Sei sulla pagina 1di 17

+

Cyber Safety
A Brief Overview of Internet Safety Policies and Procedures
Created By Dario Workman

+
Purpose:
To

inform all administrators, licensed


personnel and staff regarding the
acceptable usage policies on campus,
the dangers associated with Internet
usage, and methods of protection from
Internet predators.

+
Topic Overview and Definitions
Acceptable

Use Policies A set of rules to be


followed by users

Cyber

Bullying - bullying that takes place using


electronic technology

Cyber

Predators A predator that uses the Internet


to hunt for victims to take advantage of in ANY way

Identity

Safety Protecting your identity and keeping


yourself safe while using the Internet

Piracy

and Plagiarism Theft and usage of


copyrighted materials without authorization

+
Acceptable Use Policies
An

acceptable use
policy (AUP) is a
document
stipulating
constraints and
practices that a user
must agree to for
access to a
corporate network or
the Internet.

An AUP usually requires the user to


agree that they will not do the following:

Use the service as part of violating


any law

Attempt to break the security of any


computer network or user

Post commercial messages to Usenet


groups without prior permission

Attempt to send junk e-mail or spam


to anyone who doesn't want to receive
it

Attempt to mail bomb a site with mass


amounts of e-mail in order to flood
their server

+
Acceptable Use Policies

The Clark County School District requires that all


schools agree to the same AUP

Failure to comply with an AUP may result in termination


from employment

CCSD Acceptable Use Policy

+
Cyber Bullying

Cyber bullying is bullying that takes place using


electronic technology, such as:
Cellphones
Computers
Tablets
Social

Media Sites
Text Messages
Chat rooms
Websites.

Dont be a Bully

+
Cyber Bullying
Cyber bullying can take many forms:
Sending

mean messages or threats to a persons email account


or cell phone

Spreading

rumors online or through texts

Posting

hurtful or threatening messages on social networking


sites or web pages

Stealing

a persons account information to break into their


account and send damaging messages

Pretending

to be someone else online to hurt another person

Taking

unflattering pictures of a person and spreading them


through cell phones or the Internet

Sexting,

or circulating sexually suggestive pictures or messages


about a person

+
Cyber Bullying

Depression and anxiety, increased feelings of sadness


and loneliness, changes in sleep and eating patterns,
and loss of interest in activities they used to enjoy.
These issues may persist into adulthood.

Health complaints

Decreased academic achievementGPA and


standardized test scoresand school participation.
They are more likely to miss, skip, or drop out of
school.

Cyberbullying.gov

+
Cyber Predators
There is no one single method in
which online predators work, but
here are several common
methods:

Be smart
about Cyber
Safety!

Impersonate a child

Stalk Social Media

Gather Personal Information

Seduction by Flattery,
Sympathy, Attention or Gifts
(also known as Grooming)

Discuss the Latest Music,


Hobbies and Fashion

Gradually Introduce Sexually


Graphic Material

+
Cyber Predators

Approximately 95 percent of all Americans between 12


and 17 years old are online

One in five U.S. teenagers who regularly log on to the


Internet says they have received an unwanted sexual
solicitation via the Web.

75% of children are willing to share personal


information online

In 100% of the cases, teens that are the victims of


sexual predators have gone willingly to meet with them

Puresight.com

+
Identity Safety
For the National Crime Victimization Survey (NCVS), the
definition of identity theft includes three general types of
incidents:

Unauthorized use or attempted use of an existing account

Unauthorized use or attempted use of personal information


to open a new account

Misuse of personal information for a fraudulent purpose.

+
Identity Safety

Use complicated passwords that only


you can remember. Do not use your
birthdate or last name. Change your
passwords often.

Understand that online photos and


videos can be copied and altered.

Do not download files or links in emails


sent to you by people you do not know.

Your students safety is important to you.


Advise them on how to be safe on the
Internet as well.

Cybersmart.org

Identity Safety Video

+
Piracy and Plagiarism
Piracy-

The unauthorized duplication of


copyrighted content that is then sold at
substantially lower prices

Plagiarism-

An act or instance of using or


closely imitating the language and thoughts
of another author without authorization and
the representation of that author's work as
one's own, as by not crediting the original
author.

+
Piracy and Plagiarism
The following are considered Plagiarism:

copying text without giving proper credit to the original


author or source

copying information from Internet sites and passing it


off as your own

using someone else's paper or project and turning it in


as your own

Plagiarism.org

+
Piracy and Plagiarism
The following are considered Piracy if done
illegally and without permission from the
owner:

Downloading music
Copying software
Downloading games
Downloading and/or copying movies
Anytime you download or copy
copyrighted material without the
author's/creator's permission and it is
ILLEGAL.

+
Review

Be sure that you understand what your sites


Acceptable Use Policy allows and be compliant

Be knowledgeable about who you are giving your


personal information to and under no circumstances
should you post any personal information publicly
online.

Understand that there are people online who are


looking for easy targets. Dont let yourself be one of
them!

Never pass along someone elses work as your own

Never download content illegally or without the owners


permission.

+
Sources:

Bureau of Justice Statistics. (2016, April 22). Identity theft. RetrievedApril23,


2016, from www.bjs.gov/index.cfm?ty=tp&tid=42

CyberSafetySite422. (2016). Identity Safety - CyberSafetySite. Retrieved from


https://sites.google.com/site/cybersafetysite422/home/identity-safety

Dictionary.com. (2016). Piracy and Plagiarism | Define Piracy and Plagiarism at


Dictionary.com. Retrieved from http://www.dictionary.com/browse/plagiarism

Plagiarism.org. (n.d.). Plagiarism.org - Best Practices for Ensuring Originality in


Written Work. Retrieved from http://www.plagiarism.org/

Puresight.com. (2016). How do online predators operate? | PureSight |


Pedophiles/Online Predators. RetrievedApril23, 2016, from
http://puresight.com/Pedophiles/Online-Predators/how-do-online-predatorsoperate.html

StopBullying.Gov. (2016). Effects of Bullying | StopBullying.gov.


RetrievedApril23, 2016, from http://www.stopbullying.gov/atrisk/effects/index.html

What is acceptable use policy (AUP)? - Definition from WhatIs.com. (2014, July).
RetrievedApril23, 2016, from
http://whatis.techtarget.com/definition/acceptable-use-policy-AUP

Potrebbero piacerti anche