Digital Footprint Video. Digital Footprint Video Discussion Guide. Oops I Broadcast it on the Internet Lesson Plan. Digital Footprint Image. NetSmartz Teens Presentation. Title CloseX About Us Donate MissingKids.com NetSmartzKids.org NSTeens.org Language: Login Register Teens Presentation Download Presenter's Guide Learn Teach Watch About Us | Contact Us | Legal Information | Site Map.
NetSmartz Teens Presenters Guide 2015. Parent's Guide to Online Safety. 5 Best Apps to Protect Teens, Kids Online: KSL story. 4 Ways for Teachers to Stay Safer Online- NetSafe Utah. 1) Acceptable Use Policies (AUP) AUP's are "contracts" that outline how students can use the technology, what they cannot do with it and the consequences for violating the policy.
These should include school web pages and the content that is allowed on them. AUPs should be signed by an authorized representative of the school, students and parents so that all concerned parties are aware of the policy. 2) No Student Names It is recommend that when referring to students on a web page that either their names not be used or only their first names be posted. 3) Student Pictures. Office of the Children's eSafety Commissioner. Scams are often sent via email but can also be sent by instant messaging and SMS.
According to the Australian Competition and Consumer Commission’s (ACCC) SCAMwatch website anyone can fall victim to a scam. Scams succeed because they look like the real thing and scammers manipulate people into responding. Scams can appear to come from authoritative sources, like a well-known bank or mobile phone provider. They may make people fearful that they will miss out on a special offer, or feel ashamed of themselves for refusing to help a person or group in need. If in doubt about the legitimacy of a website, call the organisation it claims to represent. Identity Theft. Methods According to the Federal Trade Commission (FTC), identity thieves can obtain information by rummaging through trash or stealing from purses, wallets, mailboxes, or homes. They may also use electronic methods, such as those listed below.
Phishing relies on pop-ups, spam, and websites that look authentic to obtain personal information, such as log-in information and credit card numbers. Pharming uses malicious code to redirect users to fraudulent sites where hackers can access their personal information. Pretexting acquires personal information through false and illegal means, for example, obtaining financial information by pretending to call from a bank. These scams are sometimes accomplished with the use of malware (software designed to damage computers). Social Media Explained Poster. Common Sense Media: Facebook, Instagram, and Social Topic Center. KSL: Investigation Shows Why Teens Shouldn't 'Friend' People They Don't Know. Gaming Tips. Gaming Parent Handout. A Parent's Guide to Gaming. Video Games Play May Provide Learning, Health, Social Benefits, Review Finds. WASHINGTON — Playing video games, including violent shooter games, may boost children’s learning, health and social skills, according to a review of research on the positive effects of video game play to be published by the American Psychological Association.
The study comes out as debate continues among psychologists and other health professionals regarding the effects of violent media on youth. An APA task force is conducting a comprehensive review of research on violence in video games and interactive media and will release its findings in 2014. Frequently Asked Questions about Copyright and Fair Use. What is fair use?
The Copyright Act gives copyright holders the exclusive right to reproduce works for a limited time period. Fair use is a limitation on this right. Fair use allows people other than the copyright owner to copy part or, in some circumstances, all of a copyrighted work, even where the copyright holder has not given permission or objects. How does fair use fit with copyright law? Copyright law embodies a bargain.
However, copyright law does not give copyright holders complete control of their works. About Creative Commons Licenses: creativecommons.org. Our public copyright licenses incorporate a unique and innovative “three-layer” design. Each license begins as a traditional legal tool, in the kind of language and text formats that most lawyers know and love. We call this the Legal Code layer of each license. But since most creators, educators, and scientists are not in fact lawyers, we also make the licenses available in a format that normal people can read — the Commons Deed (also known as the “human readable” version of the license).
The Commons Deed is a handy reference for licensors and licensees, summarizing and expressing some of the most important terms and conditions. Think of the Commons Deed as a user-friendly interface to the Legal Code beneath, although the Deed itself is not a license, and its contents are not part of the Legal Code itself. Searching for open content is an important function enabled by our approach. Fair Use Checklist. Copyright & Creative Commons Explained for Kids Video. Questia How To Avoid Plagiarism Video.
Excellent Video Clips on Plagiarism to Share with Your Students. Turnitin - Originality Check! Works with Canvas. Handouts on Plagiarism from Plagiarism.org. Responding to Cyberbullying: Guidelines for Administrators. What is Cyberbullying. Cyberbullying is bullying that takes place using electronic technology.
Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. Why Cyberbullying is Different Kids who are being cyberbullied are often bullied in person as well. Cyberbullying. Cyberbully PSA. Tips to Prevent Sexting. Your Photo Fate Video.