Premium Essay

Internet Safety Speech

Submitted By
Words 1310
Pages 6
Internet Safety for Teens
Nakayla , Paris
November.3, 2017
Internet safety Internet safety is one of the most important things to know about. Especially if you are a teen. Here are a few tips and tricks that you should know about the internet and its safety for teens. Main subtopic you have to be focused on is Social media alerts, Teen suicide and cyberbullying, Never trust a Predators, how to be safe on social media. Teen suicide
When teens are on the internet some people are getting ridiculously, bullied and this bullying causes teen suicide
Hurts people because of a post a judgment of what they feel
The teen internet safety edgerly falls in with teen suicide
Telling people your …show more content…
Being safe on social media is a life hazard in the world. One way of being safe on social media is never give your information to anyone. The problem is, most people don’t know if they should give their information out or not . The best way to solve this problem is to not go on websites that cannot be trusted. Try to stay on websites with the following links: www, .gov, .edu, and https://. The internet can lead you into hurt-harm and danger to you or your family. For example, intruders coming to your house, being exposed on the internet, and even your location/home getting told to everyone on the internet, and everywhere else. You still always need to understand that you cannot tell anyone where you live or your address. Being safe on social media requires a few things but, you have to be able to no get personal on the internet; be wary of links-and don't overshare. Dont tell all of your personal information on social media and the internet. By doing these things, you can be safe on social media or/and the …show more content…
If someone ask for your social security number-or phone number dont do it. They are mostly predators that go for little kids or teens. This also falls in with child mostliers. they are the strangers and predators. You always have to be careful who you talk to, because you never know if they could be the next intruder coming to your house or a child molester. These are the social media alerts you have to be aware of. You can really be left in dangerous harm.
Teen suicide and Cyberbullying
Teen suicide and cyberbullying are usually caused by social media . Lesson to learn is not to listen to anyone that cyber bullies you, teen suicide is very important to talk about to any adult, guardian or teacher, as well as a counselor . About 50% half of americans decides to commit suicide, but about the other 50% half of americans doesn’t commit suicide . Its best not to commit suicide at all because people will ask what are those scars on your arms as well as your parents- they will be furious.You were put on this earth for a reason and that isn’t your job to take your own life way because your family would be so hurt; as well as your parents would be hurt if died. What is cyberbullying ? cyberbullying is when someone gets bullied in life once every blue moon for something that they didn’t do- sometimes whenever someone gets bullied someone wants to kill themselves or have suicidal thoughts never do that just don’t

Similar Documents

Premium Essay

Internet Censorship Harmful

...The internet is a widespread source of unlimited information, accessed and dispersed by billions of people around the world. The suppression and prohibition of certain information being produced or acquired by the public is called internet censorship, which is regulated by the government and private organizations. Internet censorship is a good thing because it protects us through reducing threats to national safety and stability. Internet censorship strengthens national safety and stability. General safety and stability worldwide is vulnerable to illicit and unsafe online practices. For example, online dispersion of illegal drugs provides mass access of illegitimate or toxic narcotics to potentially unknowing consumers that can have tragic...

Words: 509 - Pages: 3

Premium Essay

Cyber Bullying

...Cyberbullying Imagine coming home from school and sitting at the computer to get away from the stress of the day. Within a few minutes you're bombarded with messages like "You're ugly…We hate you…Why don't you make us all happy and end your miserable life". Welcome to a world too many teenagers are facing. A world where bullying no longer takes place in the hallways at school or on the way home. Bullying is now more likely to takes place in the murky, often anonymous world of the Internet. About a third (31%) of all students ages 12-14 have been bullied online according to a study by Opinion Research Corporation (2006). This research paper will examine some of the reasons for "cyberbullying," and what may be done about it. What is Cyberbullying? Bill Belsey, President of Bullying.org Canada says, "Cyberbullying involves the use of information and communication technologies such as e-mail, cell phone and pager text messages, instant messaging, defamatory personal Web sites, and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behavior by an individual or group that is intended to harm others". Nancy Willard, author of "An Educators Guide to Cyberbullying and Cyberthreats" breaks down cyberbullying into the following categories: -Flaming. Online fights using electronic messages with angry or vulgar language. -Harassment. Repeatedly sending nasty, mean, an insulting messages. -Denigration. "Dissing" someone online. Sending or posting...

Words: 4129 - Pages: 17

Free Essay

Cruel and Unusual Punishment Clause

...FINAL EXAM Course Name: ________________CRIMINAL LAW CLJ2100________________ School Name: _____________PALM BEACH STATE COLLEGE___________________ Any words, works, or statement are solely my own, And I shall not cheat, take another words, plagiarize or commit any violations of this course, this Professor’s rules, or the University’s Policies, Otherwise seek the consequences of a failure and possible suspension or expulsion. 1 Explain the Eighth Amendment (Cruel and Unusual Punishment Clause). The Cruel and Unusual Punishment Clause can be found in the English Bill of Rights in 1689 and later adopted by the Eighth Amendment to the United States Constitution in 1787. The phrase describes “punishment which is considered unacceptable due to the suffering, pain or humiliation it inflicts on the condemned person”. This amendment also includes the text that “excessive bail shall not be required, nor excessive fines imposed...”. It is thought that defendants who are not bailed have a more difficult time preparing for their defense. And by being “imprisoned” they are therefore being “punished” for the duration. That is why that questions of bail are always to be taken seriously by the courts. However, the Cruel and Unusual Punishment Clause did not make our Founding Fathers necessarily opponents against the Death Penalty. The Crimes Act of 1790 mandated the death penalty for treason, and also the mutilation of the corpse. There is no doubt, our modern courts...

Words: 3204 - Pages: 13

Premium Essay

Civil Liberties and the Book Matched

...this can bring; such as inference of the government in our daily lives and restriction of the fundamental rights that we are entitled to. In the book Matched, the government keeps an eye on every citizen. This constant surveillance is evidence of the lack of privacy going on in their society. The issue of lack of privacy is a major one in the story, and it was an issue that America has had to deal with. I cite the Patriot Act as an example. The purpose of this act was to “deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and for other purposes.” “The Patriot Act allowed federal agents to monitor electronic communications, which includes wireless phones, email, and internet, without much oversight. It also allowed the government to seize business records of...

Words: 1055 - Pages: 5

Premium Essay

Persuasive Essay On Net Neutrality

...not the most, well known Amendment. The freedom of speech, petition, religion, press, and assembly is important to all Americans. However, the government feels that they hold power to monitor content on the internet, on a federal, state, and local level. This has become a recent controversy with Net Neutrality being in danger of being removed, the growing social media industry, and internet filters that are being put in place by school districts. There are implied powers involved in the Constitution, but with the creation of Net Neutrality, there should be no need for the use of any implied powers. A line that has been drawn, and no level of government should cross that line unless there is someone who is truly suspect as to being a threat to the safety of the citizens of the United States....

Words: 802 - Pages: 4

Premium Essay

Technology Acts

...development of two acts: Children’s Internet Protection Act- 2000, and No Electronic Theft (NET) Act- 1997. Children’s Internet Protection Act The internet has become a very critical tool for children’s learning and success. It has become a threshold to a variety of expression and skills; however, while positive avenues are available to children via internet so are negative. Children are exposed to inappropriate material and materials that can be potentially harmful: promotion of violence, hate sites, pornography, etc… According to Department of Commerce (2003), “In October 2000, Congress passed the Children’s Internet Protection Act (CIPA), which requires schools and libraries that receive federal funds for discounted telecommunications, internet access, or internal connections services to adopt an internet safety policy and employ technological protections that block or filter certain visual depictions deemed obscene, pornographic, or harmful to minors” (para. 3). This implementation was successful after previous Congressional attempts to protect children from inappropriate content online. Congress' first attempt was in 1996 by passing the Communications Decency Act (CDA). The CDA restricted the introduction to inappropriate or obscene material via the internet to individuals under the age of 18; however, the Supreme Court found the law to be unconstitutional. According to Department of Commerce (2003), "The law violated free speech...

Words: 754 - Pages: 4

Premium Essay

The Importance Of Net Neutrality

..."The government has the duty to monitor internet content to the extent of our nation’s safety. If what is being posted or uploaded on the internet is not harmful to our nation’s security and safety and isn’t against the laws established in our country, it shouldn’t be filtered or censored. Net neutrality, according to the ACLU, is being taken away by the Trump FCC, our government. This I believe would give the government too much power over something that was supposed to be free for the people to access, within the laws of our country. Without net neutrality, big business would have the ability to control our access to certain websites and information based on how they felt about the topic. The government in turn would be able to control those businesses and that is too much control over something that was invented for the free-sharing of information across a broad scale....

Words: 672 - Pages: 3

Free Essay

Copa and Cipa

...are operating an online service or commercial web site aimed at children 13 or less you must comply with the Children’s Online Privacy Act (COPA). To determine this the FTC considers a lot of different factors these include but are not limited to; age of models on the site, subject matter, visual and audio content and whether the site is using animated characters at all. To determine who the operator is the FTC will consider who owns and controls the information and what role the web site plays in its collection of information and maintaining. For CIPA Schools and Libraries may not receive discounts unless they certify that they have an internet safety policy that also includes technology protection measures. The protection must include filters to block obscene and harmful to minors. Before adapting this safety policy they must give a reasonable notice and hold a minimum of one public hearing to address the Proposal. The proposal must address the following; * Access to minors * The security of minors when they use e-mail, chat rooms or other electronic communication. * Unauthorized access by minors including hacking. * Unauthorized disclosure, use or discrimination * Measures to restrict minors access Schools and libraries get E-Rate funding only if they certify compliance with CIPA. The operator for COPA must post the privacy notice on the homepage of their website. They want to make sure it’s noticeable and a way to do...

Words: 712 - Pages: 3

Free Essay

Acceptable Use Policy

...21st Century Safety in Schools Connie Holden Eastern New Mexico University 21st Century Safety in Schools The Internet is a tool for both educators and students. Just as with any tool, especially power tools, we need to read safety precautions before using it. A person who uses a power tool without reading safety guidelines first takes a chance of getting hurt. Although using the Internet may not be physically harmful there still needs to be a set of safety guidelines to adhere to. In 2000 Congress enacted The Children’s Internet Protection Act (CIPA) to address this safety. CIPA imposes that all schools and libraries that receive Internet services at a discounted rate follow certain guidelines to help keep students safe while online. In order to continue receiving the discounted rate schools and libraries must certify that they have an Internet safety policy that includes technology protection measures. Websites that are obscene, contain child pornography, or are harmful to minors must be either blocked or filtered. The policy that schools use is The Acceptable Use Policy (AUP). The Acceptable Use Policy outlines rules regarding internet use so that the students, and staff, are protected. It must address a number of issues including personal safety, illegal activities, system security, privacy, plagiarism, copyright infringement and access to inappropriate materials. In addition, it should make it clear to the student that the school’s technology property is to...

Words: 601 - Pages: 3

Free Essay

Internet Police in China

...article “The Internet police in China: regulation, scope and myths” wrote by Xiaoyan Chen and Peng Hwa Ang, the authors focused on the analysis of the Chinese Internet censorship and the role of the internet police in China. With the emergence and the development of the Internet, the number of Internet users grew rapidly in China and reached 384 million in 2009, which is larger than the US Internet users. In order to keep the Internet community in order, the Chinese government has put a lot of effort to regulate and control the online space. The Internet police was one of the efforts that the Chinese government has been made to regulate and manage the Internet (Chen& Ang, 2011). The public Information and Internet Security Supervision Bureau (PIISS) was set up in 1998, which intended as an online police unit to manage cyber space. This bureau was established at provincial, prefecture and county levels, which contains around 20000 Internet police everywhere in Mainland China (Chen& Ang, 2011). “Internet police work can be understood as supervision of the safety of the computer network and Internet systems, administrative regulation on Internet activities and detection of computer and Internet crimes” (Chen& Ang, 2011, P. 42). For example, to detect and prevent the transmission of the computer viruses, and to protect the security of the important computer information systems are within the scope of the supervision of the Internet police. Meanwhile, the Internet police has...

Words: 858 - Pages: 4

Premium Essay

Obama

...Barack Obama’s speech on Gun violence Gun violence is a huge problem in the United States of America. Each year thousands of people are victims of mass shooting, and mass shooting is a growing problem. Many Americans see this problem but the gun law stays the same. The gun law and the gun culture go way back in American history, and many Americans feel it is their right to bear arms because it is written in the second amendment from 1791. But times have changed, and today most Americans believe that the gun law needs to be stricter. Therefore it can be difficult to understand why nothing happens when the majority of the US population supports stricter gun laws. So why is it that the law cannot be changed? And what can the politicians do to end this nightmare? Barack Obama is trying to highlight this issue in his newest speech on gun violence – “Remarks by the President on Common-Sense Gun Safety Reform” – that he presented at the White House Press Conference on the 5th of January 2016. This paper analyses Obama’s speech. The analysis will focus on the communicative and rhetorical devices in the speech. The sender of the speech is Barack Obama, the current president in the USA. He is representing his own party, the Democrats. Obama is speaking for all Americans and against the gun lobbyists. The speech is built on the foundation of all the gun tragedies, which have happened over the last years, and therefore makes use of al lot of pathos. He expresses his compassion for...

Words: 1219 - Pages: 5

Free Essay

Childs Internet and Electronic Communication Acts

...Childs Internet and Electronic Communication Acts Technology and new forms of communication has continued to evolve and improved our everyday lives. With the advancement of new technology, new laws are evolved to protect those who use it and prosecute to those who abuse it. In this paper, I will be discussing the Children’s Internet Protection Act (CIPA) as well as the Electronic Communication Privacy Act (ECPA). I will state the legal facts of these two topics as well as discuss the ethics that surround the legal issues and how those issues affect us today. The Facts The Children’s Internet Protection Act (CIPA) of 2000 is an Act that is applied to public schools or libraries to receive federal funding while in compliance with technological safety measures. Over the past years, more than $190 million has disbursed to more than 5,000 public libraries through federal programs called E-rate where discounts are given on telecommunications and Internet access under certain conditions (CIPA, 2001). Such conditions that US Supreme Court has argued and agreed that require public libraries and schools must enforce certain software control to protect minors from harmful materials and block pornographic Websites (Mark, 2002). Ethical Issues However, blocking Websites containing protected speech can be an ethical issue in violating our Constitutional right of our First Amendment, our Freedom of Speech. Also filtering or blocking does not always protect children from harmful material...

Words: 734 - Pages: 3

Premium Essay

Persuasive Essay On Cyberbullying

..." Throughout the United States, the conflict between freedom of speech and internet safety is rapidly becoming more prevalent. As tragic cases of cyberbullying, like that of Amanda Todd, rise to the headlines of American newspapers, and centers of crime like the infamous drug website, the Silk Road, cause mayhem, governing bodies across every level of government seek a solution. The government is rapidly being forced to decide whether it must increase control, or let things continue as they will. But higher government control has the very real possibility of destroying free speech as we know it, and in the process, destroying the ethics that our founding fathers held so high. This pressing problem is visible in the trial of Michelle Carter,...

Words: 757 - Pages: 4

Premium Essay

Do Government Internet Surveillance Efforts Threaten Privacy and Civil Rights?

...government Internet surveillance efforts threaten privacy and civil rights. It is a basic human right to allow someone to keep something secret to oneself. We owe no explanation or clarification to anyone for our private matters. With the governments increasing efforts in Internet surveillance this basic right is violated. It is as if we have become completely transparent to people we know nothing about ourselves. New technological tools are vulnerable to exploitation by governments aiming to crush dissent and deny human rights. All governments struggle to balance a need to deal with serious issues such as security, hate speech and child safety for their citizens but in repressive societies, these concerns often serve as convenient pretext to engage in censorship or surveillance of the internet that violates the rights and privacy of users and threatens the free flow of information. We all are aware that he internet and other communication technologies have created a vast amount of opportunities to share information, opening-up paths for pro democracy groups, activists, journalists and individuals around the world to share their opinion and judgment on various policies made by their respective government. I understand why monitoring people’s activity may seem as the right thing to do to ensure security but it is not of utmost importance; there are various other problems that need to be fixed at grass-root levels rather than monitoring people’s activity over the internet and in...

Words: 654 - Pages: 3

Premium Essay

Case Study: Tinker V. Des Moines Independent Community Schools

...Tinker v. Des Moines Independent Community School of 1969 was a defining moment in American education history that ultimately gave school districts power against entitled student free speech. The court decided that “students do not shed their constitutional rights to freedom of speech or expression at the schoolhouse gate”, but rather enter into a special environment in which school officials may “prohibit student speech if that speech would substantially interfere with the work of the school or impinge upon the rights of other students” (Willard 2007). Although this court case was over 40 years ago, the same rules can still be applied to the battle against cyberbullying in the digital world that we live in today. Students are as connected...

Words: 2061 - Pages: 9