Upload
burkev
View
873
Download
3
Tags:
Embed Size (px)
Citation preview
California Technology Assistance Project, Region 10
The Chavez Bill (AB307) requires the guidelines and criteria to include a component to educate pupils and teachers on the appropriate and ethical use of information technology in the classroom, Internet safety, avoiding plagiarism, the concept, purpose, and significance of a copyright so that pupils can distinguish between lawful and unlawful online downloading, and the implications of illegal peer-to-peer network file sharing.
AUP stands for Acceptable Use Policy. All districts should have a policy that is signed annually by students and parents.
ResourcesThis presentation (.ppt) was created to review your district's Acceptable Use Policy (AUP) and discuss with students what they are agreeing to by signing this document. Instructors should have copies of their district's Student AUP available for this discussion.AUP links from myctap.org
Students will understand the importance of following copyright guidelines, see how students can take advantage of Fair Use Guidelines, learn what plagiarism means, and see the need to cite sources.
ResourcesPresenation to review copyright and fair use policies as they apply to students.Copyright and Fair Use Lesson from Read, Write, ThinkB4UCopy.org - The B4UCopy educational program from the Business Software Alliance has a goal of raising awareness of copyright laws and reinforce responsible behavior online. Download the free curriculum for elementary and middle school students [B4UCopy.com/kids] or the high school curriculum [B4UCopy.org/teens] on copyright laws.
A "cyber predator" is someone who uses the internet to exploit someone else: financially, sexually, emotionally, or psychologically. The anonymity of the internet allows online predators to establish relationships of trust with young people where none should exist.
ResourcesPresentation with linked video (internet required) allows for classroom exploration and discussion of online safety. NetSmartz Real Life Stories State CTAP Cyber Predator linksShort Online Safety QuizFBI-SOS: Safe Online Searching
Software that allows anyone with the same software to copy files from your PC.
Peer-2-peer files-haring, or P2P, is using software to share files with anyone over the internet.
Kazaa, Limewire, and BitTorrent are some examples of file-sharing software. The original Napster was also a file-sharing program that gained wide-spread attention.
Resources Presentation reviews the legality and dangers of downloading
and P2P file sharing. State CTAP Piracy links
Personal information can be used to identify you, your location or your financial assets. Obvious: your name, age, sex, picture, phone number, address/location. Less obvious: hobbies, interests, school mascot, online group memberships
Too much personal information puts users at risk, can lead to physical harm or identity theft . The information can also be used for scamming, spamming and phishing.
Resources That's Not Cool State CTAP Website: Identity Safety
Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery, exclusion and stalking.
Cyberbullies may use email, chat rooms, discussion forums, instant messaging, cell phone text messaging or popular teen web sites such as MySpace or Facebook.
Resources Cyberbullying Videos from NetSmartz
Cyberbullying: Feathers in the Wind Cyberbullying: You Can't Take it Back Cyberbullying: Broken Friendship
NetSmart Teens State CTAP Website - Cyberbullying- visit the State CTAP
Cyberbullying site for a range of resources for educators, parents, and students.
http://kids.yahoo.com/parents/online-safety
http://kids.yahoo.com/parents/online-safety/1701--The+Big+Picture
A Parent's Guide to Internet Safety - FBI Parent's Guide
State CTAP Site - Administrator Resources for PTA Meetings
Lingo Bingo What internet chat terms do you know? (The answers are included on page two.)
A PowerPoint(TM) game on safe and appropriate intenet use, created by CTAP Region IV.
All files and links contained in this presentation can be found at this CTAP website: http://ctap10.org/easi-u