When someone steals your private information and uses it to commit crimes in your name.
identity Theft
People who collect your information
Rules a person sets about what they are comfortable doing, seeing, and feeling while using technology and how they want to be treated by others.
Digital Boundaries
Tagging
Follow or Friend
Images
Texting
Downtime
Examples of Digital Boundaries
Used to give credit to the person who created the work you use.
Citations
The act of intruding on a person's life without their knowledge or permission
invasion of Privacy
A small text file that is saved on your device by a website. This file contains information about your visit and your device.
Cookies
The use of technology to communicate with others, such as email, messaging apps, social media platforms, blogs, and online forum
Digital Communication
Harassment
Dissing
Cyberstalking
Doxxing
Trickery
Types of Cyberbullying
A type of intellectual property that protects the original works of an author.
Using safe techniques to keep you and your personal data secure.
Cybersafety
A device receives signals from satellites. These signals are used to pinpoint the location of the device.
GPS and Satellite
A tactic used by online predators to build a relationship with a vulnerable person online to gain their trust for the purpose of harm or abuse
Online Grooming
Don't retaliate
Report the Bully
Seek help from an adult
The act of passing off another person's creative work or idea as your own.
Plagiarism
Any data that can be used to directly identify a person.
Personal identifiable Information
A legal document that tells a user what information is being collected, how it is used, and how it is protected.
Privacy Policy
The everyday disagreements and conflicts between people when using technology
Digital Drama
Choose a username that cannot be connected with you.
Use an avatar as your profile picture
Never share account or personal information
Turn on the safety features in your game
Ways to protect yourself from online gaming.
Applies to any work that is not protected by a copyright.
Public Domain
A digital trail that shows where a person has been on the Internet.
Digital Footprint
A legal document between the owner of the website, which describes the rules that the company and user must agree to and obey.
Read the privacy policy.
Avoid sharing PII data
Always log off a website or app.
Clear browser history.
Use a private search engine
Cybersafety Best Practices
Ways to protect yourself from online predators.
Amount Used
Purpose
Nature of Original
Effect
Four Factors of Fair Use