SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
Internet Safety and
   Cyberbullying
Mrs. Trudden
Mrs. Clifford
Website and Ad Safety
     Work on the assigned website
     only....don’t navigate away.
     Never click on advertisements....they are
     there to distract you.




 http://www.funbrain.com/brain/SweepsBrain/Password.html?GameName=DesertDive&Brain=kidsandparents&Grade=0&GameNumber=1
Downloading and
        File-Sharing
Download and share media
safely and from approved
websites
It is illegal to share copyrighted
materials without permission
You could unknowingly
download or distribute viruses
and illicit material.
                                     www.nonstopmac.com/ipod/
Email, IM, MySpace and
         Facebook
 Protect yourself by:
  Communicating with
people you know in person
  Keeping your personal
information private
  Not meeting offline
  Not responding to
offensive or any unknown
messages                    http://www.flickr.com/photos/luc/1824234195/
Cell Phones
   Never post your cell
phone number online
  Never send photos or
videos of yourself         http://www.flickr.com/photos/silly_a1804/2279068004/




  Don’t respond to harassing text
  Having a cell phone is a privilege,
not a right.
Make Safe Online Choices
You control your behavior and
reputation as well as how much
personal information is revealed.

Be a good friend and sibling and
encourage others to be safer online.

Talk to a trusted adult if
anything makes you feel
scared or uncomfortable.

          http://www.safeinyourspace.org/images/photokidscomputers.jpg
PRES Students are Technology PALS!

• P - Protection (about your identity and reputation)

• A - Appropriate (about inappropriate sites)

• L - Legal (about plagiarism, copying software/
  music)

• S - Safe & Responsible (about
  handling computers, software,
  equipment, backing up)



                                  http://www.flickr.com/photos/21976935@N03/2774496663
What is Bullying?
          P.I.C. Criteria

  P...purposeful
behavior
  I...imbalance of
power
  C...continual             http://www.citymasala.com/November2008/Bullying.gif
Cyberbullying




    http://www.uberreview.com/wp-content/uploads/cyberbully.jpg
What is Cyberbullying?
Spreading rumors and/or
gossip
Posting pictures without
consent
Stealing passwords to
assume someone’s
identity.
                        http://img.timeinc.net/TFK/media/news/2005a/050314_cyberbullies_special.jpg
Harrassing or
threatening with mean
or bad language

Most cases of
cyberbullying are
committed by someone
that you know
Warning Signs of
      Cyberbullying
• If someone tries to

  • isolate you from family and friends

  • turn you against your parents or guardians

  • tell you to keep secrets

  • sent inappropriate materials or talk about things
    that make you feel uncomfortable

  • threaten you
          Tell an adult you trust!
These warning signs apply online and offline!
What Not to Do!
•Don’t give your personal information to anyone....like
name, age, birthday, address, school, schedule
•Don’t post photos and videos of yourself or anyone
without permission
•NEVER give out your usernames and passwords to
anyone!




                  http://www.whostolemyidentity.com/uploads/Image/identity-theft.jpg
What to do!
•If you are ever cyberbullied:
 •Tell a trusted adult
 •Do not respond
 •Save the evidence
If anyone threatens you or you feel that
you are in immediate danger, talk to an
adult you trust and they will contact your
     local law-enforcement agency.
The Internet is
private.....right???
If it is on the internet, it
is NOT PRIVATE!
Real-Life Consequences
• Profiles and blogs are not only viewed
  by your friends, but also by:
 • Parents and Relatives
 • Teachers and Principals
 • Colleges and Universities
 • Employers
 • ONLINE PREDATORS
                               http://www.flickr.com/photos/32114411@N04/3021610899/

Mais conteúdo relacionado

Mais procurados

Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 

Mais procurados (17)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 

Destaque

Nouns Compound
Nouns CompoundNouns Compound
Nouns CompoundCM Ites
 
Ites Scratch Software Review
Ites Scratch Software ReviewItes Scratch Software Review
Ites Scratch Software ReviewCM Ites
 
ניהול ידע
ניהול ידעניהול ידע
ניהול ידעilanitush
 
Af Act I Scenes i-v.
Af Act I Scenes i-v.Af Act I Scenes i-v.
Af Act I Scenes i-v.CM Ites
 
Study Smarter, Not Harder
Study Smarter, Not HarderStudy Smarter, Not Harder
Study Smarter, Not HarderCM Ites
 
Great Authors Unit summary
Great Authors Unit summaryGreat Authors Unit summary
Great Authors Unit summaryCM Ites
 
Author biographies
Author biographiesAuthor biographies
Author biographiesCM Ites
 

Destaque (7)

Nouns Compound
Nouns CompoundNouns Compound
Nouns Compound
 
Ites Scratch Software Review
Ites Scratch Software ReviewItes Scratch Software Review
Ites Scratch Software Review
 
ניהול ידע
ניהול ידעניהול ידע
ניהול ידע
 
Af Act I Scenes i-v.
Af Act I Scenes i-v.Af Act I Scenes i-v.
Af Act I Scenes i-v.
 
Study Smarter, Not Harder
Study Smarter, Not HarderStudy Smarter, Not Harder
Study Smarter, Not Harder
 
Great Authors Unit summary
Great Authors Unit summaryGreat Authors Unit summary
Great Authors Unit summary
 
Author biographies
Author biographiesAuthor biographies
Author biographies
 

Semelhante a Pres Internet Safety Presentation

Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipKaylon McGee
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipnhokanson
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 

Semelhante a Pres Internet Safety Presentation (20)

Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Ciejkalab4b
Ciejkalab4bCiejkalab4b
Ciejkalab4b
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Internet safety
Internet safetyInternet safety
Internet safety
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Último

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Último (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Pres Internet Safety Presentation

  • 1. Internet Safety and Cyberbullying Mrs. Trudden Mrs. Clifford
  • 2. Website and Ad Safety Work on the assigned website only....don’t navigate away. Never click on advertisements....they are there to distract you. http://www.funbrain.com/brain/SweepsBrain/Password.html?GameName=DesertDive&Brain=kidsandparents&Grade=0&GameNumber=1
  • 3. Downloading and File-Sharing Download and share media safely and from approved websites It is illegal to share copyrighted materials without permission You could unknowingly download or distribute viruses and illicit material. www.nonstopmac.com/ipod/
  • 4. Email, IM, MySpace and Facebook Protect yourself by: Communicating with people you know in person Keeping your personal information private Not meeting offline Not responding to offensive or any unknown messages http://www.flickr.com/photos/luc/1824234195/
  • 5. Cell Phones Never post your cell phone number online Never send photos or videos of yourself http://www.flickr.com/photos/silly_a1804/2279068004/ Don’t respond to harassing text Having a cell phone is a privilege, not a right.
  • 6. Make Safe Online Choices You control your behavior and reputation as well as how much personal information is revealed. Be a good friend and sibling and encourage others to be safer online. Talk to a trusted adult if anything makes you feel scared or uncomfortable. http://www.safeinyourspace.org/images/photokidscomputers.jpg
  • 7. PRES Students are Technology PALS! • P - Protection (about your identity and reputation) • A - Appropriate (about inappropriate sites) • L - Legal (about plagiarism, copying software/ music) • S - Safe & Responsible (about handling computers, software, equipment, backing up) http://www.flickr.com/photos/21976935@N03/2774496663
  • 8. What is Bullying? P.I.C. Criteria P...purposeful behavior I...imbalance of power C...continual http://www.citymasala.com/November2008/Bullying.gif
  • 9. Cyberbullying http://www.uberreview.com/wp-content/uploads/cyberbully.jpg
  • 10. What is Cyberbullying? Spreading rumors and/or gossip Posting pictures without consent Stealing passwords to assume someone’s identity. http://img.timeinc.net/TFK/media/news/2005a/050314_cyberbullies_special.jpg
  • 11. Harrassing or threatening with mean or bad language Most cases of cyberbullying are committed by someone that you know
  • 12. Warning Signs of Cyberbullying • If someone tries to • isolate you from family and friends • turn you against your parents or guardians • tell you to keep secrets • sent inappropriate materials or talk about things that make you feel uncomfortable • threaten you Tell an adult you trust! These warning signs apply online and offline!
  • 13. What Not to Do! •Don’t give your personal information to anyone....like name, age, birthday, address, school, schedule •Don’t post photos and videos of yourself or anyone without permission •NEVER give out your usernames and passwords to anyone! http://www.whostolemyidentity.com/uploads/Image/identity-theft.jpg
  • 14. What to do! •If you are ever cyberbullied: •Tell a trusted adult •Do not respond •Save the evidence If anyone threatens you or you feel that you are in immediate danger, talk to an adult you trust and they will contact your local law-enforcement agency.
  • 15. The Internet is private.....right??? If it is on the internet, it is NOT PRIVATE!
  • 16. Real-Life Consequences • Profiles and blogs are not only viewed by your friends, but also by: • Parents and Relatives • Teachers and Principals • Colleges and Universities • Employers • ONLINE PREDATORS http://www.flickr.com/photos/32114411@N04/3021610899/