The collection of data trails you leave behind when you use the internet.
Digital footprint
Information like your name, address, or ID numbers that can be used to identify you individually.
PII
A strategy for checking if online information is reliable by examining the source, evidence, and purpose.
SEEK
Signals or warnings that someone’s online conversation may be unsafe or inappropriate.
Red flags
Using digital communication tools to repeatedly hurt or intimidate someone.
Cyberbullying
The way you design and present your online persona to others.
Curated self
The right to control your personal information, including what's collected and shared about you online.
Privacy
Using someone else’s creative work in a limited way for education, commentary, or parody without permission.
Fair use
The feeling of being accepted, valued, and included within a group or community.
Belonging
Negative effects that occur when people abuse or misuse technology and digital content.
Online harms
A network of people and places affected by your online actions, showing that your posts impact more than just you.
Web of responsibility
A fraudulent act where someone uses another person’s personal data to pretend to be them.
Identity theft
Giving recognition to the original creator when using their work.
Pressure from friends or acquaintances to share or act online in ways you might not want.
Peer pressure
Reducing tension in an online conflict by staying calm and responding thoughtfully.
De-escalation
Information about you that can be linked back to you online.
Personal data
Settings that allow you to decide who can view your posts or personal details on social media.
Privacy settings
Creative work that's not copyrighted and is free to use without permission.
Public Domain
Feeling freer to say or share things online because you are behind a screen.
Online Disinhibition
Repeatedly sending unwanted, hurtful messages or comments to someone online.
Harassment
The lasting record of your online behaviors that can shape how others perceive you.
Online identity
Hints or signs that someone is trying to trick you into giving away personal information online.
Phishing
Misusing someone else’s work by presenting it as your own without permission or acknowledgement.
Plagiarism
The personal limits we set to protect our privacy, comfort, and well-being by clearly communicating what we are and are not OK with.
Boundaries
Getting support from a trusted adult or authority to deal with harmful online situations.
Seeking help