Protecting Identity
Online Privacy
Safety Risks
Digital Safety
Copyright
100

When someone steals your private information and uses it to commit crimes in your name. 

identity Theft 

100
  • retail stores
  • government
  • businesses
  • service providers
  • gaming
  • radio or TV

People who collect your information 

100

Rules a person sets about what they are comfortable doing, seeing, and feeling while using technology and how they want to be treated by others.

Digital Boundaries 

100

Tagging

Follow or Friend

Images

Texting

Downtime

Examples of Digital Boundaries 

100

Used to give credit to the person who created the work you use.

Citations 

200

The act of intruding on a person's life without their knowledge or permission

invasion of Privacy

200

A small text file that is saved on your device by a website. This file contains information about your visit and your device.

Cookies 

200

The use of technology to communicate with others, such as email, messaging apps, social media platforms, blogs, and online forum

Digital Communication 

200

Harassment 

Dissing

Cyberstalking

Doxxing 

Trickery 

Types of Cyberbullying 

200

A type of intellectual property that protects the original works of an author.

Copyright 
300

Using safe techniques to keep you and your personal data secure.


Cybersafety 

300

A device receives signals from satellites. These signals are used to pinpoint the location of the device.

GPS and Satellite 

300

A tactic used by online predators to build a relationship with a vulnerable person online to gain their trust for the purpose of harm or abuse

Online Grooming

300
Don't respond to the bully.

Don't retaliate 

Report the Bully

Seek help from an adult 

Ways to respond to a cyberbullying 
300

The act of passing off another person's creative work or idea as your own.

Plagiarism


400

Any data that can be used to directly identify a person.

Personal identifiable Information 

400

A legal document that tells a user what information is being collected, how it is used, and how it is protected.

Privacy Policy

400

The everyday disagreements and conflicts between people when using technology

Digital Drama 

400

Choose a username that cannot be connected with you.

Use an avatar as your profile picture

Never share account or personal information

Turn on the safety features in your game

Ways to protect yourself from online gaming. 

400

Applies to any work that is not protected by a copyright.

Public Domain 

500

A digital trail that shows where a person has been on the Internet.

Digital Footprint

500

A legal document between the owner of the website, which describes the rules that the company and user must agree to and obey. 

Terms of Service 
500

Read the privacy policy.

Avoid sharing PII data

Always log off a website or app.

Clear browser history.

Use a private search engine

Cybersafety Best Practices

500
  • Do not message anyone you do not know in person.
  • Adjust the privacy settings on all apps and services.
  • Never meet an online acquaintance in person.
  • Report any inappropriate communication to a parent or trusted adult.

Ways to protect yourself from online predators. 

500

Amount Used

Purpose

Nature of Original

Effect

Four Factors of Fair Use