Personal Safety Unit - Level 6. The Plan.
Today you will be learning about personal safety when online. This unit consists of four mini lessons. The PPT covers all lessons in the unit, with a spacer slide between the lessons. The lesson activity: Identity Theft is NOT covered in this PPT. A spacer slide is in place for this lesson.
Read and review the resources pages as a class.
The Internet is not anonymous. When you sign on, others have access to you. Your e-mail address, screen name, and password serve as barriers between you and others. You need to maintain this barrier by not giving out private information. There are many out there who would like to know more for various reasons:
They could want to harm you.
They could want money
They could use information to conduct their own business - either selling your info or using it in an illegal manner.
Avoid telling anyone your:
Never give a stranger your picture
These are all considered to be identifying or personal information.
Screen names should never contain or refer to:
Follow these rules for creating a safe passwords:
Directions: Arrange the screen names on the following slide in two lists to show those that contain identifying (or potentially identifying) information and those that do not.
DO NOT contain identifying information:
Take a moment and create a screen name and password that follows the rules to be safe and secure.
Take time to share the screen names and passwords you created.
Can any of the screen names and/or passwords you use be changed to be safer?
·Why do students feel safe on the Internet?
·What are some dangers on the Internet?
·What are some good things on the Internet?
·How can you stay away from the dangerous things?
Your teacher is going to read an article to you. Pay close attention because afterwards, you’re going to discuss it!
According to events in the article, how could what happened have been prevented?
This information should not be given out on the Internet to maintain your safety.
School Friends’ names
Family names Age
Social Security Number Phone number
A User Id is a “nickname” you select to identify you in e-mail, chats, etc.
-Your real first name -Your real last name -Your location (i.e. hilliegirl, HaverhillGuy) -Your zip code -A suggestive name or word (i.e. sexyman42, hotbabygirl) -Pornographic or obscene words
Sometimes, while online, people want to find out more about you for illegal purposes. However, they go about it in different ways.
You may be tricked into giving out information. You may not even realize what you have revealed. Indirect information about your school, activities, etc, could lead someone to know where you live. Be aware of what you say at all times.
Inappropriate sites - There are some sites you should not go to. They can be pornographic, hate filled, or upsetting.
When you accidentally come across a site you know you shouldn’t be in, close out of it quickly. If you still have trouble, try logging off completely or rebooting.
Faulty information sites - Don’t trust everything you read without checking and double-checking references.
Private/personal Information – Some websites ask you for private information before you can access their stuff.
Make sure you ask your parents before giving anyone private information.
Your own website – Many teens now have their own websites. However, you have to be careful about what information you display.
Chats and blogs can result in revealing information you wouldn’t normally reveal.
This can leave you open to someone who might want to harm you.
Here is a general guideline for reporting Internet wrongdoing.
2. Simultaneously, file a report with the Cybertips hotline: 1-800-843-5678. Reports can be made directly online by clicking on the Cybertipline at http://www.missingkids.com/
You are now going to play a Bingo Review game.
Good! Fill in your card with the following terms.
1. LMSmith14 2. Singin4fun
3. Chat rooms 4. Predator
5. Address 6. Password
7. Internet Service Provider 8. Spam
9. Police 10. Indirect
11. Cyber Stalking 12. Online nickname
13. Inappropriate 14. Public
15. Moderated 16. Private Information
17. References 18. Picture
19. Cyber tipline 20. Change it
21. False 22. True
23. “.exe” 24. Flame
Remember: It is important that anytime you are asked to post personal information online you need to ask permission from a parent or supervising adult. This includes entering websites, filling out profiles, forms, etc.
Your teacher is going to give you directions on how to play a mini game!
What is your definition of a stranger?
What are common rules/advice for dealing with strangers in the physical world?
Those rules also apply to communication online! People met online are STRANGERS!
Some people lie about who they are and what they want on the Internet for various reasons.
Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators.
A predator is one who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.
One who is a victim or one who is vulnerable to victimization by a predator is prey, no matter what their age is.
How do these terms apply to the online environment?
You should receive a flyer on the grooming process now from your teacher.
As a class review and discuss the steps in the grooming process.
Make sure you take your flyer home and share with your parents. Discuss what you’ve learned today!
#1Avoid giving out personal information such as your name, home address, school name, or telephone number in chats or on profiles. (Includes IMs, blogs, etc.)
If you could make mistakes online, do you think others do also?
Who else could benefit from learning this information?
What are some good ways to relay this information to others?
Will you do the next activity on computers or paper?
To use a computer activity,
Go to the lesson folder for this lesson and select the HTML Activity. Otherwise, continue on…
You will receive additional materials automatically from i-SAFE for this activity.
You now know the tips and tools that can help keep you safe online! Just remember, when you’re online you aren’t invincible. Rules can keep you safe.
Find out about DRiVE!
Visit the X-BLOCK - http://xblock.isafe.org to learn about the i-Mentor Training Network.
It’s all online!
The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community.
To watch the videos go to the i-Mentor Network located in the X-BLOCK – http://xblock.isafe.org