1 / 30

SafeKey & Etiquette District Convention 2017

"Think before you click!" Join us at the SafeKey & Etiquette District Convention 2017 to learn about online safety, cyberbullying prevention, and maintaining proper etiquette. Don't miss out on valuable information on how to stay safe and make a positive online presence.

knupp
Download Presentation

SafeKey & Etiquette District Convention 2017

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SafeKey & Etiquette District Convention 2017 Tristan Anderson, Division 42 West Lt. Governor Mary Amontos, SAA Coordinator

  2. What is SAFEKEY? “Think before you click!”

  3. Overview and Mission • Program created to better inform Key Club members on how to act appropriately online • Provides information on the hazards of unsafe browsing • Ensures a better understanding on how to safely utilize the internet

  4. Importance • Online safety • Stop cyberbullying • Protects identity and maintains privacy • Proper etiquette

  5. Identity • Don’t BEE a target! • Access to your personal information can allow others to utilize your identity in dangerous and unethical methods • Obtainable information include your thoughts, school, community, and sometimes even home

  6. How to BEE Safe • Set your social media profiles to PRIVATE • Personal information should not be open to the publicor be kept at a minimum • BEE cautious when you are talking to someone you don’t know • Privacy is KEY!

  7. Cyberbullying • Don’t respond or retaliate • Save the evidence • It can come in many forms (words, pictures, videos, etc.) • Take action and tell an adult

  8. Prevention • Don’t make yourself vulnerable • Think before you post • Ask yourself: “Would I be ok with my dream college admissions counselor seeing this?” • Neve post when you are angry; wait until you calm down.

  9. Maintaining Proper Etiquette • Present yourself the way you want to be seen individually • 1st Impressions count • Anyone can go on your account and quickly make assumptions about you based on a few posts • Do not post things that you wouldn’t want your parents or any other adults to see on your profiles • Refrain from using inappropriate words as well as posting inappropriate content • If you were applying for a job and the manager scans your social media, would they want to hire you?

  10. What Should I Post Then? • Things you are comfortable with sharing about your life and family (ex. Pictures of your dog) • Spreading awareness and education • Maybe you want to publicize the effects of smoking or educate others about animal abuse • Anything encouraging and positive • Nothing that can hurt others in any way

  11. Scenarios

  12. Scenario One It's Friday night and Bob is on his way to his friend's birthday party. Bob is well-known among his peers and teachers at school. He is also the valedictorian and has been offered various amounts of scholarships to schools such as UCLA, UC Berkeley and Stanford. During the party, Bob decides to take a picture of himself and his friends. In this picture, Bob is seen holding a beer bottle with his friends. Later that night, Bob posts this picture and is unaware of the harmful effects it may result. The next couple days, Bob receives terrible news from his recruiting schools as the colleges saw his picture online and have taken away the scholarships. Bob is surprised and becomes disappointed in himself. The images he posted online left detrimental effects on his academic career.

  13. Scenario One Questions • Could this have been prevented? If so, how? • After posting the photos, was there anything Bob could have done to prevent the potential consequences from happening?

  14. Scenario Two Once upon a time, a boy named Jack broke up with his girlfriend, Jill. She was heartbroken and needed to express her feelings. She grabbed her phone and started "tweeting" away on Twitter! As she begins to pour her feelings out online, her friends begin to see all of her posts. The next day, Jill arrives to school and all of her classmates are aware of Jill's heartbroken feelings toward Jack. Sadly, this results in some negative effects as her classmates began to tease her and rumors starts to spread. She regrets using Twitter to express all of her anger and sadness from her relationship.

  15. Scenario Two Questions • What could Jill have done instead of expressing her feelings on Twitter? • If you were one of Jill’s friends who saw her posts, would you have done the same as the rest of her classmates?

  16. Scenario Three One night you are on Twitter and you see a Tweet about a new kid, Joe, at school. You don’t know him very well other then he is in your Math Class. The Tweet was written by Angel, a very popular and well liked girl at school, she Tweets about how Joe’s crocs are really tacky and that he should stop wearing them because they make him a loser. They next day at school Joe is found crying in the restroom and is taken to the school psychiatrist for serious help. Everyone at school looks to Angel for whom to blame. Angel loses all her friends and is lonely.

  17. Scenario Three Questions • How could this have been avoided. • How could Angel have handled this situation differently. • What is the lesson here?

  18. Quiz!

  19. Question 1: What is the best way to hide your public profiles to people you do not know?

  20. Question 2: If you are a victim of cyberbullying, what must you do?

  21. Question 3: What are the possible consequences of improper use of technology?

  22. Question 4: If you are planning to report cyberbullying, what should you do to the evidence?

  23. Question 5: What is a guideline to follow when decide whether or not the content you are about to post is inappropriate?

  24. Question 6: How can you put forth a good first impression through technology and what are ways you could tarnish your reputation online?

  25. Question 7: Have you ever been cyber-bullied or have you ever witnessed someone being bullied online? Did you or anyone take action? If so, what actions were taken?

  26. Question 8: Why is Safekey important?

  27. Question 9: How will you spread the word of Safekey and technology safety to prevent cyberbullying, identity theft, etc.?

  28. Question 10: What does SAFEKEY mean to you?

  29. ? ? Questions? Comments? Concerns? Go for it!

  30. Acknowledgements The CNH Key Club District would like to acknowledge the following individuals who have contributed to this presentation over the years. Mary Amontos, Sergeant at Arms Coordinator, 2016-2017

More Related