SlideShare une entreprise Scribd logo
1  sur  16
Keeping safe for Middle schoolers
The obvious reason—avoid danger or unhappiness now.
But ALSO
Protect your future.
Ever want to get a job? Or go to college? Or apply for a scholarship?
Everyone will look at your digital footprint, that is, what you have done
online. If you leave a mess, it will be available to view from now on….
Why is it important?
Don’t share your passwords with anyone
Make them secure:
Should have at least 8 characters
Should include capital and lower case letters
Should include at least one number and one
special character
DON’T use the same password for everything
Change your passwords from time to time
Passwords
Websites like Facebook, Instagram,Tumblr and My Space
Typing words and posting them to these kinds of sites is like “talking” in
public
Posting photographs on these sites is like appearing in public.
Make sure your personal settings on these sites are safe settings for
someone your age
Once something is “out there” you can’t get it back.
Social media
This is out there….FOREVER.
That cool person you’re chatting with who says he or she is fifteen and hot
might actually look like this:
Never give out your address or agree to meet someone you don’t know in
real life. Do not tell someone your do not know where you go to school or
where you go after school. There are some creepy people out there—don’t
be tricked by them!
You can’t be sure of a person’s real
identity online.
If you encounter someone online who is cruel or insulting to you—
BLOCK that person
DO NOT chat or text with that person!!!
If someone is being rude or mean
block them.
Save the evidence.
The only good news about
digital bullying is that the
harassing messages can
usually be captured, saved,
and shown to someone who
can help.You need to do this
even if it’s minor stuff, in case
things escalate.
If you do get bullied…
Talk to an adult who cares:
Mom or Dad
Teacher
Uncle or Aunt
Counselor or Principal
Minister or religious leader
Coach or mentor
OR ask your best friend
to recommend a trustworthy adult
If things get really bad—talk to
someone
If you share a picture of yourself doing something stupid that picture could
be seen by your parents, teachers or others.
If you engage in name-calling or being mean to others, it can come back and
hurt you later.
If you share personal information or embarrassing stories, be aware that
those things will get around, eventually, to someone you wish did not know.
If you text, chat or post something, it can be shared with others that you did
not intend to share it with.
Be careful about what you share
The person who posted this picture can
never get it off the internet.
Sexting
What is it? “Sexting” usually refers to teens sharing nude photos via
cellphone, but it’s happening on other devices and the Web too.The practice
can have serious legal and psychological consequences, so – teens and adults –
consider these tips!
It’s illegal: Don’t take or send nude or sexually suggestive photos of yourself
or anyone else. If you do, even if they’re of you or you pass along someone
else’s – you could be charged with producing or distributing child
pornography. If you keep them on your phone or computer you could be
charged with possession. If they go to someone in another state (and that
happens really easily), it’s a federal felony.
Another thing to avoid (BIGTIME):
Non-legal consequences:Then there’s the emotional (and reputation)
damage that can come from having intimate photos of yourself go to a
friend who can become an ex-friend and send it to everyone you know. Not
only can they be sent around; they can be distributed and archived online for
people to search for pretty much forever.
Not just on phones. Sexting can be done on any media-sharing device or
technology – including email and the Web. Teens have been convicted for
child porn distribution for emailing sexually explicit photos to each other.
Other unhappy consequences:
If you know about a friend who is doing dangerous things on the internet, it’s
better to tell a trusted adult.
If someone on the internet seems like they are acting creepy or
inappropriate, tell a trusted adult.
Don’t endanger yourself by engaging in mean behavior online. If you do
mean things, you open yourself up to the same thing happening to you.
Don’t encourage others to be mean or do dangerous things online. Report it
if you witness someone being mistreated online. Bullying is never cool.
If someone is doing something wrong
online, tell a trusted adult
NSTeens
Go to this website for videos and games
and more information on this subject.
Fun website to explore for
more on this topic
Keep calm and keep safe online.

Contenu connexe

Tendances

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpointducklvr9
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingMarc Kuhn
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 

Tendances (20)

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpoint
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 

Similaire à Cyber safety: internet safety presentation for middle school students

Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Bullying prevention #3 2016
Bullying prevention #3 2016Bullying prevention #3 2016
Bullying prevention #3 2016superrin
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 

Similaire à Cyber safety: internet safety presentation for middle school students (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
cyber safety
cyber safetycyber safety
cyber safety
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Bullying prevention #3 2016
Bullying prevention #3 2016Bullying prevention #3 2016
Bullying prevention #3 2016
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Heads up!
Heads up!Heads up!
Heads up!
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 

Dernier

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Dernier (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Cyber safety: internet safety presentation for middle school students

  • 1. Keeping safe for Middle schoolers
  • 2. The obvious reason—avoid danger or unhappiness now. But ALSO Protect your future. Ever want to get a job? Or go to college? Or apply for a scholarship? Everyone will look at your digital footprint, that is, what you have done online. If you leave a mess, it will be available to view from now on…. Why is it important?
  • 3. Don’t share your passwords with anyone Make them secure: Should have at least 8 characters Should include capital and lower case letters Should include at least one number and one special character DON’T use the same password for everything Change your passwords from time to time Passwords
  • 4. Websites like Facebook, Instagram,Tumblr and My Space Typing words and posting them to these kinds of sites is like “talking” in public Posting photographs on these sites is like appearing in public. Make sure your personal settings on these sites are safe settings for someone your age Once something is “out there” you can’t get it back. Social media
  • 5. This is out there….FOREVER.
  • 6. That cool person you’re chatting with who says he or she is fifteen and hot might actually look like this: Never give out your address or agree to meet someone you don’t know in real life. Do not tell someone your do not know where you go to school or where you go after school. There are some creepy people out there—don’t be tricked by them! You can’t be sure of a person’s real identity online.
  • 7. If you encounter someone online who is cruel or insulting to you— BLOCK that person DO NOT chat or text with that person!!! If someone is being rude or mean block them.
  • 8. Save the evidence. The only good news about digital bullying is that the harassing messages can usually be captured, saved, and shown to someone who can help.You need to do this even if it’s minor stuff, in case things escalate. If you do get bullied…
  • 9. Talk to an adult who cares: Mom or Dad Teacher Uncle or Aunt Counselor or Principal Minister or religious leader Coach or mentor OR ask your best friend to recommend a trustworthy adult If things get really bad—talk to someone
  • 10. If you share a picture of yourself doing something stupid that picture could be seen by your parents, teachers or others. If you engage in name-calling or being mean to others, it can come back and hurt you later. If you share personal information or embarrassing stories, be aware that those things will get around, eventually, to someone you wish did not know. If you text, chat or post something, it can be shared with others that you did not intend to share it with. Be careful about what you share
  • 11. The person who posted this picture can never get it off the internet.
  • 12. Sexting What is it? “Sexting” usually refers to teens sharing nude photos via cellphone, but it’s happening on other devices and the Web too.The practice can have serious legal and psychological consequences, so – teens and adults – consider these tips! It’s illegal: Don’t take or send nude or sexually suggestive photos of yourself or anyone else. If you do, even if they’re of you or you pass along someone else’s – you could be charged with producing or distributing child pornography. If you keep them on your phone or computer you could be charged with possession. If they go to someone in another state (and that happens really easily), it’s a federal felony. Another thing to avoid (BIGTIME):
  • 13. Non-legal consequences:Then there’s the emotional (and reputation) damage that can come from having intimate photos of yourself go to a friend who can become an ex-friend and send it to everyone you know. Not only can they be sent around; they can be distributed and archived online for people to search for pretty much forever. Not just on phones. Sexting can be done on any media-sharing device or technology – including email and the Web. Teens have been convicted for child porn distribution for emailing sexually explicit photos to each other. Other unhappy consequences:
  • 14. If you know about a friend who is doing dangerous things on the internet, it’s better to tell a trusted adult. If someone on the internet seems like they are acting creepy or inappropriate, tell a trusted adult. Don’t endanger yourself by engaging in mean behavior online. If you do mean things, you open yourself up to the same thing happening to you. Don’t encourage others to be mean or do dangerous things online. Report it if you witness someone being mistreated online. Bullying is never cool. If someone is doing something wrong online, tell a trusted adult
  • 15. NSTeens Go to this website for videos and games and more information on this subject. Fun website to explore for more on this topic
  • 16. Keep calm and keep safe online.