Protect Your Privacy Online
|
|
|
- Cornelia Dennis
- 9 years ago
- Views:
Transcription
1 Protect Your Privacy Online By Kathiann M. Kowalski Keep personal information private for your own good! High school sophomore Karra H. never expected to see herself on a Web site featuring scantily clad teens. Yet there she was, wearing a bikini while holding a suggestive cheerleading pose. The site s anonymous owner got most of the photos from teens social media pages. While Nancy McBride at the National Center for Missing & Exploited Children feels the actions of the site s creator were wrong, she warns teens against posting revealing images in the first place. Once it s out there, it s out there forever, says McBride. Somebody else can go out there and grab it. In other words, protecting privacy starts with you. Watch Out for Strangers And Friends In Karra s case, the unknown Web site operator didn t contact Karra or use online information to track her down in real life. Strangers rarely physically assault teens they find or connect with online, but it has happened. Jochen Luebke/Newscom When some female friends told 17-year-old Eric M. in Utah that they had chatted online with unknown adults, he urged them to stop. There are child molesters, and there are a lot of crazies out on the Internet, says Eric. If you don t know someone, don t talk to them. More often, teens hurt one another or themselves. Cyberbullying can be both nasty and illegal. One 19-year-old New Jersey college student faced 1
2 criminal charges after he tweeted about watching a roommate s romantic date via Webcam. Other teens use cell phone cameras and social media sites to share photos of their own private moments or illegal activities, such as underage drinking. Even if charges don t result, embarrassment can follow. One of the biggest mistakes that teens make is believing that the information that they post is private and just amongst their friends, explains Michelle Boykins at the National Crime Prevention Council. Anyone can copy and resend material. There s even less control over friends of friends. Identity Theft Happens Teens are also targets for identity theft the use of someone s personal information for fraud or crime. Last year about 8 percent of reported identity theft cases in the U.S. involved teen victims, says attorney Steven Toporoff at the Federal Trade Commission. That s roughly 18,000 cases. Adults in their 20s make up the biggest group of victims. Neglecting potential identity theft could really come back to bite you, stresses Toporoff. Many teens discover identity theft only later, when they apply for college loans or auto loans. By then, cleaning up credit reports can take hundreds of hours. Meanwhile, lenders delay extending credit. Facebook has become a gold mine and a giveaway for identity thieves, notes Neal O Farrell at the Identity Theft Council in California. Some users post their full dates of birth, addresses, or phone numbers. Others disclose their places of birth, pet s names, favorite bands, or similar information. That data can help criminals recover someone s password for various accounts. Identity thieves now have very sophisticated programs that scrape these pages of this information, join the dots, and then clone the identity, says O Farrell. Even teens who don t give away information can be vulnerable. Earlier this year, for example, criminals broke into servers for the Sony and Sega corporations, two leading game makers. The security breaches revealed data about millions of people. Other criminals develop false identities with teens and young children s Social Security numbers. When one study reviewed a database with information about 42,000 people age 18 and younger, 10 percent of those kids Social Security numbers had already been used for loans or to open credit accounts. In most of those cases, some sort of identity theft had happened. 2
3 Run a credit check on yourself, suggests O Farrell. (The government requires the three companies that control individuals credit information in the United States to provide you with a free report once a year.) If you don t have a credit card or loan yet, finding a report on yourself could signal a problem. Review your social media page too. Delete anything that could help strangers impersonate or find you. Unless it s someone I know, I don t freely give out any contact information, says 16-year-old Matt K. in New York. It s just as important that you remove anything that s inappropriate. You can t get away with any behavior you want online, stresses McBride. Don t post anything you wouldn t want parents, colleges, or potential employers to see. After all, says McBride, this is a public forum. Take These Steps Now Don t strike up online relationships or give your contact info to strangers. Never meet someone offline without a parent. Disable location tagging on your phone s settings for photos and messages. Trim your social media profile to the basics. Delete phone info from social media profiles. Review your security settings regularly because sites sometimes change their defaults. Change passwords every 90 to 120 days. And use different passwords for different devices and sites. When you get credit or debit cards, review statements and report inconsistencies right away. Use secure web sites for any online purchases. Even if you don t have a credit card, check to see whether you have a credit report at creditreport.com. (Beware of similarsounding sites selling products.) Correct any problems. Above all, use good judgment. Keep your private life private. 3
4 Don t Let Geotagging Target You Maurizio Gambarini/Newscom Many mobile devices now include geotagging. The technology embeds specific location information into uploaded images or other material. For instance, if you have photos online showing the location of your home and then you make it known online that you re on vacation and your home is empty, thieves could take advantage. To keep your mobile phone photos from telling where you are, disable the feature in the device s settings. 4
5 Questions: Protect Your Privacy Online Name: Date: 1. What percentage of reported identity theft cases in the United States involve teen victims? A 18,000 B 8% C 18% D 10% 2. The author tries to persuade readers that protecting your privacy online is important. Which persuasive writing tactics does the author use to make his case? A statistics and facts B personal anecdotes C direct quotations from experts in the field D all of the above 3. Which word would the author most likely use to describe the approach someone should take when posting information online? A nervous B bold C cautious D carefree 4. Read the following sentence: Neglecting potential identity theft could really come back to bite you, stresses Toporoff. In this sentence the word stresses means A worries B emphasizes C strains D says 5. What would another good title be for this passage? A Going Online? Beware of Thieves and Bullies B Proper Etiquette for Facebook Usage C Cyberbullying: Trends, Problems, and Solutions D The Downsides and Challenges of the Internet 1
6 6. What is one example of how teens use the internet and social media for cyberbullying? Questions: Protect Your Privacy Online 7. What information could an identity thief take from a kid s Facebook page today that would still be useful to the thief twenty years from now? 8. The question below is an incomplete sentence. Choose the word that best completes the sentence. The author suggests you trim your social media profile to the basics identity thieves can t steal your identity. A because B but C whenever D so 9. Answer the following questions based on the sentence below. Geotagging can target you, wherever you are, when you upload photos or information to your mobile device. What? geotagging What? When? Where? 2
7 Questions: Protect Your Privacy Online 10. Read the vocabulary word and definition below and complete questions 10a, 10b, and 11. Vocabulary Word: vulnerable (vul ner a ble): susceptible of being hurt, emotionally or physically. 10a. Read the sentences below and underline the word vulnerable. 1. The elderly are particularly vulnerable to breaking a bone if they fall. 2. The plants are vulnerable to frost and can die because of the cold, so she brought them inside during the months from November to March to protect them. 3. If you post a lot of personal information online, you are making yourself more vulnerable to having your identity stolen. 4. He made himself vulnerable to his friends by sharing a lot of personal stories and sharing his emotions with them. 5. When the guard decided to take a nap when he was supposed to be guarding the castle, the fort was vulnerable to attack. 10b. Which object(s) would you use to make sure your belongings were not vulnerable to theft? 11. How can you make yourself less vulnerable to someone stealing your identity? 3
CyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
National Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
Social Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
Affirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
Today s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
Safety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
ONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Cyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority
MEMBER IDENTITY PROTECTION Protect Your Identity Security of Personal Information is Our Top Priority Imagine this Unexpectedly, you get turned down for a loan, you get a call from a collection agency
Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
Outsmarting On-line Predators. Christina Kilbourne
Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information
HEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
A Parents' Guide to. Snapchat. 2013 ConnectSafely.org
A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their
Private and Personal Information
LESSON PLAN Private and Personal Information UNIT Essential Question How can you protect yourself from online identity theft? Lesson Overview As students visit sites that request information about their
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
Internet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
Youth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
Citi Identity Theft Solutions
Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information
Beware! Identity Theft
STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal
Learning English with CBC Radio Living in Alberta. Identity Theft
Learning English with CBC Radio Living in Alberta Identity Theft by Maroro Zinyemba Project Manager: Justine Light Daylight Consulting Inc. Integration Enhancement Lesson: Identity Theft CLB Level: 6 CLB
Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
Bullying 101: Guide for Middle and High School Students
Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
Staying Safe.....on social media and online
Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or
Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online
Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012
Social Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
Chapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
Related KidsHealth Links. Discussion Questions
Grades 6 to 8 Personal Health Series Online Safety and Cyberbullying KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible
Standard 9: The student will identify and explain consumer fraud and identity theft.
TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the
Driving License. National Insurance Number
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
15 Bad Things Identity Thieves Can Do With Your Identity
This free ebook is provided to help you protect yourself from fraud and identity theft by LeMay Mobile Shredding. LeMay Mobile Shredding offers mobile document shredding to help you destroy old tax forms,
EADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus
Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some
Today s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
Common Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
CivicScience Insight Report
CivicScience Insight Report Consumer Sentiment Toward Data Privacy Part 1 of 2: Internet-Based Data Sharing and Collection Our lives as consumers in a modern society have become characterized by digitized
FIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
A Parents Guide to. 2014 ConnectSafely.org
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk
A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Identity fraud explained. How to protect your identity
Identity fraud explained How to protect your identity Contents Raising the alarm 3 What is identity fraud? 4 When your identity is in danger 4 Keeping your identity safe 6 Spotting the warning signs 6
Guideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
2010 Middle School Internet Safety Survey Results
When you are online, people can say whatever they want. ~ 8th Grader A friend pressured me to tell her my password. ~ 5th Grader Plainview Old Bethpage Central School District 21 Middle School Internet
Understand What s Going On
Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
Words In The News. Teacher s pack Lesson plan and student worksheets with answers
Words In The News Teacher s pack Lesson plan and student worksheets with answers Britain information blunder 21 November 2007 CONTENTS 1. Level, topic, language, aims, materials 2. Lesson stages 3. Student
How to protect your identity. Identity fraud explained
How to protect your identity Identity fraud explained What is identity fraud? Identity theft is when someone gets hold of your personal information without your permission. This can include your name,
Sexual Assault of a Child VOIR DIRE QUESTIONS
ATTORNEYS Sexual Assault of a Child VOIR DIRE QUESTIONS 1. What are your feelings or opinions about criminal defense attorneys? 2. Have you ever had a bad experience with a criminal defense attorney? If
Technology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect
PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org [email protected]
PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org [email protected] Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
A Parents' Guide to. 2014 ConnectSafely.org
A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram
Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
