Utah Education Network
Resources created or licensed by the Utah Education Network
Listen in as 15-year-old Haley has a conversation with the Internet. Along the way, she learns a few things about Internet safety.
The Internet can be a cool place, but like in the real world, everyone needs help to stay safe online. This video encourages teens to reach out to the people they trust if they ever experience anything that makes them feel weird or uncomfortable.
Being helpful and kind online is the best way to keep the Internet safe and fun for everybody. This video helps young children understand why it’s important to treat others how they want to be treated, even when they’re online.
This video clip addresses how kids are using cell phones today and consequences of kids taking nude photos. Kids taking these kind of photos of themselves or others under the age of 18 is considered manufacturing child pornography which is a felony in Utah. Sending this kind of photo is considered distributing child pornography. Having this kind of photo on your cell phone or computer is considered possession of child pornography. Once a photo is e-mailed or posted on the Internet it is virtually impossible to control how it is used and distributed.
When Alex runs into a bully on the playground, he knows what to do. But how can Alex handle the bully when he starts posting mean messages and texting threats? This video gives kids strategies for handling cyber bullies, including saving copies of inappropriate messages and telling a trusted adult.
How should Joe deal with Lamer Bill’s threatening emails, texts and web posts? This video explains what cyber bullying is and gives a simple, solid strategy for handling it: save the messages and tell a trusted adult.
A special program for parents that looks at ways to keep teens and children safe on the Internet. Produced by KUED in February 2007, the program features a panel of experts and a studio audience.
Would you drive blindfolded? Probably not. Yet driving while distracted by mobile phone conversations or texts is like putting on a virtual blindfold. This video explains why drivers should curb mobile devices.
This video clip addresses the potential dangers of kids meeting an online predator. It shows some of the grooming behaviors that online predators use to gain kids trust and their intent to eventually meet in real life.
With mobile devices and computers everywhere, it’s important that adults understand what kids are doing in the virtual world. This video introduces viewers to NetSafe Utah, a program with trainings, videos, links to web resources and more that can help parents, grandparents, caregivers and teachers keep kids safe online.
This video clip addresses how kids use online gaming to not only have fun but to also socialize with friends and others. Examples of these games include World of War Craft, Runescape, and Second Life. A scenario is played out with a girl teen whose screen name is "Tiffanonly" and how she meets a friend, "Rockman" while gaming online. This scenario shows how easily an online predator can find enough information about Tiffanonly to eventually track down where she lives. It also shows what she could have done to avoid becoming a potential victim.
This video clip addresses basic terms regarding today?s technology such as computers, the Internet, e-mail, instant messaging, and texting. A glimpse of a typical teenager's day is explored with respect to their online activities. In addition, a brief overview of the benefits and dangers are looked at with suggestions on what parents can do to help them create a safer environment at home.
What a day! You're out with your friends at the mall, then at the water park, then at a concert. You're also sharing this awesomeness on Facebook and Twitter by uploading photos on the go. But there's something wrong with this picture. Did you know that sharing your photos can be dangerous, especially when you do it from a smartphone? Here's why: Most smartphones use technology that tracks your exact location at all times. This is helpful when you're trying to get directions to the water park on a map, but it could get you into trouble when it comes to your photos. Many smartphones attach a little piece of information to every picture that tells exactly where the picture was taken and when. This is called Geotagging, and when you share a photo, your location is included with it.
This video clip addresses the importance of parents and their children communicating with one another about Internet use at home and elsewhere. Rules on Internet use should be discussed and agreed upon. For example, what web sites are okay to visit, who is okay to communicate with, and where should the computer be located (i.e., in a highly visible area of the home and not in a child's bedroom). One good way for parents and their kids to communicate is for the kids to show their parents what they are doing on the Internet.
Connecting with friends online can be a lot of fun—but when you don’t know someone in the real world, you can’t be sure who they are. This video gives kids a simple, sensible rule for deciding how to choose online friends: stick with the friends you know in the real world to stay safe and keep things fun.
This video clip addresses the differences between how parents and kids use technology today. Most parents tend to use the Internet to retrieve information while most kids use it to connect with friends through instant messaging and texting. With kids having grown up with technology there seems to be a generation gap with respect to adults and kids use of technology. For example, kids appear to be able to multi-task quite well such as doing homework while listening to music/tv and instant messaging/texting with their friends.
Hoping to impress his friends, Alex is thinking of posting a picture of himself online. This video helps kids understand why they should be careful when taking, sharing and receiving digital pictures.
Posting a picture takes only a second but it lasts a lifetime with social media. This video invites teens to consider the consequences of sharing inappropriate photos that can be copied, altered and viewed by future employers.
Open Wi-Fi networks are convenient, but they can also expose a computer to hackers. This video describes the precautions that allow for safe use of open Wi-Fi.