Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Digital Driver's License
Transcript of Digital Driver's License
Technologies and Responsible Use
Does this sound familiar? ...And is it important?
Respect, Educate, and Protect
Make sure to think about how YOU use technology
Digital Driver's License
Are You BYOD Ready?
Types of Digital Communication
How do you use different tools to communicate with one another?
Should you consider your audience?
Does writing for school work differ from casual types of communication?
Jeff is with his friends in the hallway at school... They see an underclassman trip and fall in the hallway. While laughing they immediately pull their mobile phones out and record the video. The video ends up on YouTube, followed by a stream of very hurtful comments.
A friend's 11 year old sister has 300 Facebook friends. You wonder if her mom or dad are aware of this.
An email with personal information is sent out from Stacey to the entire school. But Stacey was taking an Algebra exam at the time it was sent. She remembers letting one of her friends use her computer account to print a paper in the library... She also remembers letting another friend use her iPhone.
Legal Rights and Restrictions Governing
Technology and Its Use
is the practice of distributing or providing access to digitally stored information, such as computer programs, multimedia (audio, images, & video), documents, or electronic books.
is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)
is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. If adults are involved it is "cyber-harassment" or "cyberstalking."
The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
stealing someone's identity to gain access to data, information, or to achieve financial gains.
is used negatively to describe a person seen as obtaining or trying to obtain sexual contact with another person in a metaphorically "predatory" manner. This activity is found in our digital society. Text messaging sexual images (sexting) can also lead to sexual predator activity.
Fair Use: The ability to use a small amount of someone’s creative work without permission, but only in certain ways
Commercial Purposes: A use in connection with a business, usually for profit
Copyright: A law that protects a creator’s ownership of and control over the work he or she creates, requiring other people to get the creator’s permission before they copy, share, or perform that work
Creative Commons: A kind of copyright that makes it easy for people to copy, share, and build on someone’s creative work – as long as they give the creator credit for it
PublicDomain: Creative work that’s not protected by copyright and is therefore free for you to use however one wants
Check out this video clip:
Are these students using technology responsibly?
21st Century Digital Compass
Don't be careless, think about your safety as well as others
Respect yourself, and others
Stay educated and connected with others
Protect yourself, and help to protect others
Use information ethically and responsibly