teens presentation

47
These terms and conditions are additional to the general NetSmartz terms of use (available at http://www.netsmartz.org/legal/termsofuse.ht m), which are hereby incorporated by reference. By using this Presentation, you hereby agree to adhere to and be legally bound by these terms and conditions and by the general NetSmartz terms of use and other related legal statements found on the NetSmartz website. You acknowledge that this Presentation is part of the NetSmartz Materials, as defined in the NetSmartz Reproduction Policy, and is subject to the NetSmartz Reproduction Policy. You understand and acknowledge that this Presentation consists of multiple files, including but not limited to a PowerPoint file and several movie files, and all of which are included in the download file of this Presentation, and which total 47 pages. You agree that you will not alter, transform or build upon this Presentation in any way, unless and as expressly consented to in writing by NetSmartz. You further agree that you shall only use this Presentation in its entirety and not to subdivide, edit, or cut any of the pieces of this Presentation, or to present any portion of this You understand that NetSmartz is making this Presentation available to the public for educational use. If you choose to use this Presentation, you agree to attribute all aspects of this Presentation to NetSmartz and not to claim any portion of this Presentation as content, product, concept, design or other conceived of or developed by you. This Presentation may contain logos, notices or other type or marks denoting NetSmartz’s ownership of and rights in and to this Presentation. You agree that you will not remove, obscure, deface or fail to reproduce in any authorized copy any such copyright, trademark or other proprietary rights notice contained in any part of this Presentation. These terms of use grant you a non-exclusive and non-transferable license to use or make use of this Presentation as and only as set forth in these terms and conditions. Except for the limited use license set forth above, all right, title and interest in and to this Presentation and all portions thereof shall remain with NetSmartz. You acknowledge such ownership and intellectual property rights and will not take any action to jeopardize, limit or interfere in any manner with NetSmartz’s ownership of or rights in and TERMS OF USE FOR THIS PRESENTATION USE OF THIS PRESENTATION IS CONDITIONAL UPON ACCEPTANCE OF THESE TERMS AND CONDITIONS. IF YOU DO NOT AGREE TO BE BOUND BY THESE TERMS AND CONDITIONS, INCLUDING ANY OTHER TERMS INCORPORATED BY REFERENCE, DO NOT USE OR PRESENT THIS PRESENTATION.

Upload: sharon7111

Post on 05-Dec-2014

3.244 views

Category:

Education


2 download

DESCRIPTION

Internet Safety presentation for Teens

TRANSCRIPT

Page 1: Teens Presentation

These terms and conditions are additional to the general NetSmartz terms of use (available at http://www.netsmartz.org/legal/termsofuse.htm), which are hereby incorporated by reference. By using this Presentation, you hereby agree to adhere to and be legally bound by these terms and conditions and by the general NetSmartz terms of use and other related legal statements found on the NetSmartz website.

You acknowledge that this Presentation is part of the NetSmartz Materials, as defined in the NetSmartz Reproduction Policy, and is subject to the NetSmartz Reproduction Policy. You understand and acknowledge that this Presentation consists of multiple files, including but not limited to a PowerPoint file and several movie files, and all of which are included in the download file of this Presentation, and which total 47 pages. You agree that you will not alter, transform or build upon this Presentation in any way, unless and as expressly consented to in writing by NetSmartz. You further agree that you shall only use this Presentation in its entirety and not to subdivide, edit, or cut any of the pieces of this Presentation, or to present any portion of this Presentation on a stand-alone basis, unless you have requested and received written permission to do so from NetSmartz.

This Presentation is intended solely for educational use. You agree that you will not, under any circumstance, use this Presentation for any commercial purpose or in any commercial manner. You further agree that you will use this Presentation only for legal purposes. You, and not NetSmartz, shall be responsible for any illegal use made of this Presentation by you or any person to whom you give this Presentation.

You understand that NetSmartz is making this Presentation available to the public for educational use. If you choose to use this Presentation, you agree to attribute all aspects of this Presentation to NetSmartz and not to claim any portion of this Presentation as content, product, concept, design or other conceived of or developed by you. This Presentation may contain logos, notices or other type or marks denoting NetSmartz’s ownership of and rights in and to this Presentation. You agree that you will not remove, obscure, deface or fail to reproduce in any authorized copy any such copyright, trademark or other proprietary rights notice contained in any part of this Presentation.

These terms of use grant you a non-exclusive and non-transferable license to use or make use of this Presentation as and only as set forth in these terms and conditions. Except for the limited use license set forth above, all right, title and interest in and to this Presentation and all portions thereof shall remain with NetSmartz. You acknowledge such ownership and intellectual property rights and will not take any action to jeopardize, limit or interfere in any manner with NetSmartz’s ownership of or rights in and to this Presentation.

THIS PRESENTATION AND ALL PORTIONS THEREOF ARE PROVIDED ON AN “AS IS” BASIS, WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. NETSMARTZ CANNOT GUARANTEE THE ACCURACY OR NON-INTERFERING OR NON-INFRINGING NATURE OF THIS PRESENTATION. ALL RISK AS TO THE QUALITY AND PERFORMANCE OF THIS PRESENTATION IS BORNE BY YOU, AND NETSMARTZ DOES NOT WARRANT THAT THIS PRESENTATION WILL PERFORM AS INDICATED OR HAVE THE DESIRED EFFECT ON ITS AUDIENCE.

TERMS OF USE FOR THIS PRESENTATION

USE OF THIS PRESENTATION IS CONDITIONAL UPON ACCEPTANCE OF THESE TERMS AND CONDITIONS.

IF YOU DO NOT AGREE TO BE BOUND BY THESE TERMS AND CONDITIONS, INCLUDING ANY OTHER TERMS INCORPORATED BY

REFERENCE, DO NOT USE OR PRESENT THIS PRESENTATION.

Page 2: Teens Presentation

2 Return to this Menu and Instructions

[ Keyboard Shortcuts ]Press the slide number and then“enter” to skip to specific slide segments

Press the slide number and then“enter” to skip to specific slide segments

4 Start the Presentation

10 Survivor Diaries

13 Julie’s Journey

18 Tracking Teresa

21 You Can’t Take It Back

24 Broken Friendship31 Ad Council PSA: Bulletin Board

6 Teen PSA: Promises

Esc Exit

37 Ad Council PSA: Everyone Knows Your Name37 Ad Council PSA: Everyone Knows Your Name

Page 3: Teens Presentation

Reminder: You may need to use a keyboard command, such as “Function + F4” to see video through

a projector. If you can see the video above while projecting, proceed with the presentation.

If not, please refer to your presenter guide for troubleshooting information.

QuickTime™ and a decompressor

are needed to see this picture.

Page 4: Teens Presentation

MAC Version 5.0

Internet Safety

Presentation:

Teens

Internet Safety

Presentation:

Teens

Page 5: Teens Presentation

Online RisksOnline Risks

Predators

Revealing Too Much

Cyberbullying

Spyware, Spam, and Scams

Page 6: Teens Presentation
Page 7: Teens Presentation

QuickTime™ and a decompressor

are needed to see this picture.

Page 8: Teens Presentation

Predators “Entice”Predators “Entice” If anyone

– Talks about inappropriate things

– Sends you sexually explicit images

– Asks for your personal information

– Wants you to do things that make you feel uncomfortable

– Wants to meet you in person

Talk to an adult you trust!

Page 9: Teens Presentation

Sexual Solicitation of Teens.Sexual Solicitation of Teens.

70% were female; 30% were male

86% of offenders were people youth first “met” online

37% of incidents happened in chatrooms; 40% in instant messages

Page 10: Teens Presentation
Page 11: Teens Presentation

QuickTime™ and a decompressor

are needed to see this picture.

Page 12: Teens Presentation

Who Can You Trust?Who Can You Trust? You may not know the truth about people

you first meet online

You can be lied to or betrayed

Time ≠ Trust

Anyone worth having as a friend wouldn’t ask you to put yourself at risk

It can be a crime for an adult to engage in sexually explicit communication with a minor

Page 13: Teens Presentation
Page 14: Teens Presentation

QuickTime™ and a decompressor

are needed to see this picture.

Page 15: Teens Presentation

Warning SignsWarning Signs If someone tries to

– Isolate you from family and friends

– Turn you against your parents or guardian

– Make you keep everything secret

– Send inappropriate material or talk about explicit subjects

– Threaten you

Tell an adult you trust!

These warning signs apply online and in real life.

Page 16: Teens Presentation

Risks of Meeting OfflineRisks of Meeting Offline

Page 17: Teens Presentation

How Much Is Too Much? How Much Is Too Much? Personal information that can lead a predator

to your doorstep

Photos and videos should never be posted online if they show– Backgrounds that reveal identifying information

– Sexually provocative poses

– Too much skin

Name Age Birthday Phone Number

School Schedule Location

Page 18: Teens Presentation
Page 19: Teens Presentation

QuickTime™ and a decompressor

are needed to see this picture.

Page 20: Teens Presentation

What Is Cyberbullying?What Is Cyberbullying? Spreading rumors and gossip

Posting pictures without consent

Stealing passwords to assume someone’s identity

Harassing or threatening with mean or bad language

Page 21: Teens Presentation
Page 22: Teens Presentation

QuickTime™ and a decompressor

are needed to see this picture.

Page 23: Teens Presentation

What to DoWhat to Do If you are ever cyberbullied

– Do not respond

– Save the evidence

– Tell an adult you trust

– Report it to your ISP

If anyone threatens you or you feel that you are in immediate danger, talk to an adult you trust and contact your local law-enforcement agency

Page 24: Teens Presentation
Page 25: Teens Presentation

QuickTime™ and a decompressor

are needed to see this picture.

Page 26: Teens Presentation

Spyware, Spam, and ScamsSpyware, Spam, and Scams Only download from trustworthy sources

to prevent spyware and viruses

Protect your privacy and don’t give out information to soliciting sites and e-mails

If an offer seems too good to be true, it usually is

Page 27: Teens Presentation

Your Online LifeYour Online LifeSocial Networking

Blogging

Cell Phones

Online Gaming

Webcams and Videos

E-mail, IM, and Chatrooms

File-sharing

Page 28: Teens Presentation

What Is Social Networking?What Is Social Networking?

Page 29: Teens Presentation
Page 30: Teens Presentation

- Information can be inadvertently revealed in pictures

- Sexually provocative pictures can be used for exploitation

Page 31: Teens Presentation

BULLETIN BOARDBULLETIN BOARD

Page 32: Teens Presentation

QuickTime™ and a decompressor

are needed to see this picture.

Page 33: Teens Presentation

- Teens let people they don’t know into their lives to gain status and display popularity

Page 34: Teens Presentation
Page 35: Teens Presentation

BloggingBlogging

Page 36: Teens Presentation

- Vulnerabilities and insecurities can be used by a predator to “groom” children into a face-to-face meeting

Page 37: Teens Presentation

EVERYONE KNOWS YOUR NAME

EVERYONE KNOWS YOUR NAME

Page 38: Teens Presentation

QuickTime™ and a decompressor

are needed to see this picture.

Page 39: Teens Presentation

Real-Life ConsequencesReal-Life Consequences Profiles and blogs are not only viewed by

your friends, but also by

– Parents and relatives

– Teachers and principals

– Colleges and universities

– Employers

– ONLINE PREDATORS

If it is on the Internet, IT IS NOT PRIVATE.

Page 40: Teens Presentation

Webcams and VideosWebcams and Videos Videos can be used against you for

exploitation

Check your surroundings for information that could reveal your location

Remember that any video can be saved, accessed, and altered by anyone

Page 41: Teens Presentation

Cell PhonesCell Phones Never post your cell phone number online

Never send provocative photos or videos of yourself

Don’t respond to harassing texts

Having a cell phone is a privilege, not a right

Page 42: Teens Presentation

Online GamingOnline Gaming Use voice-mask and other safety features to

hide your age and gender

Don’t get angry; walk away if things get too “heated”

Have a life outside of gaming!

Page 43: Teens Presentation

E-mail, IM, and ChatroomsE-mail, IM, and Chatrooms Protect yourself by

– Communicating with people you know in person

– Keeping your personal information private

– Not meeting offline

– Not responding to offensive messages

– Choosing gender-neutral, non-revealing, and non-suggestive screennames and e-mail addresses

Page 44: Teens Presentation

File-sharingFile-sharing Download and share media with P2P

It’s illegal to share copyrighted materials without permission

You could unknowingly download or distribute viruses and illicit material

Music Movies Videos Photos

Documents Software

Page 45: Teens Presentation

Making Safer Online ChoicesMaking Safer Online Choices YOU control your online image and how much

personal information is revealed

Be a good friend and sibling and encourage others to be safer online

Talk to an adult you trust if anything makes you feel scared or uncomfortable

Page 46: Teens Presentation

Resources for YouResources for You http://www.NetSmartz.orghttp://www.NetSmartz.org

– Watch teens’ real-life stories and learn how to make safer choices online

http://www.cybertipline.comhttp://www.cybertipline.com

– If you or someone you know has been victimized, tell a trusted adult and make a report to the CyberTipline

Page 47: Teens Presentation

The contents of this material were created by The National Center for Missing and Exploited Children (“NCMEC”) and Boys & Girls Club of America (“BGCA”).

Certain content may have been altered or modified from its original version. NCMEC may not necessarily endorse, support, or agree with such modifications and will not be responsible for such content.

You may not remove any copyright, trademark, or other intellectual property notices that may appear on any part of this material.

This project was supported by Grant No. 2005-MC-CX-K024 awarded by the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice.

Points of view or opinions in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice.

Copyright © 2004 and 2007 National Center for Missing & Exploited Children. Copyright in certain works supported by Grant Nos. 2000-LD-BX-K001, 2001-LD-BX-K002, 2003-LD-BX-K002, and

2004-LD-BX-K013 through Boys & Girls Clubs of America are jointly held by the National Center for Missing & Exploited Children and Boys & Girls Clubs of America.

All rights reserved.

Portions utilize Microsoft Windows Media Technologies. Copyright © 1999-2002 Microsoft Corporation. All Rights Reserved.