SlideShare una empresa de Scribd logo
1 de 16
Keeping safe for Middle schoolers
The obvious reason—avoid danger or unhappiness now.
But ALSO
Protect your future.
Ever want to get a job? Or go to college? Or apply for a scholarship?
Everyone will look at your digital footprint, that is, what you have done
online. If you leave a mess, it will be available to view from now on….
Why is it important?
Don’t share your passwords with anyone
Make them secure:
Should have at least 8 characters
Should include capital and lower case letters
Should include at least one number and one
special character
DON’T use the same password for everything
Change your passwords from time to time
Passwords
Websites like Facebook, Instagram,Tumblr and My Space
Typing words and posting them to these kinds of sites is like “talking” in
public
Posting photographs on these sites is like appearing in public.
Make sure your personal settings on these sites are safe settings for
someone your age
Once something is “out there” you can’t get it back.
Social media
This is out there….FOREVER.
That cool person you’re chatting with who says he or she is fifteen and hot
might actually look like this:
Never give out your address or agree to meet someone you don’t know in
real life. Do not tell someone your do not know where you go to school or
where you go after school. There are some creepy people out there—don’t
be tricked by them!
You can’t be sure of a person’s real
identity online.
If you encounter someone online who is cruel or insulting to you—
BLOCK that person
DO NOT chat or text with that person!!!
If someone is being rude or mean
block them.
Save the evidence.
The only good news about
digital bullying is that the
harassing messages can
usually be captured, saved,
and shown to someone who
can help.You need to do this
even if it’s minor stuff, in case
things escalate.
If you do get bullied…
Talk to an adult who cares:
Mom or Dad
Teacher
Uncle or Aunt
Counselor or Principal
Minister or religious leader
Coach or mentor
OR ask your best friend
to recommend a trustworthy adult
If things get really bad—talk to
someone
If you share a picture of yourself doing something stupid that picture could
be seen by your parents, teachers or others.
If you engage in name-calling or being mean to others, it can come back and
hurt you later.
If you share personal information or embarrassing stories, be aware that
those things will get around, eventually, to someone you wish did not know.
If you text, chat or post something, it can be shared with others that you did
not intend to share it with.
Be careful about what you share
The person who posted this picture can
never get it off the internet.
Sexting
What is it? “Sexting” usually refers to teens sharing nude photos via
cellphone, but it’s happening on other devices and the Web too.The practice
can have serious legal and psychological consequences, so – teens and adults –
consider these tips!
It’s illegal: Don’t take or send nude or sexually suggestive photos of yourself
or anyone else. If you do, even if they’re of you or you pass along someone
else’s – you could be charged with producing or distributing child
pornography. If you keep them on your phone or computer you could be
charged with possession. If they go to someone in another state (and that
happens really easily), it’s a federal felony.
Another thing to avoid (BIGTIME):
Non-legal consequences:Then there’s the emotional (and reputation)
damage that can come from having intimate photos of yourself go to a
friend who can become an ex-friend and send it to everyone you know. Not
only can they be sent around; they can be distributed and archived online for
people to search for pretty much forever.
Not just on phones. Sexting can be done on any media-sharing device or
technology – including email and the Web. Teens have been convicted for
child porn distribution for emailing sexually explicit photos to each other.
Other unhappy consequences:
If you know about a friend who is doing dangerous things on the internet, it’s
better to tell a trusted adult.
If someone on the internet seems like they are acting creepy or
inappropriate, tell a trusted adult.
Don’t endanger yourself by engaging in mean behavior online. If you do
mean things, you open yourself up to the same thing happening to you.
Don’t encourage others to be mean or do dangerous things online. Report it
if you witness someone being mistreated online. Bullying is never cool.
If someone is doing something wrong
online, tell a trusted adult
NSTeens
Go to this website for videos and games
and more information on this subject.
Fun website to explore for
more on this topic
Keep calm and keep safe online.

Más contenido relacionado

La actualidad más candente

Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and BenefitsSteve Young
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingR Smith
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 

La actualidad más candente (20)

Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and Benefits
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 

Similar a Cyber safety: internet safety presentation for middle school students

Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Bullying prevention #3 2016
Bullying prevention #3 2016Bullying prevention #3 2016
Bullying prevention #3 2016superrin
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 

Similar a Cyber safety: internet safety presentation for middle school students (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
cyber safety
cyber safetycyber safety
cyber safety
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Bullying prevention #3 2016
Bullying prevention #3 2016Bullying prevention #3 2016
Bullying prevention #3 2016
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Heads up!
Heads up!Heads up!
Heads up!
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Cyber safety: internet safety presentation for middle school students

  • 1. Keeping safe for Middle schoolers
  • 2. The obvious reason—avoid danger or unhappiness now. But ALSO Protect your future. Ever want to get a job? Or go to college? Or apply for a scholarship? Everyone will look at your digital footprint, that is, what you have done online. If you leave a mess, it will be available to view from now on…. Why is it important?
  • 3. Don’t share your passwords with anyone Make them secure: Should have at least 8 characters Should include capital and lower case letters Should include at least one number and one special character DON’T use the same password for everything Change your passwords from time to time Passwords
  • 4. Websites like Facebook, Instagram,Tumblr and My Space Typing words and posting them to these kinds of sites is like “talking” in public Posting photographs on these sites is like appearing in public. Make sure your personal settings on these sites are safe settings for someone your age Once something is “out there” you can’t get it back. Social media
  • 5. This is out there….FOREVER.
  • 6. That cool person you’re chatting with who says he or she is fifteen and hot might actually look like this: Never give out your address or agree to meet someone you don’t know in real life. Do not tell someone your do not know where you go to school or where you go after school. There are some creepy people out there—don’t be tricked by them! You can’t be sure of a person’s real identity online.
  • 7. If you encounter someone online who is cruel or insulting to you— BLOCK that person DO NOT chat or text with that person!!! If someone is being rude or mean block them.
  • 8. Save the evidence. The only good news about digital bullying is that the harassing messages can usually be captured, saved, and shown to someone who can help.You need to do this even if it’s minor stuff, in case things escalate. If you do get bullied…
  • 9. Talk to an adult who cares: Mom or Dad Teacher Uncle or Aunt Counselor or Principal Minister or religious leader Coach or mentor OR ask your best friend to recommend a trustworthy adult If things get really bad—talk to someone
  • 10. If you share a picture of yourself doing something stupid that picture could be seen by your parents, teachers or others. If you engage in name-calling or being mean to others, it can come back and hurt you later. If you share personal information or embarrassing stories, be aware that those things will get around, eventually, to someone you wish did not know. If you text, chat or post something, it can be shared with others that you did not intend to share it with. Be careful about what you share
  • 11. The person who posted this picture can never get it off the internet.
  • 12. Sexting What is it? “Sexting” usually refers to teens sharing nude photos via cellphone, but it’s happening on other devices and the Web too.The practice can have serious legal and psychological consequences, so – teens and adults – consider these tips! It’s illegal: Don’t take or send nude or sexually suggestive photos of yourself or anyone else. If you do, even if they’re of you or you pass along someone else’s – you could be charged with producing or distributing child pornography. If you keep them on your phone or computer you could be charged with possession. If they go to someone in another state (and that happens really easily), it’s a federal felony. Another thing to avoid (BIGTIME):
  • 13. Non-legal consequences:Then there’s the emotional (and reputation) damage that can come from having intimate photos of yourself go to a friend who can become an ex-friend and send it to everyone you know. Not only can they be sent around; they can be distributed and archived online for people to search for pretty much forever. Not just on phones. Sexting can be done on any media-sharing device or technology – including email and the Web. Teens have been convicted for child porn distribution for emailing sexually explicit photos to each other. Other unhappy consequences:
  • 14. If you know about a friend who is doing dangerous things on the internet, it’s better to tell a trusted adult. If someone on the internet seems like they are acting creepy or inappropriate, tell a trusted adult. Don’t endanger yourself by engaging in mean behavior online. If you do mean things, you open yourself up to the same thing happening to you. Don’t encourage others to be mean or do dangerous things online. Report it if you witness someone being mistreated online. Bullying is never cool. If someone is doing something wrong online, tell a trusted adult
  • 15. NSTeens Go to this website for videos and games and more information on this subject. Fun website to explore for more on this topic
  • 16. Keep calm and keep safe online.