tweens presentation

Download Tweens Presentation

Post on 25-May-2015

1.078 views

Category:

Technology

1 download

Embed Size (px)

DESCRIPTION

Internet Safety presentation for Tweens

TRANSCRIPT

  • 1. These terms and conditions are additional to the general NetSmartz terms of use (available at http://www.netsmartz.org/legal/termsofuse.htm), which are hereby incorporated by reference. By using this Presentation, you hereby agree to adhere to and be legally bound by these terms and conditions and by the general NetSmartz terms of use and other related legal statements found on the NetSmartz website.You acknowledge that this Presentation is part of the NetSmartz Materials, as defined in the NetSmartz Reproduction Policy, and is subject to the NetSmartz Reproduction Policy. You understand and acknowledge that this Presentation consists of multiple files, including but not limited to a PowerPoint file and several movie files, and all of which are included inthe download file of this Presentation, and which total 46 pages. You agree that you will not alter, transform or build upon this Presentation in any way, unless and as expressly consented to in writing by NetSmartz. You further agree that you shall only use this Presentation in its entirety and not to subdivide, edit, or cut any of the pieces of this Presentation,or to present any portion of this Presentation on a stand-alone basis, unless you have requested and received written permission to do sofrom NetSmartz. This Presentation is intended solely for educational use. You agreethat you will not, under any circumstance, use this Presentation for any commercial purpose or in any commercial manner. You further agreethat you will use this Presentation only for legal purposes. You, and not NetSmartz, shall be responsible for any illegal use made of this Presentation by you or any person to whom you give this Presentation. You understand that NetSmartz is making this Presentation available tothe public for educational use. If you choose to use this Presentation, you agree to attribute all aspects of this Presentation to NetSmartz and not to claim any portion of this Presentation as content, product, concept, designor other conceived of or developed by you. This Presentation may contain logos, notices or other type or marks denoting NetSmartzs ownership ofand rights in and to this Presentation. You agree that you will not remove, obscure, deface or fail to reproduce in any authorized copy any such copyright, trademark or other proprietary rights notice contained in anypart of this Presentation.These terms of use grant you a non-exclusive and non-transferable license to use or make use of this Presentation as and only as set forth in these terms and conditions. Except for the limited use license set forth above, all right, title and interest in and to this Presentation and all portions thereof shall remain with NetSmartz. You acknowledge such ownership and intellectual property rights and will not take any action to jeopardize, limitor interfere in any manner with NetSmartzs ownership of or rights in andto this Presentation.THIS PRESENTATION AND ALL PORTIONS THEREOF ARE PROVIDED ONAN AS IS BASIS, WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. NETSMARTZ CANNOT GUARANTEE THE ACCURACY OR NON-INTERFERING OR NON-INFRINGING NATURE OF THIS PRESENTATION. ALL RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRESENTATION IS BORNE BY YOU, AND NETSMARTZ DOES NOT WARRANT THAT THIS PRESENTATION WILL PERFORM AS INDICATED OR HAVE THE DESIRED EFFECT ON ITS AUDIENCE. TERMS OF USE FOR THIS PRESENTATION USE OF THIS PRESENTATION IS CONDITIONAL UPON ACCEPTANCE OF THESE TERMS AND CONDITIONS. IF YOU DO NOT AGREE TO BE BOUND BY THESE TERMS AND CONDITIONS, INCLUDING ANY OTHER TERMS INCORPORATED BY REFERENCE, DO NOT USE OR PRESENT THIS PRESENTATION.

2. 2 Return to this Menu and Instructions Press the slide number and then enter to skip to specific slide segments 4 Start the Presentation EscExit 9 Survivor Diaries 6 Teen PSA: Promises 12 Julies Journey 17 Tracking Teresa 23 Broken Friendship 20 You Cant Take It Back 30 Ad Council PSA: Bulletin Board 36 Ad Council PSA: Everyone Knows Your Name 3. Reminder: You may need to use a keyboard command,such as Function + F4 to see video througha projector. If you can see the video above while projecting, proceed with the presentation.If not, please refer to your presenter guidefor troubleshooting information. 4. Tweens MAC Version 5.0 Internet Safety Presentation: 5. Online Risks Predators Revealing Too Much Cyberbullying Spyware, Spam, and Scams 6. 7. 8. Predators Entice

  • If anyone
    • Talks about inappropriate things
    • Sends you inappropriate images
    • Asks for your personal information
    • Wants you to do things that make you feel uncomfortable
    • Wants to meet you in person
  • Talk to a trusted adult!

9. 10. 11. Who Can You Trust?

  • You may not know the truth about peopleyou first meet online
  • You can be lied to or betrayed
  • Time Trust
  • Be suspicious; any person worth having as a friend wouldnt ask you to put yourself at risk

12. 13. 14. Warning Signs

  • If someone tries to
    • Isolate you from family and friends
    • Turn you against your parents or guardian
    • Make you keep everything secret
    • Send inappropriate material or talk aboutexplicit subjects
    • Threaten you
    • Tell an adult you trust!
    • These warning signs apply online and in real life.

15. Risks of Meeting Offline 16. How Much Is Too Much?

  • Personal information that can lead a predator to your doorstep
  • Photos and videos should never be posted online if they show
    • Backgrounds that reveal identifying information
    • Provocative poses
    • Too much skin

NameAgeBirthdayPhone NumberScheduleSchoolLocation 17. 18. 19. What Is Cyberbullying?

  • Spreading rumors and gossip
  • Posting pictures without consent
  • Stealing passwords to assumesomeones identity
  • Harassing or threatening with mean orbad language

20. 21. 22. What to Do

  • If you are ever cyberbullied
    • Do not respond
    • Save the evidence
    • Tell a trusted adult
    • Report it at www.cybertipline.com or to your ISP
  • If anyone threatens you or you feel thatyou are in immediate danger, talk to anadult you trust and contact your locallaw-enforcement agency

23. 24. 25. Spyware, Spam, and Scams

  • Only download from trustworthy sources to prevent spyware and viruses
  • Protect your privacy and dont give out information to soliciting sites and e-mails
  • If an offer seems too good to be true,it usually is

26. Your Online Life Social Networking Blogging Webcams and Videos Cell Phones Online Gaming E-mail, IM, and Chatrooms File-sharing 27. What Is Social Networking? 28. 29.

  • Information can be inadvertently revealedin pictures
  • Sexually provocative pictures can be used
  • for exploitation

30. BULLETIN BOARD 31. 32. - Teens let peoplethey dont knowinto their lives togain status anddisplay popularity 33. 34. Blogging 35.

  • Vulnerabilities and insecurities can be used by a
  • predator to groom children into a face-to-face meeting

36. EVERYONE KNOWS YOUR NAME 37. 38. Real-Life Consequences

  • Profiles and blogs are not only viewed byyour friends, but also by
    • Parents and relatives
    • Teachers and principals
    • Colleges and universities
    • Employers
    • ONLINE PREDATORS
  • If it is on the Internet, IT IS NOT PRIVATE.

39. Webcams and Videos

  • Videos can be used against you for exploitation or manipulation
  • Check your surroundings for information that could lead someone to your location
  • Remember that any video can be saved, accessed, and altered by anyone

40. Cell Phones

  • Never post your cell phone number online
  • Never send provocative photos or videosof yourself
  • Dont respond to harassing texts
  • Having a cell phone is a privilege, not a right

41. Online Gaming

  • Use voice-mask and other safety features to hide your age and gender
  • Dont get angry; walk away if things gettoo heated
  • Have a life outside of gaming!

42. E-mail, IM, and Chatrooms

  • Protect yourself by
    • Communicating with people you know in person
    • Keeping your personal information private
    • Not meeting offline
    • Not responding to offensive messages
    • Choosing gender-neutral, non-revealing