SlideShare a Scribd company logo
1 of 16
Download to read offline
HEADS up 
stop 
think 
connect
2 
4 
8 
12 
Share with Care 
Interact with Tact 
The Protection Connection 
Word Search 
table of 
contents
You text, you play games, you share photos 
and video. You update your status, you post 
comments, you probably spend some time in a 
virtual world. 
Being online—connected through some sort of device—is how 
you live your life. And as you spend more of your time there, it 
can be easy to over-share, embarrass yourself, mess up your 
computer and possibly get messages from creepy people. The 
truth is there are some risks involved in socializing, playing and 
communicating online. 
Regardless of how fast your fingers fly on a keyboard, phone 
or tablet, the best tool you have to help avoid risks online is 
your brain. When you’re ready to post or send a message 
or a photo, download a file, game or program, or shop for 
something—stop for a second. Think about things like: 
Do you know and trust who 
you’re dealing with—or what 
you’re sharing or downloading? 
How will you feel if your 
information ends up 
somewhere you didn’t intend? 
Asking a few key questions first can help you protect yourself, 
your friends and your computer. Flip through and find more 
things to stop and think about before you click. 
1
Your online actions can have real-world 
consequences. The pictures you post and the words 
you write can affect the people in your life. Think before you 
post and share. 
What you post could have a bigger 
“audience” than you think. Even if you use privacy 
settings, it’s impossible to completely control who sees your 
social networking profile, pictures, videos or texts. Before 
you click “send,” think about how you will feel if your family, 
teachers, coaches or neighbors find it. 
Get someone’s okay before you share 
photos or videos they’re in. Online photo albums 
are great for storing and sharing pictures. It’s so easy to snap 
a shot and upload it instantly. Stop and think about your own 
privacy—and other people’s—before you share photos and 
videos online. It can be embarrassing, unfair and even unsafe 
to send or post photos and videos without getting permission 
from the people in them. 
2 
SHARE WITH CARE 
Sexting: Don’t do it. You may have heard stories at 
school or in the news about people “sexting”—sending nude 
photos from mobile phones. Don’t do it. Period. People who 
create, forward or even save sexually explicit photos, videos 
or messages put their friendships and reputations at risk. 
Worse yet, they could be breaking the law.
Once you post 
something online, you 
can’t take it back. 
You may think that you’ve deleted 
a comment or a picture from a 
site—or that you will delete it later. 
Know that it may still be online 
or saved on someone else’s 
computer. 
3 
CARE 
Were you ever 
sorry you shared 
something online?
4 
Politeness counts. Texting is just another way for 
people to have a conversation, and texters are just like 
people talking face-to-face or on the phone: they appreciate 
“please” and “thank you” (or pls and ty). 
Tone it down. In online conversations, using all CAPS, 
long rows of exclamation points or large bolded fonts is the 
same as shouting. 
Use Cc: and Reply all: sparingly. Before you 
send a message, stop and think about whether everyone 
needs to see it. 
Avatars are people too. When you’re playing a game 
or exploring an online world where you can create a character 
and interact with others, remember real people are behind 
those characters on the screen. Respect their feelings just 
INTERACT WITH
5 
TACT 
like you would in person. Remember that your character or 
avatar is a virtual version of you—what does it tell people about 
you and your interests? 
Don’t impersonate. It’s wrong and can be hurtful to 
create sites, pages or posts that seem to come from someone 
else, like someone in your class or a teacher. 
Speak up. If you see something inappropriate on a social 
networking site or in a game or chat room, let the website know 
and tell an adult you trust. Using Report Abuse links can help 
keep sites fun for everyone. 
Don’t stand for bullying—online or off. 
Treat others the way you want to be treated—whether you’re 
interacting with them online, on your phone or in person. 
Have you seen 
something online that 
made you angry?
Cyberbullying is bullying that happens online. It can happen in an 
email, a text message, an online game or on a social networking 
site. It might involve rumors or images posted on someone’s 
profile or passed around for other people to see. 
You know that, right? So you know that cyberbullying 
is a lose-lose proposition: it often makes the person being 
harassed feel bad—and it makes the bully look bad. It also might 
lead to punishment from school authorities or the police. 
6 
CYBErBULLYING
7 
If something online 
bothers you, 
who do you tell? 
What do you do if someone harasses you 
online? Keep a cool head, and don’t respond. Most people 
realize that bullying is wrong. Sometimes you can stop bullying 
if you ignore or block the person. You also can report abuse 
to the website where it’s taking place. If it continues, save the 
evidence and ask for help from an adult you trust. 
What do you do if you witness cyberbullying? 
Tell the bully to stop. Most kids don’t bully, and there’s no 
reason for anyone to put up with it. This mean behavior usually 
stops pretty quickly when somebody stands up for the person 
being bullied.
Use privacy settings to restrict who can see and post on your profile. Many social networking sites, chat rooms and blogs have privacy settings. Find out how to turn these settings on, and then do it. 
Limit your online friends to people you actually know. 
Learn about location-based services. Many phones have GPS technology, and there are applications that let you find out where your friends are—and let them find you. Set your privacy settings so that only people you know personally can see your location. Think about keeping location-based services off, and turning them on only when needed. Ask yourself, “Does this app need to know where I am?” 
Trust your gut if you feel threatened or uncomfortable because of someone or something you find online. Tell someone who can help you report your concerns to the police and other people who can help. 
8 
PROTECT YOURSELF 
THE PROTECTION
9 
CONNECTION 
Do you download apps? If you do, you might 
be giving the app’s developers access to your personal 
information—maybe even info that’s not related to the purpose 
of the app. For example, say you download an app that lets you 
make a drawing out of a photo, but the company who made the 
app gets access to your entire contact list. It might share the 
information it collected with marketers or other companies. 
You can try to check what information the app collects—if it tells 
you—and check out your own privacy settings. Also think about 
whether getting that app is really worth sharing the details of 
your life. 
Some apps 
cost money. And many 
free apps let you buy stuff 
within them—with real money. 
Check with your parents to 
make sure they’re ok with you 
buying additional features, 
especially if they’re 
paying the bill.
PROTECT YOUR INFORMATION 
Some information should stay private. 
Your Social Security number and family financial information— like your parents’ bank account or credit card numbers—should stay in the family. 
Keep your passwords private. The longer your password, the harder it is to crack. Don’t share your passwords with anybody, including your best friends or your boyfriend or girlfriend. 
Don’t reply to text, email or pop-up messages that ask you to reply with personal information—even if the message looks like it’s from a friend, family member or company you know, or threatens that something bad will happen if you don’t reply. These messages may be fakes, sent to steal your information. 
10
Be cautious about opening attachments or 
clicking on links. They may contain viruses or spyware. 
Learn about security software and how your 
computers are protected. 
Remember that sometimes, free stuff—like 
games, ring tones or screen savers—can 
hide viruses or spyware. Don’t download unless you 
trust the source and scan the file with security software. 
Whether it’s your laptop, tablet or phone, don’t 
leave it in public—even for a minute. If it goes 
missing, all the important information stored on it—like your 
messages and photos—may fall into the wrong hands. 
Protect YOUR COMPUTER 
11 
Have you ever 
downloaded something 
that turned out to be 
different than you 
expected?
WORD SEARCH 
12
13 
APPS 
PRIVACY 
RESPECT 
DOWNLOAD 
TEXTING 
POLITENESS 
PROFILE 
VIRTUAL 
SECURITY 
SPYWARE
Stop.Think.Connect.TM is a national public awareness campaign 
aimed at increasing the understanding of cyber threats and 
empowering the American public to be safer and more secure online. 
OnGuardOnline.gov is the federal government’s website to help you 
be safe, secure and responsible online. 
To order free copies of this brochure, visit bulkorder.ftc.gov. 
July 2013

More Related Content

What's hot

5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsBen Woelk, CISSP, CPTC
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyLeslie Witten
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Responsibility and accountability
Responsibility and accountabilityResponsibility and accountability
Responsibility and accountabilityDiocese of Harrisburg
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 

What's hot (20)

5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
 
Project
ProjectProject
Project
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Responsibility and accountability
Responsibility and accountabilityResponsibility and accountability
Responsibility and accountability
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 

Similar to MindMake - Online Safety Talking to your Kids Parental Control

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Digital identity
Digital identityDigital identity
Digital identitymarudiaz77
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingDonikaLici
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Jamie Edmondson
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
CyberSafety
CyberSafetyCyberSafety
CyberSafetyiceman1953
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011Loreto Normanurst
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should KnowFranklin Matters
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 

Similar to MindMake - Online Safety Talking to your Kids Parental Control (20)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social Media Smarts for Teens
Social Media Smarts for TeensSocial Media Smarts for Teens
Social Media Smarts for Teens
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Digital identity
Digital identityDigital identity
Digital identity
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015Digital Leaders e-safety presentation 2015
Digital Leaders e-safety presentation 2015
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
10things
10things10things
10things
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
Internet safety
Internet safetyInternet safety
Internet safety
 

More from MindMake - Parenting & Education

Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodMindMake - Parenting & Education
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 

More from MindMake - Parenting & Education (19)

iPad In Education Results
iPad In Education ResultsiPad In Education Results
iPad In Education Results
 
What Great Principals Do Differently
What Great Principals Do DifferentlyWhat Great Principals Do Differently
What Great Principals Do Differently
 
Mindmake - Lego Education
Mindmake - Lego EducationMindmake - Lego Education
Mindmake - Lego Education
 
Parenting In The Digital Age
Parenting In The Digital AgeParenting In The Digital Age
Parenting In The Digital Age
 
Student Debt :)
Student Debt :)Student Debt :)
Student Debt :)
 
Getting Early Childhood Educators Up and Running
Getting Early Childhood Educators Up and RunningGetting Early Childhood Educators Up and Running
Getting Early Childhood Educators Up and Running
 
Moving Beyond Screen Time - Rand Corporation
Moving Beyond Screen Time - Rand CorporationMoving Beyond Screen Time - Rand Corporation
Moving Beyond Screen Time - Rand Corporation
 
Games - Problem Based Learning and Minecraft
Games - Problem Based Learning and MinecraftGames - Problem Based Learning and Minecraft
Games - Problem Based Learning and Minecraft
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 
SEGURIDAD EN EL INTERNET
SEGURIDAD EN EL INTERNETSEGURIDAD EN EL INTERNET
SEGURIDAD EN EL INTERNET
 
Evaluacion de fuentes de internet
Evaluacion de fuentes de internetEvaluacion de fuentes de internet
Evaluacion de fuentes de internet
 
Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
 
Parents Guide to Snapchat - Connect Safely Org
Parents Guide to Snapchat - Connect Safely OrgParents Guide to Snapchat - Connect Safely Org
Parents Guide to Snapchat - Connect Safely Org
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Smartphone Safety - tips for parents
Smartphone Safety - tips for parentsSmartphone Safety - tips for parents
Smartphone Safety - tips for parents
 
Parents' Guide to Instagram - for kids
Parents' Guide to Instagram - for kidsParents' Guide to Instagram - for kids
Parents' Guide to Instagram - for kids
 
Net Smartz - Tweens Presentation - Online Safety
Net Smartz - Tweens Presentation - Online SafetyNet Smartz - Tweens Presentation - Online Safety
Net Smartz - Tweens Presentation - Online Safety
 
Net Smartz - Parenting Internet Safety
Net Smartz - Parenting Internet SafetyNet Smartz - Parenting Internet Safety
Net Smartz - Parenting Internet Safety
 
On-line Safety for Kids
On-line Safety for KidsOn-line Safety for Kids
On-line Safety for Kids
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

MindMake - Online Safety Talking to your Kids Parental Control

  • 1. HEADS up stop think connect
  • 2. 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search table of contents
  • 3. You text, you play games, you share photos and video. You update your status, you post comments, you probably spend some time in a virtual world. Being online—connected through some sort of device—is how you live your life. And as you spend more of your time there, it can be easy to over-share, embarrass yourself, mess up your computer and possibly get messages from creepy people. The truth is there are some risks involved in socializing, playing and communicating online. Regardless of how fast your fingers fly on a keyboard, phone or tablet, the best tool you have to help avoid risks online is your brain. When you’re ready to post or send a message or a photo, download a file, game or program, or shop for something—stop for a second. Think about things like: Do you know and trust who you’re dealing with—or what you’re sharing or downloading? How will you feel if your information ends up somewhere you didn’t intend? Asking a few key questions first can help you protect yourself, your friends and your computer. Flip through and find more things to stop and think about before you click. 1
  • 4. Your online actions can have real-world consequences. The pictures you post and the words you write can affect the people in your life. Think before you post and share. What you post could have a bigger “audience” than you think. Even if you use privacy settings, it’s impossible to completely control who sees your social networking profile, pictures, videos or texts. Before you click “send,” think about how you will feel if your family, teachers, coaches or neighbors find it. Get someone’s okay before you share photos or videos they’re in. Online photo albums are great for storing and sharing pictures. It’s so easy to snap a shot and upload it instantly. Stop and think about your own privacy—and other people’s—before you share photos and videos online. It can be embarrassing, unfair and even unsafe to send or post photos and videos without getting permission from the people in them. 2 SHARE WITH CARE Sexting: Don’t do it. You may have heard stories at school or in the news about people “sexting”—sending nude photos from mobile phones. Don’t do it. Period. People who create, forward or even save sexually explicit photos, videos or messages put their friendships and reputations at risk. Worse yet, they could be breaking the law.
  • 5. Once you post something online, you can’t take it back. You may think that you’ve deleted a comment or a picture from a site—or that you will delete it later. Know that it may still be online or saved on someone else’s computer. 3 CARE Were you ever sorry you shared something online?
  • 6. 4 Politeness counts. Texting is just another way for people to have a conversation, and texters are just like people talking face-to-face or on the phone: they appreciate “please” and “thank you” (or pls and ty). Tone it down. In online conversations, using all CAPS, long rows of exclamation points or large bolded fonts is the same as shouting. Use Cc: and Reply all: sparingly. Before you send a message, stop and think about whether everyone needs to see it. Avatars are people too. When you’re playing a game or exploring an online world where you can create a character and interact with others, remember real people are behind those characters on the screen. Respect their feelings just INTERACT WITH
  • 7. 5 TACT like you would in person. Remember that your character or avatar is a virtual version of you—what does it tell people about you and your interests? Don’t impersonate. It’s wrong and can be hurtful to create sites, pages or posts that seem to come from someone else, like someone in your class or a teacher. Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using Report Abuse links can help keep sites fun for everyone. Don’t stand for bullying—online or off. Treat others the way you want to be treated—whether you’re interacting with them online, on your phone or in person. Have you seen something online that made you angry?
  • 8. Cyberbullying is bullying that happens online. It can happen in an email, a text message, an online game or on a social networking site. It might involve rumors or images posted on someone’s profile or passed around for other people to see. You know that, right? So you know that cyberbullying is a lose-lose proposition: it often makes the person being harassed feel bad—and it makes the bully look bad. It also might lead to punishment from school authorities or the police. 6 CYBErBULLYING
  • 9. 7 If something online bothers you, who do you tell? What do you do if someone harasses you online? Keep a cool head, and don’t respond. Most people realize that bullying is wrong. Sometimes you can stop bullying if you ignore or block the person. You also can report abuse to the website where it’s taking place. If it continues, save the evidence and ask for help from an adult you trust. What do you do if you witness cyberbullying? Tell the bully to stop. Most kids don’t bully, and there’s no reason for anyone to put up with it. This mean behavior usually stops pretty quickly when somebody stands up for the person being bullied.
  • 10. Use privacy settings to restrict who can see and post on your profile. Many social networking sites, chat rooms and blogs have privacy settings. Find out how to turn these settings on, and then do it. Limit your online friends to people you actually know. Learn about location-based services. Many phones have GPS technology, and there are applications that let you find out where your friends are—and let them find you. Set your privacy settings so that only people you know personally can see your location. Think about keeping location-based services off, and turning them on only when needed. Ask yourself, “Does this app need to know where I am?” Trust your gut if you feel threatened or uncomfortable because of someone or something you find online. Tell someone who can help you report your concerns to the police and other people who can help. 8 PROTECT YOURSELF THE PROTECTION
  • 11. 9 CONNECTION Do you download apps? If you do, you might be giving the app’s developers access to your personal information—maybe even info that’s not related to the purpose of the app. For example, say you download an app that lets you make a drawing out of a photo, but the company who made the app gets access to your entire contact list. It might share the information it collected with marketers or other companies. You can try to check what information the app collects—if it tells you—and check out your own privacy settings. Also think about whether getting that app is really worth sharing the details of your life. Some apps cost money. And many free apps let you buy stuff within them—with real money. Check with your parents to make sure they’re ok with you buying additional features, especially if they’re paying the bill.
  • 12. PROTECT YOUR INFORMATION Some information should stay private. Your Social Security number and family financial information— like your parents’ bank account or credit card numbers—should stay in the family. Keep your passwords private. The longer your password, the harder it is to crack. Don’t share your passwords with anybody, including your best friends or your boyfriend or girlfriend. Don’t reply to text, email or pop-up messages that ask you to reply with personal information—even if the message looks like it’s from a friend, family member or company you know, or threatens that something bad will happen if you don’t reply. These messages may be fakes, sent to steal your information. 10
  • 13. Be cautious about opening attachments or clicking on links. They may contain viruses or spyware. Learn about security software and how your computers are protected. Remember that sometimes, free stuff—like games, ring tones or screen savers—can hide viruses or spyware. Don’t download unless you trust the source and scan the file with security software. Whether it’s your laptop, tablet or phone, don’t leave it in public—even for a minute. If it goes missing, all the important information stored on it—like your messages and photos—may fall into the wrong hands. Protect YOUR COMPUTER 11 Have you ever downloaded something that turned out to be different than you expected?
  • 15. 13 APPS PRIVACY RESPECT DOWNLOAD TEXTING POLITENESS PROFILE VIRTUAL SECURITY SPYWARE
  • 16. Stop.Think.Connect.TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. OnGuardOnline.gov is the federal government’s website to help you be safe, secure and responsible online. To order free copies of this brochure, visit bulkorder.ftc.gov. July 2013