SlideShare a Scribd company logo
Internet Safety and
   Cyberbullying
Mrs. Trudden
Mrs. Clifford
Website and Ad Safety
     Work on the assigned website
     only....don’t navigate away.
     Never click on advertisements....they are
     there to distract you.




 http://www.funbrain.com/brain/SweepsBrain/Password.html?GameName=DesertDive&Brain=kidsandparents&Grade=0&GameNumber=1
Downloading and
        File-Sharing
Download and share media
safely and from approved
websites
It is illegal to share copyrighted
materials without permission
You could unknowingly
download or distribute viruses
and illicit material.
                                     www.nonstopmac.com/ipod/
Email, IM, MySpace and
         Facebook
 Protect yourself by:
  Communicating with
people you know in person
  Keeping your personal
information private
  Not meeting offline
  Not responding to
offensive or any unknown
messages                    http://www.flickr.com/photos/luc/1824234195/
Cell Phones
   Never post your cell
phone number online
  Never send photos or
videos of yourself         http://www.flickr.com/photos/silly_a1804/2279068004/




  Don’t respond to harassing text
  Having a cell phone is a privilege,
not a right.
Make Safe Online Choices
You control your behavior and
reputation as well as how much
personal information is revealed.

Be a good friend and sibling and
encourage others to be safer online.

Talk to a trusted adult if
anything makes you feel
scared or uncomfortable.

          http://www.safeinyourspace.org/images/photokidscomputers.jpg
PRES Students are Technology PALS!

• P - Protection (about your identity and reputation)

• A - Appropriate (about inappropriate sites)

• L - Legal (about plagiarism, copying software/
  music)

• S - Safe & Responsible (about
  handling computers, software,
  equipment, backing up)



                                  http://www.flickr.com/photos/21976935@N03/2774496663
What is Bullying?
          P.I.C. Criteria

  P...purposeful
behavior
  I...imbalance of
power
  C...continual             http://www.citymasala.com/November2008/Bullying.gif
Cyberbullying




    http://www.uberreview.com/wp-content/uploads/cyberbully.jpg
What is Cyberbullying?
Spreading rumors and/or
gossip
Posting pictures without
consent
Stealing passwords to
assume someone’s
identity.
                        http://img.timeinc.net/TFK/media/news/2005a/050314_cyberbullies_special.jpg
Harrassing or
threatening with mean
or bad language

Most cases of
cyberbullying are
committed by someone
that you know
Warning Signs of
      Cyberbullying
• If someone tries to

  • isolate you from family and friends

  • turn you against your parents or guardians

  • tell you to keep secrets

  • sent inappropriate materials or talk about things
    that make you feel uncomfortable

  • threaten you
          Tell an adult you trust!
These warning signs apply online and offline!
What Not to Do!
•Don’t give your personal information to anyone....like
name, age, birthday, address, school, schedule
•Don’t post photos and videos of yourself or anyone
without permission
•NEVER give out your usernames and passwords to
anyone!




                  http://www.whostolemyidentity.com/uploads/Image/identity-theft.jpg
What to do!
•If you are ever cyberbullied:
 •Tell a trusted adult
 •Do not respond
 •Save the evidence
If anyone threatens you or you feel that
you are in immediate danger, talk to an
adult you trust and they will contact your
     local law-enforcement agency.
The Internet is
private.....right???
If it is on the internet, it
is NOT PRIVATE!
Real-Life Consequences
• Profiles and blogs are not only viewed
  by your friends, but also by:
 • Parents and Relatives
 • Teachers and Principals
 • Colleges and Universities
 • Employers
 • ONLINE PREDATORS
                               http://www.flickr.com/photos/32114411@N04/3021610899/

More Related Content

What's hot

Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 

What's hot (17)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 

Viewers also liked

Nouns Compound
Nouns CompoundNouns Compound
Nouns CompoundCM Ites
 
Ites Scratch Software Review
Ites Scratch Software ReviewItes Scratch Software Review
Ites Scratch Software ReviewCM Ites
 
ניהול ידע
ניהול ידעניהול ידע
ניהול ידעilanitush
 
Af Act I Scenes i-v.
Af Act I Scenes i-v.Af Act I Scenes i-v.
Af Act I Scenes i-v.CM Ites
 
Study Smarter, Not Harder
Study Smarter, Not HarderStudy Smarter, Not Harder
Study Smarter, Not HarderCM Ites
 
Great Authors Unit summary
Great Authors Unit summaryGreat Authors Unit summary
Great Authors Unit summaryCM Ites
 
Author biographies
Author biographiesAuthor biographies
Author biographiesCM Ites
 

Viewers also liked (7)

Nouns Compound
Nouns CompoundNouns Compound
Nouns Compound
 
Ites Scratch Software Review
Ites Scratch Software ReviewItes Scratch Software Review
Ites Scratch Software Review
 
ניהול ידע
ניהול ידעניהול ידע
ניהול ידע
 
Af Act I Scenes i-v.
Af Act I Scenes i-v.Af Act I Scenes i-v.
Af Act I Scenes i-v.
 
Study Smarter, Not Harder
Study Smarter, Not HarderStudy Smarter, Not Harder
Study Smarter, Not Harder
 
Great Authors Unit summary
Great Authors Unit summaryGreat Authors Unit summary
Great Authors Unit summary
 
Author biographies
Author biographiesAuthor biographies
Author biographies
 

Similar to Pres Internet Safety Presentation

Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipKaylon McGee
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipnhokanson
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 

Similar to Pres Internet Safety Presentation (20)

Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Ciejkalab4b
Ciejkalab4bCiejkalab4b
Ciejkalab4b
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Internet safety
Internet safetyInternet safety
Internet safety
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Recently uploaded

The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfalexjohnson7307
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyUXDXConf
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Boni Yeamin
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Intelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfIntelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfAnthony Lucente
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 

Recently uploaded (20)

The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in Technology
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Intelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfIntelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 

Pres Internet Safety Presentation

  • 1. Internet Safety and Cyberbullying Mrs. Trudden Mrs. Clifford
  • 2. Website and Ad Safety Work on the assigned website only....don’t navigate away. Never click on advertisements....they are there to distract you. http://www.funbrain.com/brain/SweepsBrain/Password.html?GameName=DesertDive&Brain=kidsandparents&Grade=0&GameNumber=1
  • 3. Downloading and File-Sharing Download and share media safely and from approved websites It is illegal to share copyrighted materials without permission You could unknowingly download or distribute viruses and illicit material. www.nonstopmac.com/ipod/
  • 4. Email, IM, MySpace and Facebook Protect yourself by: Communicating with people you know in person Keeping your personal information private Not meeting offline Not responding to offensive or any unknown messages http://www.flickr.com/photos/luc/1824234195/
  • 5. Cell Phones Never post your cell phone number online Never send photos or videos of yourself http://www.flickr.com/photos/silly_a1804/2279068004/ Don’t respond to harassing text Having a cell phone is a privilege, not a right.
  • 6. Make Safe Online Choices You control your behavior and reputation as well as how much personal information is revealed. Be a good friend and sibling and encourage others to be safer online. Talk to a trusted adult if anything makes you feel scared or uncomfortable. http://www.safeinyourspace.org/images/photokidscomputers.jpg
  • 7. PRES Students are Technology PALS! • P - Protection (about your identity and reputation) • A - Appropriate (about inappropriate sites) • L - Legal (about plagiarism, copying software/ music) • S - Safe & Responsible (about handling computers, software, equipment, backing up) http://www.flickr.com/photos/21976935@N03/2774496663
  • 8. What is Bullying? P.I.C. Criteria P...purposeful behavior I...imbalance of power C...continual http://www.citymasala.com/November2008/Bullying.gif
  • 9. Cyberbullying http://www.uberreview.com/wp-content/uploads/cyberbully.jpg
  • 10. What is Cyberbullying? Spreading rumors and/or gossip Posting pictures without consent Stealing passwords to assume someone’s identity. http://img.timeinc.net/TFK/media/news/2005a/050314_cyberbullies_special.jpg
  • 11. Harrassing or threatening with mean or bad language Most cases of cyberbullying are committed by someone that you know
  • 12. Warning Signs of Cyberbullying • If someone tries to • isolate you from family and friends • turn you against your parents or guardians • tell you to keep secrets • sent inappropriate materials or talk about things that make you feel uncomfortable • threaten you Tell an adult you trust! These warning signs apply online and offline!
  • 13. What Not to Do! •Don’t give your personal information to anyone....like name, age, birthday, address, school, schedule •Don’t post photos and videos of yourself or anyone without permission •NEVER give out your usernames and passwords to anyone! http://www.whostolemyidentity.com/uploads/Image/identity-theft.jpg
  • 14. What to do! •If you are ever cyberbullied: •Tell a trusted adult •Do not respond •Save the evidence If anyone threatens you or you feel that you are in immediate danger, talk to an adult you trust and they will contact your local law-enforcement agency.
  • 15. The Internet is private.....right??? If it is on the internet, it is NOT PRIVATE!
  • 16. Real-Life Consequences • Profiles and blogs are not only viewed by your friends, but also by: • Parents and Relatives • Teachers and Principals • Colleges and Universities • Employers • ONLINE PREDATORS http://www.flickr.com/photos/32114411@N04/3021610899/