Who should you contact if you feel unsafe?
Room 107 -- 385-6460
Mrs. Davis -- 385-6436
Merced Police -- 385-6905
...and, of course, tell a parent or guardian!
Read the advice offered to people who find themselves the target of a Cyber Bully. Cyberbullying: Tips for Taking Action. Now watch this brief video of teens discussing the issue of Cyberbullying taken from NetSmartz.org Teens Talk Back: Cyberbullying
Take the Internet Safety Survey to reflect on your own online behavior.
There are additional videos you may view regarding the issue of cyberbullying or online actions that have had bad outcomes:
Cyberbullying: Feathers in the Wind
Cyberbullying: You Can't Take it Back
Cyberbullying: Broken Friendship
Cyber Relationships and staying safe online. View the Cyber Relationships video and reflect on any screen names that you use online. How can you change them to make them more anonymous and generic? Think about the online image a screen name projects and how you would advise “SexyCindy” to change hers.
View this brief video entitled Your Photo Fate depicting what can happen when someone sends a text message. Sending inappropriate text messages or engaging in “Sexting” is wrong. Please read this information explaining what “Sexting” means what you can do if you receive an inappropriate message.
When you’re online, it’s important to have secure passwords and keep profiles and chats from sharing too much personal information. View this Online Safety and Security PowerPoint and take the Password Strength quiz. Then, watch these videos about social networking, information traveling, and offline consequences. You can even share too much information unintentionally. Look how easy it is for someone to piece together details that may seem insignificant to you. Watch what happens to Soccer Girl. Paying attention to your online image is important when social networking, including blogging. View this Powerpoint presentation on Social Networking and BLOG
IDENTITY THEFT & SECURITY RISKS
Identity Theft can occur if you’re not careful with online practices. Take the SonicWall Phishing IQ test online to see if they know how to tell real email messages from phishing messages. View this short video on other malware that can harm your computer’s security. View this Security Risks Powerpoint presentation
COPYRIGHT LAW & FAIR USE GUIDELINES
Check out what you know about Copyright by taking The Copyright Challenge. Here's another: CopyRight - CopyWrong Quiz. Watch this Copyright Basics video. Then, view this PowerPoint presentation on Copyright Law and Fair Use Guidelines and complete this worksheet at the same time.
Nike Swoosh? Energizer Bunny? Trademark, Patent, or Copyright? Here’s more information about the difference between trademark, patent, and copyright.
Peer-to-Peer Sharing (P2P): Read this information about P2P file sharing and then be prepared to explain 2 reasons why it’s a dangerous practice.
There are certain key things to consider when evaluating websites. Here is a website evaluation checklist you should complete before using any website as a source for research. Here is another set of questions to ask yourself when evaluating websites. Another great resource can be found on UC-Berkeley's Library website. Complete the evaluation checklist for www.wikipedia.org. Can you justify Wikipedia as a valid source for research purposes? Why or why not? Please explain in a brief paragraph on the back of your test (or attach an additional page)
ACCEPTABLE USE POLICY
The MUHSD Acceptable Use Policy (AUP). Read this document that you signed in order to access the Internet at school. Why do you think it’s important for schools to have such documents in place? What are at least three ways to violate the policy? Write your response in a brief paragraph of complete sentences on the back of your test (or attach additional pages).