SlideShare une entreprise Scribd logo
1  sur  22
Take charge of your digital life




Presenter Name
Presenter Organization
Angela’s password
didn’t protect her
Use strong passwords and
     keep them secret
Use strong passwords
   Long

   Mix capital and lowercase letters, numbers, and symbols

   Easy for you to remember; hard for others to guess
    Examples:

          Milo likes to play football – M!loLikes2PlayF00tball

          Strong passwords are safer – Str0ngpassw0rdsRsafer!

          I love popcorn – !L0veP0pc0rn
Don’t share your password or PIN
   WITH ANYONE
   Not even your best friend

 Use different passwords for different
accounts
 Use different passwords for
different accounts
Clicking unknown
links can lead
to trouble
Think, then click

  Before you click links

  Before you open attachments

  Even if you know the sender
You can’t take it back
Share with care

  Don’t share suggestive photos or videos

  Make social network pages private

  Keep personal info private

  Be choosy about adding friends

  Share your accomplishments
You see kindness
and cruelty on
social networks
You see kindness and
cruelty on social networks

88%
of teens surveyed
witnessed cruelty

        78%
        of teens surveyed
        reported at least one
        good outcome
What you do online
doesn’t stay online   8%
                      physical fight
6%
trouble at
school
                           22%
                           ended a
                           friendship


                      25%
                      face-to-face
                      argument
Be a real friend

  If you wouldn’t wear it, don’t share it
  Stand up for your friends
  Keep personal details of others
  to yourself
Pirated programs
are not a game
Connect honestly and carefully

  Download files legally
  Use web content honestly
  Use social sites appropriately
  Meet an online “friend” in
  person VERY cautiously
Use strong
passwords and
keep them secret
Think, then click
Share
with care
Be a real friend
Connect honestly
and carefully
More helpful info

  Chat with other teens: cybermentors.org.uk
  What it takes to be savvy online:
  tinyurl.com/iLBW-teen-safety
  Stand up to bullying: schoolclimate.org/bullybust
  Help from Microsoft: microsoft.com/security
Your gateway to the latest information from Microsoft about how to help defend your
computer, safeguard your information, and protect your family: microsoft.com/security.


                                                                                 © 2012. This material is provided for informational purposes only.
                                                                                               Microsoft makes no warranties, express or implied.

Contenu connexe

Tendances

Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social mediaevieasmedia
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Online Responsibility for Teens
Online Responsibility for TeensOnline Responsibility for Teens
Online Responsibility for TeensStephen Curtis
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying CarlosE15
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Social Media Cyber Bullying & Australia
Social Media Cyber Bullying & AustraliaSocial Media Cyber Bullying & Australia
Social Media Cyber Bullying & AustraliaIsobar Australia
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYINGRene Ge
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesSwapnil Shahade
 
Social Media Presentation
Social Media PresentationSocial Media Presentation
Social Media PresentationEline Kyriazi
 

Tendances (20)

Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber Bullying
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Online Responsibility for Teens
Online Responsibility for TeensOnline Responsibility for Teens
Online Responsibility for Teens
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Social Media Cyber Bullying & Australia
Social Media Cyber Bullying & AustraliaSocial Media Cyber Bullying & Australia
Social Media Cyber Bullying & Australia
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber Bullying on Social Media Sites
Cyber Bullying on Social Media SitesCyber Bullying on Social Media Sites
Cyber Bullying on Social Media Sites
 
Social Media Presentation
Social Media PresentationSocial Media Presentation
Social Media Presentation
 

En vedette

Curriculum 2.0 - A 21st century literacy curriculum
Curriculum 2.0 - A 21st century literacy curriculumCurriculum 2.0 - A 21st century literacy curriculum
Curriculum 2.0 - A 21st century literacy curriculumJustin Medved
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
 
From Information Literacy to Transliteracy: Preparing our Students for Open L...
From Information Literacy to Transliteracy: Preparing our Students for Open L...From Information Literacy to Transliteracy: Preparing our Students for Open L...
From Information Literacy to Transliteracy: Preparing our Students for Open L...Dana Longley
 
Survival of the Savviest: Content Curation & Professional Development
Survival of the Savviest: Content Curation & Professional DevelopmentSurvival of the Savviest: Content Curation & Professional Development
Survival of the Savviest: Content Curation & Professional DevelopmentScoop.it
 
Why content curation is a new form of communication
Why content curation is a new form of communicationWhy content curation is a new form of communication
Why content curation is a new form of communicationScoop.it
 
Idées d'usages pédagogiques de twitter
Idées d'usages pédagogiques de twitterIdées d'usages pédagogiques de twitter
Idées d'usages pédagogiques de twitterPedago Lu
 
Driving Innovation in Public Education
Driving Innovation in Public EducationDriving Innovation in Public Education
Driving Innovation in Public EducationChris Kennedy
 
Build your Personal Learning Environment
Build your Personal Learning EnvironmentBuild your Personal Learning Environment
Build your Personal Learning EnvironmentAlexander Mikroyannidis
 
Preparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learningPreparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learningJudy O'Connell
 
Leading in Context Manifesto
Leading in Context ManifestoLeading in Context Manifesto
Leading in Context Manifesto7Lenses
 
Introduction to Slide Design: 7 Rules for Creating Effective Slides
Introduction to Slide Design: 7 Rules for Creating Effective SlidesIntroduction to Slide Design: 7 Rules for Creating Effective Slides
Introduction to Slide Design: 7 Rules for Creating Effective SlidesAlex Rister
 
teaching and learning in 21st century
teaching and learning in 21st centuryteaching and learning in 21st century
teaching and learning in 21st centuryIin Hermiyanto
 
Demo final Filipino 10 - Aralin 1.1. Mitolohiya ng Rome ni Leilani C. Avila
Demo  final Filipino 10 - Aralin 1.1.  Mitolohiya ng Rome ni Leilani C. AvilaDemo  final Filipino 10 - Aralin 1.1.  Mitolohiya ng Rome ni Leilani C. Avila
Demo final Filipino 10 - Aralin 1.1. Mitolohiya ng Rome ni Leilani C. AvilaLeilani Avila
 
Facilitating 21st century learning by leilani c. avila
Facilitating 21st century learning by leilani c. avilaFacilitating 21st century learning by leilani c. avila
Facilitating 21st century learning by leilani c. avilaLeilani Avila
 
SAMR as a Framework for Moving Towards Education 3.0
SAMR as a Framework for Moving Towards Education 3.0SAMR as a Framework for Moving Towards Education 3.0
SAMR as a Framework for Moving Towards Education 3.0Jackie Gerstein, Ed.D
 

En vedette (20)

Curriculum 2.0 - A 21st century literacy curriculum
Curriculum 2.0 - A 21st century literacy curriculumCurriculum 2.0 - A 21st century literacy curriculum
Curriculum 2.0 - A 21st century literacy curriculum
 
Curation web
Curation webCuration web
Curation web
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
From Information Literacy to Transliteracy: Preparing our Students for Open L...
From Information Literacy to Transliteracy: Preparing our Students for Open L...From Information Literacy to Transliteracy: Preparing our Students for Open L...
From Information Literacy to Transliteracy: Preparing our Students for Open L...
 
Mobile Learning - A Quick Start Guide
Mobile Learning - A Quick Start GuideMobile Learning - A Quick Start Guide
Mobile Learning - A Quick Start Guide
 
Survival of the Savviest: Content Curation & Professional Development
Survival of the Savviest: Content Curation & Professional DevelopmentSurvival of the Savviest: Content Curation & Professional Development
Survival of the Savviest: Content Curation & Professional Development
 
Why content curation is a new form of communication
Why content curation is a new form of communicationWhy content curation is a new form of communication
Why content curation is a new form of communication
 
Idées d'usages pédagogiques de twitter
Idées d'usages pédagogiques de twitterIdées d'usages pédagogiques de twitter
Idées d'usages pédagogiques de twitter
 
Driving Innovation in Public Education
Driving Innovation in Public EducationDriving Innovation in Public Education
Driving Innovation in Public Education
 
Build your Personal Learning Environment
Build your Personal Learning EnvironmentBuild your Personal Learning Environment
Build your Personal Learning Environment
 
Learning2learn
Learning2learnLearning2learn
Learning2learn
 
Preparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learningPreparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learning
 
Leading in Context Manifesto
Leading in Context ManifestoLeading in Context Manifesto
Leading in Context Manifesto
 
Introduction to Slide Design: 7 Rules for Creating Effective Slides
Introduction to Slide Design: 7 Rules for Creating Effective SlidesIntroduction to Slide Design: 7 Rules for Creating Effective Slides
Introduction to Slide Design: 7 Rules for Creating Effective Slides
 
21st century LEARNER
21st century LEARNER21st century LEARNER
21st century LEARNER
 
teaching and learning in 21st century
teaching and learning in 21st centuryteaching and learning in 21st century
teaching and learning in 21st century
 
Demo final Filipino 10 - Aralin 1.1. Mitolohiya ng Rome ni Leilani C. Avila
Demo  final Filipino 10 - Aralin 1.1.  Mitolohiya ng Rome ni Leilani C. AvilaDemo  final Filipino 10 - Aralin 1.1.  Mitolohiya ng Rome ni Leilani C. Avila
Demo final Filipino 10 - Aralin 1.1. Mitolohiya ng Rome ni Leilani C. Avila
 
Facilitating 21st century learning by leilani c. avila
Facilitating 21st century learning by leilani c. avilaFacilitating 21st century learning by leilani c. avila
Facilitating 21st century learning by leilani c. avila
 
21st Century Teaching and Learning
21st Century Teaching and Learning21st Century Teaching and Learning
21st Century Teaching and Learning
 
SAMR as a Framework for Moving Towards Education 3.0
SAMR as a Framework for Moving Towards Education 3.0SAMR as a Framework for Moving Towards Education 3.0
SAMR as a Framework for Moving Towards Education 3.0
 

Similaire à Take Charge of Your Digital Life

Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safetyguestd5e1d2
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit pptapieper
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15Sue DeRosier
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010paul
 
Social networking and Cyber bullying
Social networking and Cyber bullyingSocial networking and Cyber bullying
Social networking and Cyber bullyingPaul OBriant
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsWebbed Marketing
 

Similaire à Take Charge of Your Digital Life (20)

Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Heads up!
Heads up!Heads up!
Heads up!
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15Cyberbullying in Social Media_FINAL without video clip_09.14.15
Cyberbullying in Social Media_FINAL without video clip_09.14.15
 
Internet safety2010
Internet safety2010Internet safety2010
Internet safety2010
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Social networking and Cyber bullying
Social networking and Cyber bullyingSocial networking and Cyber bullying
Social networking and Cyber bullying
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in Schools
 

Plus de emilyensign

Wise Tech Choices June 27th Event
Wise Tech Choices June 27th EventWise Tech Choices June 27th Event
Wise Tech Choices June 27th Eventemilyensign
 
C3 Presentation - Oct 2015
C3 Presentation - Oct 2015C3 Presentation - Oct 2015
C3 Presentation - Oct 2015emilyensign
 
NCE Presentation, Feb. 2015
NCE Presentation, Feb. 2015 NCE Presentation, Feb. 2015
NCE Presentation, Feb. 2015 emilyensign
 
Education Privacy Presentation
Education Privacy Presentation Education Privacy Presentation
Education Privacy Presentation emilyensign
 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
 
The 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship SuccessThe 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship Successemilyensign
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
Building a Positive Online Reputation
Building a Positive Online ReputationBuilding a Positive Online Reputation
Building a Positive Online Reputationemilyensign
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
CETPA Presentation: Building A Successful BYOD Program
CETPA Presentation: Building A Successful BYOD ProgramCETPA Presentation: Building A Successful BYOD Program
CETPA Presentation: Building A Successful BYOD Programemilyensign
 
Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program emilyensign
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention emilyensign
 
National Conference on Youth Cyber Safety
National Conference on Youth Cyber SafetyNational Conference on Youth Cyber Safety
National Conference on Youth Cyber Safetyemilyensign
 
2nd Grade Class Presentation
2nd Grade Class Presentation 2nd Grade Class Presentation
2nd Grade Class Presentation emilyensign
 

Plus de emilyensign (14)

Wise Tech Choices June 27th Event
Wise Tech Choices June 27th EventWise Tech Choices June 27th Event
Wise Tech Choices June 27th Event
 
C3 Presentation - Oct 2015
C3 Presentation - Oct 2015C3 Presentation - Oct 2015
C3 Presentation - Oct 2015
 
NCE Presentation, Feb. 2015
NCE Presentation, Feb. 2015 NCE Presentation, Feb. 2015
NCE Presentation, Feb. 2015
 
Education Privacy Presentation
Education Privacy Presentation Education Privacy Presentation
Education Privacy Presentation
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
The 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship SuccessThe 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship Success
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
Building a Positive Online Reputation
Building a Positive Online ReputationBuilding a Positive Online Reputation
Building a Positive Online Reputation
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
CETPA Presentation: Building A Successful BYOD Program
CETPA Presentation: Building A Successful BYOD ProgramCETPA Presentation: Building A Successful BYOD Program
CETPA Presentation: Building A Successful BYOD Program
 
Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program Fall CUE Presentation: Building a Successful BYOD Program
Fall CUE Presentation: Building a Successful BYOD Program
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
 
National Conference on Youth Cyber Safety
National Conference on Youth Cyber SafetyNational Conference on Youth Cyber Safety
National Conference on Youth Cyber Safety
 
2nd Grade Class Presentation
2nd Grade Class Presentation 2nd Grade Class Presentation
2nd Grade Class Presentation
 

Dernier

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Dernier (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Take Charge of Your Digital Life

  • 1. Take charge of your digital life Presenter Name Presenter Organization
  • 3. Use strong passwords and keep them secret Use strong passwords Long Mix capital and lowercase letters, numbers, and symbols Easy for you to remember; hard for others to guess Examples: Milo likes to play football – M!loLikes2PlayF00tball Strong passwords are safer – Str0ngpassw0rdsRsafer! I love popcorn – !L0veP0pc0rn
  • 4. Don’t share your password or PIN WITH ANYONE Not even your best friend Use different passwords for different accounts Use different passwords for different accounts
  • 5. Clicking unknown links can lead to trouble
  • 6. Think, then click Before you click links Before you open attachments Even if you know the sender
  • 8.
  • 9. Share with care Don’t share suggestive photos or videos Make social network pages private Keep personal info private Be choosy about adding friends Share your accomplishments
  • 10. You see kindness and cruelty on social networks
  • 11. You see kindness and cruelty on social networks 88% of teens surveyed witnessed cruelty 78% of teens surveyed reported at least one good outcome
  • 12. What you do online doesn’t stay online 8% physical fight 6% trouble at school 22% ended a friendship 25% face-to-face argument
  • 13. Be a real friend If you wouldn’t wear it, don’t share it Stand up for your friends Keep personal details of others to yourself
  • 15. Connect honestly and carefully Download files legally Use web content honestly Use social sites appropriately Meet an online “friend” in person VERY cautiously
  • 19. Be a real friend
  • 21. More helpful info Chat with other teens: cybermentors.org.uk What it takes to be savvy online: tinyurl.com/iLBW-teen-safety Stand up to bullying: schoolclimate.org/bullybust Help from Microsoft: microsoft.com/security
  • 22. Your gateway to the latest information from Microsoft about how to help defend your computer, safeguard your information, and protect your family: microsoft.com/security. © 2012. This material is provided for informational purposes only. Microsoft makes no warranties, express or implied.

Notes de l'éditeur

  1. Slide 4: Use strong passwords and keep them secretTALKING POINTSFirst, you want passwords to be strong so people can’t guess them or remember them easily. not only would a strong password have protected Angela, it would have protected her friends, too, and kept the drama to a minimum. So what makes a strong password? [click]Strong passwords are long phrases or sentences that mix capital and lowercase letters, numbers, and symbols. One way to create a strong password is to come up with a sentence that means something to you, that you can remember—like the example. Longer is stronger.Then play with the characters to make it even stronger. See how you can substitute an exclamation point for an “I” or a zero for an “o”. [click]Different passwords. One of the problems with Angela’s passwords was that she used the same password for email and Facebook. [click]Lock your phone with a password, too—a PIN. This makes it harder for someone to use your phone to impersonate you or read your private stuff. So what makes a good PIN?When we say “Don’t use your own numbers,” we mean numbers like the house number in your address or parts of your phone, driver’s license, bank account, or social security numbers. [click]Don’t share. As we saw in Angela’s case, friends aren’t always responsible about sharing this vital information. Plus friends don’t always stay friends. So, even if your friends tempt you: keep your passwords and PINs a secret.Want to know what happened after Angela’s father called the police? Although Rolando claimed he was just joking, he was prosecuted and convicted in juvenile court of impersonation and identity theft under the laws of California. The judge ordered him “committed to the Kings County Juvenile Academy Alpha Program for 90 days to a year, and put him on probation.”To illustrate other risks you may bump into online, let me tell you another true story about a guy we’ll call Spike. [click]
  2. Slide 5: Clicking unknown links can lead to troubleTALKING POINTSSpike got a message in Facebook for an app that would let him share his music with friends. He clicked the link, and downloaded the app to jailbreak his phone so he could share his music. But what he didn’t realize, was that the app was created by a professional scammer. Downloading the app gave the scammer access to Spike’s laptop. While he had access, he broke into Spike’s Facebook account and sent an individual message to everyone on his friends list. The message looked like it was from Spike and asked them to download some “awesome FREE ringtones.”He wasn’t happy when he found upset friends expressing their annoyance with him on his wall. But the scammer locked Spike out of his account so he couldn’t reply. Anyone who clicked the link would download the same malicious software (also known as malware) and the scammer could repeat what he did on Spike’s machine.What happened to Spike?What could Spike have done to protect himself from the scammer? What advice would you give him?As you’ve suggested, the advice to protect Spike—AND his friends—is pretty straightforward. [click]SPEAKER NOTESHere are some answers that you might get. They include points that will tie in with the next slide.Only download from sites with a good reputation.Be careful about clicking links.Pay attention to who sent the message.Think before you click a link (or open an attached file) even if you know the person who sent the message.When you’ve gotten a few of these points, you’re ready to go to the next slide.But before you go to the next slide, if you’ve established a good rapport with the group, you might ask for a couple of personal experiences: Has anyone gotten messages like the one Spike’s friends got--especially from someone you know—in email or IM, or on a social site, in a text message, or while playing a game?
  3. Slide 6: Think, then clickTALKING POINTSThink before you click because you don’t ever really know who is on the other end. And not only will you protect yourself and your computer, but just as in Spike’s story, you may do your friends a favor, too. [click]You know what happened to Spike when he clicked that link. But clicking attachments can do the same kind of damage. Malware can tag along on pictures, videos, games, or other attachments. It could:Screw up your computer—maybe even stop it altogether or lock you out of it.Destroy your stuff: erase your photos, games, and contact list.Spy on you by installing software that can track passwords or account numbers as you type them to steal your money or, worse, your identity. Criminals who are trying to steal your identity don’t really care if you have any money at all. They want to use your identity to open up bank accounts, sign up for credit cards and loans, even commit crimes—all in your name.And of course as you heard in Spike’s case, you have to be cautious even if the message comes from someone you know. It could really be a friend whose account was hacked.So we’ve covered a couple steps you can take to protect yourself: use strong passwords and think before you click. [click]
  4. Slide 9: Share with careTALKING POINTSThe important thing to remember is that you lose control once you post something, and it can be don the Internet forever. For sure, Vanessa should not have posted that image. But let’s take up some of your other points. [click]Private pages. Does anyone know how to make social network pages private? On Facebook? [Or: What other social networks do you use? How would you control your privacy there?]Look in Settings, Options, or Preferences for ways to manage your privacy: who can see your profile or photos tagged with your name, how people can search for you, who can make comments, and how to block people.Another idea: Some sites let you create separate friend lists—for family, your sports team or school club, your closest friends, and so on—so you can manage what you share with each.Now and then, review your settings because these sites change what you can control (particularly in response to public pressure—Facebook is a perfect example). [click]Personal info. No settings are perfect. No matter how private you make your pages, remember that whoever has access (your friends) can still forward what you post. You still need to use good judgment.Keep sensitive details to yourself that could be used to impersonate you, defraud you, or find you in person—your home address, phone and account numbers, age or birth date, even photos, especially suggestive ones. This also means creating profile pages on socials sites or in games that don’t show such details. This is particularly important for Twitter profiles which are public by default.Of course, you don’t want to share your password. We’ve already talked about the problem with that!Don’t post anything you’d ordinarily say only to a close friend, including feelings. Whether you’re happy, sad, angry, or have money worries, confiding broadly could increase your risk of being bullied or targeted for scams.If you use a check-in service, pay attention to where and when you check in.Think about who will know where you are—a teacher, your parents? Will it harm your reputation? Are you alone? If so, is it safe?Consider restricting who knows your location. [click]Adding friends.Consider friending only those you or close friends have met in person or with whom you have friends in common.Look at your friend list from time to time and make sure everyone who’s there belongs. Friends change over time.Review what others write about you.Make sure they don’t post anything you don’t want to share, like private photos, or tell where you are (like you’re out of town on vacation with your family).It’s okay to ask someone to remove information that you don’t want to tell. [click]Accomplishments. Post what you’re proud of and want others to see—a recital video, academic successes, pictures from a school play, a persuasive essay, art you made, or music you performed. Adding good material about yourself is also a way to push the negative stuff lower on your pages, like pictures you posted you wish you hadn’t or mean comments by others.So, did you know that the adult world is so interested in how you share on social networks that they’ve done research on how you interact on them? [click]SPEAKER NOTESPrivate pages. If you have Internet access for your presentation, kids could look up the specifics about how to specify privacy settings for Facebook (and perhaps one other social site) on their phones or laptops, and report to the group.If you feel comfortable with the group of tweens and teens you’re talking with, and with taking a more relaxed approach, consider asking them to expand on each bullet point instead of giving the explanations yourself. Then fill in where they don’t have ideas.
  5. Slide 11: You see kindness and cruelty on social networksTALKING POINTSThe good news is that most of you who use social media say that in your experience, people your age are generally kind to one another on social networks. These researchers found that 78% of teens surveyed reported at least one positive experience with others. [click]However, the researchers also found that 88% of you had witnessed someone being mean or cruel to another person on a social network.Just out of curiosity, how many of you have observed someone being mean or cruel on a social network? [click]
  6. Slide 12: What you do online doesn’t stay onlineTALKING POINTSWhen the researchers looked deeper into online cruelty, they found that 69% of the teens in the study thought that their peers were mostly kind to each other, but almost half (41%) said they had experienced at least one of the negative experiences the researchers asked about. [click]25% of teens who use social media had an experience that resulted in a face-to-face argument or confrontation with someone. [click]22% had an experience that ended their friendship with someone. [click]8% had a physical fight with someone because of something that happened on a social network site. [click]6% had gotten in trouble at school because of an experience on a social site.Clearly, what teens experienced online had a direct impact on their “real” lives. With these statistics in mind: How many of you had an experience online that affected your real life?What can you do if you see mean behavior on a social network?[These last three questions are just different ways to elicit the response you’re looking for. You probably won’t need to ask all of them.]What do you think you can do to be a better friend on social sites?What advice would you give to someone about how to reduce online drama?What can you do if you see someone being bullied online?Let’s see the tips Microsoft’s safety experts came up with and how they compare with what you said. [click]SPEAKER NOTESHere are some of the answers to your questions that may come up and that you’ll be looking for to transition to the safety tips on the next slide.Tell the person causing the drama to stop it.Don’t participate in drama—don’t post mean comments or pictures.Don’t ignore bullying or drama.Stand up for your friends. Don’t be a bystander.Don’t make private stuff about others public.What do we mean by “drama?“ This term has already popped up a couple of times in this presentation but is more central to the point here. It is based on research by Danah Boyd, a researcher at Microsoft Research, that showed that teenagers “describe many interpersonal conflicts playing out in their lives as drama, including bullyingTo get a glimpse into her ideas, read this opinion piece (that she co-authored with Alice Marwick) in the New York Times (September 2011): “Bullying as True Drama:” www.nytimes.com/2011/09/23/opinion/why-cyberbullying-rhetoric-misses-the-mark.html
  7. Slide 13: Be a real friendTALKING POINTSHere are the highlights of the points you’ve made. [click]If you wouldn’t wear it on a t-shirt or say it in person to someone, don’t text or post it online. [click]Stand up for friends. Don’t ignore drama when you see it happening.Stand up for anyone you see being harassed. Bullies are less likely to target someone who has a strong group of friends, and usually stop when a victim’s friends rally around him or her. (Cyberbullies may also be surprised to learn that their actions may be a crime.)Tell the bully to stop.Help your friend block anyone whose behavior is inappropriate or threatening in any way. Check with the service–social networking, IM, mobile phone–to find out how.Don’t forward mean messages.Report problems:To the web service or company where the problem occurred. Most services make this easy to do and you can report it anonymously, so no one will know that you did. For example, in Microsoft services or software, look for a Report Abuse link or contact Microsoft at www.microsoft.com/reportabuse.If the bully is a student, consider reporting it to the school. [click]Keep personal details secret. Ask friends and family members for permission before you share any of their personal details on your pages—this includes tagging them in photos, telling their location, revealing secrets they’ve told you. This way, you can help protect their privacy just as you would protect your own.So our last piece of safety advice has to do with using the web honestly. It starts with another true story about gamers who pirated a game. [click]
  8. Slide 14: Pirated programs are not a gameTALKING POINTSThe night the Xbox game, “Call of Duty: Modern Warfare 2,” went on sale, thousands of gamers lined up hours in advance to snap up the first copies when the game was released at the stroke of midnight.But up to a million other gamers chose the pirated route, modifying their Xboxes to bypass the digital rights management features so they could download illegal copies of the game. Now they’re paying for it. Most of those players were banned from Xbox Live—up to a million players!—from playing pirated versions of Microsoft’s games.These gamers learned the hard way that theft has consequences and that you’re never truly anonymous with digital files and devices. There are other ways you can connect honestly and carefully on the web. [click]SPEAKER NOTESDepending how talkative your group of tweens and teens has been, it’s quite possible that you won’t have time to include this point. In that case, skip this slide and the next. When you get to the “recap” slide (slide 15), summarize the points below, to give a slightly more substantive summary than you will on the other slides.
  9. Slide 15: Connect honestly and carefullyTALKING POINTSDownload files legally. You saw what happened to the gamers. Get permission or pay before you download copyrighted content like music and games; otherwise, downloading is illegal. Plus, it’s also safer for your computer because pirated files are often used to secretly distribute viruses and spyware. Well, it’s a secret until you realize that the malware has slowed your computer to a crawl, delivers nonstop ads, or destroys what’s on your hard drive. [click]Use web content honestly. If you use the web for schoolwork:Put the ideas you find there in your own words. Don’t simply copy text from the web.Don’t buy finished essays or reports and turn them in as your own work. When you copy web content and buy reports you’re plagiarizing. your school has rules against plagiarism—and consequences for breaking those rules, too. (Plus your teachers have ways of finding you out that it wasn’t your own work.) [click]Use social sites appropriately. Make sure to follow the rules of the social site so you’re not kicked off. For example, Facebook requires you to be at least 13 years old before you can create an account. (In some places, the age limit may be even higher.) In addition, social sites may have special safeguards to protect minors. For example, they may restrict adults from sharing and connecting with them. [click]Meeting an online “friend” is a VERY risky thing to do—online someone can pretend to be anyone. I don’t recommend it, but if you must, protect yourself. Always bring a parent, trusted adult, or friend and meet in a busy public place. Bring along your mobile phone and keep it on.Okay. We’ve covered the five points of advice from Microsoft. Let’s recap what we’ve come up with. [click]SPEAKER NOTESThis would be a good time to distribute the printed tip sheet, “Top Tips for Online Safety.” As you recap each point, you can review it in the brochure as well as any links to instructions about how to do things like create a strong password.
  10. Slide 16: Use strong passwords and keep them secretTALKING POINTSRemember Angela and her password? To keep this kind of thing from happening to you, use strong passwords (and a PIN on your phone) and do not share them—not even with your best friend. [click]
  11. Slide 17: Think, then clickTALKING POINTSRemember how Spike’s Facebook page got hacked because he clicked a link sent by a friend? To protect yourself, think twice—even if you know the sender—before you open attachments or click links in email or IM, or on a social site. [click]
  12. Slide 18: Share with careTALKING POINTSRemember the video about Vanessa?What you share online about yourself or comments you post can become public, and they can stay in search results for years to come. So think carefully before you post—no suggestive photos or mean comments. Make your social network pages private and be choosy about adding friends. [click]
  13. Slide 19: Be a real friendTALKING POINTSRemember the research that Pew did on teens who use social media? Don’t join the teens who saw cruelty but didn’t do anything about it. Stand up for your friends if you see something mean happening to them and report it, too. [click]
  14. Slide 20: Connect honestly and carefullyTALKING POINTSRemember the story of the players who pirated a game who were locked out of playing on Xbox? Download files legally and use web content honestly for school work. [click]
  15. Slide 21: More helpful informationTALKING POINTS[Point out the first two links in the tip sheet. If you have Internet access, you can visit these sites by way of demonstration.] Stand up to bullying: There’s lots of information here about how you can be an “upstander” and help put an end to online bullying.Help from Microsoft: Here’s where you can go to learn how to strengthen your computer against viruses and get more advice, like how to use mobile phones or play games more safely.That wraps it up. Any more comments? Questions? [click]
  16. Slide 22: Microsoft slideTALKING POINTSThanks for being such great group—looks like you have a good sense of how to be in charge of your digital life!