It's cool to be Kind
Share with Care
Don't fall for fake
Secure your secrets
100

Bullying that happens online or through using digital devices

Cyberbullying

100

Sharing too much online – usually this is about sharing too much personal information or just too much about yourself in a certain situation or conversation online.

Oversharing

100

A dishonest attempt to make money or gain something else of value by tricking people

scam

100

The process of converting information or data into a code that makes it unreadable and inaccessible

Encryption

200

A way to end all interaction with another person online, preventing them from accessing your profile, sending you messages, seeing your posts, etc., without notifying them

Block

200

This is the area in any digital product, app, website, etc., where you can define or adjust what you share and how your account is handled

Settings

200

A person who is known for regularly posting short videos on a blog or social media. 

vlogger
200

Protecting people’s devices and the software on them

Security

300

A witness to harassment or bullying who recognizes the situation but chooses not to intervene

Bystander

300

Information that identifies a specific person – for example, your name, street address, phone number, Social Security number, email address, etc.

Personal information

300

Tricking someone in order to get something valuable from them

Fraudulent

300

A person who uses computers to gain unauthorized access to other people’s or organizations’ devices and data

Hacker

400

A witness to harassment or bullying who supports the target privately or publicly, sometimes including trying to stop and/or report the incident they witnessed

Upstander

400

All the information about you that appears online. This can mean anything from photos, audio, videos, and texts to “likes” and comments you post on friendsʼ profiles. Just as your footsteps leave prints on the ground while you walk, what you post online leaves a trail as well.

Digital footprint

400

An attempt to scam you or trick you into sharing login information or other personal information online. Phishing is usually done through email, ads, or sites that look similar to ones you’re already used to.

Phishing

400

A secret combination used to access something.

Password or Passcode

500

Purposefully mean behavior that is usually repeated. The person being targeted often has a hard time defending themselves.

Bullying

500

Protecting people’s data and personal information (also called sensitive information)

Privacy