SlideShare uma empresa Scribd logo
1 de 27
Electronic Safety

Keeping yourself safe on the
  internet and cell phone
      Intended for Grades 4-5
Do you have a computer at home?
1. Yes
                    96%
2. No




                           4%
                    s




                           o
                   Ye




                           N
Do you have/use a cell phone?
1. Yes
                   86%
2. No




                         14%

                   s




                          o
                  Ye




                         N
Do you ever play games online?
1. Yes
                   95%
2. No




                         5%
                   s




                          o
                  Ye




                          N
Do you have an e-mail address?
1. Yes
                     87%
2. No




                           13%

                     s




                            o
                    Ye




                            N
Do you ever use Chat groups?
1. Yes
2. No              63%



                         37%




                   s




                          o
                  Ye




                         N
Have you ever visited Facebook,
 Myspace or other “social sites”?
1. Yes
2. No                 74%




                             26%



                      s




                              o
                     Ye




                             N
Have you ever sent or received a
         text message?
1. Yes
                      75%
2. No



                             25%



                      s




                              o
                     Ye




                             N
Have you ever bullied someone
             online?
1. Yes
2. No                       71%




                     29%



                     s




                             o
                    Ye




                            N
Have you ever been bullied online?
1. Yes
2. No                        54%




                      46%



                      s




                              o
                     Ye




                             N
Electronic Enemies:
1)   Cyberbullies
2)   Spammers
                        www.seobook.com
3)   Defamatory Sites
4)   Child Predators
5)   Cellphone Abuser
What is Cyber Bullying?

 Cyber bullying is sending or posting
 harmful or cruel text or images using the
 Internet or other digital communication
 devices, including cell phones and PDA's
 (personal digital assistants)
Cyber-bullying can include:
• Sending cruel, vicious or threatening e-mails or
  IMs.
• Creating Web sites that have stories, pictures
  and jokes ridiculing others.
• Posting pictures of other students/kids online
  with derogatory phrases or questions attached
  to them.
• Using someone else's e-mail to send vicious or
  incriminating e-mails to others.
• Using instant messaging tools to harass others.
Save your Identity
• Only share passwords with
  parents/guardians
• Change your passwords routinely
• Set webpages, profiles, blogs, etc. to
  private
How much is too much?
 Discuss with an elbow buddy what
 information is safe to put on a
 webpage, blog, myspace or a
 facebook account.
Too much information:
• Do not give away your gender, age, or
  location in screen names
• Avoid posting photos that could be
  damaging now or in the future
• All pictures should be altered to remove
  identifying information
• Don’t post plans or where you are located
• Think about real life effects of posts
Defamatory Sites
Changes information on your site without
your permission
Creates a site about you without you
knowing
Posts negative material or lies about you
Created by cyber-bullies
Have you ever been a victim of a
         cyber bully?
        Students Who've Been Bullied
         Online Between Grades 4-8




         43%                           Yes
                         57%           No
Ways to handle cyber-bullies:
• not giving out your passwords or any personal
  information to anyone, either online or in person.
• not replying to a message from an online bully.
• blocking e-mail or instant messages from the
  sender.
• You can also save harassing messages and forward
  them to your Internet Service Provider (ISP). ISPs are
  companies, such as AOL, Netscape, and NetZero
  that provide Internet access to consumers. Most
  ISPs have policies that restrict users from harassing
  others over the Internet.
• Be aware! Cyber bullies can easily change screen
  names.

 •http://www.weeklyreaderexpress.com/ViewArticle.aspx?pin=wrg5-2003530
Ways to handle cyber-bullies:
• Ignore the bullying or tell them to stop.
• Tell a parent, teacher or trusted adult if
  you are being bullied online. This isn't
  "tattling“ or “snitching.”
• If you know someone else who is being
  mean to other kids online, tell them to
  stop and then tell a parent or teacher.
Spammers
Sends you junk e-mails or texts
Sends e-mails to everyone in their address
book or in contact list
Sends links to sites that contain
inappropriate materials
Sends the same material repeatedly
Cellphone Abusers
Send bullying text messages
Take pictures of people on their cameras
without their consent or knowledge
Use cell phones to text links to
inappropriate sites, spam by phone
Gang up on someone by group texting
Child Predators
Intent is to meet children for illegal
purposes
May intend to harm you
May suggest to meet in real life
Gathers facts about you from your
websites, chat, and profiles
Avoiding Electronic Enemies
- It is important to know who you are talking
  to when using electronic devices.
- Anything you say to someone on-line or in
  a text has a permanent record, it will
  NEVER go away
- You should report anyone who makes you
  feel uncomfortable to an adult.
- Never attempt to “fight back” electronically
Electronic Safety Pledges
I Pledge…
• I promise to tell an adult about e-mails or text
  messages that make me feel uncomfortable,
  bully me, or bully others.
• I will tell a parent if anyone asks for my personal
  information including but not limited to phone
  numbers, addresses and passwords.
• I will never meet anyone from online. I will tell
  an adult if someone online asks to meet me.
I Pledge…
• I will not create sites, post comments, or
  post pictures with the intent of hurting
  someone’s feelings.
• I will not use a cell phone or a computer to
  bully someone else, even if they have
  previously done it to me.
• I will not say things electronically that I
  would not say face to face.

Mais conteúdo relacionado

Mais procurados

Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
Stay Safe In Cyberspace
Stay  Safe In  CyberspaceStay  Safe In  Cyberspace
Stay Safe In CyberspaceCarolyn Argo
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingMatt Britland
 
Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 

Mais procurados (19)

Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber saftey
Cyber safteyCyber saftey
Cyber saftey
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Stay Safe In Cyberspace
Stay  Safe In  CyberspaceStay  Safe In  Cyberspace
Stay Safe In Cyberspace
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Semelhante a Electronic safety grade 4 5

Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying projectvolpila
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwptsooy10
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwptsooy10
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbullingalsebastino
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsWebbed Marketing
 
Electronic safety grade 2 3 1
Electronic safety grade 2 3 1Electronic safety grade 2 3 1
Electronic safety grade 2 3 1Melissa Halcott
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2Chu Yuan
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital CitizensJason Rushing
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copybrlewis1971
 

Semelhante a Electronic safety grade 4 5 (20)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyber bullying project
Cyber bullying projectCyber bullying project
Cyber bullying project
 
Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)Pengertian (Means of Cyber Bullying)
Pengertian (Means of Cyber Bullying)
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in Schools
 
Electronic safety grade 2 3 1
Electronic safety grade 2 3 1Electronic safety grade 2 3 1
Electronic safety grade 2 3 1
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
Sexting technology
Sexting  technologySexting  technology
Sexting technology
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copy
 
Using Social Media To Change Your World: The Power of Girls Online
Using Social Media To Change Your World: The Power of Girls OnlineUsing Social Media To Change Your World: The Power of Girls Online
Using Social Media To Change Your World: The Power of Girls Online
 

Mais de Melissa Halcott

Project management board presentation
Project management board presentationProject management board presentation
Project management board presentationMelissa Halcott
 
Photo story 3 for windows
Photo story 3 for windowsPhoto story 3 for windows
Photo story 3 for windowsMelissa Halcott
 
Study island presentation for summer school
Study island presentation for summer schoolStudy island presentation for summer school
Study island presentation for summer schoolMelissa Halcott
 
Photo story 3 for windows
Photo story 3 for windowsPhoto story 3 for windows
Photo story 3 for windowsMelissa Halcott
 
Project management board presentation
Project management board presentationProject management board presentation
Project management board presentationMelissa Halcott
 

Mais de Melissa Halcott (9)

Storybird ppt
Storybird pptStorybird ppt
Storybird ppt
 
Managing moodle
Managing moodleManaging moodle
Managing moodle
 
Discovery learning
Discovery learningDiscovery learning
Discovery learning
 
Project management board presentation
Project management board presentationProject management board presentation
Project management board presentation
 
Photo story 3 for windows
Photo story 3 for windowsPhoto story 3 for windows
Photo story 3 for windows
 
Unit1 edm vocab intro
Unit1 edm vocab introUnit1 edm vocab intro
Unit1 edm vocab intro
 
Study island presentation for summer school
Study island presentation for summer schoolStudy island presentation for summer school
Study island presentation for summer school
 
Photo story 3 for windows
Photo story 3 for windowsPhoto story 3 for windows
Photo story 3 for windows
 
Project management board presentation
Project management board presentationProject management board presentation
Project management board presentation
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Electronic safety grade 4 5

  • 1. Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5
  • 2. Do you have a computer at home? 1. Yes 96% 2. No 4% s o Ye N
  • 3. Do you have/use a cell phone? 1. Yes 86% 2. No 14% s o Ye N
  • 4. Do you ever play games online? 1. Yes 95% 2. No 5% s o Ye N
  • 5. Do you have an e-mail address? 1. Yes 87% 2. No 13% s o Ye N
  • 6. Do you ever use Chat groups? 1. Yes 2. No 63% 37% s o Ye N
  • 7. Have you ever visited Facebook, Myspace or other “social sites”? 1. Yes 2. No 74% 26% s o Ye N
  • 8. Have you ever sent or received a text message? 1. Yes 75% 2. No 25% s o Ye N
  • 9. Have you ever bullied someone online? 1. Yes 2. No 71% 29% s o Ye N
  • 10. Have you ever been bullied online? 1. Yes 2. No 54% 46% s o Ye N
  • 11. Electronic Enemies: 1) Cyberbullies 2) Spammers www.seobook.com 3) Defamatory Sites 4) Child Predators 5) Cellphone Abuser
  • 12. What is Cyber Bullying? Cyber bullying is sending or posting harmful or cruel text or images using the Internet or other digital communication devices, including cell phones and PDA's (personal digital assistants)
  • 13. Cyber-bullying can include: • Sending cruel, vicious or threatening e-mails or IMs. • Creating Web sites that have stories, pictures and jokes ridiculing others. • Posting pictures of other students/kids online with derogatory phrases or questions attached to them. • Using someone else's e-mail to send vicious or incriminating e-mails to others. • Using instant messaging tools to harass others.
  • 14. Save your Identity • Only share passwords with parents/guardians • Change your passwords routinely • Set webpages, profiles, blogs, etc. to private
  • 15. How much is too much? Discuss with an elbow buddy what information is safe to put on a webpage, blog, myspace or a facebook account.
  • 16. Too much information: • Do not give away your gender, age, or location in screen names • Avoid posting photos that could be damaging now or in the future • All pictures should be altered to remove identifying information • Don’t post plans or where you are located • Think about real life effects of posts
  • 17. Defamatory Sites Changes information on your site without your permission Creates a site about you without you knowing Posts negative material or lies about you Created by cyber-bullies
  • 18. Have you ever been a victim of a cyber bully? Students Who've Been Bullied Online Between Grades 4-8 43% Yes 57% No
  • 19. Ways to handle cyber-bullies: • not giving out your passwords or any personal information to anyone, either online or in person. • not replying to a message from an online bully. • blocking e-mail or instant messages from the sender. • You can also save harassing messages and forward them to your Internet Service Provider (ISP). ISPs are companies, such as AOL, Netscape, and NetZero that provide Internet access to consumers. Most ISPs have policies that restrict users from harassing others over the Internet. • Be aware! Cyber bullies can easily change screen names. •http://www.weeklyreaderexpress.com/ViewArticle.aspx?pin=wrg5-2003530
  • 20. Ways to handle cyber-bullies: • Ignore the bullying or tell them to stop. • Tell a parent, teacher or trusted adult if you are being bullied online. This isn't "tattling“ or “snitching.” • If you know someone else who is being mean to other kids online, tell them to stop and then tell a parent or teacher.
  • 21. Spammers Sends you junk e-mails or texts Sends e-mails to everyone in their address book or in contact list Sends links to sites that contain inappropriate materials Sends the same material repeatedly
  • 22. Cellphone Abusers Send bullying text messages Take pictures of people on their cameras without their consent or knowledge Use cell phones to text links to inappropriate sites, spam by phone Gang up on someone by group texting
  • 23. Child Predators Intent is to meet children for illegal purposes May intend to harm you May suggest to meet in real life Gathers facts about you from your websites, chat, and profiles
  • 24. Avoiding Electronic Enemies - It is important to know who you are talking to when using electronic devices. - Anything you say to someone on-line or in a text has a permanent record, it will NEVER go away - You should report anyone who makes you feel uncomfortable to an adult. - Never attempt to “fight back” electronically
  • 26. I Pledge… • I promise to tell an adult about e-mails or text messages that make me feel uncomfortable, bully me, or bully others. • I will tell a parent if anyone asks for my personal information including but not limited to phone numbers, addresses and passwords. • I will never meet anyone from online. I will tell an adult if someone online asks to meet me.
  • 27. I Pledge… • I will not create sites, post comments, or post pictures with the intent of hurting someone’s feelings. • I will not use a cell phone or a computer to bully someone else, even if they have previously done it to me. • I will not say things electronically that I would not say face to face.