Personal safety unit level 6
1 / 74

Personal Safety Unit - Level 6 - PowerPoint PPT Presentation

  • Uploaded on

Personal Safety Unit - Level 6. The Plan.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Personal Safety Unit - Level 6' - yardan

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

Personal safety unit level 6

The Plan

Today you will be learning about personal safety when online. This unit consists of four mini lessons. The PPT covers all lessons in the unit, with a spacer slide between the lessons. The lesson activity: Identity Theft is NOT covered in this PPT. A spacer slide is in place for this lesson.

  • Safeguarding Your Identity Online: Screen Names and Passwords

  • Protecting Personal Information

  • Online Strangers, Predators, and the Grooming Process

  • Online Personal Safety Review and Action

Personal safety unit level 6

Lesson 1Safeguarding Your Identity Online:Screen Names and Passwords

Resource pages
Resource Pages

Read and review the resources pages as a class.

Think about it
Think About It

  • Is a person really anonymous if they have provided personal information in a screen name?

  • How can a safe screen/user name and/or password help you avoid danger on the Internet?

Personal safety unit level 6

Be Smart Be Safe

The Internet is not anonymous. When you sign on, others have access to you. Your e-mail address, screen name, and password serve as barriers between you and others. You need to maintain this barrier by not giving out private information. There are many out there who would like to know more for various reasons:

They could want to harm you.

They could want money

They could use information to conduct their own business - either selling your info or using it in an illegal manner.

One way to stay safe is to avoid revealing any personal information online
One way to stay safe is to avoid revealing any personal information online.

Avoid telling anyone your:



phone number




Never give a stranger your picture

These are all considered to be identifying or personal information.

Screen names
Screen Names information online.

Screen names should never contain or refer to:

  • first and/or last name

  • address

  • phone number

  • date of birth (complete or partial) or age

  • social security number

  • email address

  • combinations of personal information such as listed above

  • combinations of personal information such as listed above plus descriptions such as (but not limited to ) gender, school name, favorite sport, favorite celebrity, family member names



Passwords information online.

Follow these rules for creating a safe passwords:

  • be lengthy – at least 8 characters

  • contain a combination of letters, numbers, and symbols

  • be changed when its secrecy is in doubt

    • should not contain personal information

    • should not be shared

    • should not be easily guessed

    • should not be provided in an email, even if requested

Group activity
Group Activity information online.

Directions: Arrange the screen names on the following slide in two lists to show those that contain identifying (or potentially identifying) information and those that do not.

  • GTaylorplaysGuitar


  • REMforever

  • Miamisue13

  • canarielover

  • nymets29

  • brandonclassof09

  • wellesleygirl

  • namelessjester9

The answers
The Answers information online.

Contain identifying (or potentially identifying) information

  • andersonMJ (initials and last name)

  • (email address)

  • Miamisue13 (name, location, age)

  • brandonclassof09 (name and graduation year – tells age)

  • GTaylorplaysGuitar (initial, name, hobby)

  • wellesleygirl (location, gender)

The answers1
The Answers information online.

DO NOT contain identifying information:

  • REMforever

  • canarielover

  • nymets29

  • namelessjester9

Personal challenge
Personal Challenge information online.

Take a moment and create a screen name and password that follows the rules to be safe and secure.

Share information online.

Take time to share the screen names and passwords you created.

Can any of the screen names and/or passwords you use be changed to be safer?

Think about it1
Think About It… information online.

  • It is important to select safe and secure screen names and passwords.

  • Think about it: What should you NEVER reveal in either?

  • Think about it: What is your screen name and password? Do you think you need to change it? Why/Why not?

Lesson 2 protecting personal information

Lesson 2 information online.Protecting Personal Information

Brainstorm information online.

·Why do students feel safe on the Internet?

·What are some dangers on the Internet?

·What are some good things on the Internet?

·How can you stay away from the dangerous things?

Article information online.

Your teacher is going to read an article to you. Pay close attention because afterwards, you’re going to discuss it!

The article
The Article information online.

According to events in the article, how could what happened have been prevented?

Reference page
Reference Page information online.

  • Refer to the reference page.

  • Cover the information as a class.

Review personal information
Review – Personal Information information online.

This information should not be given out on the Internet to maintain your safety.

Name Address

School Friends’ names

Family names Age

Social Security Number Phone number

Review user id screen name
Review – User Id/Screen name information online.

A User Id is a “nickname” you select to identify you in e-mail, chats, etc.

  • DO NOT USE Personal Information such as:

    -Your real first name -Your real last name -Your location (i.e. hilliegirl, HaverhillGuy) -Your zip code -A suggestive name or word (i.e. sexyman42, hotbabygirl) -Pornographic or obscene words

    • For added security, always opt NOT to add your name or nickname to any sort of member directory.

Indirect information solicitation
Indirect Information Solicitation information online.

Sometimes, while online, people want to find out more about you for illegal purposes. However, they go about it in different ways.

You may be tricked into giving out information. You may not even realize what you have revealed. Indirect information about your school, activities, etc, could lead someone to know where you live. Be aware of what you say at all times.

Watch out for dangers on the web
Watch out for… information online.Dangers On the Web

Inappropriate sites - There are some sites you should not go to. They can be pornographic, hate filled, or upsetting.

When you accidentally come across a site you know you shouldn’t be in, close out of it quickly. If you still have trouble, try logging off completely or rebooting.

Watch out for dangers on the web1
Watch out for… information online.Dangers On the Web

Faulty information sites - Don’t trust everything you read without checking and double-checking references.

Watch out for dangers on the web2
Watch out for… information online.Dangers On the Web

Private/personal Information – Some websites ask you for private information before you can access their stuff.

Make sure you ask your parents before giving anyone private information.

Watch out for dangers on the web3
Watch out for… information online.Dangers On the Web

Your own website – Many teens now have their own websites. However, you have to be careful about what information you display.

Watch out for dangers in e mail
Watch out for… information online.Dangers in E-mail

  • E-mail is an online form of communication, typically between two people. Just like in regular mail, users write letters and send them electronically.

  • Spamming – many companies advertise via e-mail. They try to entice you to purchase items, visit inappropriate sites, etc. Delete these e-mails.

  • Be careful when you reply to an e-mail. You are including your e-mail address and you don’t know where it will go from there.

Watch out for dangers in email
Watch out for… information online.Dangers in Email

  • Inappropriate, offensive, angry e-mail should be reported to your Internet provider.

  • Remember - the sender of an e-mail may not be someone you know – don’t send personal information, photographs, etc.

Watch out for dangers in chatting and socializing
Watch out for… information online.Dangers in Chatting and Socializing

Chats and blogs can result in revealing information you wouldn’t normally reveal.

This can leave you open to someone who might want to harm you.

Here are some tips to remember when chatting
Here are Some Tips to Remember when Chatting information online.

  • Keep online interaction online. Don’t agree to meet or phone people met online.

  • Don’t give out personal information. Be careful about indirectly saying too much – like school mascot, game times, etc. Eventually you will have said enough.

  • Keep your parents or guardians informed of online interaction.

  • Use Chat rooms that are moderated.

  • Be suspicious of someone who wants to be your friendand turns you against your parents, teachers or friends.

  • Private chats aren’t always private – when you meet offline friends online in a private chat room be careful. Others can often enter and lurk.

  • Try to choose a gender-neutral online screen name

Watch out for dangers in newsgroups forums and social networking sites
Watch out for… information online.Dangers in Newsgroups, Forums, and Social Networking Sites

  • The most important thing to remember is to AVOID including personal information in postings. Don’t reveal anything identifying about yourself.

  • Realize that by posting something, you are making it public.

  • Be careful not to participate in a group, which might be illegal or hateful.

Resources for reporting incidents
Resources for reporting incidents: information online.

Here is a general guideline for reporting Internet wrongdoing.

  • Call the local police and ask if they have a dept. affiliated with "Internet Crimes Against Children (ICAC). If they do, go through that dept.

    2. Simultaneously, file a report with the Cybertips hotline: 1-800-843-5678. Reports can be made directly online by clicking on the Cybertipline at

Return to the article
Return to the Article information online.

  • Your teacher will hand out a copy of the article read at the beginning of the lesson.

  • Review it and answer the questions on the following slide.

The questions
The Questions information online.

  • What mistakes did Brittany make that lead her into potential danger?

  • What are some potential problems students could find themselves in concerning:

    • Screen name

    • Password

    • Revealing personal information

    • Not asking for adult help

Bingo review
Bingo Review information online.

You are now going to play a Bingo Review game.

All right everyone have a card
All right – information online.Everyone Have a Card?

Good! Fill in your card with the following terms.

Words to use
Words to Use information online.

1.   LMSmith14 2. Singin4fun

3.   Chat rooms 4. Predator

5.   Address 6. Password

7.   Internet Service Provider 8. Spam

9.   Police 10. Indirect

11. Cyber Stalking 12. Online nickname

13. Inappropriate 14. Public

15. Moderated 16. Private Information

17. References 18. Picture

19. Cyber tipline 20. Change it

21. False 22. True

23. “.exe” 24. Flame

Here are the directions to get started
Here are the directions to get started information online.

  • Use the vocabulary words to fill in your bingo card randomly.

  • Your teacher will ask you a question.

  • Find the correct answer on your card and mark it off.

  • When you have five in a row – horizontally, vertically, or diagonally – call out Bingo.

All finished
ALL Finished??? information online.

Let s review
Let’s Review! information online.

Remember: It is important that anytime you are asked to post personal information online you need to ask permission from a parent or supervising adult. This includes entering websites, filling out profiles, forms, etc.

Personal safety unit level 6

Lesson 3 information online.Identity Theft – NO corresponding PPT

Lesson 4 online strangers predators and the grooming process

Lesson 4 information online.Online Strangers, Predators, and the Grooming Process

Talk about it
Talk About It information online.

  • How many of you use the internet?

  • How many of you go online alone?

  • What do you like to do online?

  • Is it your intention to be talking to adults while online?

  • How do you know if someone is your own age when online?

Pause for activity
Pause for Activity information online.

Your teacher is going to give you directions on how to play a mini game!

Review the activity
Review the Activity information online.

  • Raise your hand if you found it easy or if you got your answers.

  • How did you get your answer if not able to ask the question?

  • Discuss some of the strategies used to uncover answers.

  • Who had a difficult time? Why?

  • Did some people resist giving information? Did this make the assignment more difficult? Would it also make it difficult for someone online to find information?

Strangers information online.

What is your definition of a stranger?

What are common rules/advice for dealing with strangers in the physical world?

Strangers online
Strangers Online information online.

Those rules also apply to communication online! People met online are STRANGERS!

Online predators
Online Predators information online.

Some people lie about who they are and what they want on the Internet for various reasons.

Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators.

Key point
Key Point information online.

A predator is one who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.

Key point1
Key Point information online.

One who is a victim or one who is vulnerable to victimization by a predator is prey, no matter what their age is.

Online predators and prey
Online Predators and Prey information online.

How do these terms apply to the online environment?

Minimize dangers
Minimize Dangers information online.

  • Choose screen name carefully

  • Don’t reveal information online

  • Choose people to communicate with online carefully

  • No matter what – Tell an adult if you are made to feel uncomfortable online or are approached by someone who discusses inappropriate things or wants to meet you offline.

Grooming flyer
Grooming Flyer information online.

You should receive a flyer on the grooming process now from your teacher.

As a class review and discuss the steps in the grooming process.

Make sure you take your flyer home and share with your parents. Discuss what you’ve learned today!

Let s review1
Let’s Review information online.

  • Anyone met online is a stranger.

  • What are the steps a predator uses to groom a potential victim?

  • Remember: It is important to avoid revealing personal information online and have safe screen names so that you are not targeted by strangers online.

  • Remember: It is important to report stranger behavior online that makes you uncomfortable, asks for personal information, or requests a face to face meeting.

Lesson 5 online personal safety review and action

Lesson 5 information online.Online Personal Safety Review and Action

Personal safety unit level 6
Make sure you have a copy of the resource page to review: information online.The FBI Internet Safety Tipsi-SAFE’s 4’R’s





Personal safety unit level 6

#1 information online.Avoid giving out personal information such as your name, home address, school name, or telephone number in chats or on profiles. (Includes IMs, blogs, etc.)

Personal safety unit level 6
#2 information online.Never write to someone who has made you feel uncomfortable or scared, even if you or your parents know who they are.

3 do not meet someone or have them visit you without the permission of your parents
#3 information online.Do not meet someone or have them visit you without the permission of your parents.

Personal safety unit level 6
#4 information online.Tell your parents right away if you read anything on the Internet that makes you feel uncomfortable.

5 remember that people online may not be who they say they are
#5 information online.Remember that people online may not be who they say they are.

Share what you know about

Review information online.

Share what you know about..

  • Screen names

  • Passwords

  • Online personal information

What would you do
What would you do…. information online.

  • If a website you want to enter requests personal information?

  • If you are presented with a profile for IM or chat that requests personal information?

  • If you are talking to someone online who requests personal information?

Remember never reveal information online without a parent s knowledge or permission
Remember: Never reveal information online without a parent’s knowledge or permission.

What about others
What About Others parent’s knowledge or permission.

If you could make mistakes online, do you think others do also?

Who else could benefit from learning this information?




What are some good ways to relay this information to others?

Teacher s choice
Teacher’s choice: parent’s knowledge or permission.

Will you do the next activity on computers or paper?

To use a computer activity,

Go to the lesson folder for this lesson and select the HTML Activity. Otherwise, continue on…

Build a brochure
Build a Brochure parent’s knowledge or permission.

  • You will be building a brochure to educate others about online personal safety.

  • Use what you have learned today to help others!

  • You will either be building your brochure using paper or a computer.

  • Let’s meet back here when you finish it!

Brochures completed
Brochures Completed! parent’s knowledge or permission.

  • As a class decide which brochure is the most informative and creative.

  • Make plans to copy the brochure and distribute. (Another option is to have multiple brochures utilizing all brochures students have created.)

  • Where will your brochure have the most impact?

  • Plan a distribution day. Ideas: distribute at lunch, in library, with report cards, etc.

Let i safe help
Let i-SAFE Help! parent’s knowledge or permission.

  • Go to

  • Click on Implementation Plan

  • Select Brochure Distribution.

    You will receive additional materials automatically from i-SAFE for this activity.

That s a wrap
That’s a wrap! parent’s knowledge or permission.

You now know the tips and tools that can help keep you safe online! Just remember, when you’re online you aren’t invincible. Rules can keep you safe.

It doesn t have to end here
It doesn’t have to end here! parent’s knowledge or permission.

Find out about DRiVE!

Personal safety unit level 6

Take Action parent’s knowledge or permission.It’s Easy with the i-Mentor Training Network!

Visit the X-BLOCK - to learn about the i-Mentor Training Network.

It’s all online!

The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community.

To watch the videos go to the i-Mentor Network located in the X-BLOCK –

Personal safety unit level 6

Get the recognition you deserve as an i-SAFE Mentor parent’s knowledge or permission.

  • Enroll online at by clicking on Create an Account.

  • Go to the X-BLOCK and submit the Online Mentor Menu.

  • Download your own Student Toolkit and materials to get started.

Take Action