The Wellness Project-High

Protect Yourself Online COMPUTER VIRUSES Computer viruses can damage your hard drive or digital devices. They can also jeopardize your personal information, files, and software. Viruses harm your computer when you run infected executable files. These files can pose as useful programs, pictures, e-cards, video clips, email attachments, or pop-up ads. Protect yourself by clicking with care. • Only visit sites you trust or know are safe. • D elete email attachments from people you don’t know. INFORMATION AND IDENTITY THEFT Thieves can use the personal information you provide online to steal your identity. Details such as your full name, birthdate, and social insurance number can be used to open accounts in your name. Additionally, some computer viruses allow thieves to hack into your computer to collect account, credit card, and PIN numbers, as well as your passwords. Protect yourself by guarding your privacy. • Never send sensitive information over unsecure wireless networks. • Don’t share personal information (e.g., full name and birthdate) online. • Keep your antivirus software up to date. ONLINE PERSONAL SAFETY Some adults use social-networking sites and chat rooms to target young people. They may lie and manipulate to gain trust or form relationships. Protect yourself by forming safe online relationships. • Don’t form online friendships with people you don’t know. • Never agree to meet online-only friends in real life. • End chats or block people if you feel upset or uncomfortable. Cyberbullying Cyberbullying is a form of bullying that uses technology to hurt, harass, or humiliate others. It’s a common form of bullying because it’s quick, can be anonymous, and allows bullies to reach their targets at any time of the day or night. COMMON FORMS OF CYBERBULLYING • Harassment: Continual, hurtful contact through phone calls or emails, instant or text messages, or posting cruel messages on bulletin boards or social-networking sites. • Outing: Making someone’s private information public by posting it on social-networking sites, blogs, or chat rooms, or by forwarding private photos to other people. • Gossip: Posting or passing along rumours about someone. • Impersonation: Pretending to be someone else in chat rooms or on social-networking sites in order to post messages that can make that person look bad. • Flaming: Fighting online using offensive or threatening language. Protect yourself by knowing how to respond to bullying. • B lock cyberbullies to prevent them from contacting you. • R eport cyberbullying to trusted adults and your Internet Service Provider (ISP). Break the cycle of cyberbullying. • Use netiquette online by being respectful, courteous, and truthful in your posts, email, and text messages. • Refuse to forward mean or threatening messages or embarrassing pictures. R–3 RESOURCE PAGES

RkJQdWJsaXNoZXIy ODA5Mw==