Skip to main content
Voice Recognition
X

Commack School District

Excellence in Education

#InstaSmart Campaign

#InstaSmart Campaign


PRIDE    CHARACTER    POSITIVITY
Learning to use Social Media through daily tweets
Twitter How To Protect Your Online Presence Your Digital Tattoo Think Before You "Send"
Once Posted, Always Posted Don't Announce Your Empty House When in Doubt... Know What NOT to Share
Stay Away from Location Networking Password Dos and Don'ts Who's a Friend Privacy, Privacy, Privacy!!!
Video Montages  Take a Break from the Screen  Know Who You're Talking To 
NEW - Social Media Apps - What Parents Need to Know
 Thanks for your #MackPics!
Keeping a Safe App Environment for Tweens (and more great info)

We hope that you have enjoyed our daily #InstaSmart Tweets and helpful tips on protecting yourself online and when using social media.

Join our new campaign to apply what we’ve learned!  

Please use the hashtag #MACKpics, to help us promote Commack Pride.

Here’s how: Please submit positive photos capturing community pride and school sponsored events by tagging your pictures on Instagram, Twitter, or Facebook using #MACKpics and your photo may be selected for a photo montage, on the Commack Website, or even in the annual Commack Schools Calendar!

Who are you really talking with?
Anyone can open an email account and create a false identity. A good practice is:
If you've never met the person in real life, don't provide information that could help them find you. 

The FBI estimates there are 750,000 child predators online at any one time (
http://wjla.com/features/7-on-your-side/stranger-in-the-console-113707) which is scary! so be especially careful with online gaming systems that may open the door to an internet predator looking to find and meet up with you.

Disable the camera/video feed in online gaming systems - in Xbox, PlayStation, Wii, Kinect, and other online game systems, even in your phone. 

http://www.nbcchicago.com/investigations/unit-5-video-games-internet-devices-child-predators-173429241.html

Use care with online gaming systems
Privacy, privacy, privacy!!!
We've passed on a lot of tips about staying secure online in the last two weeks. There are settings in your web browsers that prevent tracking the websites you visit, the purchases you make, and even your web searches (try the DuckDuckGo search engine).  
cookiesCookies are small text files that are stored on your computer's browser directory. They create a trail of where you've been, your log on information, and can be accessed by a web server or a client computer. They can be used by a third party without your knowledge. Learn to manage cookies, and  keep security settings high and privacy settings turned on
What are Cookies? https://kb.iu.edu/d/agwm

Browser Security Settings: You will need to determine which browser you are using first (Help, About on the menu bar) Here's a general article:   https://www.veracode.com/blog/2013/03/browser-security-settings-for-chrome-firefox-and-internet-explorer
 

How to Remove Embarrasing Photos from Social Media:
https://www.seoinc.com/seo-blog/how-to-remove-embarrassing-photos-from-social-media/

Often your online friends are not your real friends, so limit the number of people who can read and comment on your posts.
People you don't know are strangers - remember what your mother said about speaking to strangers! 

How many online friends do you have? Really?
 
Do you have strong passwords? Keep your devices protected
  • Don't share your passwords - even with your best friend.
  • Change your passwords often.
  • Don't use the same passwords for your important accounts.
  • Always sign out of your email account, don't just close the window. 
  • Password protect your phone, your computer, and all your devices.
password
Finding it hard to keep track of them all? Here's one suggestion - put them all in a spreadsheet and then password protect your spreadsheet. Then you only have to remember one password.
You can also try one of the online password generating services, but choose with care!

http://www.google.com/goodtoknow/online-safety/passwords 
http://krebsonsecurity.com/password-dos-and-donts/  
**************************************************************************
Stay away from location networking – I know where you are!
You're providing a BIG piece of the puzzle to strangers when you post something and your location is turned 'on' in your cell phone or other device. Foursquare, Instagram, BuzzMob, the list is endless.
Location-based services can be one of the most dangerous features provided by social networking sites. It exposes the profile user’s location and whereabouts. The service also has a feature that allows users to tag who they are with at any given time. While it can be fun to share your location with friends and family, it can also increase your vulnerability, potentially opening you up to being robbed, sexually assaulted, or worse. Predators can use this tool to track your movements and determine when you are alone or when you are not at home.
 
Geolocation, Tweeters beware! 

Find a balance, have screen-free timesocial media addiction
Take a break from technology, and enjoy your family, pets, friends, and the outdoors! Unplug and play!

Did you know?
Children between the ages of 8 and 18 use media devices an average of 7 1/2 hours a day
U.S. Adults spend 11 hours per day with digital media
Even babies and toddlers are at risk for screen-time overload

Tips for reducing screen time:
  • Ignore your cell phone's texts and calls and focus on having a real conversation with whoever you're with.
  • Eat a family meal together, and turn off the TV - no electronic devices either
  • You'll get more sleep, reduce stress, and even lose weight if you don't use devices for two hours before bedtime. 
Article: 
Limit screen time for healthier kids
Know what not to share. Keep personal info private. Privacy
You wouldn't open your front door to a stranger and let them look around your home, would you? Don't put information online about you that could lead an online predator to your door or into your bank account.
Here's some tips to keep a lock on your info:
http://techland.time.com/2013/07/24/11-simple-ways-to-protect-your-privacy/    
http://enlightenme.com/top-10-ways-to-keep-your-personal-information-safe-on-the-internet/  
http://www.reputation.com/blog/privacy/top-ten-reasons-keep-your-personal-information-private

 When in doubt, throw it out:
   You've won $5,000!  Really? Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, (sometimes even if you know the source/sender), it’s best to delete - or if appropriate - mark as junk email. NEVER open attachments with the file extension .exe.
   Better to be safe than sorry. Use the Delete key! Protect your computer with antivirus software, too.
delete it If you have been sent something inappropriate, delete it. Don't be in possession of something that could get you in trouble.
Don't announce your empty houseDon't announce your empty house!
You worry about identity theft when making purchases online - but do you realize that by posting vacation pictures, your itinerary, and "checking in" your location via social media, it can lead to your home being burglarized? Burglars use social media, too. 

   Checking in at the airport or your hotel might seem like a fun way to let friends and family know you're on vacation, but burglars are also combing through social media looking for easy targets. These criminals only need a rough idea of where you live and access to Google Street View to start casing your home.

Some Tips:
  • Turn off location information on social media apps
  • Don't share your address
  • Only share information with friends (not friends of friends!)
  • Turn off EXIF meta-data contained in image files which contains GPS locations
  • Refrain from posting pictures while you're on vacation - wait til you get home
  • Don't EVER post a picture of your boarding pass. The QR code on it contains loads of info about you!
http://www.ibtimes.com/how-burglars-use-facebook-target-vacationing-homeowners-1341325  
Once posted, always posted
THINK Before You INK!

What is your digital footprint? Think about this: Every child born today has an online dossier. Thanks to Facebook, there may even be data from before birth. Digital footprints are not washed away as footprints in the sand are. The next big wave won't erase them. Once you put it out there, it is there  FOREVER! Search engines can find everything posted about you, and so can any random person in the world.

So, create your own digital tattoo/footprint. Choose what to share on social media. Establish a positive online presence. YOU can be in control to a certain extent.
Ask yourself...who is going to see this message/picture?
If the answer was EVERYONE, would you still send/post it?

If you wouldn't say it to someone's face...

There are grave consequences to cyberbullying.
Kids are often quiet about the hurt they are feeling and it can push some
kids to their limits.

You don’t have to participate in online bullying
 to fit in with your
peers. Most teens don’t find cruelty to be cool.

BREAK THE CYCLE
  Take the pledge to NOT participate in cyber bullying
       Don’t respond to, or forward mean or inappropriate
        pictures/messages

            Tell an adult who can help


Think before you hit the SEND button!
Think!Social Media Etiquette
"Remember your manners," we are cautioned. Is that old fashioned advice? Not according to Forbes and the New York Times (see links below).

Ask yourself a few questions before you post or send an email:
  • Is my message offensive?
  • Will my post hurt anyone?
  • Does it violate anyone's privacy?
Altho proper spelling seems 2 B slipping when using social media, that's not true when sending an email. Emails are a different animal. An email can be forwarded to an unlimited number of people. Reread an email before you send it. Your "tone" is based on your words, so use words carefully. And remember, emails are frequently archived for years and years. Once you hit "Send" it's gone.

For more info:
Great VIDEO: Think Before You Post - https://www.youtube.com/watch?feature=player_embedded&v=Asahg03unyI
Social Media Etiquette: http://www.forbes.com/sites/ilyapozin/2013/01/09/social-media-etiquette-12-step-checklist/
Email Etiquette: http://www.nytimes.com/2012/04/21/your-money/what-to-think-about-before-you-hit-send.html?mwrsm=Email&_r=0 
Email Checklist: http://sethgodin.typepad.com/seths_blog/2008/06/email-checklist.html

**************************************************************************
What does your digital tattoo say about you?

 Find out!  Google your name and see what pops up about you.
  • Is your digital tattoo a true reflection of who you are?
  • Does it represent you in a positive way?
  • How can it affect your college, career, and relationships?
Questions you should ask yourself before posting online:
  • Would I want my...fill in the blank (teachers, parents, employer, friends) to see this?
  • Will this information reflect well on me a year from now? Five years from now?
  • Who might view or purchase this information about me?
  • Are there some details about my life I would like to keep personal?
  • What conclusions might others form with my information? 
Adapted from: www.athinline.org

Digital Tattoos are harder to erase than an ink tattoo! Be careful what you post!

Your Online Life, permanent as a tattoo - Video
Protect your online presence!

You think you’re safe….you trust you set it all up correctly….but are you really protecting yourself and your identity when you use social media?

 Protect yourself with these STOP. THINK. CONNECT. tips:

·         Keep a clean machine:  Having the latest security software, web browser, and operating system on your cellphone, computer, or tablet are the best defenses against viruses, malware, and other online threats. 

·         Own your online presence: When applicable, set the privacy and security settings on websites to your comfort level for information sharing. It’s ok to limit how you share information.  

·         Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.

·         Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals.    

·         To avoid giving away email addresses of your friends, do not allow social networking services to scan your email address book. When you join a new social network, you might receive an offer to enter your email address and password to find out if your contacts are on the network. The site might use this information to send email messages to everyone in your contact list or even everyone you've ever sent an email message to with that email address. Social networking sites should explain that they're going to do this, but some do not.  

·         Choose your social network carefully. Evaluate the site that you plan to use and make sure you understand the privacy policy. Find out if the site monitors content that people post. You will be providing personal information to this website, so use the same criteria that you would to select a site where you enter your credit card. 

See more at:

https://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks#sthash.1MD2TTBl.dpuf

http://www.microsoft.com/security/online-privacy/social-networking.aspx

Protect Yourself
- Use privacy settings
- Use your email wisely
- Don't talk to strangers online, and be smart with instant messaging (IM) programs 
- Don't share personal or private information online
(Your name, school name, home address, phone numbers, photos)

Are you Social Media Savvy?

Follow Commack School District's daily #InstaSmart tweets with the hashtags #InstaSmart to learn the ins and outs and the dos and don'ts of social media. 

TWITTER - THE BASICS:

Do you have a Twitter account?

To follow us @CommackSchools, sign up for an account at   www.twitter.com

Q&As for Today - What's a Hashtag?
A hastag is a word or phrase preceded by a hashtag symbol (#) that is used to identify messages on a specific topic. The hashtag make it easier for users to find messages with a specific theme or content. Using this symbol is another way of grouping what a tweet is about with others that are talking about the same thing.

What's a Tweet?
When you post something, it's a Tweet. Messages are limited to 140 characters. That includes letters and spaces. 

Quick Twitter Tutorial...The symbols below are used on Twitter.

Use the back arrow button to reply to a Tweet or message that was posted.
Use the double arrows to 'retweet' or repost something someone else has said.
Clicking the star means you like ('favorite') the Tweet or message.
The three dots mean that you can copy the link to the tweet.
More help:
Getting started with Twitter