1.cdn.edl.iohowe~er, telling the network about a bad user isn't going to take that virus off...

12
""Don't share any information about yourself . ••. If you suspect that you are being stalked or the victim of inappropriate communication by a stranger, report it to a trusted adult or the CyberTipline <http://www.cybertipline.com/> (1-800-843-5678) 24-hours a day. ~ Sexual predators disguise themselves as friendly and often hunt for victims through social networking sites. ~ Never share your personal information or anything about your friends-especially your cell phone number. ~ Be careful about adding strangers to your "friends list." ~ Don't be shy; report inappropriate postings/profiles to the social networking provider and to the police. -".'.' .. """"' . " I' I I ~ .. ~ •,. ,'H .,>_ ., .•• " ""Don't respond to or meet ,with a cyberbully. II> Save proof ofthe harasstr1~nt like e-mail messages, screen shots/1M logs, blogs, etc. ~ Tell a trusted adult who .c.m: , • File a complaint with the,lnternet Service Provider, e-mail provid!='r,or the host of the Web site where the abuse has been posted . • Contact the cyberbull~,:s parents. • Contact an attorney o~fjle a small claims action. \ \ Fundedby ~ at&t

Upload: others

Post on 21-Feb-2020

21 views

Category:

Documents


0 download

TRANSCRIPT

""Don't share any information aboutyourself .

••. If you suspect that you are beingstalked or the victim of inappropriatecommunication by a stranger, report itto a trusted adult or the CyberTipline<http://www.cybertipline.com/>(1-800-843-5678) 24-hours a day.

~ Sexual predators disguisethemselves as friendly and oftenhunt for victims through socialnetworking sites.

~ Never share your personalinformation or anything about yourfriends-especially your cell phonenumber.

~ Be careful about adding strangers toyour "friends list."

~ Don't be shy; report inappropriatepostings/profiles to the socialnetworking provider and to thepolice.

-".'.' .. """"' ." I' I I~ ..~•,. ,'H .,>_ ., .•• "

""Don't respond to or meet ,with a cyberbully.II> Save proof ofthe harasstr1~nt like e-mail

messages, screen shots/1M logs, blogs, etc.~ Tell a trusted adult who .c.m: ,

• File a complaint with the,lnternet ServiceProvider, e-mail provid!='r,or the host of theWeb site where the abuse has been posted .

• Contact the cyberbull~,:s parents.• Contact an attorney o~fjle a small

claims action.

\\

Fundedby ~ at&t

mYTH DR FReT: FIIIE onLInE SRFETY TIPS------CySER CITIZEHSHIP-----·-Cyber BullyingMyth: I cannot be held accountable for what I say or do online.

Fact: False. Cyber Bullying can be considered a form of harassment. In many states, it can be punishable by law asa misdemeanor, and in some cases, a felony if there is a reasonable threat to a person's personal safery. Most schools

have their own anti-bullying plan in place with penalties that can range from detention to expulsion. Depcndingon how severe the information is, posting someone's private and personal information on the Internet for theworld to see can result in punishment.

What do you do if you're being bullied?• Be strong and stop it early. Don't accept it and avoid going to their level to lash back.

o Say something about it. Tellan adult (parents, counselor, principal, police) and speak up until you ge( help.o Avoid opening or reading messages from ,cyberbullies •

• Block the bully if you are in a chatroom or IMing.

, • Tellyour Internet service provider by contacting abuse@(Your ISPname).com.

·If the problem continues alert the local Police Department.

·If it is school related, immediately tell your teacher, counselor, or principal.o Keep all related online messages. Logall dates and time •

• Change your e-mail address, screen name, telephone or cell #.o Takescreen shots of your chat room pages as documentation.

o Save URLs,e-mail addresses, and profiles of the bully.

o Stay safe-Never agree to meet with a bully face to face.

How to avoid being cyber bullied ,o Be kind to others and use netiquette (no flooding, be nice to newbies, avoid using all caps, and set a good tone).• Keep personal information private online like pin numbers, passwords, addresses, cellnumbers, names. The information

can be used against you.

o Avoid exchanging pictures or giving out e-mail addresses to people you meet online.o Don't send messages when you are angry.

o Trust your instincts. When things don't seem right, it probably isn't. Get out of the site, end the chat, or tum off yourcomputer or cellphone.

The Reality042 % of students have been bullied online.

057% of students said they have received hurtful messages online while 13% said it happened frequently.

• 53% of students admitted that they have said hurtful things online while 7% said they did it uquite often."(Source: i-SAFE Inc.)

\\.

YUUTH summIT' OOLIOE SRFETY • USER IiUIDE.

mYTH DR FReT: FII/E onLInE 5RFETY TIPS~------CYBER 5ECURITY-------VirusesMyth: You can get a computer virus just by opening an e-mail.

Fact: False. To get a virus you need to open an e-mail attachment. However, opening the mail can stilllc( a spal11­mer know your address is active.

Avoid the PlagueOpening an attachment from an unknown source is risky, and especially if you don't check it with anti-virus soft­ware first. Anti-virus software only works properly if it's updated constantly, because new viruses are always on theloose. It's not difficult to hide a virus in a file-sharing site. Most Peer-to-Peer networks will let you report anyonewho disguises viruses as files. Howe~er, telling the network about a bad user isn't going to take that virus off yourmachine.

Word Up!, Virus-Executable code (computer program) that infects itself to other computer programs in order to cause

destructive computer events. They are most commonly spread through e-mail attachments, infected disks, and filedownloads. They can only be spread with human assistance.

Worm-A special type of virus that can replicate itself and use your memory to cause harm to your friend's com­puter. Worms can spread by themselves within a network of computers.TrojanHorse-A virus in disguise. What looks like a free game actually is a program that might erase files onyour hard drive.

How to help secure your computer• Install and run anti-virus software.

• Update your anti-virus software regularly.•Ask the sender if they meant to send you an attachment .

• Delete questionable e-mail ore-mail addresses you don't know .• Be aware of files with extensions .exe, .vbs, and .ser.

• Install anti-spyware software to help protect your computer from

spyware and viruses.

The Reality• Worldwide 12.4 billion spam e-mails are sent everyday. **• 26 states have anti-spam laws. **• Onaverage individuals receive 6 spame-mails per day. *·In the USAalone, it is estimated that spam costs the country more than $10 billion annually due to expenses for anti-spamequipment, software, manpower, and lost productivity. *

·25% of students have opened e-mail from strangers.

• 15.8% of students have opened attachments from strangers.

·It is estimated that computer viruses cost businesses approximately $55 billion in damages in 2003. *(Source: *securitystats.com, **spamreview.com, i-SAFE Inc.)

\\..

YOUTII summiT, onLine SRFETY• IISER ••UIOE1U1U1U.ISRF£.DRIl

mYTH DR FReT: FIIIE onLInE SRFETY TIPS------CyHER PREHRTClR5-------Myth: If you don't give away your real name, address, home phone numbers, cell numbers, or school name to ;\stranger online, you can't be found.Fact: False. Some information can be more personal than you think. Information like when a specific concert ishappening in your town, your school mascot, names of sports teams you play on, or sports jersey numbers can bepieced together by potential predators to find you. Static IP addresses can also be used to trace the location of yourcomputer.

How Predators groom kids and teens• Starts with an innocent 1Mor chat.

• Wants to be your best friend, boyfriend orgirlfriend.• Askspersonal questions, ASL(age, gender, location).

• Studies your profile.

• Seeks provocative user names oruser names with info about you.

, •Asksyou for personal info. (Phone number, e-mail address, home address,school name, etc.).

•Asks for personal photos.

• Starts in on inappropiate conversations.• Makes threats.

• Wants to set up a face-to-face meeting.

·Is all about keeping secrets.

Ways to avoid Predators• Recognize creepy techniques to deceive you, like those mentioned above.• Choosesafer user names.

• Remove identifying info from your onlineprofile.• Set chat boundaries on discussions (forexample: inappropriate topics, problems you're having at home, school, etc.).

• Keep your personal info private.

Report it immediately• Save your original e-mails.

• Takeascreen shot of your chat room conversations .• Write down all dates, times, locations, user names and screen names.

If you're threatened ...• Don'tbe afraid to say no.

• Stop the chat and turn off your computer.

• Logoff.• Don'tpanic.

• Tellyour parents and report to your localpolice.

The Reality63 million U.S.students between the ages of 2-17 use the Internet

today. *24% of students say they see nothing wrong with chatting with a

stranger.390AJ of students trust people that they chat with online.10% of students have been asked to meet somewhere by a strangerface to face.

(Source: i-SAFE Inc., * NeilsonllNet Ratings)

YUUTH summIT· UU1-IUE SUFETY • USEU 6UlOEUlUIUI.ISUFE.UR6

mYTH OR FReT: FIVE onLInE SRFETY TIPS-------IHEHTITy THEFT--------Myth: It's safe to give out my personal credit card information over the Internet.

Fad: True and False. It's never 100% safe. Some sites are safer than others. There is a risk every time you PUI il OUI I ht'r<:,

Make a good judgment call before you make online purchases based on research and confidence in the retailcr.

The Download on Identity TheftIdentity theft is the fastest-growing crime in the United States with close toW million people victimizcd each year,Identity theft is when someone takes your personal information (name, address, credit card or Social Security numbcr)and uses that to open up new charge cards, buy new stuff, or borrow money from the bank. For victims of identityfraud, it may mean months of headaches trying to recover the money lost and repair credit. An identity thief can dam­age a victim's financial reputation for years.

How to limit your chances of getting your identity stolen (Share it with your'parents!)• You and your parents should remove personal information from your computer.

• Avoid giving out identifying information about you and your parents online as much as possible (name, birth date, credit card

number and Social Security number) .

.;Shop on secure sites. Look for the padlock icon in the lower right of the screen.

• Look in the URLto see if it has "https': The "s"indicates the site is secure.

• Research the website privacy policy.

" Use reputable companies. Call to confirm they are legit.

• Frequently check your credit report if you have a credit card.• Close out and cancel all unused credit cards.

• Proted your passwords to all your accounts.

The LawOn July 15, 2004, President Bush signed the Identity TheftPenalty Enhancement Act, which established the federal offenseof aggravated identity theft. And someone convicted of that

crime might receive jail time and fines that reflect the damagedone to individuals.

The Rea lity• Last year alone, close to 70 million Americans had their identities stolen by criminals. *• Identity thieves made away with over $50 billion in bogus transactions. *·52 % of all 10 theft vidims, approximately 5 million people last year discovered they were vidims by monitoring their

accounts-another 26%percent (2.5 million) were alerted by credit card issuers and banks. *• 87% of Americans can uniquely be identified by just 3 pieces of information: date of birth, gender, and their 5-dig/t zip code. **·10 thieves stole nearly $ 700 million from financial institutions last year, or an average of $6,767 per victim. *(Source:*FTC Survey> **Datannon)

'\\

YUUTll summiT' UUI.lnE SUFETY • USER GIIIDEUlUIUI.15RFE.UR6

mYTH DR FReT: FII/E onLInE SRFETY TIPS----IHTELLECTUIlL PROPERTY ~ -Myth: I cannot be sued for downloading music and movies using P2P s(;rviccs. '1h(/II never (;Hch fW:.

Fad:True and False. You can't be sued if you have downloaded songs or movies that have been pilI onlh\(' with tit('

approval of record labels, movie studios, and artists-which usually involves paying It)r royalties, You can b,~sued if'you download tracks or movies that were posted without permission from the copyright owncr--whed1cr it is onesong or movie or a million-as you are infringing copyright laws.

Key WordsCopyrighted Material-Creative works such as songs, movies, commercials, books, photos, software, andpaintings. ,Piracy-Is a term used for when copyrighted material such as music, movies, and software are copied and distrib-

uted illegally.P2P Services-Is a term often used to describe software and online services that allow files to be shared amongusers.

The Lawu.s. and international copyright law protects copyright owners from unauthorized copying, modification, anddistribution of songs, movies, and software.

What you need to knowP2P services have many legal uses and illegal uses. Trading music, movies, and software without permission are

illegal uses. Just because a service exists does not mean it is legal for you to download or upload music, movies, orsoftware without paying the normal price. In fact, doing so can result in criminal penalties and jail time. There isa good possibility of downloading a virus when using P2P services. You are also creating a gateway for a hacker tocome into your computer and steal your personal information.

What's the alternative?• Finda site that's safe where you can download legally.

• Songs and movies that you find on legal download sites are:

, In the public domain.

, Uploaded by artists who give their permission because they are trying to get exposure.

, Released with permission by record companies trying to build interest in a CD•

. Paid for by you to legally download. Thesite pays the artist and/or record company royalties.

The Reality• The Recording Industry Association of America (RIAA)has sued 7, 977 downloaders as of March 2004. *•According to RIAA,record sales in the U.S. were down 30% in 2003. *• OnApril 72, 2005, 405 lawsuits were filed to students using the i2hub network on U.S. college campuses. Combined, the

students being sued have illegally distributed more than 7.5 million total files, including more that 930,000 songs. **.45% of the students polled by i-SAFEhave copied music from the Internet.

(Source: i-SAFE Inc., *BBC News, **RlAA Newsroom)

'" \\.

90llTH summiT' OULlnE SRFETY • USER CiiUIDEIUIUUI.'SRFE.ORCii

www.socialshield.com• offers free membership• live help

• Internet safety semin~rs• books, videos, programs

www. wiredsafety .org• quick tips for MySpace, Xanga and Facebook• comprehensive Q&A for parents• fraud" cyberstalking, Iharassment and identity theft• parent and educator links to www.wiredkids.org

htlp:/ /collect.myspace.com• safety tips provided by MySpace.com

www.fbi.gov• very user friendly• Internet safety for kids• E-scams and warnings

www.safeteens.com• cell phone safety tips• blogging tips• cyber tip line to report crimes against children and teens• guidelines for parents and kids

www. wiredwithwisdom. org• variety of teaching programs for Internet safety geared for ages 10- 17• FAQs• tips and information to recognize and prevent online child abuse• Katie's story

\"

SafeKids.Com

Family Contract for Online Safety

Parents' Pledge1.

2.

3.

4.

5.

6.

I will get to know the services and web sites my child uses. If I don't know how to usethem, I'll get my child to show me how.

I will set reasonable rules and guidelines for computer use by my children and will discussthese rules and post them near the computer as a reminder. I'll remember to monitor theircompliance with these rules, especially when it comes to the amount of time they spend onthe computer.

I will not overreact if my child tells me about a problem he or she is having on the Internet.Instead, we'll work together to try to solve the problem and prevent it from happeningagam.

I promise not to use a computer or the Internet as an electronic babysitter.

I will help make the Internet a family activity and ask my child to help plan family eventsusing the Internet.

I will try to get to know my child's "online friends" just as I try get to know his or her otherfriends.

I agree to the above

Parent(s)

I understand that my parent(s) agreed to these rules and I will help my parent(s) explore the Internetwith me.

Child sign here

(c) 2000-2004 SafeKids.Com

,\

SafeKids.Com

Family Contract for Online Safety

Kids' Pledge1. I will not give out persQnal information such as my address, telephone number,

parents' work address/telephone number, or the name and location of my schoolwithout my parents' permission.

2. I will tell my parents right away if I come across any information that makes mefeel uncomfortable.

3. I will never agree to get together with someone I "meet" online without firstchecking with my parents. If my parents agree to the meeting, I will be sure that itis in a public place and bring my mother or father along.

4. I will never send a person my picture or anything else without first checking withmy parents.

5. I will not respond to any messages that are mean or in any way make me feeluncomfortable. It is not my fault if I get a message like that. If I do I will tell myparents right away so that they can contact the service provider.

6. I will talk with my parents so that we can set up rules for going online. We willdecide upon the time of day that I can be online, the length of time I can beonline, and appropriate areas for me to visit. I will not access other areas orbreak these rules without their permission.

7. I will not give out my Internet password to anyone (even my best friends) otherthan my parents.

8. I will check with my parents before downloading or installing software or doinganything that could possibly hurt our computer or jeopardize my family's privacy.

9. I will be a good online citizen and not do anything that hurts other people or isagainst the law.

1O. I will help my parents understand how to have fun and learn things online andteach them things about the Internet, computers and other technology.

I agree to the above terms

Child Sign Here

I will help my child follow thisagreement and will allow reasonableuse of the Internet as long as theserules and other family rules arefollowed.

Parent Sign Here

Items 1-6 © National Center for Missing & Exploited Children. Entire contract © 2005 SafeKids.com.Have teenagers? Visit SafeTeens.com, "\

\

l'IatioJl~d Blue Rjbbon -School400 North Pierre Road

Walnut, CoJifornia 9i789(909) 594-1333 Fax (909) 444-3'602

-'./"

(~~7~~/t{YJ{

rw\v. wall1utval1ey.k12.ca.us/\vhs

July 2006

.ussel1 Lee-SungPrincip~

,iil Diskin

h;;ight BaUn12.I1n

Oper •.•.tion:: Jv1a.'"1~er

. ~1111.t'arenDirector ofStudent / •.ccivitie~

erry PersonAthletic Director

3arbie ColeIn$tructional Dea..."1

X'il1ian1 DavisIn$truc[ion:ti Dea.n

Larry HolmesIn$lructioI1~J De:Ul

Jeff JordanIn~tructio.nfJ De:U1

Scott CassellsGr:<.de Level Coordin:\tor

Donna HunterGmde Level Coordina.tor

Reuben JonesGrade Level Coordi.nJ:ltor

Ken McDillGrade Level Coordin.tor

Lorelee MillerGr~de Level Coordin:1.tor

Andrea MiragliaGrade Level Coordina.tor

Jennifer OkuGra.de Level Coordinator

Ruthellyn WhittingtonGrade Level CoordinRtor

Dear Parent/Guardian:

Walnut High School is pleased to announce that electronic information services are availableto students and teachers. Walnut High School strongly believes in the educational value ofsuch electronic resources and recognizes their potential to support curriculum and student .learning. The use of these resources is a privilege, not a right. While the Walnut ValleyUnified School District has taken precautions to restrict access to controversial material,these efforts are in no way "foolproof." In an effort to protect students and teachers from any

misuses or abuses of our electronic information services, users must adhere to the followingprovisions:

1. Accept personal responsibility for reporting any misl;lse of the networks'electronic information services to the appropriate supervisor. Misuse is definedas any messages sent or received that involve pornography, illegal solicitation,racism, sexism, obscenity, or materials that promote illegal behavior.

2. Agree to limit your use of electronic information services to legitimateeducational purposes. You will not utilize personal e-mail, capabilities, ortransmit any material in violation of applicable law. This includes, but is notlimited to: copyrighted material, threatening or obscene material, materialswhich promote illegal behavior, or material protected as a trade secret.

Any violation of the above provisions may result in disciplinarY action, the revoking ofelectronic information access privilege and, in extreme cases, appropriate legal action.

The Walnut Valley Unified School District Internet Agreement is attached. This addendumrequires that the district policy has been read and signed by both the student andparent/guardian before students are allowed access to Walnut High School's electronicinformation services account.

Please have your son/daughter bring the siQned agreement back to school and return to theInformation Center/Library ..

Thank you for your cooperation.

Sincerely,

~~OJ~~y DavisInstructional Dean

Applied Arts and Technology

attch.'\\

t

6163.4 (c)

WALNUT VALLEY UNIFIED SCHOOL DISTRICT

INTERNET USE AGREEMENT

Please read this document carefully before signing.

Internet access is now available to students and teachers in the Walnut Valley Unified School District. Weare very pleased to provide this access and believe the Internet offers vast, diverse, and uniqueresources to both students and teachers. Our goal in providing this service to teachers and students is topromote educational excellence in schools by facilitating resource sharing, innovation, and communication.

The Internet is an electronic highway connecting thousands of computers all over the world and millions ofindividual subscribers. Students and te'achers will have access to a few examples listed below:

1. Electronic mail communication with people all over the world.2. Information and news from NASA as well as the opportunity to correspond with the scientists at

NASA and other research institutions.3. Public domain software and shareware of all types.4. Discussion groups on a plethora of topics ranging from Chinese culture to the environment to musicto politics.5. Many University Library Catalogs, the Library of Congress and ERIC.

With access to computers and people all over the world also comes the availability of material notconsidered to be of educational value in the context of the school setting. Walnut Valley Unified SchoolDistrict has taken precautions to restrict access to controversial materials. However, on a globalnetwork it is impossible to control all materials and an industrious user may discover controversialinformation. We (Walnut Valley Unified School District) firmly believe that the valuable information andinteraction available on this worldwide network far outweighs the possibility that users may procurematerial that is not consistent with the educational goals of the district.

Internet access is coordinated through a complex association of government agencies, and regional andstate networks. In addition, the smooth operation of the network relies upon the proper conduct of the endusers who must adhere to strict guidelines.

These guidelines are provided here so that you are aware of the responsibilities to which you are about toagree to accept. In general, this requires efficient, ethical and legal utilization of the network resources.If a Walnut Valley Unified School District user violates any of these provisions, his or her account will be

terminated and future access could possibly be denied. The signatureat the end of this document is legallybinding and indicates the party who signed has read the terms and conditions carefully and understandstheir significance.

Internet - Terms and Conditions

Acceptable Use - The purpose of the Internet is to support research and education in and amongacademic institutions by providing access to unique resources and the opportunity for collaborativework. The use of your account must be in support of education and research and consistent withthe educational objectives of the Walnut Valley Unified School District. Use of other organization'snetwork or computing resources must comply with the rules appropriate for that networjc.Transmission of any material in violation of any US or state regulation is prohibited. This includes,but is not limited to: copyrighted material, threatening or obscene material, or material protectedby trade secret. Use of commercial activities is generally not acceptable. Use for productadvertisement or political lobbying is also prohibited.

, \\

75

R 6163.4 (d)

2. Privileges - The use of the Irtemet is a privilege, not a right,' and inappropriate use will result ina cancellation of those privileges. (Each student who receives an account will be part of adiscussion with a Walnut Valley Unified School District faculty member pertaining to the proper useof the network.) The system administrators will deem what is inappropriate use and their decisionis final. Also, the system administrators may close an account at any time as required. Theadministration, faculty, and staff of Walnut Valley Unified School District may request the systemadministrator to deny, revoke, or suspend specific user accounts.

3 . Network Etiquette - You are expected to abide by the generally accepted rules of networketiquette. These include (but are not limited to) the following:

Be polite. Always be courteous In your messagesto others.Use only appropriate language.Do not use offensive or inappropriate language. Illegal

activities are strictly forbidden.Do not revealyour homeaddressor personal phone numberor the addressesandphone

numbers of students or colleagues.Note that electronic mail (email) is not guaranteed to be private. People who operate the

system do,have access to all mail. Messages relating to or in support of illegal activitiesmay be reported to the authorities.

Do not use the network in such a way that you would disrupt the use of the network byother users.

f. Do not wastefully use finite resources.g. Do not post personalcommunicationswithout the author's consent. .h. Do not send messagesthat are likely to result in the loss of recipients workI. Do not send "chain letters,' or 'broadcast· messagesto lists or individuals,other types of usewhich would cause congestion of the networks orinterfere with the work of others.

a.

b.

c.

d.

e.

or systems.and anyotherwise

4. Warranties - Walnut Valley Unified School District makes or gives no warranties of any kind,whether expressed or implied, for the service it is providing. Walnut Valley Unified School Districtwill not be responsible for any damages you suffer. This includes loss of data resulting fromdelays, nondelivery, misdelivery-deliveries, or service interruptions caused by the system,negligence or your own errors or omissions. Use of any information obtained via the Internet Is atyour own risk. Walnut Valley Unified School District specifically denies any responsibility for theaccuracy or quality of information obtained through its services.

5. Security - Security on any computer system is a high priority, especially when the systeminvolves many users. If you feel you can identify a security problem on the Internet, you mustnotify a system administrator or your District Internet Coordinator. Do not demonstrate theproblem to other users. Do not use another individual's account. All use of the system must beunder your own account. Attempts to log-on to the Internet as a system administrator will resultin cancellation of user privileges. Any user identified as a security risk or having a history ofproblems with other computer systems may be denied access to Internet.

6. Prior Approval - Approval must be obtained from a supervising teacher before a studentpublishes a Web pageor any materialon the Internet.

7 Vandalism - Vandalism will result in cancellation of privileges. Vandalism is defined as anymalicious attempt to harm or destroy data of another user. Internet, or any of the above listedagencies or other networks that are connected to the Internet backbone. This includes, but notlimited to, the uploading or creation of computer viruses.

8 . Teacher or Parent Rule - A user must apply 'a teacher or parent rule' for actions taken,situation encountered, or decisions made. The 'teacher or parent rule' is a rule under which theuser asks himself,\'would the teacher or parent approve of this? If the answer is no, then the user\must not take the action, must withdraw from the situation, or must not make the decision.

76