Presentation on theme: "MAC Version 6.0 T weens I nternet S afety:. 2 Return to this Menu and Instructions Press the slide number and then “enter” to skip to specific slide segments."— Presentation transcript:
MAC Version 6.0 T weens I nternet S afety:
2 Return to this Menu and Instructions Press the slide number and then “enter” to skip to specific slide segments 4 Start the Presentation Esc Exit 12 Julie’s Journey 8 Teen PSA: Exchange 17 Survivor Diaries 22 Post-to-be Private 33 You Can’t Take It Back 27 Teen PSA: Everyone Knows Your Name 38 Terrible tEXt
Reminder: You may need to use a keyboard command, such as “Function + F4” to see video through a projector. If you can see the video above while projecting, proceed with the presentation. If not, please refer to your presenter guide for troubleshooting information.
Your Online Life E-mail, IM, and Chatrooms Cell Phones Social Networking Blogging Video & images Online Gaming File Sharing
Risky Online Behaviors
Basic Online Safety Follow the guidelines set by your parents and guardians Respect other people online Keep your identity private Stop communication if you feel uncomfortable Don’t meet offline
1.Do you think he respects her? 2.Do you think she is respecting herself by talking to him?
If anyone –Talks about inappropriate things –Sends you inappropriate images –Asks for your personal information –Wants you to do things that make you feel uncomfortable –Wants to meet you in person Talk to a trusted adult! Predators
I can trust him. He loves me… He tells me I’m Pretty *.* I love him. He cares about me. “Grooming” If someone tries to –Isolate you from family and friends –Turn you against your parents or guardian –Make you keep everything secret –Threaten you Tell an adult you trust!
Who Can You Trust? You may not know the truth about people you first meet online You can be lied to or betrayed Time ≠ Trust Be suspicious; any person worth having as a friend wouldn’t ask you to put yourself at risk
Risks of Meeting Offline AssaultAssault A b du ct io n E x p l oi ta tio n
1.Would you tell a trusted adult if a friend was victimized? 2.Would you tell a trusted adult if you were victimized? 3.Why do you think Ryan and Noah call themselves survivors and not victims? 1.Would you tell a trusted adult if a friend was victimized? 2.Would you tell a trusted adult if you were victimized? 3.Why do you think Ryan and Noah call themselves survivors and not victims? Survivor Diaries
Information How Much Is Too Much? NameAgeBirthdayPhone Number Schedule School Address Images –Backgrounds that reveal identifying information –Provocative poses –Too much skin –Inappropriate or illegal activities
What Is Social Networking?
Information can be inadvertently revealed in pictures Sexually provocative pictures can be used for exploitation Information can be inadvertently revealed in pictures Sexually provocative pictures can be used for exploitation
Videos & Images Videos can be used against you for exploitation or manipulation Remember that any video can be saved, accessed, and altered by anyone
EVERYONE KNOWS YOUR NAME
Don’t let people you don’t know into your life to gain status and display popularity
Blogging Vulnerabilities and insecurities can be used by a predator to “groom” you into a face-to-face meeting
What Is Cyberbullying? Spreading rumors and gossip Posting pictures without consent Stealing passwords to assume someone’s identity Harassing or threatening with mean or bad language
Use voice-mask and other safety features to hide your age and gender Don’t get angry; walk away if things get too “heated” Online Gaming
Protect yourself by –Communicating with people you know in person –Keeping your personal information private –Not participating in sexually explicit chat –Not responding to offensive messages –Choosing gender-neutral, non-revealing, and non-suggestive screennames and e-mail addresses E-mail, IM, & Chat rooms
Never post your cell phone number online Going Mobile Don’t respond to harassing texts Never send provocative photos or videos of yourself (it’s illegal!)
What to Do If you are ever cyberbullied –Do not respond –Save the evidence –Tell a trusted adult –Report it at www.cybertipline.com or to your ISP If you feel threatened or that you are in immediate danger contact your local law-enforcement agency Don’t become a cyberbully yourself
Downloading and sharing media with peer-to-peer (P2P) It’s illegal to share copyrighted materials without permission You could unknowingly download or distribute viruses and illicit material File-sharing Music Movies Videos Photos Documents Software
Only download from trustworthy sources to prevent spyware and viruses Protect your privacy and don’t give out information to soliciting sites and e-mails If an offer seems too good to be true, it usually is Spyware, Spam, & Scams
If it is on the Internet, IT IS NOT PRIVATE. Employers Teachers and principals Colleges and universities Parents, guardians, and relatives ONLINE PREDATORS Blogs Pictures Videos Profiles Real-Life Consequences are not only viewed by your friends, but also by
YOU control your online image Be a good friend and sibling and encourage others to be safer online Respect others– don’t be a cyberbully Talk to an adult you trust if anything makes you feel scared or uncomfortable Making Safer Choices
Resources for You www.NetSmartz.org –W–Watch teens’ real-life stories and learn how to make safer choices online www.NSTeens.org –W–Watch NSTeens animated videos and read the webcomic for online safety tips www.cybertipline.com –I–If you or someone you know has been victimized, make a report and tell a trusted adult