Slide 4: Use strong passwords and keep them secretTALKING POINTSFirst, you want passwords to be strong so people can’t guess them or remember them easily. not only would a strong password have protected Angela, it would have protected her friends, too, and kept the drama to a minimum. So what makes a strong password? [click]Strong passwords are long phrases or sentences that mix capital and lowercase letters, numbers, and symbols. One way to create a strong password is to come up with a sentence that means something to you, that you can remember—like the example. Longer is stronger.Then play with the characters to make it even stronger. See how you can substitute an exclamation point for an “I” or a zero for an “o”. [click]Different passwords. One of the problems with Angela’s passwords was that she used the same password for email and Facebook. [click]Lock your phone with a password, too—a PIN. This makes it harder for someone to use your phone to impersonate you or read your private stuff. So what makes a good PIN?When we say “Don’t use your own numbers,” we mean numbers like the house number in your address or parts of your phone, driver’s license, bank account, or social security numbers. [click]Don’t share. As we saw in Angela’s case, friends aren’t always responsible about sharing this vital information. Plus friends don’t always stay friends. So, even if your friends tempt you: keep your passwords and PINs a secret.Want to know what happened after Angela’s father called the police? Although Rolando claimed he was just joking, he was prosecuted and convicted in juvenile court of impersonation and identity theft under the laws of California. The judge ordered him “committed to the Kings County Juvenile Academy Alpha Program for 90 days to a year, and put him on probation.”To illustrate other risks you may bump into online, let me tell you another true story about a guy we’ll call Spike. [click]
Slide 5: Clicking unknown links can lead to troubleTALKING POINTSSpike got a message in Facebook for an app that would let him share his music with friends. He clicked the link, and downloaded the app to jailbreak his phone so he could share his music. But what he didn’t realize, was that the app was created by a professional scammer. Downloading the app gave the scammer access to Spike’s laptop. While he had access, he broke into Spike’s Facebook account and sent an individual message to everyone on his friends list. The message looked like it was from Spike and asked them to download some “awesome FREE ringtones.”He wasn’t happy when he found upset friends expressing their annoyance with him on his wall. But the scammer locked Spike out of his account so he couldn’t reply. Anyone who clicked the link would download the same malicious software (also known as malware) and the scammer could repeat what he did on Spike’s machine.What happened to Spike?What could Spike have done to protect himself from the scammer? What advice would you give him?As you’ve suggested, the advice to protect Spike—AND his friends—is pretty straightforward. [click]SPEAKER NOTESHere are some answers that you might get. They include points that will tie in with the next slide.Only download from sites with a good reputation.Be careful about clicking links.Pay attention to who sent the message.Think before you click a link (or open an attached file) even if you know the person who sent the message.When you’ve gotten a few of these points, you’re ready to go to the next slide.But before you go to the next slide, if you’ve established a good rapport with the group, you might ask for a couple of personal experiences: Has anyone gotten messages like the one Spike’s friends got--especially from someone you know—in email or IM, or on a social site, in a text message, or while playing a game?
Slide 6: Think, then clickTALKING POINTSThink before you click because you don’t ever really know who is on the other end. And not only will you protect yourself and your computer, but just as in Spike’s story, you may do your friends a favor, too. [click]You know what happened to Spike when he clicked that link. But clicking attachments can do the same kind of damage. Malware can tag along on pictures, videos, games, or other attachments. It could:Screw up your computer—maybe even stop it altogether or lock you out of it.Destroy your stuff: erase your photos, games, and contact list.Spy on you by installing software that can track passwords or account numbers as you type them to steal your money or, worse, your identity. Criminals who are trying to steal your identity don’t really care if you have any money at all. They want to use your identity to open up bank accounts, sign up for credit cards and loans, even commit crimes—all in your name.And of course as you heard in Spike’s case, you have to be cautious even if the message comes from someone you know. It could really be a friend whose account was hacked.So we’ve covered a couple steps you can take to protect yourself: use strong passwords and think before you click. [click]
Slide 9: Share with careTALKING POINTSThe important thing to remember is that you lose control once you post something, and it can be don the Internet forever. For sure, Vanessa should not have posted that image. But let’s take up some of your other points. [click]Private pages. Does anyone know how to make social network pages private? On Facebook? [Or: What other social networks do you use? How would you control your privacy there?]Look in Settings, Options, or Preferences for ways to manage your privacy: who can see your profile or photos tagged with your name, how people can search for you, who can make comments, and how to block people.Another idea: Some sites let you create separate friend lists—for family, your sports team or school club, your closest friends, and so on—so you can manage what you share with each.Now and then, review your settings because these sites change what you can control (particularly in response to public pressure—Facebook is a perfect example). [click]Personal info. No settings are perfect. No matter how private you make your pages, remember that whoever has access (your friends) can still forward what you post. You still need to use good judgment.Keep sensitive details to yourself that could be used to impersonate you, defraud you, or find you in person—your home address, phone and account numbers, age or birth date, even photos, especially suggestive ones. This also means creating profile pages on socials sites or in games that don’t show such details. This is particularly important for Twitter profiles which are public by default.Of course, you don’t want to share your password. We’ve already talked about the problem with that!Don’t post anything you’d ordinarily say only to a close friend, including feelings. Whether you’re happy, sad, angry, or have money worries, confiding broadly could increase your risk of being bullied or targeted for scams.If you use a check-in service, pay attention to where and when you check in.Think about who will know where you are—a teacher, your parents? Will it harm your reputation? Are you alone? If so, is it safe?Consider restricting who knows your location. [click]Adding friends.Consider friending only those you or close friends have met in person or with whom you have friends in common.Look at your friend list from time to time and make sure everyone who’s there belongs. Friends change over time.Review what others write about you.Make sure they don’t post anything you don’t want to share, like private photos, or tell where you are (like you’re out of town on vacation with your family).It’s okay to ask someone to remove information that you don’t want to tell. [click]Accomplishments. Post what you’re proud of and want others to see—a recital video, academic successes, pictures from a school play, a persuasive essay, art you made, or music you performed. Adding good material about yourself is also a way to push the negative stuff lower on your pages, like pictures you posted you wish you hadn’t or mean comments by others.So, did you know that the adult world is so interested in how you share on social networks that they’ve done research on how you interact on them? [click]SPEAKER NOTESPrivate pages. If you have Internet access for your presentation, kids could look up the specifics about how to specify privacy settings for Facebook (and perhaps one other social site) on their phones or laptops, and report to the group.If you feel comfortable with the group of tweens and teens you’re talking with, and with taking a more relaxed approach, consider asking them to expand on each bullet point instead of giving the explanations yourself. Then fill in where they don’t have ideas.
Slide 11: You see kindness and cruelty on social networksTALKING POINTSThe good news is that most of you who use social media say that in your experience, people your age are generally kind to one another on social networks. These researchers found that 78% of teens surveyed reported at least one positive experience with others. [click]However, the researchers also found that 88% of you had witnessed someone being mean or cruel to another person on a social network.Just out of curiosity, how many of you have observed someone being mean or cruel on a social network? [click]
Slide 12: What you do online doesn’t stay onlineTALKING POINTSWhen the researchers looked deeper into online cruelty, they found that 69% of the teens in the study thought that their peers were mostly kind to each other, but almost half (41%) said they had experienced at least one of the negative experiences the researchers asked about. [click]25% of teens who use social media had an experience that resulted in a face-to-face argument or confrontation with someone. [click]22% had an experience that ended their friendship with someone. [click]8% had a physical fight with someone because of something that happened on a social network site. [click]6% had gotten in trouble at school because of an experience on a social site.Clearly, what teens experienced online had a direct impact on their “real” lives. With these statistics in mind: How many of you had an experience online that affected your real life?What can you do if you see mean behavior on a social network?[These last three questions are just different ways to elicit the response you’re looking for. You probably won’t need to ask all of them.]What do you think you can do to be a better friend on social sites?What advice would you give to someone about how to reduce online drama?What can you do if you see someone being bullied online?Let’s see the tips Microsoft’s safety experts came up with and how they compare with what you said. [click]SPEAKER NOTESHere are some of the answers to your questions that may come up and that you’ll be looking for to transition to the safety tips on the next slide.Tell the person causing the drama to stop it.Don’t participate in drama—don’t post mean comments or pictures.Don’t ignore bullying or drama.Stand up for your friends. Don’t be a bystander.Don’t make private stuff about others public.What do we mean by “drama?“ This term has already popped up a couple of times in this presentation but is more central to the point here. It is based on research by Danah Boyd, a researcher at Microsoft Research, that showed that teenagers “describe many interpersonal conflicts playing out in their lives as drama, including bullyingTo get a glimpse into her ideas, read this opinion piece (that she co-authored with Alice Marwick) in the New York Times (September 2011): “Bullying as True Drama:” www.nytimes.com/2011/09/23/opinion/why-cyberbullying-rhetoric-misses-the-mark.html
Slide 13: Be a real friendTALKING POINTSHere are the highlights of the points you’ve made. [click]If you wouldn’t wear it on a t-shirt or say it in person to someone, don’t text or post it online. [click]Stand up for friends. Don’t ignore drama when you see it happening.Stand up for anyone you see being harassed. Bullies are less likely to target someone who has a strong group of friends, and usually stop when a victim’s friends rally around him or her. (Cyberbullies may also be surprised to learn that their actions may be a crime.)Tell the bully to stop.Help your friend block anyone whose behavior is inappropriate or threatening in any way. Check with the service–social networking, IM, mobile phone–to find out how.Don’t forward mean messages.Report problems:To the web service or company where the problem occurred. Most services make this easy to do and you can report it anonymously, so no one will know that you did. For example, in Microsoft services or software, look for a Report Abuse link or contact Microsoft at www.microsoft.com/reportabuse.If the bully is a student, consider reporting it to the school. [click]Keep personal details secret. Ask friends and family members for permission before you share any of their personal details on your pages—this includes tagging them in photos, telling their location, revealing secrets they’ve told you. This way, you can help protect their privacy just as you would protect your own.So our last piece of safety advice has to do with using the web honestly. It starts with another true story about gamers who pirated a game. [click]
Slide 14: Pirated programs are not a gameTALKING POINTSThe night the Xbox game, “Call of Duty: Modern Warfare 2,” went on sale, thousands of gamers lined up hours in advance to snap up the first copies when the game was released at the stroke of midnight.But up to a million other gamers chose the pirated route, modifying their Xboxes to bypass the digital rights management features so they could download illegal copies of the game. Now they’re paying for it. Most of those players were banned from Xbox Live—up to a million players!—from playing pirated versions of Microsoft’s games.These gamers learned the hard way that theft has consequences and that you’re never truly anonymous with digital files and devices. There are other ways you can connect honestly and carefully on the web. [click]SPEAKER NOTESDepending how talkative your group of tweens and teens has been, it’s quite possible that you won’t have time to include this point. In that case, skip this slide and the next. When you get to the “recap” slide (slide 15), summarize the points below, to give a slightly more substantive summary than you will on the other slides.
Slide 15: Connect honestly and carefullyTALKING POINTSDownload files legally. You saw what happened to the gamers. Get permission or pay before you download copyrighted content like music and games; otherwise, downloading is illegal. Plus, it’s also safer for your computer because pirated files are often used to secretly distribute viruses and spyware. Well, it’s a secret until you realize that the malware has slowed your computer to a crawl, delivers nonstop ads, or destroys what’s on your hard drive. [click]Use web content honestly. If you use the web for schoolwork:Put the ideas you find there in your own words. Don’t simply copy text from the web.Don’t buy finished essays or reports and turn them in as your own work. When you copy web content and buy reports you’re plagiarizing. your school has rules against plagiarism—and consequences for breaking those rules, too. (Plus your teachers have ways of finding you out that it wasn’t your own work.) [click]Use social sites appropriately. Make sure to follow the rules of the social site so you’re not kicked off. For example, Facebook requires you to be at least 13 years old before you can create an account. (In some places, the age limit may be even higher.) In addition, social sites may have special safeguards to protect minors. For example, they may restrict adults from sharing and connecting with them. [click]Meeting an online “friend” is a VERY risky thing to do—online someone can pretend to be anyone. I don’t recommend it, but if you must, protect yourself. Always bring a parent, trusted adult, or friend and meet in a busy public place. Bring along your mobile phone and keep it on.Okay. We’ve covered the five points of advice from Microsoft. Let’s recap what we’ve come up with. [click]SPEAKER NOTESThis would be a good time to distribute the printed tip sheet, “Top Tips for Online Safety.” As you recap each point, you can review it in the brochure as well as any links to instructions about how to do things like create a strong password.
Slide 16: Use strong passwords and keep them secretTALKING POINTSRemember Angela and her password? To keep this kind of thing from happening to you, use strong passwords (and a PIN on your phone) and do not share them—not even with your best friend. [click]
Slide 17: Think, then clickTALKING POINTSRemember how Spike’s Facebook page got hacked because he clicked a link sent by a friend? To protect yourself, think twice—even if you know the sender—before you open attachments or click links in email or IM, or on a social site. [click]
Slide 18: Share with careTALKING POINTSRemember the video about Vanessa?What you share online about yourself or comments you post can become public, and they can stay in search results for years to come. So think carefully before you post—no suggestive photos or mean comments. Make your social network pages private and be choosy about adding friends. [click]
Slide 19: Be a real friendTALKING POINTSRemember the research that Pew did on teens who use social media? Don’t join the teens who saw cruelty but didn’t do anything about it. Stand up for your friends if you see something mean happening to them and report it, too. [click]
Slide 20: Connect honestly and carefullyTALKING POINTSRemember the story of the players who pirated a game who were locked out of playing on Xbox? Download files legally and use web content honestly for school work. [click]
Slide 21: More helpful informationTALKING POINTS[Point out the first two links in the tip sheet. If you have Internet access, you can visit these sites by way of demonstration.] Stand up to bullying: There’s lots of information here about how you can be an “upstander” and help put an end to online bullying.Help from Microsoft: Here’s where you can go to learn how to strengthen your computer against viruses and get more advice, like how to use mobile phones or play games more safely.That wraps it up. Any more comments? Questions? [click]
Slide 22: Microsoft slideTALKING POINTSThanks for being such great group—looks like you have a good sense of how to be in charge of your digital life!
Take Charge of Your Digital Life
Take charge of your digital lifePresenter NamePresenter Organization
Use strong passwords and keep them secretUse strong passwords Long Mix capital and lowercase letters, numbers, and symbols Easy for you to remember; hard for others to guess Examples: Milo likes to play football – M!loLikes2PlayF00tball Strong passwords are safer – Str0ngpassw0rdsRsafer! I love popcorn – !L0veP0pc0rn
Don’t share your password or PIN WITH ANYONE Not even your best friend Use different passwords for differentaccounts Use different passwords fordifferent accounts
More helpful info Chat with other teens: cybermentors.org.uk What it takes to be savvy online: tinyurl.com/iLBW-teen-safety Stand up to bullying: schoolclimate.org/bullybust Help from Microsoft: microsoft.com/security