Cyber Safety
LaMar S. Brown
Topics
Acceptable Use Policies - signed and written
agreement
Cyberbullying - using technology to harass
Cyberpredators - using internet to harm
Identity Safety - being cautious of info shared
Inappropriate Content - visual deceptions, porn
Piracy, Plagiarism using protected material
Acceptable Use Policies
An AUP is a written agreement, signed by
students, their parents, and teachers,
outlining the terms and conditions of Internet
use.
Definition provided by isafe
Acceptable Use Policies
Needs to be current and updated frequently due to
emerging technologies
Must become more specific by including personal
technology
Encourage ethical behavior with students
(tips found on ED TECH)
We must keep this updated to ensure we are covering
all potential ends. With technology evolving so
rapidly we must update the form regularly.
Cyberbullying
Cyberbullying is the use of technology for
social cruelty, which can include harassment,
impersonation, denigration, trickery, exclusion
and stalking.
Definition provided by CTAP
Cyberbullying
Take immediate action
Make students aware of cybertipline.com
Conduct preventative activities as seen on
Cybersmart
Making sure our students are protected is very
important. As educators we must take immediate
action in the event of cyberbullying.
Cyberpredators
A Cyber predator uses the Internet to hunt for victims to
take advantage of in ANYway, including sexually,
emotionally, psychologically or financially. Cyber
predators know how to manipulate kids, creating trust
and friendship where none should exist.
Definition provided by CTAP
Cyberpredators
2008- Child Pornography reports 85,301
2008- Online enactment of children for sexual acts-
8,787
Keep students aware of the constant threats
(statistics found on Missing Kids)
Cyber predators is a growing crime. We need to make
efforts to keep our students aware of the danger and
safe.
Identity Safety
Personal information can be used to identify you,
your location or your financial assets. Obvious: your
name, age, sex, picture, phone number,
address/location. Less obvious: hobbies, interests,
school mascot, online group memberships.
Definition provided by CTAP
Identity Safety
Students should use caution when using providing
personal information
Create strong passwords
Dont open unknown emails
Look for htts- The (s) means the site is secure
(tips found on Netsmartz)
Identity safety is important not only for the students
but for educators as well. Always exercise caution
when sharing personal information to avoid identity
theft.
Inappropriate Content
Inappropriate content has been defined in the
Children's Internet Protection Act
as visual depictions that are obscene, child
pornography, or material "harmful to minors
Definition provided by CTAP
Inappropriate Content
Place monitors in places were they are easily visible
Promote AUP
Address issues when students access IC
(tips found on CSRIU)
The web is filled with inappropriate content. We must
always promote appropriate use when students are
working online.
Piracy & Plagiarism
Piracy or Intellectual Property refers to the ownership
rights of materials, created, written, designed or
expressed by individuals. These materials include music,
games, movies, photos, and writing. Illegally
downloading or sharing intellectual property without the
permission of the creator is a crime punishable by law.
Definition provided by CTAP
Piracy & Plagiarism
Help promote piracy and plagiarism awareness
Educators must understand fair use
Get permission to use material (when needed)
Make yourself aware of copyright and fair use laws as it
is easy to be in violation. For additional explanation
visit Media Education Lab.
Conclusion
Understanding and knowing cybersafty is very important. It helps ensure
we are providing a safe learning and working environment for
students and educators. Understanding AUP, cyberbullying,
cyberpredators, identity safety, inappropriate content, piracy and
plagiarism will help us create the awareness and teach us how
to recognize potential threats.
Self educate about each topic
Create awareness with students
Encourage online safety
Set examples
For additional information be sure to visit the following links.
Reference List
California Technology Assistance Project. (2010). Cyberbulling.
In California Technology Assistance Project.
Retrieved February 23, 2012, from
http://www.myctap.org/index.php/cyberbyllying
California Technology Assistance Project. (2010).
Cyberpredators. In California Technology Assistance
Project. Retrieved February 23, 2012, from
http://www.myctap.org/index.php/cyber-predators
California Technology Assistance Project. (2010). Identity Safety.
In California Technology Assistance Project.
Retrieved February 23, 2012, from
http://www.myctap.org/index.php/identity-safety
California Technology Assistance Project. (2010). Inappropriate
Content. In California Technology Assistance Project.
Retrieved February 23, 2012, from
http://www.myctap.org/index.php/inappropriate-
content
California Technology Assistance Project. (2010). Piracy and
Plagiarism. In California Technology Assistance
Project. Retrieved February 23, 2012, from
http://www.myctap.org/index.php/piracy-a-
olagiarism
Common Sense Media. (2012). Prevention Activities for School,
Families, and Community. In Cyber Smart Curriculum. Retrieved
February 22, 2012, from
http://cybersmartcurriculum.org/cyberbullying/prevention/
i-SAFE, Inc. (1998-2009). Acceptable Use Policies. In I Safe. Retrieved
February 22, 2012, from
http://www.isafe.org/imgs/pdf/education/AUPs.pdf.
Media Education Lab. ((Unknown)). Code of Best Practices in Fair Use
for Media LiteraCy edUCation. In Media Education Lab.
Retrieved February 23, 2012, from
http://csriu.org/onlinedochttp://mediaeducationlab.com/sit
es/mediaeducationlab.com/files/CodeofBestPracticesinFairUse.pdfs/doc
uments/nwnas.html.
NetSmartz. (2010). Protecting Your Kids Online. In National Center for
Missing or Exploited Children. Retrieved February 23, 2012,
from
http://cdn.netsmartz.org/tipsheets/protecting_kids.pdf.
Unknown. (1-12/31/08). CyberTipline: Annual Report Totals By
Incident Type. In National Center for Missing and Exploited
Children.Retrieved February 22, 2012, from
http://www.missingkids.com/en_US/documents/CyberTiplineReportTota
ls.pdf.
Willard, Nancy . (December 13,2000 ). Choosing Not To Go Down the
Not-so-good Cyberstreets. In Center for Safe and
Responsible Internet Use. Retrieved February 23, 2012,
from http://csriu.org/onlinedocs/documents/nwnas.html.