SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Internet Safety and
   Cyberbullying
Mrs. Trudden
Mrs. Clifford
Website and Ad Safety
     Work on the assigned website
     only....don’t navigate away.
     Never click on advertisements....they are
     there to distract you.




 http://www.funbrain.com/brain/SweepsBrain/Password.html?GameName=DesertDive&Brain=kidsandparents&Grade=0&GameNumber=1
Downloading and
        File-Sharing
Download and share media
safely and from approved
websites
It is illegal to share copyrighted
materials without permission
You could unknowingly
download or distribute viruses
and illicit material.
                                     www.nonstopmac.com/ipod/
Email, IM, MySpace and
         Facebook
 Protect yourself by:
  Communicating with
people you know in person
  Keeping your personal
information private
  Not meeting offline
  Not responding to
offensive or any unknown
messages                    http://www.flickr.com/photos/luc/1824234195/
Cell Phones
   Never post your cell
phone number online
  Never send photos or
videos of yourself         http://www.flickr.com/photos/silly_a1804/2279068004/




  Don’t respond to harassing text
  Having a cell phone is a privilege,
not a right.
Make Safe Online Choices
You control your behavior and
reputation as well as how much
personal information is revealed.

Be a good friend and sibling and
encourage others to be safer online.

Talk to a trusted adult if
anything makes you feel
scared or uncomfortable.

          http://www.safeinyourspace.org/images/photokidscomputers.jpg
PRES Students are Technology PALS!

• P - Protection (about your identity and reputation)

• A - Appropriate (about inappropriate sites)

• L - Legal (about plagiarism, copying software/
  music)

• S - Safe & Responsible (about
  handling computers, software,
  equipment, backing up)



                                  http://www.flickr.com/photos/21976935@N03/2774496663
What is Bullying?
          P.I.C. Criteria

  P...purposeful
behavior
  I...imbalance of
power
  C...continual             http://www.citymasala.com/November2008/Bullying.gif
Cyberbullying




    http://www.uberreview.com/wp-content/uploads/cyberbully.jpg
What is Cyberbullying?
Spreading rumors and/or
gossip
Posting pictures without
consent
Stealing passwords to
assume someone’s
identity.
                        http://img.timeinc.net/TFK/media/news/2005a/050314_cyberbullies_special.jpg
Harrassing or
threatening with mean
or bad language

Most cases of
cyberbullying are
committed by someone
that you know
Warning Signs of
      Cyberbullying
• If someone tries to

  • isolate you from family and friends

  • turn you against your parents or guardians

  • tell you to keep secrets

  • sent inappropriate materials or talk about things
    that make you feel uncomfortable

  • threaten you
          Tell an adult you trust!
These warning signs apply online and offline!
What Not to Do!
•Don’t give your personal information to anyone....like
name, age, birthday, address, school, schedule
•Don’t post photos and videos of yourself or anyone
without permission
•NEVER give out your usernames and passwords to
anyone!




                  http://www.whostolemyidentity.com/uploads/Image/identity-theft.jpg
What to do!
•If you are ever cyberbullied:
 •Tell a trusted adult
 •Do not respond
 •Save the evidence
If anyone threatens you or you feel that
you are in immediate danger, talk to an
adult you trust and they will contact your
     local law-enforcement agency.
The Internet is
private.....right???
If it is on the internet, it
is NOT PRIVATE!
Real-Life Consequences
• Profiles and blogs are not only viewed
  by your friends, but also by:
 • Parents and Relatives
 • Teachers and Principals
 • Colleges and Universities
 • Employers
 • ONLINE PREDATORS
                               http://www.flickr.com/photos/32114411@N04/3021610899/

Más contenido relacionado

La actualidad más candente

Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 

La actualidad más candente (17)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 

Destacado

Nouns Compound
Nouns CompoundNouns Compound
Nouns CompoundCM Ites
 
Ites Scratch Software Review
Ites Scratch Software ReviewItes Scratch Software Review
Ites Scratch Software ReviewCM Ites
 
ניהול ידע
ניהול ידעניהול ידע
ניהול ידעilanitush
 
Af Act I Scenes i-v.
Af Act I Scenes i-v.Af Act I Scenes i-v.
Af Act I Scenes i-v.CM Ites
 
Study Smarter, Not Harder
Study Smarter, Not HarderStudy Smarter, Not Harder
Study Smarter, Not HarderCM Ites
 
Great Authors Unit summary
Great Authors Unit summaryGreat Authors Unit summary
Great Authors Unit summaryCM Ites
 
Author biographies
Author biographiesAuthor biographies
Author biographiesCM Ites
 

Destacado (7)

Nouns Compound
Nouns CompoundNouns Compound
Nouns Compound
 
Ites Scratch Software Review
Ites Scratch Software ReviewItes Scratch Software Review
Ites Scratch Software Review
 
ניהול ידע
ניהול ידעניהול ידע
ניהול ידע
 
Af Act I Scenes i-v.
Af Act I Scenes i-v.Af Act I Scenes i-v.
Af Act I Scenes i-v.
 
Study Smarter, Not Harder
Study Smarter, Not HarderStudy Smarter, Not Harder
Study Smarter, Not Harder
 
Great Authors Unit summary
Great Authors Unit summaryGreat Authors Unit summary
Great Authors Unit summary
 
Author biographies
Author biographiesAuthor biographies
Author biographies
 

Similar a Pres Internet Safety Presentation

Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipKaylon McGee
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipnhokanson
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 

Similar a Pres Internet Safety Presentation (20)

Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Ciejkalab4b
Ciejkalab4bCiejkalab4b
Ciejkalab4b
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Internet safety
Internet safetyInternet safety
Internet safety
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Último

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 

Último (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 

Pres Internet Safety Presentation

  • 1. Internet Safety and Cyberbullying Mrs. Trudden Mrs. Clifford
  • 2. Website and Ad Safety Work on the assigned website only....don’t navigate away. Never click on advertisements....they are there to distract you. http://www.funbrain.com/brain/SweepsBrain/Password.html?GameName=DesertDive&Brain=kidsandparents&Grade=0&GameNumber=1
  • 3. Downloading and File-Sharing Download and share media safely and from approved websites It is illegal to share copyrighted materials without permission You could unknowingly download or distribute viruses and illicit material. www.nonstopmac.com/ipod/
  • 4. Email, IM, MySpace and Facebook Protect yourself by: Communicating with people you know in person Keeping your personal information private Not meeting offline Not responding to offensive or any unknown messages http://www.flickr.com/photos/luc/1824234195/
  • 5. Cell Phones Never post your cell phone number online Never send photos or videos of yourself http://www.flickr.com/photos/silly_a1804/2279068004/ Don’t respond to harassing text Having a cell phone is a privilege, not a right.
  • 6. Make Safe Online Choices You control your behavior and reputation as well as how much personal information is revealed. Be a good friend and sibling and encourage others to be safer online. Talk to a trusted adult if anything makes you feel scared or uncomfortable. http://www.safeinyourspace.org/images/photokidscomputers.jpg
  • 7. PRES Students are Technology PALS! • P - Protection (about your identity and reputation) • A - Appropriate (about inappropriate sites) • L - Legal (about plagiarism, copying software/ music) • S - Safe & Responsible (about handling computers, software, equipment, backing up) http://www.flickr.com/photos/21976935@N03/2774496663
  • 8. What is Bullying? P.I.C. Criteria P...purposeful behavior I...imbalance of power C...continual http://www.citymasala.com/November2008/Bullying.gif
  • 9. Cyberbullying http://www.uberreview.com/wp-content/uploads/cyberbully.jpg
  • 10. What is Cyberbullying? Spreading rumors and/or gossip Posting pictures without consent Stealing passwords to assume someone’s identity. http://img.timeinc.net/TFK/media/news/2005a/050314_cyberbullies_special.jpg
  • 11. Harrassing or threatening with mean or bad language Most cases of cyberbullying are committed by someone that you know
  • 12. Warning Signs of Cyberbullying • If someone tries to • isolate you from family and friends • turn you against your parents or guardians • tell you to keep secrets • sent inappropriate materials or talk about things that make you feel uncomfortable • threaten you Tell an adult you trust! These warning signs apply online and offline!
  • 13. What Not to Do! •Don’t give your personal information to anyone....like name, age, birthday, address, school, schedule •Don’t post photos and videos of yourself or anyone without permission •NEVER give out your usernames and passwords to anyone! http://www.whostolemyidentity.com/uploads/Image/identity-theft.jpg
  • 14. What to do! •If you are ever cyberbullied: •Tell a trusted adult •Do not respond •Save the evidence If anyone threatens you or you feel that you are in immediate danger, talk to an adult you trust and they will contact your local law-enforcement agency.
  • 15. The Internet is private.....right??? If it is on the internet, it is NOT PRIVATE!
  • 16. Real-Life Consequences • Profiles and blogs are not only viewed by your friends, but also by: • Parents and Relatives • Teachers and Principals • Colleges and Universities • Employers • ONLINE PREDATORS http://www.flickr.com/photos/32114411@N04/3021610899/