Post on 25-May-2015
Embed Size (px)
DESCRIPTIONInternet Safety presentation for Tweens
2. 2 Return to this Menu and Instructions Press the slide number and then enter to skip to specific slide segments 4 Start the Presentation EscExit 9 Survivor Diaries 6 Teen PSA: Promises 12 Julies Journey 17 Tracking Teresa 23 Broken Friendship 20 You Cant Take It Back 30 Ad Council PSA: Bulletin Board 36 Ad Council PSA: Everyone Knows Your Name 3. Reminder: You may need to use a keyboard command,such as Function + F4 to see video througha projector. If you can see the video above while projecting, proceed with the presentation.If not, please refer to your presenter guidefor troubleshooting information. 4. Tweens MAC Version 5.0 Internet Safety Presentation: 5. Online Risks Predators Revealing Too Much Cyberbullying Spyware, Spam, and Scams 6. 7. 8. Predators Entice
- If anyone
- Talks about inappropriate things
- Sends you inappropriate images
- Asks for your personal information
- Wants you to do things that make you feel uncomfortable
- Wants to meet you in person
- Talk to a trusted adult!
9. 10. 11. Who Can You Trust?
- You may not know the truth about peopleyou first meet online
- You can be lied to or betrayed
- Time Trust
- Be suspicious; any person worth having as a friend wouldnt ask you to put yourself at risk
12. 13. 14. Warning Signs
- If someone tries to
- Isolate you from family and friends
- Turn you against your parents or guardian
- Make you keep everything secret
- Send inappropriate material or talk aboutexplicit subjects
- Threaten you
- Tell an adult you trust!
- These warning signs apply online and in real life.
15. Risks of Meeting Offline 16. How Much Is Too Much?
- Personal information that can lead a predator to your doorstep
- Photos and videos should never be posted online if they show
- Backgrounds that reveal identifying information
- Provocative poses
- Too much skin
NameAgeBirthdayPhone NumberScheduleSchoolLocation 17. 18. 19. What Is Cyberbullying?
- Spreading rumors and gossip
- Posting pictures without consent
- Stealing passwords to assumesomeones identity
- Harassing or threatening with mean orbad language
20. 21. 22. What to Do
- If you are ever cyberbullied
- Do not respond
- Save the evidence
- Tell a trusted adult
- Report it at www.cybertipline.com or to your ISP
- If anyone threatens you or you feel thatyou are in immediate danger, talk to anadult you trust and contact your locallaw-enforcement agency
23. 24. 25. Spyware, Spam, and Scams
- Only download from trustworthy sources to prevent spyware and viruses
- Protect your privacy and dont give out information to soliciting sites and e-mails
- If an offer seems too good to be true,it usually is
26. Your Online Life Social Networking Blogging Webcams and Videos Cell Phones Online Gaming E-mail, IM, and Chatrooms File-sharing 27. What Is Social Networking? 28. 29.
- Information can be inadvertently revealedin pictures
- Sexually provocative pictures can be used
- for exploitation
30. BULLETIN BOARD 31. 32. - Teens let peoplethey dont knowinto their lives togain status anddisplay popularity 33. 34. Blogging 35.
- Vulnerabilities and insecurities can be used by a
- predator to groom children into a face-to-face meeting
36. EVERYONE KNOWS YOUR NAME 37. 38. Real-Life Consequences
- Profiles and blogs are not only viewed byyour friends, but also by
- Parents and relatives
- Teachers and principals
- Colleges and universities
- ONLINE PREDATORS
- If it is on the Internet, IT IS NOT PRIVATE.
39. Webcams and Videos
- Videos can be used against you for exploitation or manipulation
- Check your surroundings for information that could lead someone to your location
- Remember that any video can be saved, accessed, and altered by anyone
40. Cell Phones
- Never post your cell phone number online
- Never send provocative photos or videosof yourself
- Dont respond to harassing texts
- Having a cell phone is a privilege, not a right
41. Online Gaming
- Use voice-mask and other safety features to hide your age and gender
- Dont get angry; walk away if things gettoo heated
- Have a life outside of gaming!
42. E-mail, IM, and Chatrooms
- Protect yourself by
- Communicating with people you know in person
- Keeping your personal information private
- Not meeting offline
- Not responding to offensive messages
- Choosing gender-neutral, non-revealing