5 minute read

ISMART 2021 POWER POINT

214

1. Ask students what kinds of electronic devices they use….

Advertisement

2. The words they use, the images and videos they send or post, all have incredible power. ⮚ What are some ways that your words have power? ⮚ What about images: pictures, drawings and videos?

3. Talk about what Power is….It can be positive or destructive. ⮚ In a positive way…Power can help or support someone. ⮚ And you have power to avoid risks by making good decisions about your online activities. ⮚ What we send and post online can impact our lives and maybe our friends and family.

4. What is reputation? Is it about how many likes you get? While that might seem important to you now, how adults, schools, parents of your friends think of you can be helped by what you post or send. How may of you want to get a job someday? How many f you want to go to college? Employers and universities are looking at online activity to determine character.

It is not just about you, it is about everyone's: reputations and safety. ⮚ Can you think who that might include? • Family • Friends • ????? 5. Today we are going to highlight some of the risks that you can avoid. We want you to experience safe and rewarding online activities. Tell story

The decisions we make with our electronic devices are important. ⮚ Look at this photo…. Does anyone know where this is? Times Square, NYC If you were there, who might be with you? What safety rules would you be practicing? • That is correct! We need to be mindful of the safety rules our families have taught us! Would you ever go there alone? Why? ⮚ Now let’s look at this photo…. Are they alone? NO…if they are connected to wifi…they are connected to someone. And what about mobile phones? Do you think they need to be mindful of safety rules?

Let’s get started with iSmart.

Know the difference between information worth sharing and private information. There are many ways you can share your ideas and creativity online, but personal information should remain private. Never input personal identity information such as phone numbers, addresses, or your date of birth in order to download something. And never, ever give Social Security numbers or credit card information.

You wouldn’t give a key to their house to someone without their permission. Same thing for information you may know about them. It is up to them to give out info.

Show video

Click for safety rules private identity information in your password. Identity thieves can use this information to pretend to be you. • Don’t use a word in the dictionary as a password. Hackers use programs that will try every word in the dictionary to guess passwords. • Do use combinations of letters, numbers, and symbols. These are harder to crack than regular words because there are more combinations to try.

Which password looks like the best choice? The 3rd choice because no identifying info and a symbol was used.

Protect yourself ‐‐ and your stuff ‐‐ with strong passwords that safeguard

your digital data. Use these tips to help you do it: • Don’t use passwords that are easy to guess –such as your nickname or your pet’s name. People who know you well can guess these kinds of passwords. • Don’t use any words found in the dictionary

Show video…discuss Self‐reflect before you self‐reveal. If you post something or send something…make sure you have the approval of that person. Reinforce with the 3 Ps

story

Protect yourself ‐‐ and your stuff ‐‐ with strong passwords that safeguard your digital data.

Once you post something online, you can’t take it back.

Talk about: Posting embarrassing things about themselves or pother people. • Pranks/silly photos • Revealing pictures

Between minors: The sending of sexually explicit photos, images, text messages, or e‐mails by using a cell phone or other mobile device.

NO OLDER TEEN OR ADULT SHOULD

• TALK ABOUT DATING YOU • ASK FOR REVEALING PICTURES • ASK TO MEET YOU OFFLINE

The reasons teens “sext” vary widely. In some cases it’s a form of flirting or a way of showing affection for a boyfriend or girlfriend or someone the teen is interested in dating. Sometimes it’s impulsive behavior, perhaps at a party. There are also cases where the teen is responding to peer pressure, bullying or even threats. In rarer cases, adults solicit images from teens.

the sending of sexually explicit photos, images, text messages, or e‐mails by using a cell phone or other mobile device.

Avoid the risks: Sending mean messages Posting inappropriate pictures Talking to people you don’t know Visiting inappropriate sites

spy∙ware ˈ spīwer/ noun noun: spyware software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. Spyware is a general term used to describe software that performs certain behaviors, generally without appropriately obtaining your consent first, such as: Advertising Collecting personal information Changing the configuration of your computer Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information.

Be very careful with what you download. Don’t download free games or videos to your computer. These programs often come with spyware and viruses that will land your computer in the shop –and you in hot water.

You saw spyware on the screen…what is it? Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.

Don’t be tricked!

• completing four surveys • signing up for six trial offers to get your prize your e‐mail address is usually sold to every spammer with a computer That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it.

The gaming icon is included because gamers have to follow the same safety guidelines.

All of the social media platforms have guidelines to follow. Create appropriate screen nemes. Do not use personal information in your screen name.

Facebook can record and access all information you share on Facebook. All of it! I can also access information other Facebook users share about you on Facebook, as well as a variety of information other Facebook users share about you on Facebook, as well as information from the websites you visit through the “like” button –even if you are not logged in at the time. Although Facebook allows you to make certain information private, some information is public, no matter what you do.

Only accept friends you know in real life. Do you really know who you are talking to? Keep in mind the 3Ps

Slide #17

Talk about resources

Slide #18

NOVA supports and empowers crime victims in Bucks County Support 24‐hours on the hotline

Website for further support

Slide #19

Monday –Friday: 9:00 AM to 7:00 PM Saturday: 9:00 AM to 12:00 PM

244

This article is from: