SlideShare ist ein Scribd-Unternehmen logo
1 von 7
10 Rules for Safe Internet Usage For YOUNG TEENAGERS (13-16)
1. Keep your personal information  PERSONAL! Don’t give out your name, age, address, telephone number etc to anyone other than people you trust (family and close friends only). 2. Never share passwords! Sharing passwords allows people to access important/personal content such as your emails, instant messenger services, social networking sites. These details could be leaked into the wrong hands, even accidently, but by then it’s too late!
3. Use  Antivirus  and  Antispyware  programs! These programs will guard your PC and will keep it secure against any hazardous attacks (virus’s, key loggers etc). 4.  Update  these security programs! It is not always enough to just have antivirus and antispyware applications installed. They need to be regularly updated and to ensure they're secure against the latest virus definitions.
5. Don’t believe everything you see/read online!   There are many “scam” websites making false promises to entice you to sign up (for junk mail) and to part with your money.
6. Never agree to meet a  stranger! As a teenager it is exciting to go out and meet new people. However, meeting someone online is completely different.  Do you really know who this person is?  7. Never use your  webcam   with someone you don’t know! If your not sure who the person is your talking to and they request a webcam meeting, refuse it! Especially if they don’t have a webcam themselves! For all you know it could be anyone, and once you have been on webcam then they know what you look like!
8. Don’t give out  credit/debit  card details! For obvious reasons, only use your credit/debit card on secure websites that display the padlock icon. Don’t share these details across IM or social networking sites!
9. Take extra care on  Social Networking  sites! These sites attract all sorts of people and you can never guarantee someone is who they claim (unless of course you personally know them). Social networking sites allow people to see who you are, find out your personal details! 10. Don’t respond to  abusive messages! If some is sending you threatening or abusive messages, e-mails, IM’s etc then either ignore them or report them.  Do not get involved!

Weitere ähnliche Inhalte

Andere mochten auch

правила за безопасно сърфиране в интернет
правила за безопасно сърфиране в интернетправила за безопасно сърфиране в интернет
правила за безопасно сърфиране в интернет
Pepi Nikova
 
10 Forklift Safety Rules - A Review
10 Forklift Safety Rules - A Review10 Forklift Safety Rules - A Review
10 Forklift Safety Rules - A Review
Creative Safety Supply
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai
 

Andere mochten auch (11)

Powerpoint on Parental Control Styles
Powerpoint on Parental Control StylesPowerpoint on Parental Control Styles
Powerpoint on Parental Control Styles
 
правила за безопасно сърфиране в интернет
правила за безопасно сърфиране в интернетправила за безопасно сърфиране в интернет
правила за безопасно сърфиране в интернет
 
E Fraud
E FraudE Fraud
E Fraud
 
Being A Responsible Internet User
Being A Responsible Internet UserBeing A Responsible Internet User
Being A Responsible Internet User
 
10 Forklift Safety Rules - A Review
10 Forklift Safety Rules - A Review10 Forklift Safety Rules - A Review
10 Forklift Safety Rules - A Review
 
Advantage and disadvantage of the internet
Advantage and disadvantage of the internetAdvantage and disadvantage of the internet
Advantage and disadvantage of the internet
 
Ipad ppt
Ipad pptIpad ppt
Ipad ppt
 
Conditionals 1 and 2
Conditionals 1 and 2Conditionals 1 and 2
Conditionals 1 and 2
 
Future Perfect
Future PerfectFuture Perfect
Future Perfect
 
Future Continuous
Future ContinuousFuture Continuous
Future Continuous
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

10 Rules For Safe Internet Usage

  • 1. 10 Rules for Safe Internet Usage For YOUNG TEENAGERS (13-16)
  • 2. 1. Keep your personal information PERSONAL! Don’t give out your name, age, address, telephone number etc to anyone other than people you trust (family and close friends only). 2. Never share passwords! Sharing passwords allows people to access important/personal content such as your emails, instant messenger services, social networking sites. These details could be leaked into the wrong hands, even accidently, but by then it’s too late!
  • 3. 3. Use Antivirus and Antispyware programs! These programs will guard your PC and will keep it secure against any hazardous attacks (virus’s, key loggers etc). 4. Update these security programs! It is not always enough to just have antivirus and antispyware applications installed. They need to be regularly updated and to ensure they're secure against the latest virus definitions.
  • 4. 5. Don’t believe everything you see/read online! There are many “scam” websites making false promises to entice you to sign up (for junk mail) and to part with your money.
  • 5. 6. Never agree to meet a stranger! As a teenager it is exciting to go out and meet new people. However, meeting someone online is completely different. Do you really know who this person is? 7. Never use your webcam with someone you don’t know! If your not sure who the person is your talking to and they request a webcam meeting, refuse it! Especially if they don’t have a webcam themselves! For all you know it could be anyone, and once you have been on webcam then they know what you look like!
  • 6. 8. Don’t give out credit/debit card details! For obvious reasons, only use your credit/debit card on secure websites that display the padlock icon. Don’t share these details across IM or social networking sites!
  • 7. 9. Take extra care on Social Networking sites! These sites attract all sorts of people and you can never guarantee someone is who they claim (unless of course you personally know them). Social networking sites allow people to see who you are, find out your personal details! 10. Don’t respond to abusive messages! If some is sending you threatening or abusive messages, e-mails, IM’s etc then either ignore them or report them. Do not get involved!