Internet Safety Curriculum
10 quick facts: (roll onto message to stop scrolling)
November/December - Safe Social Networking
TMI - Too Much Information
Your online profile can be viewed by anyone, including coaches, employers, and college admissions offices. Everything on your profile represents who you are. What does it say about you?
Stay in control of your online reputation!
Don't post information, photos, or videos you might regret later.
Think about your online image (Who will see this? What will they think?).
Use privacy settings to limit access to your page; don't let anyone - not predators or cyberbullies - gain access to information that's yours.
Remember that online choices have offline consequences and in some cases, legal implications.
Consider how fast information and images get forwarded to people beyond your group of friends via texting, IM, and e-mail - especially explicit ones.
Setting your page to private is smart, and a step in the right direction -- but who's on your friends list? Don't give just anyone access to your world.
Keep your personal information private
Only add friends you know in real life
Set your page and blog to private
Use a nickname that doesn't identify your location, gender, or age
Never meet in person with anyone you have first met online
Alter your pictures before you post them to remove identifying information
Profile and photo share only with people on your friends list
Don't post your plans or whereabouts on your site
Ignore harassing or rude comments posted on your profile
Think about the possible consequences of the information and photos you post
Never post provocative photos
January - Safe Online Gaming
- Beware of hidden cost associated with games….some games require buying the game and monthly fees, plus additional fees for game accessories
- Online gaming can become addictive. Kids can lose interest in friends, school and other activities. Kids turn their backs on their friends preferring to be involved with their online friends. Health issues occur and kids even can take on a virtual persona.
- Online games can provide exposure to online predators
- Risk from computer intruders exploiting security vulnerabilities. Gaining access to personal information, stealing credit card information, or even stealing your identity.
- Malicious users might be able to control the gamers’ computer remotely and use it to attack other computers or install programs such as Trojan horses, adware, or spyware, or gain access to personal information. Also, the gamers’ computer can then be used to send out malicious code
Key practices of good personal computer security include the following:
• Use antivirus and antispyware programs.
• Be cautious about opening files attached to email messages or instant messages.
• Verify the authenticity and security of downloaded files and new software.
• Configure your web browsers securely.
• Use a firewall.
• Identify and back up your personal or financial data.
• Create and use strong passwords.
• Patch and update your application software.
For More Information:
Playing it Safe:
Avoiding Online Gaming Risks
February - Recognizing and avoiding deceptive communication
Internet users must:
guard against internet fraud
secure personal computers against intrusion
protect personal information
* evaluate websites critically
*No legitimate financial institution would solicit personal or account information through email.
*Watch for misspelled words and bad grammar.
*Contact information is always provided on legitimate correspondence.
*Check to be sure that the web addresses match the institution and are not fake.
*Verify information in email against past correspondence such as bills or letters.
*Inclusion of your name does not guarantee an email is legitimate and be wary of any correspondence not personally addressed to you.
Visit this site and take the quiz. Check the explanations at the end.
Guarding against fraudulent emails designed to get personal information. (Phishing)
Email Scams: OnGuard Online
Computer Security: OnGuard Online
March - Cyberbullying
Some teens say and do terrible things to each other online because they don't see the direct effects of their actions. Be respectful at all times. Don't spread rumors.
Feathers in the wind.
You can't take it back
Stuff to Know
- Never respond to harassing or rude comments
- Save or print the evidence
- Talk to your parents or guardian if you are harassed and get help reporting this to your ISP, school, or local law enforcement if you feel threatened
- Respect others online
- Only share your password with your parent or guardian
- Change your passwords often
- Password protect your cell phone
- Use privacy settings to block unwanted messages
- Think before posting or sending photos - they could be used to hurt you
- Contact the site administrator if someone creates a social networking page in your name
April - Evaluating Websites
Using the Web well takes more than just knowing how to Google. To use the web wisely and efficiently, consider these six points:
- Authority: Who are the authors of the Web page, or who is responsible for it? What gives them their authority or expertise to write?
- Accuracy: Do you have good reason to believe that the information on the site is accurate? Are the facts documented?
- Objectivity: What is the author's point of view? What is the purpose of the site?
- Currency: When was the information on the page originally written? Has the site been kept up-to-date?
- Coverage: Does this site address the topic you are researching? Is the information basic and cursory or detailed and scholarly? However complex the language might be, is the information substantial?
- Value: Was the page worth visiting? Does the site offer anything informative, unique, or insightful? Is the site free of careless errors, misspelled words, and poor grammar?
Watch website evaluation video
Here are some resources for additional information and examples:
University of California Santa Barbara Library
ICYouSee - A guide to critical thinking about what you see on the web
University of California Berkeley - Evaluating web pages: Techniques to apply and questions to ask.
Discovery Education/Streaming - Video on Evaluating Websites for content quality
May - Texting/Sexting
Avoid the consequences of sexting- private pictures intended for one person may not stay that way.
Watch 2 videos outlining peer pressure from both perspectives
Things to consider:
pictures can spread like wildfire
participants may be stigmatized for the rest of your life
participants may be charged with a crime
sexting does emotional damage to all involved
Jesse Logan Story - devastating consequences of sexting
August/September - District internet user Agreement
All students and parents sign an acceptable use/ internet user agreement form that outlines policy and rules for responsible use of computers and equipment.
This agreement was explained to students in August and September during orientation meetings conducted by the Deans.
Click here to view the internet user agreement form