Authorized activities only Monitor email and instant messaging Use only approved websites or custom
searches Read website privacy policies before class
to learn how the site will use information
Profiles◦No identifying
information◦No pictures
Chatting◦No strangers◦No identifying
details◦Activate history to
monitor conversations
Viruses can corrupt information
Phishing schemes steal personal and financial information
Antispyware Antivirus Firewall software Backup software to
protect against data loss
iKeepsafe.org◦ Games, worksheets, and
tests Cyber Angels
◦ www.cyberangels.org◦ Finds and reports illegal
activity online Get Net Wise
◦ www.getnetwise.org◦ resource for families and
caregivers to help kids have safe, educational, and entertaining online experiences
http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec10.shtm
http://www.truste.com/pdf/parent_teacher_tutorial.pdf
The family that computes together stays together: http://www.flickr.com/photos/john/390948637/
Worker using a non-ergonomic keyboard: http://www.flickr.com/photos/niosh/2492840578/
Facebook: http://www.flickr.com/photos/fbouly/3568409530/
My classroom in bonn: http://www.flickr.com/photos/austinevan/2296270551/
Threat of virus computer: http://www.flickr.com/photos/42338073@N07/4269414996/