Online Safety Janetta Garton Technology Curriculum Director Willard R-II School District

download Online Safety Janetta Garton Technology Curriculum Director Willard R-II School District

If you can't read please download the document

description

Image Credit: Alleke by kellyandapril

Transcript of Online Safety Janetta Garton Technology Curriculum Director Willard R-II School District

Online Safety Janetta Garton Technology Curriculum Director Willard R-II School District District Policy Policy that must be signed by students, parents, and staff prior to gaining access to the schools network and the Internet. Unfortunately, to be legally binding, these policies often are written in a language unfamiliar to students. It is important to discuss this policy with your students in terms they can understand. Image Credit: School Rules by Zac-Attack Image Credit: Alleke by kellyandapril Access to Inappropriate Content We do have a district filter. This software is used to strain out inappropriate sites. However, you cannot depend solely on this filter to insure that your students are visiting only appropriate web sites. Inappropriate content could be: hate sites sites that promote delinquency (weapons, drugs, fake ids, explosives) pornography sites gambling sites Gates to Inappropriate Content advertisements: click the blinking banner searching: inappropriate sites appear in the search results typo squatting: a sites url uses a misspelling of an appropriate sites (funbrain.com & funbrian.com) or slight variation (whitehouse.gov & whitehouse.com) spam messages Image Credit: Kintana by Matt & Helen Hamm Internet Offenders manipulate young people into criminal sexual relationships by appealing to young peoples desire to be appreciated, understood, take risks, and find out about sex. Predators will: use chat rooms look at profiles targeting kids who are looking for attention, dont have much attention from parents at home, and parents that arent too tech savy try to get as much personal information as possible send an invitation to a private chat want to move on toand phone work toward a face to face meeting establish a common ground by pretending to like the same things (music, movies, hobbies, sports, etc) work to build trust by showing interest in everything discussed in chat, agreeing always with childs opinions and viewpoints may pose as a sponsor to recruit individuals for a competition, event, club, etc discourage discussing this relationship with anyone start introducing sexual content Signs that may a child be involved with predator: watch for diminished communication about what they are doing online minimizing of screen when you approach unexplained phone calls or absences Image Credit: _2edb503a94_o by DarthAbraham Cyberbullying use of technology to spread rumors and gossip post pictures of someone without their consent steal passwords to assume someone elses identity disseminate private information and threaten or harass with offensive language Cyberthreats threats or distressing material statements that make it sound like the writer is emotionally upset and may be considering harming someone else, or him/herself. Schools place restrictions on student speech that appears to be sponsored by the school, or that is necessary to maintain an appropriate school climate. This applies to student speech through the district Internet system or via cell phones used at school. For online speech posted when off-campus, there must be a substantial and material threat of disruption on campus. Law enforcement officials should be contacted when the situation involves: Making threats of violence to people or their property. Engaging in coercion obscene or harassing calls/messages Harassment or stalking. Hate or bias crimes Creating or sending sexually explicit images Sexual exploitation. Taking a photo of someone in place where privacy is expected (like a locker room) Addressing Cyber Bullying and Threats Safe School Committee Needs Assessment Policy & Practice Professional Development Parent/Community Education Student Education See the 2 flowcharts in the handout: Cyberbullying or Cyberthreat Situation Review Process & School Actions and Options Image Credit: Predator & Alien by Maigh Intellectual property refers to creations of the mind such as: musical, literary, and artistic work; inventions; and symbols, names, images, and designs. The holder of this property has certain exclusive rights, copyright, which is automatic upon creation. Just because something is online doesnt mean its legal to copy, download, or use. Piracy Piracy is the unauthorized use of material which is covered by copyright law Piracy causes economic harm to the copyright holders. Plagiarism Copying and pasting text from on-line Transcribing text Using photographs, video or audio without permission or acknowledgment Using another person's work and claiming it as your own, even with permission Acquiring work from commercial sources Translation from one language to another Using an essay that you wrote for another class/another purpose without getting permission from the teacher/professor of both the current class and the class for which the original work was used Peer to Peer Network uses connectivity and the cumulative bandwidth of participants in a network, as opposed to servers providing the service. Some illegally distribute copyrighted materials. Virus, spyware, and pornography are also available Often these files are labeled so as to attract students to download them. Users of the site can be held accountable for copyright infringement. Image Credit: Shhh, It Be the Little Lass' Treasure I Be Steal'n by Cayusa Malicious code software created to cause damage, steal information, or use up resources on a computer or a network. Viruses programs that alter the way a computer operates without the permission or knowledge of the user. can impair and seriously damage your computer (or network server) by executing random text, audio and video messages; draining memory; deleting files; corrupting programs; erasing the contents of your hard disk. Worms replicate themselves without the use a host file. can overload networks and shut down communication Trojan Horses imposter files that claim to be something desirable to spread, you must openattachment or a downloaded file Spyware hide on your computer to steal information such as credit card numbers,addresses, home addresses, and surfing habits majority of it is adware, designed to capture anonymous data for targeted advertising. usually just an annoyance often bundled in other software that you install, but can also be acquired by simply accessing a webpage. Signs of Spyware You receive more pop-ups than usual. Your computer runs slowly. Icons appear on your desktop or task bar. Your default browser is changed. Spyware hide on your computer to steal information such as credit card numbers,addresses, home addresses, and surfing habits majority of it is adware, designed to capture anonymous data for targeted advertising. usually just an annoyance often bundled in other software that you install, but can also be acquired by simply accessing a webpage. Signs of Spyware You receive more pop-ups than usual. Your computer runs slowly. Icons appear on your desktop or task bar. Your default browser is changed. You hear your hard drive running even when you are not using the computer. Firewalls, anti-virus, and anti-spyware software address these issues. Keeping your operating system and other software up-to-date, and setting your browsers security settings to medium or higher is important. You hear your hard drive running even when you are not using the computer. Firewalls, anti-virus, and anti-spyware software address these issues. Keeping your operating system and other software up-to-date, and setting your browsers security settings to medium or higher is important. Image Credit: Credit Card Theft by d70focus Identity Theft theft of personal identifying information (name, address, credit card number, social security number) and use of that data to open new charge accounts, order merchandise, or borrow money. Phishing seemingly credible/text message/popup that I nstructs the user to visit a Web site where they are prompted to enter or update their personal information May say your account has come under review, may be in danger of being suspended and/or cancelled, and some piece of information needs to be verified or updated. often contain spelling or grammar errors. Contact your merchant right away to ask for clarification Spoofing appears to have been sent from one source when it actually was sent from another Any replies go legitimateaccount, not the real sender. Legitimate user can find their Inbox bombarded with viruses, bounced, and in some cases can have their account suspended for violating its anti-spam policy. Send a copy of the spoofedto the spoofedsender's ISP. Spamming unsolicited or undesired bulk messages district has a spam filter ePALs there is a spam control setting that teachers can calibrate Willard Tiger Webmail has a Spam filter that you can activiate Shopping Online time saving convenience Helpful consumer reviews can put you at risk Image Credit: Identity Thief as Paris by CarbonNYC