Internet+Safety

Internet Safety What is an acceptable use policy? It is a document signed by the students, teachers, and parents with conditions set for Internet use.It is important for all schools to have some sort of acceptable use polices because there are many negative aspects to using the internet. Many schools are coming up with policies that will allow proactive education instead of not letting the students access information not available in schools. What is phishing? Phishing is another form of fraud or identity theft. It is when a person sends an email or tries to con a person into giving them their private information for the use of their identity.
 * Acceptable Use Policies **
 * Phishing **

Students should be given clear rules with limits beforehand. It is important to tell students not to share information over the internet -Names, school, age, phone number or addresses -Do not send a picture to strangers -Make sure their passwords are private **Safe Blogging**

What is blogging? It is a place where students, teachers, and parents can write down their thoughts and feelings. They are journals that people post on the internet.

Some ways to make sure you protecting your blog include: -Your blog should be protected by a password that no one knows. - Make sure no personal information should be displayed - Do not post any photos of yourself, friends, or family - Do not leave your blog open and unattended What is copyright Infringement? It is when a person copies an authors published work without giving credit where credit is due. An infringement does not have to be just on written materials. It can be music, pictures, or any other materials found on the internet that is reproduced without permission. Make sure the students computer is set with a filter that limits their ability to go to certain websites, so it is age appropriate. It is important to explain to the students what is considered to be appropriate behavior: -No on line cheating because it is still cheating -No cyber bullying
 * Copyright Infringement ** 
 * Peer to Peer Networking Dangers **