SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
HEADS up
stop
think
connect
table of
contents
2 Share with Care

4 Interact with Tact
8 The Protection Connection
12 Word Search
You text, you play games, you share photos
and video. You update your status, you post
comments, you probably spend some time in a
virtual world.
Being online—connected through some sort of device—is how
you live your life. And as you spend more of your time there, it
can be easy to over-share, embarrass yourself, mess up your
computer and possibly get messages from creepy people. The
truth is there are some risks involved in socializing, playing and
communicating online.
Regardless of how fast your fingers fly on a keyboard, phone
or tablet, the best tool you have to help avoid risks online is
your brain. When you’re ready to post or send a message
or a photo, download a file, game or program, or shop for
something—stop for a second. Think about things like:

Do you know and trust who
you’re dealing with—or what
you’re sharing or downloading?
How will you feel if your
information ends up
somewhere you didn’t intend?
Asking a few key questions first can help you protect yourself,
your friends and your computer. Flip through and find more
things to stop and think about before you click.

1
SHARE WITH CA
Your online actions can have real-world
consequences. The pictures you post and the words

you write can affect the people in your life. Think before you
post and share.

What you post could have a bigger
“audience” than you think. Even if you use privacy

settings, it’s impossible to completely control who sees your
social networking profile, pictures, videos or texts. Before
you click “send,” think about how you will feel if your family,
teachers, coaches or neighbors find it.

Get someone’s okay before you share
photos or videos they’re in. Online photo albums

are great for storing and sharing pictures. It’s so easy to snap
a shot and upload it instantly. Stop and think about your own
privacy—and other people’s—before you share photos and
videos online. It can be embarrassing, unfair and even unsafe
to send or post photos and videos without getting permission
from the people in them.

Sexting: Don’t do it. You may have heard stories at
school or in the news about people “sexting”—sending nude
photos from mobile phones. Don’t do it. Period. People who
create, forward or even save sexually explicit photos, videos
or messages put their friendships and reputations at risk.
Worse yet, they could be breaking the law.
2
ARE
Were you ever
sorry you shared
something online?
Once you post
something online, you
can’t take it back.

You may think that you’ve deleted
a comment or a picture from a
site—or that you will delete it later.
Know that it may still be online
or saved on someone else’s
computer.

3
INTERACT WITH

Politeness counts. Texting is just another way for

people to have a conversation, and texters are just like
people talking face-to-face or on the phone: they appreciate
“please” and “thank you” (or pls and ty).

Tone it down. In online conversations, using all CAPS,
long rows of exclamation points or large bolded fonts is the
same as shouting.

Use Cc: and Reply all: sparingly. Before you
send a message, stop and think about whether everyone
needs to see it.

Avatars are people too. When you’re playing a game
or exploring an online world where you can create a character
and interact with others, remember real people are behind
those characters on the screen. Respect their feelings just
4
TACT
Have you seen
something online that
made you angry?

like you would in person. Remember that your character or
avatar is a virtual version of you—what does it tell people about
you and your interests?

Don’t impersonate. It’s wrong and can be hurtful to

create sites, pages or posts that seem to come from someone
else, like someone in your class or a teacher.

Speak up. If you see something inappropriate on a social

networking site or in a game or chat room, let the website know
and tell an adult you trust. Using Report Abuse links can help
keep sites fun for everyone.

Don’t stand for bullying—online or off.

Treat others the way you want to be treated—whether you’re
interacting with them online, on your phone or in person.
5
CYBErBULLYING
Cyberbullying is bullying that happens online. It can happen in an
email, a text message, an online game or on a social networking
site. It might involve rumors or images posted on someone’s
profile or passed around for other people to see.

You know that, right? So you know that cyberbullying

is a lose-lose proposition: it often makes the person being
harassed feel bad—and it makes the bully look bad. It also might
lead to punishment from school authorities or the police.

6
What do you do if someone harasses you
online? Keep a cool head, and don’t respond. Most people

realize that bullying is wrong. Sometimes you can stop bullying
if you ignore or block the person. You also can report abuse
to the website where it’s taking place. If it continues, save the
evidence and ask for help from an adult you trust.

What do you do if you witness cyberbullying?
Tell the bully to stop. Most kids don’t bully, and there’s no
reason for anyone to put up with it. This mean behavior usually
stops pretty quickly when somebody stands up for the person
being bullied.

If something online
bothers you,
who do you tell?

7
THE PROTECTION
PROTECT YOURSELF
Use privacy settings to restrict who can see
and post on your profile. Many social networking

sites, chat rooms and blogs have privacy settings. Find out how
to turn these settings on, and then do it.

Limit your online friends to people you
actually know.
Learn about location-based services. Many

phones have GPS technology, and there are applications that let
you find out where your friends are—and let them find you. Set
your privacy settings so that only people you know personally can
see your location. Think about keeping location-based services
off, and turning them on only when needed. Ask yourself, “Does
this app need to know where I am?”

Trust your gut if you feel threatened or
uncomfortable because of someone or
something you find online. Tell someone who can

help you report your concerns to the police and other people
who can help.

8
CONNECTION
Do you download apps? If you do, you might

be giving the app’s developers access to your personal
information—maybe even info that’s not related to the purpose
of the app. For example, say you download an app that lets you
make a drawing out of a photo, but the company who made the
app gets access to your entire contact list. It might share the
information it collected with marketers or other companies.
You can try to check what information the app collects—if it tells
you—and check out your own privacy settings. Also think about
whether getting that app is really worth sharing the details of
your life.

Some apps
cost money. And many
free apps let you buy stuff
within them—with real money.
Check with your parents to
make sure they’re ok with you
buying additional features,
especially if they’re
paying the bill.

9
PROTECT YOUR INFORMATION
Some information should stay private.

Your Social Security number and family financial information—
like your parents’ bank account or credit card numbers—should
stay in the family.

Keep your passwords private. The longer your

password, the harder it is to crack. Don’t share your passwords
with anybody, including your best friends or your boyfriend or
girlfriend.

Don’t reply to text, email or pop-up
messages that ask you to reply with personal
information—even if the message looks like it’s from a
friend, family member or company you know, or threatens that
something bad will happen if you don’t reply. These messages
may be fakes, sent to steal your information.

10
Have you ever
downloaded something
that turned out to be
different than you
expected?

Protect YOUR COMPUTER
Be cautious about opening attachments or
clicking on links. They may contain viruses or spyware.
Learn about security software and how your
computers are protected.
Remember that sometimes, free stuff—like
games, ring tones or screen savers—can
hide viruses or spyware. Don’t download unless you
trust the source and scan the file with security software.

Whether it’s your laptop, tablet or phone, don’t
leave it in public—even for a minute. If it goes
missing, all the important information stored on it—like your
messages and photos—may fall into the wrong hands.

11
WORD SEARCH

12
APPS
PRIVACY
RESPECT
DOWNLOAD
TEXTING
POLITENESS
PROFILE
VIRTUAL
SECURITY
SPYWARE
13
Stop.Think.Connect.TM is a national public awareness campaign
aimed at increasing the understanding of cyber threats and
empowering the American public to be safer and more secure online.
OnGuardOnline.gov is the federal government’s website to help you
be safe, secure and responsible online.
To order free copies of this brochure, visit bulkorder.ftc.gov.
July 2013

Más contenido relacionado

La actualidad más candente

Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 

La actualidad más candente (20)

Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Responsibility and accountability
Responsibility and accountabilityResponsibility and accountability
Responsibility and accountability
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Digital etiquette 2[1]
Digital etiquette 2[1]Digital etiquette 2[1]
Digital etiquette 2[1]
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for Students
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 

Destacado

Destacado (7)

Consumer Financial Rights
Consumer Financial RightsConsumer Financial Rights
Consumer Financial Rights
 
Training for Child Court Appointed Advocates
Training for Child Court Appointed AdvocatesTraining for Child Court Appointed Advocates
Training for Child Court Appointed Advocates
 
DATA BROKERS: A Call for Transparency and Accountability
DATA BROKERS: A Call for Transparency and AccountabilityDATA BROKERS: A Call for Transparency and Accountability
DATA BROKERS: A Call for Transparency and Accountability
 
Putting Telephone Scams... on Hold
Putting Telephone Scams... on HoldPutting Telephone Scams... on Hold
Putting Telephone Scams... on Hold
 
Protecting the Credit of Youth in Foster Care
Protecting the Credit of Youth in Foster CareProtecting the Credit of Youth in Foster Care
Protecting the Credit of Youth in Foster Care
 
Stolen and Falsely Obtained Employer Identification Numbers Are Used to Repor...
Stolen and Falsely Obtained Employer Identification Numbers Are Used to Repor...Stolen and Falsely Obtained Employer Identification Numbers Are Used to Repor...
Stolen and Falsely Obtained Employer Identification Numbers Are Used to Repor...
 
GMO Myths and Truths 2
GMO Myths and Truths 2GMO Myths and Truths 2
GMO Myths and Truths 2
 

Similar a Heads up!

Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
UNC-Greensboro
 
Digital identity
Digital identityDigital identity
Digital identity
marudiaz77
 
Online privacy
Online privacyOnline privacy
Online privacy
jo-jo23
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
janemiller48
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
Ellie Simons
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
apieper
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 

Similar a Heads up! (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Digital identity
Digital identityDigital identity
Digital identity
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 

Más de - Mark - Fullbright

Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 

Más de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Heads up!

  • 2. table of contents 2 Share with Care 4 Interact with Tact 8 The Protection Connection 12 Word Search
  • 3. You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online—connected through some sort of device—is how you live your life. And as you spend more of your time there, it can be easy to over-share, embarrass yourself, mess up your computer and possibly get messages from creepy people. The truth is there are some risks involved in socializing, playing and communicating online. Regardless of how fast your fingers fly on a keyboard, phone or tablet, the best tool you have to help avoid risks online is your brain. When you’re ready to post or send a message or a photo, download a file, game or program, or shop for something—stop for a second. Think about things like: Do you know and trust who you’re dealing with—or what you’re sharing or downloading? How will you feel if your information ends up somewhere you didn’t intend? Asking a few key questions first can help you protect yourself, your friends and your computer. Flip through and find more things to stop and think about before you click. 1
  • 4. SHARE WITH CA Your online actions can have real-world consequences. The pictures you post and the words you write can affect the people in your life. Think before you post and share. What you post could have a bigger “audience” than you think. Even if you use privacy settings, it’s impossible to completely control who sees your social networking profile, pictures, videos or texts. Before you click “send,” think about how you will feel if your family, teachers, coaches or neighbors find it. Get someone’s okay before you share photos or videos they’re in. Online photo albums are great for storing and sharing pictures. It’s so easy to snap a shot and upload it instantly. Stop and think about your own privacy—and other people’s—before you share photos and videos online. It can be embarrassing, unfair and even unsafe to send or post photos and videos without getting permission from the people in them. Sexting: Don’t do it. You may have heard stories at school or in the news about people “sexting”—sending nude photos from mobile phones. Don’t do it. Period. People who create, forward or even save sexually explicit photos, videos or messages put their friendships and reputations at risk. Worse yet, they could be breaking the law. 2
  • 5. ARE Were you ever sorry you shared something online? Once you post something online, you can’t take it back. You may think that you’ve deleted a comment or a picture from a site—or that you will delete it later. Know that it may still be online or saved on someone else’s computer. 3
  • 6. INTERACT WITH Politeness counts. Texting is just another way for people to have a conversation, and texters are just like people talking face-to-face or on the phone: they appreciate “please” and “thank you” (or pls and ty). Tone it down. In online conversations, using all CAPS, long rows of exclamation points or large bolded fonts is the same as shouting. Use Cc: and Reply all: sparingly. Before you send a message, stop and think about whether everyone needs to see it. Avatars are people too. When you’re playing a game or exploring an online world where you can create a character and interact with others, remember real people are behind those characters on the screen. Respect their feelings just 4
  • 7. TACT Have you seen something online that made you angry? like you would in person. Remember that your character or avatar is a virtual version of you—what does it tell people about you and your interests? Don’t impersonate. It’s wrong and can be hurtful to create sites, pages or posts that seem to come from someone else, like someone in your class or a teacher. Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using Report Abuse links can help keep sites fun for everyone. Don’t stand for bullying—online or off. Treat others the way you want to be treated—whether you’re interacting with them online, on your phone or in person. 5
  • 8. CYBErBULLYING Cyberbullying is bullying that happens online. It can happen in an email, a text message, an online game or on a social networking site. It might involve rumors or images posted on someone’s profile or passed around for other people to see. You know that, right? So you know that cyberbullying is a lose-lose proposition: it often makes the person being harassed feel bad—and it makes the bully look bad. It also might lead to punishment from school authorities or the police. 6
  • 9. What do you do if someone harasses you online? Keep a cool head, and don’t respond. Most people realize that bullying is wrong. Sometimes you can stop bullying if you ignore or block the person. You also can report abuse to the website where it’s taking place. If it continues, save the evidence and ask for help from an adult you trust. What do you do if you witness cyberbullying? Tell the bully to stop. Most kids don’t bully, and there’s no reason for anyone to put up with it. This mean behavior usually stops pretty quickly when somebody stands up for the person being bullied. If something online bothers you, who do you tell? 7
  • 10. THE PROTECTION PROTECT YOURSELF Use privacy settings to restrict who can see and post on your profile. Many social networking sites, chat rooms and blogs have privacy settings. Find out how to turn these settings on, and then do it. Limit your online friends to people you actually know. Learn about location-based services. Many phones have GPS technology, and there are applications that let you find out where your friends are—and let them find you. Set your privacy settings so that only people you know personally can see your location. Think about keeping location-based services off, and turning them on only when needed. Ask yourself, “Does this app need to know where I am?” Trust your gut if you feel threatened or uncomfortable because of someone or something you find online. Tell someone who can help you report your concerns to the police and other people who can help. 8
  • 11. CONNECTION Do you download apps? If you do, you might be giving the app’s developers access to your personal information—maybe even info that’s not related to the purpose of the app. For example, say you download an app that lets you make a drawing out of a photo, but the company who made the app gets access to your entire contact list. It might share the information it collected with marketers or other companies. You can try to check what information the app collects—if it tells you—and check out your own privacy settings. Also think about whether getting that app is really worth sharing the details of your life. Some apps cost money. And many free apps let you buy stuff within them—with real money. Check with your parents to make sure they’re ok with you buying additional features, especially if they’re paying the bill. 9
  • 12. PROTECT YOUR INFORMATION Some information should stay private. Your Social Security number and family financial information— like your parents’ bank account or credit card numbers—should stay in the family. Keep your passwords private. The longer your password, the harder it is to crack. Don’t share your passwords with anybody, including your best friends or your boyfriend or girlfriend. Don’t reply to text, email or pop-up messages that ask you to reply with personal information—even if the message looks like it’s from a friend, family member or company you know, or threatens that something bad will happen if you don’t reply. These messages may be fakes, sent to steal your information. 10
  • 13. Have you ever downloaded something that turned out to be different than you expected? Protect YOUR COMPUTER Be cautious about opening attachments or clicking on links. They may contain viruses or spyware. Learn about security software and how your computers are protected. Remember that sometimes, free stuff—like games, ring tones or screen savers—can hide viruses or spyware. Don’t download unless you trust the source and scan the file with security software. Whether it’s your laptop, tablet or phone, don’t leave it in public—even for a minute. If it goes missing, all the important information stored on it—like your messages and photos—may fall into the wrong hands. 11
  • 16. Stop.Think.Connect.TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. OnGuardOnline.gov is the federal government’s website to help you be safe, secure and responsible online. To order free copies of this brochure, visit bulkorder.ftc.gov. July 2013