more for various reasons - They could want to harm you.
- They could want money
- They could use information to conduct their
own business - either selling your info or
using it in an illegal manner.
11Private Information
- This information should not be given out on the
Internet to maintain your safety. - Name Address
- School Friends names
- Family names Age
- Social Security Number Phone number
12Indirect Information Solicitation
- Sometimes, while online, people want to find out
more about you for illegal purposes. However,
they go about it in different ways. They may
trick you into giving out information. You may
not even realize what you have told them.
Indirect information about your school,
activities, etc, could lead them to knowing where
you live. Be aware of what you say at all times.
13User Id/Screen name
- A User Id is a nickname you select to identify
you in e-mail, chats, etc. - DO NOT USE Personal Information such as
- -Your real first name -Your real last name
-Your location (i.e. hilliegirl, HaverhillGuy)
-Your zip code -A suggestive name or word (i.e.
sexyman42, hotbabygirl) -Pornographic or obscene
words - For added security, always opt NOT to add your
name or nickname to any sort of member directory.
14Password
- A Password is a series of letters, numbers or
symbols used to log you into a computer system.
Passwords are used to access email, join
chatrooms, etc. They are usually between 6 and 8
characters long. - Password Security
- Dont tell anyone your password.
- Don't write your password down anywhere.
- When you decide on a password, make sure it
can't be guessed. - If you think there's even a chance someone else
might know your password, change it. - Make sure no one is standing near you when you
enter your password
15Watch out for Dangers On the Web
- Inappropriate sites - There are some sites you
should not go to. They can be pornographic, hate
filled, or upsetting. When you accidentally come
across a site you know you shouldnt be in, close
out of it quickly. If you still have trouble,
try logging off completely or rebooting.
16Watch out for Dangers On the Web
- Faulty information sites - Dont trust
everything you read without double-checking and
checking references.
17Watch out for Dangers On the Web
- Private Information Some websites ask you for
private information before you can access their
stuff. Make sure you ask your parents before
giving anyone private information.
18Watch out for Dangers On the Web
- Your own website Many teens now have their own
websites. However, you have to be careful about
what information you display.
19Watch out for Dangers in E-mail
- E-mail is an online form of communication,
typically between two people. Just like in
regular mail, users write letters and send them
electronically. - Spamming many companies advertise via e-mail.
They try to entice you to purchase items, visit
inappropriate sites, etc. Delete these e-mails. - Be careful when you reply to an e-mail. You are
including your e-mail address and you dont know
where it will go from there.
20Watch out for Dangers in Email
- Inappropriate, offensive, angry e-mail should be
reported to your Internet provider. - Remember - the sender of an e-mail may not be
someone you know dont send personal
information, photographs, etc.
21Watch out for Dangers in Chatting
- Chats can result in revealing information you
wouldnt normally reveal. This can leave you
open to online predators.
22Here are Some Tips to Remember when Chatting
- Keep online interaction online. Dont agree to
meet or phone people met online. - Dont give out personal information. Be careful
about indirectly saying too much like school
mascot, game times, etc. Eventually you will
have said enough. - Keep your parents or guardians informed of online
interaction. - Use Chat rooms that are moderated.
- Be suspicious of someone who wants to be your
friend and turns you against your parents,
teachers or friends. - Private chats arent always private when you
meet offline friends online in a private chat
room be careful. Others can often enter and
lurk. - Try to choose a gender-neutral online screen name
23Watch out forDangers in Newsgroups, Forums, and
Bulletin Boards
- The main thing to remember is to NOT include
personal information in postings. Dont reveal
anything identifying about yourself. - Realize that by posting, you are making your
e-mail address public. - Be careful not to participate in a group which
might be illegal or hateful.
24Resources for reporting incidents
- Here is a general guideline for reporting
Internet wrongdoing. - Call the local police and ask if they have a
dept. affiliated with "Internet Crimes Against
Children (ICAC). If they do, go through that
dept. - 2. Simultaneously, file a report with the
Cybertips hotline 1-800-843-5678. Reports can
be made directly online by clicking on the
Cybertipline at http//www.missingkids.com/
25What you can do ...
- The following are guidelines on proactive things
you can do when you are bothered, harassed, or
annoyed while online. - Use these tips to make your online experience one
that is more fun and safe too!
26Junk E-mail/Spam
- Delete without opening. Report to your Internet
provider. Do not click unsubscribe as this
identifies you as a real person.
27Cyber stalking
- Report this to the local police department and to
your local provider, who can help you change your
online ids to protect yourself.
28Child Luring
- If you feel you are in danger or someone you know
is in danger of becoming a victim of a predator,
notify a trusted adult immediately. Call your
local police department.
29I hope you learned something I know I did!
30Discussion Time
- Who are most likely to be the most expert users
of Cyberspace, children or adults? - Who are most vulnerable? (Peers, younger kids,
siblings, parents?) - Who are the most qualified to get the message of
personal safety out to others?
31You can Make a Difference!
- The remainder of the lesson will enable you to
make a presentation that may be used to teach
others about what you know about online personal
safety.
Lets Continue On
32- i-SAFE mentorship - Using what you know to teach
others! - As participants in this lesson, you are already
involved in this process. - What do you think Does a mentor have to be
someone who likes to get up in front of people,
put on events, etc? - Many Mentors work behind the scenes use their
technology and/or Internet know-how to provide
materials, technical assistance, etc. for
outreach activities. - You can go to the i-SAFE website at www.isafe.org
to enter your activity from this lesson in an
ongoing contest. - You can also order additional materials (videos,
posters, etc.) to enhance the presentation
activity or to put on the i-SAFE Assembly
Experience.
33Activity Time
- Ok To get started on your presentation, we need
to divide into groups. Your teacher will divide
you up. (Or can be completed as one large group
if desired) - You may complete this activity with computers or
without! - Today we are going to do a jigsaw activity. Each
group will contribute to the end product a final
presentation.
34Here are the directions to get started
- Becoming Experts
- Each group will have a specific topic
- Group 1 - User IDs/Passwords
- Group 2 - Private Information
- Group 3 - Online Interaction
- Group 4 - Consequences possibilities for
danger - Group 5 - Resources
- Each group reads over the worksheet, discusses
the issue with their group, creates corresponding
slides or materials, and develops a script for
the section. - Later you will meet back as a class and put the
final presentation together.
35Presentations and Discussions
- The Groups should present their information to
the class. If using PowerPoint slides, create
one large class presentation. You can also do
the same with any other props you created.
36Tier 2 Opportunity
The activities you've completed have prepared you
to create a Tier 2 Activity. You can easily host
a school assembly. Find out how at
www.isafe.org. Go to the Kids and Teens section
and find out about the I-mentor Training
network. Submit a plan online for a tier 2
activity or event and become eligible for larger
incentives. At isafe.org youll also find free
materials you can order to help you host the
event.
37 So How Do you Know When Youre Done?
- Have you
- 1. Completed the survey?
- 2. Read the true life story?
- 3. Read the overview information?
- 4. Completed the group presentations?
- 5. Registered online and carried out the steps
for your empowerment activity?
38It doesnt have to end here!
Find out about DRiVE!
39Take Action
Its Easy with the i-Mentor Training Network!
Visit the Kids and Teens section at www.isafe.org
to learn about the i-Mentor Training Network.
Its all online!
The i-Mentor Training Network has short
informative videos that will take you step by
step through the process of accomplishing any of
the i-SAFE Outreach activities you can do in your
school and community. To watch the videos go to
the i-Mentor Network located in the Kids and
Teens section of the i-SAFE website at
www.isafe.org.
40Take Action
Its Easy with the i-Mentor Training Network!
The i-Mentor Training Network videos were
produced for students like you, who care about
online safety and want to DRiVE the message to
other students, parents, and community members.
By watching the training videos you will become
a Certified i-Mentor and will be able to teach
students, conduct the i-SAFE assembly experience,
or be that important link to parents and
community leaders by presenting the i-Parent
Programs and Community Leaders Meetings.
41Get the recognition you deserve as an i-SAFE
Mentor
- Enroll online at www.isafe.org by clicking on
Create an Account. - Go to the Kids and Teens Section and Submit the
Online Mentor Menu. - Receive your own Student Toolkit and materials to
get started.
Take Action
www.isafe.org