SlideShare una empresa de Scribd logo
1 de 16
Keeping safe for Middle schoolers
The obvious reason—avoid danger or unhappiness now.
But ALSO
Protect your future.
Ever want to get a job? Or go to college? Or apply for a scholarship?
Everyone will look at your digital footprint, that is, what you have done
online. If you leave a mess, it will be available to view from now on….
Why is it important?
Don’t share your passwords with anyone
Make them secure:
Should have at least 8 characters
Should include capital and lower case letters
Should include at least one number and one
special character
DON’T use the same password for everything
Change your passwords from time to time
Passwords
Websites like Facebook, Instagram,Tumblr and My Space
Typing words and posting them to these kinds of sites is like “talking” in
public
Posting photographs on these sites is like appearing in public.
Make sure your personal settings on these sites are safe settings for
someone your age
Once something is “out there” you can’t get it back.
Social media
This is out there….FOREVER.
That cool person you’re chatting with who says he or she is fifteen and hot
might actually look like this:
Never give out your address or agree to meet someone you don’t know in
real life. Do not tell someone your do not know where you go to school or
where you go after school. There are some creepy people out there—don’t
be tricked by them!
You can’t be sure of a person’s real
identity online.
If you encounter someone online who is cruel or insulting to you—
BLOCK that person
DO NOT chat or text with that person!!!
If someone is being rude or mean
block them.
Save the evidence.
The only good news about
digital bullying is that the
harassing messages can
usually be captured, saved,
and shown to someone who
can help.You need to do this
even if it’s minor stuff, in case
things escalate.
If you do get bullied…
Talk to an adult who cares:
Mom or Dad
Teacher
Uncle or Aunt
Counselor or Principal
Minister or religious leader
Coach or mentor
OR ask your best friend
to recommend a trustworthy adult
If things get really bad—talk to
someone
If you share a picture of yourself doing something stupid that picture could
be seen by your parents, teachers or others.
If you engage in name-calling or being mean to others, it can come back and
hurt you later.
If you share personal information or embarrassing stories, be aware that
those things will get around, eventually, to someone you wish did not know.
If you text, chat or post something, it can be shared with others that you did
not intend to share it with.
Be careful about what you share
The person who posted this picture can
never get it off the internet.
Sexting
What is it? “Sexting” usually refers to teens sharing nude photos via
cellphone, but it’s happening on other devices and the Web too.The practice
can have serious legal and psychological consequences, so – teens and adults –
consider these tips!
It’s illegal: Don’t take or send nude or sexually suggestive photos of yourself
or anyone else. If you do, even if they’re of you or you pass along someone
else’s – you could be charged with producing or distributing child
pornography. If you keep them on your phone or computer you could be
charged with possession. If they go to someone in another state (and that
happens really easily), it’s a federal felony.
Another thing to avoid (BIGTIME):
Non-legal consequences:Then there’s the emotional (and reputation)
damage that can come from having intimate photos of yourself go to a
friend who can become an ex-friend and send it to everyone you know. Not
only can they be sent around; they can be distributed and archived online for
people to search for pretty much forever.
Not just on phones. Sexting can be done on any media-sharing device or
technology – including email and the Web. Teens have been convicted for
child porn distribution for emailing sexually explicit photos to each other.
Other unhappy consequences:
If you know about a friend who is doing dangerous things on the internet, it’s
better to tell a trusted adult.
If someone on the internet seems like they are acting creepy or
inappropriate, tell a trusted adult.
Don’t endanger yourself by engaging in mean behavior online. If you do
mean things, you open yourself up to the same thing happening to you.
Don’t encourage others to be mean or do dangerous things online. Report it
if you witness someone being mistreated online. Bullying is never cool.
If someone is doing something wrong
online, tell a trusted adult
NSTeens
Go to this website for videos and games
and more information on this subject.
Fun website to explore for
more on this topic
Keep calm and keep safe online.

Más contenido relacionado

La actualidad más candente

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineIan Krieger
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingMatt Britland
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Cyber bullying for Elementary
Cyber bullying for ElementaryCyber bullying for Elementary
Cyber bullying for Elementaryshannonmf
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingMarc Kuhn
 

La actualidad más candente (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Cyber bullying for Elementary
Cyber bullying for ElementaryCyber bullying for Elementary
Cyber bullying for Elementary
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Similar a Cyber safety: internet safety presentation for middle school students

Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Bullying prevention #3 2016
Bullying prevention #3 2016Bullying prevention #3 2016
Bullying prevention #3 2016superrin
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 

Similar a Cyber safety: internet safety presentation for middle school students (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
cyber safety
cyber safetycyber safety
cyber safety
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Bullying prevention #3 2016
Bullying prevention #3 2016Bullying prevention #3 2016
Bullying prevention #3 2016
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Heads up!
Heads up!Heads up!
Heads up!
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 

Último

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Cyber safety: internet safety presentation for middle school students

  • 1. Keeping safe for Middle schoolers
  • 2. The obvious reason—avoid danger or unhappiness now. But ALSO Protect your future. Ever want to get a job? Or go to college? Or apply for a scholarship? Everyone will look at your digital footprint, that is, what you have done online. If you leave a mess, it will be available to view from now on…. Why is it important?
  • 3. Don’t share your passwords with anyone Make them secure: Should have at least 8 characters Should include capital and lower case letters Should include at least one number and one special character DON’T use the same password for everything Change your passwords from time to time Passwords
  • 4. Websites like Facebook, Instagram,Tumblr and My Space Typing words and posting them to these kinds of sites is like “talking” in public Posting photographs on these sites is like appearing in public. Make sure your personal settings on these sites are safe settings for someone your age Once something is “out there” you can’t get it back. Social media
  • 5. This is out there….FOREVER.
  • 6. That cool person you’re chatting with who says he or she is fifteen and hot might actually look like this: Never give out your address or agree to meet someone you don’t know in real life. Do not tell someone your do not know where you go to school or where you go after school. There are some creepy people out there—don’t be tricked by them! You can’t be sure of a person’s real identity online.
  • 7. If you encounter someone online who is cruel or insulting to you— BLOCK that person DO NOT chat or text with that person!!! If someone is being rude or mean block them.
  • 8. Save the evidence. The only good news about digital bullying is that the harassing messages can usually be captured, saved, and shown to someone who can help.You need to do this even if it’s minor stuff, in case things escalate. If you do get bullied…
  • 9. Talk to an adult who cares: Mom or Dad Teacher Uncle or Aunt Counselor or Principal Minister or religious leader Coach or mentor OR ask your best friend to recommend a trustworthy adult If things get really bad—talk to someone
  • 10. If you share a picture of yourself doing something stupid that picture could be seen by your parents, teachers or others. If you engage in name-calling or being mean to others, it can come back and hurt you later. If you share personal information or embarrassing stories, be aware that those things will get around, eventually, to someone you wish did not know. If you text, chat or post something, it can be shared with others that you did not intend to share it with. Be careful about what you share
  • 11. The person who posted this picture can never get it off the internet.
  • 12. Sexting What is it? “Sexting” usually refers to teens sharing nude photos via cellphone, but it’s happening on other devices and the Web too.The practice can have serious legal and psychological consequences, so – teens and adults – consider these tips! It’s illegal: Don’t take or send nude or sexually suggestive photos of yourself or anyone else. If you do, even if they’re of you or you pass along someone else’s – you could be charged with producing or distributing child pornography. If you keep them on your phone or computer you could be charged with possession. If they go to someone in another state (and that happens really easily), it’s a federal felony. Another thing to avoid (BIGTIME):
  • 13. Non-legal consequences:Then there’s the emotional (and reputation) damage that can come from having intimate photos of yourself go to a friend who can become an ex-friend and send it to everyone you know. Not only can they be sent around; they can be distributed and archived online for people to search for pretty much forever. Not just on phones. Sexting can be done on any media-sharing device or technology – including email and the Web. Teens have been convicted for child porn distribution for emailing sexually explicit photos to each other. Other unhappy consequences:
  • 14. If you know about a friend who is doing dangerous things on the internet, it’s better to tell a trusted adult. If someone on the internet seems like they are acting creepy or inappropriate, tell a trusted adult. Don’t endanger yourself by engaging in mean behavior online. If you do mean things, you open yourself up to the same thing happening to you. Don’t encourage others to be mean or do dangerous things online. Report it if you witness someone being mistreated online. Bullying is never cool. If someone is doing something wrong online, tell a trusted adult
  • 15. NSTeens Go to this website for videos and games and more information on this subject. Fun website to explore for more on this topic
  • 16. Keep calm and keep safe online.