Apply personal security protocols
The Technology Tail: A Digital Footprint Story (Communicate with Confidence)
Paperback – September 1, 2017 by Julia Cook (Author), Anita DuFalla (Illustrator) A cute, creative story about children and their texts, tweets, posts and pics. Don t be mean and irresponsible!
That is the straight-to-the-point advice Screen has for young readers who are active on social media. Whether tapping out messages on their computers, tablets or phones, Screen wants kids to know their words will follow them for life, creating a digital trail that can't be erased. A timeless message to a new generation just learning how to navigate the fast-changing digital age. Written for children in grades 1-6, this storybook uses rhymes and colourful illustrations to grab their attention. There are also tips for parents and teachers who want to reinforce kindness and respect in a high-tech world. Amazon |
Once Upon a Time... Online: Happily Ever After Is Only a Click Away!
Hardcover – December 27, 2016 by David Bedford (Author), Rosie Reeve (Illustrator) But I Read It on the Internet! (Mrs. Skorupski Story) Hardcover – February 14, 2013by Toni Buzzeo (Author), Sachiko Yoshikawa (Illustrator) Hunter and Carmen disagree whether George Washington really had wooden teeth, and Mrs. Skorupski encourages them to research the story on the internet and use her "Website Evaluation Gizmo" to evaluate websites and come up with the correct answer. Once upon a time, a laptop arrived in Fairy-tale land... A happily ever after is only a click away! Find out what happens when our favourite fairy-tale characters receive a laptop and learn a lesson in online safety. |
WHAT WOULD YOU DO?
As horrific as the request was, the person who sent it was pretending to be an employee of the app.
“Welcome to this Amino group. My name is Mandy and I work with Amino,” the message says.
“So if you don’t know this is a safe space for young girls. We require users to be 14 and younger. If you fit these requirements you can be here.
“We also have to make sure that all members here are girls. To verify this I will need from you a photo of your bare chest (with a bra on if you feel uncomfortable) and age.
“This is just an extra security feature but all members must do this. Users that refuse to do this will be permanently banned.”
A spokesperson for the app has come forward to respond to the claims, highlighting their “zero-tolerance” for inappropriate contact with minors.
For more of the story visit: Ten year old girl asked to send a topless photo
(Source: News.com.au)
“Welcome to this Amino group. My name is Mandy and I work with Amino,” the message says.
“So if you don’t know this is a safe space for young girls. We require users to be 14 and younger. If you fit these requirements you can be here.
“We also have to make sure that all members here are girls. To verify this I will need from you a photo of your bare chest (with a bra on if you feel uncomfortable) and age.
“This is just an extra security feature but all members must do this. Users that refuse to do this will be permanently banned.”
A spokesperson for the app has come forward to respond to the claims, highlighting their “zero-tolerance” for inappropriate contact with minors.
For more of the story visit: Ten year old girl asked to send a topless photo
(Source: News.com.au)
Use the quizzes either pre-movie and /or after movie and discussion.
do not share personal information
What is personal information?
Discuss with the students what is meant by ‘personal information’.
Discuss with the students what is meant by ‘personal information’.
- First name,
- Middle name,
- Surname,
- Address,
- Home town,
- Post code,
- School name,
- Age,
- Date of Birth,
- Family Members,
- Friends,
- Photos...
- Could someone use them to identify / contact you?
What types of personal information would you share with different people?
Is it OK to give other people's personal information away without their permission?
- Their doctor,
- A famous sports star,
- Their teacher
- Their favourite singer,
- A taxi driver,
- A friend's grandad.
Is it OK to give other people's personal information away without their permission?
This activity reinforces messages about personal safety and protective measures for dealing with strangers online.
Cybersmart Detectives is easy to facilitate and provides an excellent opportunity to address some of the 'Personal, Social and Community Health' content in the Health and Physical Education curriculum.
Cybersmart Detective Teaching notes
Cybersmart Detectives is easy to facilitate and provides an excellent opportunity to address some of the 'Personal, Social and Community Health' content in the Health and Physical Education curriculum.
Cybersmart Detective Teaching notes
Email phishing and spam
Spam is unsolicited bulk junk emails which use up valuable space and time.
Phishing emails are potentially harmful exposing our system to viruses and other damaging
.
You are requested to delete these messages. Here are some suggestions on recognising and managing spam and phishing emails:
Spam is unsolicited bulk junk emails which use up valuable space and time.
Phishing emails are potentially harmful exposing our system to viruses and other damaging
.
You are requested to delete these messages. Here are some suggestions on recognising and managing spam and phishing emails:
- If you don't recognise the sender or the subject looks suspicious, delete the message without opening it.
- Never open attachments links in messages from strangers, or even suspicious-looking messages from people that you know.
- Never reply to spam messages or attempt to contact the sender.
- Be careful who you give your email address to.
- Never confirm details like account numbers or passwords.
- If you believe the email may be genuine, contact the institution and confirm its validity.
secure sites
Look at the security symbol in the url (address)Some websites will display a lock symbol in the address bar. This is most commonly seen with certain types of websites, like online stores and banking sites.
This means the website is using an HTTPS connection, which makes it safe to enter your personal information.
You won't see this symbol on all websites, and that's OK—not all websites need this extra layer of security.
However, you should avoid entering any sensitive information, such as your credit card number, if you don't see this symbol in the address bar.
This means the website is using an HTTPS connection, which makes it safe to enter your personal information.
You won't see this symbol on all websites, and that's OK—not all websites need this extra layer of security.
However, you should avoid entering any sensitive information, such as your credit card number, if you don't see this symbol in the address bar.
Turning off email images
Spam messages often contain images that the sender can track. When you open the email, the images will load and the spammer will be able to tell if your email works, which could result in even more spam.
You can avoid this by turning off email images.
Let's look at how to do this in Gmail, but remember that the process will vary depending on your email service.
Spam messages often contain images that the sender can track. When you open the email, the images will load and the spammer will be able to tell if your email works, which could result in even more spam.
You can avoid this by turning off email images.
Let's look at how to do this in Gmail, but remember that the process will vary depending on your email service.
phishing
Phishing scams are messages that try to trick you into providing sensitive information.
These often appear to come from a bank or another trusted source, and they'll usually want you to re-enter a password, verify a birth date, or confirm a credit card number.
Phishing messages may look real enough at first glance, but it’s surprisingly easy for scammers to create convincing details.
other email scams
Spam and phishing are common problems, but there are many other types of email scams you may encounter.
Some will promise to give you a lot of money if you advance a small amount upfront.
Others may pretend to be from people you know in real life, and they'll often ask you to send money or download an attached file.
As with spam and phishing scams, remember to trust your best judgement.
You should never send someone money just because you've received an email request.
You should also never download email attachments you weren't expecting because they might contain malware that could damage your computer and steal your personal information.
Thanks to http://www.gcflearnfree.org/
Some will promise to give you a lot of money if you advance a small amount upfront.
Others may pretend to be from people you know in real life, and they'll often ask you to send money or download an attached file.
As with spam and phishing scams, remember to trust your best judgement.
You should never send someone money just because you've received an email request.
You should also never download email attachments you weren't expecting because they might contain malware that could damage your computer and steal your personal information.
Thanks to http://www.gcflearnfree.org/