SlideShare une entreprise Scribd logo
1  sur  30
Personal Safety Unit - Level 5
Today you will be learning about personal safety when online.  This unit consists of four mini lessons. The PPT covers all lessons in the unit, with a spacer slide between the lessons. The Plan ,[object Object],[object Object],[object Object],[object Object]
Lesson 1 Safeguarding Your Identity Online: Screen Names and Passwords
Cyberspace What is Cyberspace, and how do we get there? What are some of the ways we communicate in Cyberspace?
Online ID – What can you tell ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion ,[object Object],[object Object],[object Object],[object Object]
Screen Names ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[email_address] marcy14inSanFran tiger1234
Password Protection   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion ,[object Object],[object Object],[object Object],[object Object],[object Object],What types of dangers are involved when others know or can guess  your password?
Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Remember ,[object Object],[object Object],[object Object]
Lesson 2 Protecting Personal Information
Make sure you have a copy of the resource page to review:  The FBI Internet Safety Tips   i-SAFE’s 4’R’s R ECOGNIZE R EFUSE R ESPOND R EPORT
N ever give out personal information such as your name, home address, school name, or telephone number in a chat room or on bulletin boards. (Includes IMs, blogs, etc.) Never write to someone who has made you feel uncomfortable or scared, even if you or your parents know who they are. The FBI Internet Safety Tips
  Do not meet someone you have only met on the Internet without the permission of your parents.  That includes having them visit you.   Tell your parents right away if you read anything on the Internet that makes you feel uncomfortable. The FBI Internet Safety Tips Remember that people online may not be who they say they are.
Remember that people online may not be who they say they are.
Brainstorm ,[object Object],[object Object],[object Object],[object Object]
One-way to stay safe, is to avoid revealing any information about oneself online   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Lesson 3 Online Strangers, Predators, and the Grooming Process
Talk About It ,[object Object],[object Object],[object Object],[object Object],[object Object]
Strangers ,[object Object],[object Object],[object Object]
Online Predators ,[object Object],[object Object],[object Object]
Predators and Prey KEY point: A  predator  is one who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.  KEY point:   One who is a victim or one who is vulnerable to victimization by a  predator  is  prey . How do these terms apply to the online environment?
Minimize Dangers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Review ,[object Object],[object Object],[object Object],[object Object]
Lesson 4 Online Personal Safety Review and Action
Cyber Bullying  Sending or posting harmful or cruel text or images using the Internet or other digital media source. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Theft  ,[object Object],[object Object],[object Object],[object Object]
A Little Prevention… ,[object Object],[object Object],[object Object],[object Object],[object Object]
That’s a wrap! ,[object Object]

Contenu connexe

Tendances

Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Security Awareness for Children
Security Awareness for ChildrenSecurity Awareness for Children
Security Awareness for ChildrenJOEL JESUS SUPAN
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Studentskgilliard13
 
Lesson 4 respect
Lesson 4 respectLesson 4 respect
Lesson 4 respectAlpheZarriz
 
Good Behaviors - Class 2 and 3.pptx
Good Behaviors - Class 2 and 3.pptxGood Behaviors - Class 2 and 3.pptx
Good Behaviors - Class 2 and 3.pptxShenna20
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpointgmtango
 
Bullying In Schools Educ 350
Bullying In Schools Educ 350Bullying In Schools Educ 350
Bullying In Schools Educ 350crowl006
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 

Tendances (20)

Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Positive Parenting
Positive ParentingPositive Parenting
Positive Parenting
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Security Awareness for Children
Security Awareness for ChildrenSecurity Awareness for Children
Security Awareness for Children
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Bullying in schools
Bullying in schoolsBullying in schools
Bullying in schools
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 
Lesson 4 respect
Lesson 4 respectLesson 4 respect
Lesson 4 respect
 
Good Behaviors - Class 2 and 3.pptx
Good Behaviors - Class 2 and 3.pptxGood Behaviors - Class 2 and 3.pptx
Good Behaviors - Class 2 and 3.pptx
 
Bully Powerpoint
Bully PowerpointBully Powerpoint
Bully Powerpoint
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpoint
 
Bullying In Schools Educ 350
Bullying In Schools Educ 350Bullying In Schools Educ 350
Bullying In Schools Educ 350
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 

Similaire à Personal safety gr5 unit ppt

DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsLeon Letkeman
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
INTERNET-SAFETY-DEMO.pptx
INTERNET-SAFETY-DEMO.pptxINTERNET-SAFETY-DEMO.pptx
INTERNET-SAFETY-DEMO.pptxErinRoelle
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
Digital literacy
Digital literacyDigital literacy
Digital literacyAmanda lee
 
Internet safety
Internet safetyInternet safety
Internet safetyerinmarkus
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dudeguesta2b256
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
E safety assembly
E safety assemblyE safety assembly
E safety assemblyJEcomputing
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 

Similaire à Personal safety gr5 unit ppt (20)

DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
INTERNET-SAFETY-DEMO.pptx
INTERNET-SAFETY-DEMO.pptxINTERNET-SAFETY-DEMO.pptx
INTERNET-SAFETY-DEMO.pptx
 
Heads up!
Heads up!Heads up!
Heads up!
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety St Mary's Wollongong
Internet Safety St Mary's WollongongInternet Safety St Mary's Wollongong
Internet Safety St Mary's Wollongong
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 

Dernier

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Dernier (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Personal safety gr5 unit ppt

  • 2.
  • 3. Lesson 1 Safeguarding Your Identity Online: Screen Names and Passwords
  • 4. Cyberspace What is Cyberspace, and how do we get there? What are some of the ways we communicate in Cyberspace?
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Lesson 2 Protecting Personal Information
  • 13. Make sure you have a copy of the resource page to review: The FBI Internet Safety Tips i-SAFE’s 4’R’s R ECOGNIZE R EFUSE R ESPOND R EPORT
  • 14. N ever give out personal information such as your name, home address, school name, or telephone number in a chat room or on bulletin boards. (Includes IMs, blogs, etc.) Never write to someone who has made you feel uncomfortable or scared, even if you or your parents know who they are. The FBI Internet Safety Tips
  • 15. Do not meet someone you have only met on the Internet without the permission of your parents. That includes having them visit you. Tell your parents right away if you read anything on the Internet that makes you feel uncomfortable. The FBI Internet Safety Tips Remember that people online may not be who they say they are.
  • 16. Remember that people online may not be who they say they are.
  • 17.
  • 18.
  • 19. Lesson 3 Online Strangers, Predators, and the Grooming Process
  • 20.
  • 21.
  • 22.
  • 23. Predators and Prey KEY point: A predator is one who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them. KEY point: One who is a victim or one who is vulnerable to victimization by a predator is prey . How do these terms apply to the online environment?
  • 24.
  • 25.
  • 26. Lesson 4 Online Personal Safety Review and Action
  • 27.
  • 28.
  • 29.
  • 30.

Notes de l'éditeur

  1. Cyber Bullies are another unfortunate danger many kids face online. Sometimes it can come across as harmless, but to kids any type of bullying can have adverse effects and result in low self esteem, depression, etc. Students use chat, IM, websites, and more to joke, poke fun of, and threaten others. Online one can find sites devoted to ranking the ugliest student at school. Sometimes after a fight a friend will become an enemy as what was meant to be a private email is forwarded to others. Indeed some people say things which are meant to be taken one way but with only a computer screen facing the receiver, they are taken completely wrong. Bullying escalates and becomes a bigger problem. Perhaps more so then schoolyard bullying ever was because ANYONE can do it or be on the receiving end of it.
  2. Identity theft has gone high tech. Pretending to be your bank, ebay, paypal, or other institution, identity thieves mimic the logos, email address, etc. to request you to confirm personal information, etc. Even typing in your personal information and credit card number online presents a risk to thieves. Another way to access personal info is through old fashioned hacking. If you are online you should be running firewalls and other security software to protect your computer and your information.
  3. It is best to act smartly when online. These 4 R’s can apply to many online safety hazards. For example – being aware of how a predator finds the victim and understanding that people online are strangers, allows one to act appropriately when faced with those situations: R ECOGNIZE techniques used by online predators to deceive or intimidate their victims. R EFUSE requests for personal information or a face-to-face meeting. R ESPOND assertively by exiting the program, logging off, or turning off the computer. R EPORT any suspicious or dangerous contact that makes you or your child feel uncomfortable. The 4 R’s also hold true for cyber bullying: R ECOGNIZE ‘flaming’ and cyber bullying techniques and the bully’s screen name or address. R EFUSE to open or read any message from a cyber bully. R ESPOND assertively by leaving the chat room without responding or the letter unopened. R EPORT cyber bullying to the ISP, the school, or law enforcement as needed to stop it immediately. And it is also true for identity theft scams. By being aware of the latest ploys such as phishing emails (sending what looks like a reputable email asking for personal information) one is better equipped to deal appropriately with them. R ECOGNIZE techniques used by identity thieves to obtain people’s personal information. R EFUSE to provide personal information by phone or email if you didn’t initiate the communication. R ESPOND assertively by contacting the three U.S. credit bureaus and put a fraud alert on your credit. R EPORT any unusual, suspicious, or fraudulent activities to law enforcement authorities.