6 8 safety ppt final copy
TRANSCRIPT
![Page 1: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/1.jpg)
![Page 2: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/2.jpg)
• Learn about your digital footprint and how it can impact your future.
• Recognize and apply safety measures to protect your digital footprint.
• Learn about Cyber Bullying and the impact it can have on yourself and
others around you.
Today, you will….
![Page 3: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/3.jpg)
Safety and Security
Digital Footprint
Cyber Bullying
![Page 4: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/4.jpg)
On the Internet a digital footprint is the
word used to describe the trail, traces or
"footprints" that people leave online. This
is information transmitted online, such as
forum registration, e-mails and
attachments, uploading videos or digital
images and any other form of
transmission of information — all of which
leaves traces of personal information
about yourself available to others online.
![Page 5: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/5.jpg)
![Page 6: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/6.jpg)
![Page 7: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/7.jpg)
Keeping safe online?
Stop and
think before
you
check in!Treat your phone
as your wallet/purse!
Stop before
you click!
Update
your
computer security!
Spams exist!
Your personal
details are
valuable!
Your Digital
Footprint
is important!
![Page 8: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/8.jpg)
First and last names
Home telephone number
Cell phone number
Street address
Hometown/city of residence
Name of school
Name of favorite playground or park
Date of birth
Credit card numbers
Images that identify you, your school, or your hometown
![Page 9: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/9.jpg)
![Page 10: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/10.jpg)
Talking to people in various places online
Adding strangers to “friend‟s” list
Looking for pornographic content
Acting in a rude or nasty manner online
Harassing or posting embarrassing information about others online
Posting personal information in a profile, a blog or on a Web page
Sharing your personal information with strangers
Using file sharing programs for indecent images
Refrain from…..
![Page 11: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/11.jpg)
?
?
?
?
1015
761
1057
1015
![Page 12: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/12.jpg)
When a child, preteen or teen is tormented, harassed,
humiliated, embarrassed or otherwise targeted by any
other person using the Internet or other digital
communication technology
![Page 13: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/13.jpg)
Bullying
1. School
2. Direct (F2F)
3. Limited Audience Cyber Bullying
1. Anywhere/Anytime
2. Seems Anonymous
3. Larger Audience
4. Spreads Quickly
5. Victim NOT Participant
6. Permanent Record
![Page 14: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/14.jpg)
What if it‟s happening to Me or a
Friend!
• Ignore the behavior
• Don‟t Retaliate
• Save the Evidence
• Block Sender
• Tell a parent or trusted adult
• Call police department if necessary
![Page 15: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/15.jpg)
![Page 16: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/16.jpg)
720 ILCS 5/12-7.5) Cyberstalking.• (a) A person commits cyberstalking when he or she engages in a
course of conduct using electronic communication directed at a specific person, and he or she knows or should know that would cause a reasonable person to:
(1) fear for his or her safety or the safety of a third person; or
(2) suffer other emotional distress.Consequence: Class 4 Felony
• 720 ILCS: 5/11-27 Distributing Harmful Material to a minor
•Distribution of indecent images to a minor < 18 years of
age.
Consequence: Class A Misdemeanor
![Page 18: 6 8 safety ppt final copy](https://reader035.vdocument.in/reader035/viewer/2022081401/55997dcd1a28aba1278b4774/html5/thumbnails/18.jpg)
A digital citizen is “someone who is able to think critically about the ethical opportunities and challenges of the „digital world‟ and make safe, respectful, and responsible choices.” (Common Sense Media, 2010)
› Attributes of a good digital citizen:
Respects others (doesn‟t respond to or post negative comments)
Doesn‟t steal (if you wouldn‟t steal from a store, why steal music, movies, videos)
Accepts personal responsibility (cell phones and Internet)