
Q6 Safe & Secure
Introduction
This Quest is about being wise about the username and passwords you select. There are a lot of tips on selecting smart ones. Start with Part 1, learning about the AUP, then Part 2 to see how good your judgment is, and finally Part 3 for tips about passwords and usernames.
I Can Statements
- list three key points from my school's AUP
- create a strong username and password
- know tips on how to keep a mobile device safe and secure
- collaborate constructively with others
Key Vocabulary
AUP (Acceptable Use Policy): A document that outlines a set of rules to be followed by users on a network or website.
Password: A password is a secret word or phrase that is used to identify a user in order to gain admission to an account, also sometimes called a passcode.
SSO (Single Sign-on): This refers to something that is frequently used by school districts that lets a student log in only once to access different resources provided by the district and helps protect users and their accounts.
Two-factor authentication (2FA): This refers to the use of two factors to access your account online. It could be your password AND a special code and will make sure that the person logging into your account is really you.
Username: The username is a name that uniquely identifies someone on a computer system.
Play the Vocabulary Game below to practice the Key Vocabulary.
Vocabulary Game
You can change the Quiz mode to Match, Test, Learn, Flash Cards, Spell using the selection list at the bottom right of the activity that says "Choose a Study Mode." Direct Link
Part 1: AUP
AUP stands for Acceptable Use Policy and is frequently part of a district's student handbook. It may be part of an Internet Use Agreement that your district will expect all students or parents/guardians to sign.
It is a contract that explains the rules for using digital technologies - such as cell phones, computers, and the Internet - in the school or educational environment. The AUP can set expectations and consequences for equipment and Internet use behaviors, such as cyber-bullying. This is one way educators try to help keep students safe in the digital world at school.
What does your AUP tell you? Read through the AUP for your school district and then be prepared to summarize at least three key points that should be important for all students to remember. Here are some AUP's Examples from other schools.
Steps
PART 1 AUP
a. Locate your district's AUP and discover what it is and the consequences for not following it.
b. Summarize your district's AUP by identifying at least three key points that are important for all students to remember when accessing the district's computer network and equipment.
c. Go on to Part 2
Part 2: Judgment call
Part 2: Judgment call
This is a judgment challenge. Check with your teacher and discuss the following with your class and/or group of friends:
a. Your best friend asks for your password to log into your social network site for just a minute so they can check something they heard about. What would you say?
b. Would you create (or have you already created ) a username that is or sounds inappropriate or one that tries to get attention from others?
c. Have you seen someone do something that seems stupid to you and you immediately send a text message to others about it?
Part 3: Passwords, Usernames and Two-factor Authentication
Steps
1. Begin this section by watching the animated video above and then watch Broken Friendship YouTube. It is about a teen who gave her best friend's password to some friends and what happened afterwards.
2. Here are some resources and articles about creating a Good Password and keeping it secure. Take notes of the different tips offered to create your own Password Tips list. You, your class, or small groups will then create your own Password Tips to share with others (poster, rap video, presentation).
- Video about Strong Passwords from GCFGlobal (3:30) for tips.
- 8 Do's and Don'ts Of Good Passwords article from Educause.
- 10 Tips for Teens for a strong password.
3. Reflection and discussion on Creating Passwords: Are the passwords you're using now as strong and secure as they could be? Working with a partner or small group create examples of four simple passwords you feel are good examples. Share and discuss your examples in class and explain what tips you used to create them. One of the free solutions recommended in 2021 for keeping track of your passwords is Bitwarden, but do your own research by checking several different reviews on the web before making a decision.
4. Creating a good username: With over 2.7 billion people using the Internet, you will find that the username you want to use to create an account may already be taken. You will need to be creative and create a username that you will remember and be unique to you.
Work with one or two others, and each select one of the following resources, take notes and then share what you learned with your partners.
- Why Usernames are Important and How to Choose Good Ones (Leapfrog)
- WikiHow to Create a Unique Username (1/5/2020)
- Lifewire How to Create the Perfect Screen/Username
Note: You can check to see if your username is still available on certain sites, such as Facebook, Twitter, YouTube, Photobucket, Hulu, Bebo, and others, by using the website namechk.
5. Two-factor authentication (2FA) is also referred to as two-step verification. It means that you need two factors to access your account online. It could be your password AND a special code. When you set up 2FA, it will make sure that the person logging into your account is really you.
It adds a second security level (two-factors) to complete your login process to make it more secure and protect you. Direct YouTube link.

Part 4: Mobile Safety and Security
Watch this video about safety with a mobile device (tablet, iPad...) or phone and then discuss with a partner or in class.
- Is it safe to put your device on a Free wifi site?
- Has anything strange shown up on your mobile or cell phone device? Did you suspect a virus?
- What type of personal information (names, addresses, photos, videos, etc.) is stored on your mobile or cell phone device? If someone got it what might be a result?
- With a partner or class, make a list of 8-10 tips to keep your mobile device safe.
Completing this Quest
By completing this assignment you are certifying that you:
- have read the pages of the Acceptable Use Policy, student handbook, or Internet Use Policy that outlines the Acceptable Use Code for accessing school equipment, the Internet, and networks and that you agree to abide by the rules
- understand the dangers of sharing your password and have created a safe and secure password and username
- understand the dangers of safety and security with mobile devices and have some great safety tips
Suggested rubric for parts 1-3.
Additional Resources
Check with your Media Center, Librarian, Technology Coordinator, Principal, and/or school web site for the AUP.
Try this 5-question Knowledge Check
Check off this Quest on the 21t4s roadmap
Proceed to Quest 7 Email
Competencies & Standards
MITECS Michigan Integrated Technology Competencies for Students, and
3. Knowledge Constructor
a. Plan and employ effective research strategies to locate information and other resources for their intellectual or creative pursuits
Websites and Documents
Websites
- 8 Do's and Don'ts Of Good Passwords
- 10 Tips for Teens on Strong Passwords
- AUP Examples
- Bitwarden
- How to Create the Perfect Screen/Username
- Namechk
- Why Usernames are Important and How to Choose Good Ones
- WikiHow to Create a Unique Username
Videos from Outside Sources
- Broken Friendship YouTube (1:50 mins)
- How to Create a Strong Password YouTube (3:30 mins)
- Mobile Safety & Security CommonCraft Video (2:57 mins)
- Two-Factor Authentication (2FA) YouTube (2:35 mins)
21t4s Videos
21t4s Documents & Quizzes