SlideShare a Scribd company logo
1 of 16
Keeping safe for Middle schoolers
The obvious reason—avoid danger or unhappiness now.
But ALSO
Protect your future.
Ever want to get a job? Or go to college? Or apply for a scholarship?
Everyone will look at your digital footprint, that is, what you have done
online. If you leave a mess, it will be available to view from now on….
Why is it important?
Don’t share your passwords with anyone
Make them secure:
Should have at least 8 characters
Should include capital and lower case letters
Should include at least one number and one
special character
DON’T use the same password for everything
Change your passwords from time to time
Passwords
Websites like Facebook, Instagram,Tumblr and My Space
Typing words and posting them to these kinds of sites is like “talking” in
public
Posting photographs on these sites is like appearing in public.
Make sure your personal settings on these sites are safe settings for
someone your age
Once something is “out there” you can’t get it back.
Social media
This is out there….FOREVER.
That cool person you’re chatting with who says he or she is fifteen and hot
might actually look like this:
Never give out your address or agree to meet someone you don’t know in
real life. Do not tell someone your do not know where you go to school or
where you go after school. There are some creepy people out there—don’t
be tricked by them!
You can’t be sure of a person’s real
identity online.
If you encounter someone online who is cruel or insulting to you—
BLOCK that person
DO NOT chat or text with that person!!!
If someone is being rude or mean
block them.
Save the evidence.
The only good news about
digital bullying is that the
harassing messages can
usually be captured, saved,
and shown to someone who
can help.You need to do this
even if it’s minor stuff, in case
things escalate.
If you do get bullied…
Talk to an adult who cares:
Mom or Dad
Teacher
Uncle or Aunt
Counselor or Principal
Minister or religious leader
Coach or mentor
OR ask your best friend
to recommend a trustworthy adult
If things get really bad—talk to
someone
If you share a picture of yourself doing something stupid that picture could
be seen by your parents, teachers or others.
If you engage in name-calling or being mean to others, it can come back and
hurt you later.
If you share personal information or embarrassing stories, be aware that
those things will get around, eventually, to someone you wish did not know.
If you text, chat or post something, it can be shared with others that you did
not intend to share it with.
Be careful about what you share
The person who posted this picture can
never get it off the internet.
Sexting
What is it? “Sexting” usually refers to teens sharing nude photos via
cellphone, but it’s happening on other devices and the Web too.The practice
can have serious legal and psychological consequences, so – teens and adults –
consider these tips!
It’s illegal: Don’t take or send nude or sexually suggestive photos of yourself
or anyone else. If you do, even if they’re of you or you pass along someone
else’s – you could be charged with producing or distributing child
pornography. If you keep them on your phone or computer you could be
charged with possession. If they go to someone in another state (and that
happens really easily), it’s a federal felony.
Another thing to avoid (BIGTIME):
Non-legal consequences:Then there’s the emotional (and reputation)
damage that can come from having intimate photos of yourself go to a
friend who can become an ex-friend and send it to everyone you know. Not
only can they be sent around; they can be distributed and archived online for
people to search for pretty much forever.
Not just on phones. Sexting can be done on any media-sharing device or
technology – including email and the Web. Teens have been convicted for
child porn distribution for emailing sexually explicit photos to each other.
Other unhappy consequences:
If you know about a friend who is doing dangerous things on the internet, it’s
better to tell a trusted adult.
If someone on the internet seems like they are acting creepy or
inappropriate, tell a trusted adult.
Don’t endanger yourself by engaging in mean behavior online. If you do
mean things, you open yourself up to the same thing happening to you.
Don’t encourage others to be mean or do dangerous things online. Report it
if you witness someone being mistreated online. Bullying is never cool.
If someone is doing something wrong
online, tell a trusted adult
NSTeens
Go to this website for videos and games
and more information on this subject.
Fun website to explore for
more on this topic
Keep calm and keep safe online.

More Related Content

What's hot

A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingMarc Kuhn
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 

What's hot (20)

A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 

Similar to Cyber safety: internet safety presentation for middle school students

Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Bullying prevention #3 2016
Bullying prevention #3 2016Bullying prevention #3 2016
Bullying prevention #3 2016superrin
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GArissa Ablao
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 

Similar to Cyber safety: internet safety presentation for middle school students (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
cyber safety
cyber safetycyber safety
cyber safety
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Bullying prevention #3 2016
Bullying prevention #3 2016Bullying prevention #3 2016
Bullying prevention #3 2016
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Heads up!
Heads up!Heads up!
Heads up!
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbully
CyberbullyCyberbully
Cyberbully
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 

Recently uploaded

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 

Recently uploaded (20)

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 

Cyber safety: internet safety presentation for middle school students

  • 1. Keeping safe for Middle schoolers
  • 2. The obvious reason—avoid danger or unhappiness now. But ALSO Protect your future. Ever want to get a job? Or go to college? Or apply for a scholarship? Everyone will look at your digital footprint, that is, what you have done online. If you leave a mess, it will be available to view from now on…. Why is it important?
  • 3. Don’t share your passwords with anyone Make them secure: Should have at least 8 characters Should include capital and lower case letters Should include at least one number and one special character DON’T use the same password for everything Change your passwords from time to time Passwords
  • 4. Websites like Facebook, Instagram,Tumblr and My Space Typing words and posting them to these kinds of sites is like “talking” in public Posting photographs on these sites is like appearing in public. Make sure your personal settings on these sites are safe settings for someone your age Once something is “out there” you can’t get it back. Social media
  • 5. This is out there….FOREVER.
  • 6. That cool person you’re chatting with who says he or she is fifteen and hot might actually look like this: Never give out your address or agree to meet someone you don’t know in real life. Do not tell someone your do not know where you go to school or where you go after school. There are some creepy people out there—don’t be tricked by them! You can’t be sure of a person’s real identity online.
  • 7. If you encounter someone online who is cruel or insulting to you— BLOCK that person DO NOT chat or text with that person!!! If someone is being rude or mean block them.
  • 8. Save the evidence. The only good news about digital bullying is that the harassing messages can usually be captured, saved, and shown to someone who can help.You need to do this even if it’s minor stuff, in case things escalate. If you do get bullied…
  • 9. Talk to an adult who cares: Mom or Dad Teacher Uncle or Aunt Counselor or Principal Minister or religious leader Coach or mentor OR ask your best friend to recommend a trustworthy adult If things get really bad—talk to someone
  • 10. If you share a picture of yourself doing something stupid that picture could be seen by your parents, teachers or others. If you engage in name-calling or being mean to others, it can come back and hurt you later. If you share personal information or embarrassing stories, be aware that those things will get around, eventually, to someone you wish did not know. If you text, chat or post something, it can be shared with others that you did not intend to share it with. Be careful about what you share
  • 11. The person who posted this picture can never get it off the internet.
  • 12. Sexting What is it? “Sexting” usually refers to teens sharing nude photos via cellphone, but it’s happening on other devices and the Web too.The practice can have serious legal and psychological consequences, so – teens and adults – consider these tips! It’s illegal: Don’t take or send nude or sexually suggestive photos of yourself or anyone else. If you do, even if they’re of you or you pass along someone else’s – you could be charged with producing or distributing child pornography. If you keep them on your phone or computer you could be charged with possession. If they go to someone in another state (and that happens really easily), it’s a federal felony. Another thing to avoid (BIGTIME):
  • 13. Non-legal consequences:Then there’s the emotional (and reputation) damage that can come from having intimate photos of yourself go to a friend who can become an ex-friend and send it to everyone you know. Not only can they be sent around; they can be distributed and archived online for people to search for pretty much forever. Not just on phones. Sexting can be done on any media-sharing device or technology – including email and the Web. Teens have been convicted for child porn distribution for emailing sexually explicit photos to each other. Other unhappy consequences:
  • 14. If you know about a friend who is doing dangerous things on the internet, it’s better to tell a trusted adult. If someone on the internet seems like they are acting creepy or inappropriate, tell a trusted adult. Don’t endanger yourself by engaging in mean behavior online. If you do mean things, you open yourself up to the same thing happening to you. Don’t encourage others to be mean or do dangerous things online. Report it if you witness someone being mistreated online. Bullying is never cool. If someone is doing something wrong online, tell a trusted adult
  • 15. NSTeens Go to this website for videos and games and more information on this subject. Fun website to explore for more on this topic
  • 16. Keep calm and keep safe online.