opportunity
plagiarism
Yes
identity theft
No
pitfall
green - there is nothing risky here
No
fair use
Protect a person’s creative work and require permission from others to use it
vulnerable
ask - when you can get permission from the author or artist Example: using a picture your friend took. Acknowledge - anytime you use material created by someone else. Add Value - anytime you are reworking something Example: creating a parody
check who created it and give them credit, get permission to use it, buy it if necessary, use it responsibly
change the subject, log off, block the user, create a new account, tell a friend or adult
date of birth, place or birth, addresses, phone numbers. driver's license number, passport number, account numbers, social security number
need to verify account info, sense of urgency, alert account is in trouble, link in email or attachment, too good to be true, generic greeting, spelling errors
license
phishing
creative works
public domain
harass
avoid opening messages that look suspicious, don't click on links or download attachments, don't reply, mark as junk or spam for your email provider
to allow others to use their work, but while requiring credit be given; make it easier to share things responsibly
scam
piracy
You can use things you find online as long as you
Is it okay to share information about your pets online?
A hidden or unsuspected problem or danger
Give an example of a feature of a phishing email
in a position that makes it easier for you to be harmed or attacked
the ability to use a small amount of copyrighted work without permission, but only in certain ways and in specific situations
clear way to define the copyright of your creative work so people know how it can be used
any idea or artistic creation that is recorded in some form whether it is hard copy or digital
Kayla replies to a fan of her cooking blog, answering a question about a recipe she just posted. Is this situation a red, yellow, or green situation?
A type of crime in which your private information is stolen and used for criminal activity
To bother or pressure aggressively
an attempt to trick someone, usually with the intention of stealing money or private info
The act of copying someone else’s work and saying it is your own is
Know when it is appropriate to use each item in the Ask, Acknowledge, and Add Value framework
Is it okay to share passwords online?
What should you do if someone makes you uncomfortable while communicating online?
What are some of the other pieces of information identity thieves try to get from you?
How can you protect yourself from an online scheme?
A chance for something to happen
Stealing copyrighted work by downloading or copying it in order to keep, sell, or give it away without permission and without paying
The purpose of copyright is to
Is it okay to share your full name online?
When people send phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal information and financial information
Why would people want to use a Creative Commons license?
Creative work that’s not copyrighted and therefore free for you to use however you want