You are on page 1of 15

Digital Safety:

Secondary
LAUREN H, CHASE C, FRAN M, ANTHONY F
Cyberbullying
What is it?

Cyberbullying is bullying that takes place


over digital devices like cell phones,
computers, and tablets. It occurs over
texting and other apps, or online on
social media, forums, or gaming where
https://kidshelpline.com.au/teens/issues/cyberbullying

people can view, participate in, or share


content. This often happens over Direct
Messaging (on Twitter, Snapchat, etc).

Examples: Sending a mean text to someone; Pranking someone’s cell phone; Hacking into someone’s gaming or
social media profile; Being rude or mean to someone on an online platform; Spreading secrets or rumors about
people online; Pretending to be someone else to spread hurtful messages; Posting inappropriate pictures or videos
of someone
Cyberbullying: continued
What should you do if you’re cyberbullied?
0
e-
om
-h
r-it
nte

1. Stay calm lem


-a
nd
-h
ow-
cou

2. Don’t reply
ob
-pr
ing
lly
bu
er
yb
-c

3. Take screenshots os
t/s
tu
dy
-de
ta
ils

/p

4. Tell a trusted adult


rg
.o
pr
.u
ww
://w
ps
htt

5. Block the bully!


6. Report the abuse
7. Confront the bully!
8. Bring it further
9. Change your privacy settings
10. Review and filter your friends
Cyberbullying Resources: for Students

For students! StopBullying.gov

Gives information on different


cyberbullying issues you could come in
contact with and how to handle them if
they come up. Also lets students know
how they can help and prevent
cyberbullying in their classrooms!
Educates students on ways to not only
help themselves, but their peers around
them.
https://twitter.com/stopbullyinggov/status/1002659825279520769
Cyberbullying Resources: for Parents & Teachers
For parents! aft.org

Provides different websites in order to educate yourself on


cyberbullying and how it affects your child. Provides
information on campaigns and research done, while giving you
information on how to approach and have a conversation with
your child. Includes pamphlets, flyers, educational videos, etc.

ce
ur
so
/re
om
s.c
m
ra

For teachers! CommonSense.org m


ne er
nli b
.o s/cy
b
og /
pr ing
sw ully

ww e
/w su
s:/ l-is
tp ia
ht soc
s/

Provides information on cyberbullying and how to tell if your


student is being cyberbullied. It also gives suggestions on how
to intervene if you need to. Informs you of your responsibility
as the teacher, like giving lessons or resources for the matter.
Sexting: Legal Implications & Responses
● Sexting = Child pornography
○ Even if it is consensual!!!!
○ A felony charge (for sending and/or receiving)
○ In Michigan, there’s no sexting law - There is a Revenge Porn Law
● Can be exposed to child predators since once it is sent, it is out
of the senders control
● At risk for blackmailing and a ruined reputation
● “What do I do if I receive an explicit message?”
○ Delete it right away
○ Block the sender
○ Do NOT share the explicit message or photo
Digital Footprint
● Digital Footprint: trail of data a person creates while using the
internet
○ Includes any website a person visits, emails sent, or information that
is submitted to online services
● What does a “good digital footprint look like?”
○ Not putting out personal information
○ Not oversharing
○ Knowing that the Internet is forever
● What does a “negative digital footprint look like?”
○ Being tagged in photos you wouldn’t want family or an employer to
see
○ Inappropriate searches or comments left on platforms
● How can my digital footprint impact my future?
○ Google yourself - Companies will do it
○ Reputation potentially at risk

https://www.teachthought.com/the-future-of-learning/11-tips-for-students-tomanage-their-digital-footprints/
Personal Information
● What is considered personal information?
○ Name
○ Address
○ Phone number
○ Personal email address
○ Photos
○ Financial information
○ Allegations of wrong doings
○ Memberships
○ Medical information
● Don’t put this info out on the internet!!! - You are at risk for identity theft!
Updating Your Technology

● It can be annoying and a waste of time, but it is very

important that you do update your technology

whenever there is an update available.

● Allows a person to stay up to date on technology

● Allows for access to fastest and most efficient systems


Password Safety

- Have separate, unique passwords for every site


- Switch from passwords to passphrases- example: Ilovetofishat6:00AM!
- Use a password manager application
Emails and links-
avoiding phishing
- Recognize attempts at Phishing
● The document in question does not mention
you by name
● Be suspicious of “billing issues”
- Hover over links; look for “http” and “https”
Search Engines
- Google, Yahoo, Bing, are all examples of search
engines.
- Be clear and concise in your search.
- Identify the domain of the site you use.
- Identify false sites by domain, missing contact
information for the site, improper
language/grammar, check the address bar, WHOIS
lookup, and by the SSL certificate.
Why To Only Visit “http” Sites
- HTTP sites provide fast and secure connection when configured
properly. (This is important since there is no such thing as
“non-sensitive” web traffic).
- Always using HTTP sites allows for web services to regard every bit of
information as sensitive and leave less room for error.
- The mass use of HTTP sites discourages large cyber attacks.
- More and more sites are becoming HTTP based and are phasing out
unencrypted information on sites.
Resources for Students and Parents
Cyberbullying:https://www.stopbullying.gov/resources/get-help-now
Sexting:https://www.verywellfamily.com/things-teens-do-not-know-about-sexting-but-should-460654
& https://mediasmarts.ca/teacher-resources/what-should-i-do-if%C2%A0someone-sends-me-sext
Digital Footprint:
https://www.teachthought.com/the-future-of-learning/11-tips-for-students-tomanage-their-digital-f
ootprints/
Personal Info.:
https://www.oic.qld.gov.au/guidelines/for-government/access-and-amendment/introduction-to-the
-acts/what-is-personal-information
Updating tech: https://endlesstechsolutions.com/update-technology/
Resources for Students and Parents (cont.)

Phishing Scams: https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams

Password Safety: https://www.coolcatteacher.com/password-tips/

Use of Search Engines: https://techwelkin.com/fake-websites

Use of HTTP Sites: https://https.cio.gov/everything/

Search Engines: https://techwelkin.com/fake-websites

HTTP sites (cont.): https://https.cio.gov/everything/

You might also like