際際滷

際際滷Share a Scribd company logo
ONLINE PRIVACY

           ONLINE PRIVACY: Involves
             the right or mandate of
             personal privacy concerning
             the storing, repurposing,
             providing to third-parties,
             and displaying of information
             pertaining to oneself via the
             Internet.
RULE #1
PICTURES EASILYAND VIDEOS CAN EASILY BE
 COPIED AND SHARED WITHOUT YOU KNOWING.
RULE #2
 YOU CAN COME ACROSS DISGUTING
SEXUAL PICTURES AND ADVERTISEMENTS
RULE #3
 YOU COULD GIVE AWAY YOUR PERSONAL
 INFORMATION TO SOMEONE YOU DONT
 WANT TO HAVE IT
RULE #4
 YOU CAN END UP IN WEIRD
 CONVERSATIONS THAT CAN BE REALLY
 UNCOMFORTABLE
RULE #5
 PEOPLE CAN TYPE WHATEVER THEY WANT
  BUT IT DOESNT MEAN THAT ITS TRUE!!!!!
RULE #6
  IF YOU END UP SHARING PRIVATE
 INFORMATION, YOU MAY BE IN FOR AN
INCREADIBLY EMBARRASSING MOMENT!
DO YOU THINK WHAT YOU
DO ONLINE IS PRIVATE?
  THE INTERNET IS A PUBLIC PLACE. PARENTS, TEACHERS,
 COACHES, AND ANYONE WHO WANTS TO SEE WHAT YOU DO IN
 SOCIAL NETWORKING SITES, CHATROOMS, NEWGROUPS, ETC.
DO YOU THINK POSTING SEXY POSES OF
YOURSELF ONLINE WILL GET YOU ATTENTION?
DO YOU THINK POPSTING EMBARRASSING
  PICTURES OF OTHERS WILL MAKE THEM
              LOOK BAD?

 IT MAKES   YOU LOOK BAD.
 RESPECTING YOURSELF ALSO MEANS
 RESPECTING OTHERS!!!
DID YOU KNOW???
  IT`S ILLEGAL FOR YOU OR YOUR
FRIENDS TO SEND OUT NAKED PICTURES
           OF YOURSELF!!!

More Related Content

Similar to Online privacy (20)

Test on BB
Test on BBTest on BB
Test on BB
nickstroller
POE
 POE POE
POE
Nolungelo Shongwe
BNC Issue3: Rights in the modern world
BNC Issue3: Rights in the modern worldBNC Issue3: Rights in the modern world
BNC Issue3: Rights in the modern world
The Economist Educational Foundation
Media and Information Literacy RA 10175.pptx
Media and Information Literacy RA 10175.pptxMedia and Information Literacy RA 10175.pptx
Media and Information Literacy RA 10175.pptx
klynth23
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
John Dale Cruz
Online privacy
Online privacyOnline privacy
Online privacy
jo-jo23
LESSON 2 - NETIQUETTE.pptx EMPOWERMENT TECHNOLOGY
LESSON 2 - NETIQUETTE.pptx EMPOWERMENT TECHNOLOGYLESSON 2 - NETIQUETTE.pptx EMPOWERMENT TECHNOLOGY
LESSON 2 - NETIQUETTE.pptx EMPOWERMENT TECHNOLOGY
FrankEsolan
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
Heads up!
Heads up!Heads up!
Heads up!
- Mark - Fullbright
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
Mukarram Dhorajiwala
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
MaImmaConcepcionTros
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
remerosearcenal
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
ssuser482fec
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
jesusmlaz
Socialmediatips
SocialmediatipsSocialmediatips
Socialmediatips
Homelove123
Opsec for families
Opsec for familiesOpsec for families
Opsec for families
Lindy Kyzer
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
jcullishpum
Teens on the net
Teens on the netTeens on the net
Teens on the net
talandronmmp
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
empowerment technology/ RULES AND NETIQUETE lesson 2.pptxempowerment technology/ RULES AND NETIQUETE lesson 2.pptx
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
MariaIvyBonifacio
Media and Information Literacy RA 10175.pptx
Media and Information Literacy RA 10175.pptxMedia and Information Literacy RA 10175.pptx
Media and Information Literacy RA 10175.pptx
klynth23
Online privacy
Online privacyOnline privacy
Online privacy
jo-jo23
LESSON 2 - NETIQUETTE.pptx EMPOWERMENT TECHNOLOGY
LESSON 2 - NETIQUETTE.pptx EMPOWERMENT TECHNOLOGYLESSON 2 - NETIQUETTE.pptx EMPOWERMENT TECHNOLOGY
LESSON 2 - NETIQUETTE.pptx EMPOWERMENT TECHNOLOGY
FrankEsolan
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
MaImmaConcepcionTros
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
remerosearcenal
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
ssuser482fec
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
jesusmlaz
Socialmediatips
SocialmediatipsSocialmediatips
Socialmediatips
Homelove123
Opsec for families
Opsec for familiesOpsec for families
Opsec for families
Lindy Kyzer
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
jcullishpum
Teens on the net
Teens on the netTeens on the net
Teens on the net
talandronmmp
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
empowerment technology/ RULES AND NETIQUETE lesson 2.pptxempowerment technology/ RULES AND NETIQUETE lesson 2.pptx
empowerment technology/ RULES AND NETIQUETE lesson 2.pptx
MariaIvyBonifacio

More from megg16 (14)

His story of video games - copy
His story of video games - copyHis story of video games - copy
His story of video games - copy
megg16
Video game addiction
Video game addictionVideo game addiction
Video game addiction
megg16
Video games
Video gamesVideo games
Video games
megg16
Toyota supra mkiv
Toyota supra mkivToyota supra mkiv
Toyota supra mkiv
megg16
Presentation1
Presentation1Presentation1
Presentation1
megg16
Video games - Megan
Video games - MeganVideo games - Megan
Video games - Megan
megg16
際際滷show - Lil Rat
際際滷show - Lil Rat際際滷show - Lil Rat
際際滷show - Lil Rat
megg16
Meerkats prac slideshow by kelly
Meerkats prac slideshow by kellyMeerkats prac slideshow by kelly
Meerkats prac slideshow by kelly
megg16
Penguins 際際滷 Show Palveer
Penguins 際際滷 Show PalveerPenguins 際際滷 Show Palveer
Penguins 際際滷 Show Palveer
megg16
power point on sarah
power point on sarah power point on sarah
power point on sarah
megg16
Justin bieber
Justin bieberJustin bieber
Justin bieber
megg16
Justin bieber
Justin bieberJustin bieber
Justin bieber
megg16
Online privacy Josh's Version
Online privacy Josh's VersionOnline privacy Josh's Version
Online privacy Josh's Version
megg16
Online privacy
Online privacyOnline privacy
Online privacy
megg16
His story of video games - copy
His story of video games - copyHis story of video games - copy
His story of video games - copy
megg16
Video game addiction
Video game addictionVideo game addiction
Video game addiction
megg16
Video games
Video gamesVideo games
Video games
megg16
Toyota supra mkiv
Toyota supra mkivToyota supra mkiv
Toyota supra mkiv
megg16
Presentation1
Presentation1Presentation1
Presentation1
megg16
Video games - Megan
Video games - MeganVideo games - Megan
Video games - Megan
megg16
際際滷show - Lil Rat
際際滷show - Lil Rat際際滷show - Lil Rat
際際滷show - Lil Rat
megg16
Meerkats prac slideshow by kelly
Meerkats prac slideshow by kellyMeerkats prac slideshow by kelly
Meerkats prac slideshow by kelly
megg16
Penguins 際際滷 Show Palveer
Penguins 際際滷 Show PalveerPenguins 際際滷 Show Palveer
Penguins 際際滷 Show Palveer
megg16
power point on sarah
power point on sarah power point on sarah
power point on sarah
megg16
Justin bieber
Justin bieberJustin bieber
Justin bieber
megg16
Justin bieber
Justin bieberJustin bieber
Justin bieber
megg16
Online privacy Josh's Version
Online privacy Josh's VersionOnline privacy Josh's Version
Online privacy Josh's Version
megg16
Online privacy
Online privacyOnline privacy
Online privacy
megg16

Recently uploaded (20)

BoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is DynamicBoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is Dynamic
Ortus Solutions, Corp
Wondershare Dr.Fone Crack Free Download 2025
Wondershare Dr.Fone Crack Free Download 2025Wondershare Dr.Fone Crack Free Download 2025
Wondershare Dr.Fone Crack Free Download 2025
maharajput103
What Makes "Deep Research"? A Dive into AI Agents
What Makes "Deep Research"? A Dive into AI AgentsWhat Makes "Deep Research"? A Dive into AI Agents
What Makes "Deep Research"? A Dive into AI Agents
Zilliz
DevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdfDevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdf
Justin Reock
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog GavraReplacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
ScyllaDB
1.1. Evolution-and-Scope-of-Business-Analytics.pptx
1.1. Evolution-and-Scope-of-Business-Analytics.pptx1.1. Evolution-and-Scope-of-Business-Analytics.pptx
1.1. Evolution-and-Scope-of-Business-Analytics.pptx
Jitendra Tomar
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-StoryRevolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
ssuser52ad5e
Deno ...................................
Deno ...................................Deno ...................................
Deno ...................................
Robert MacLean
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & TipsTrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc
Fl studio crack version 12.9 Free Download
Fl studio crack version 12.9 Free DownloadFl studio crack version 12.9 Free Download
Fl studio crack version 12.9 Free Download
kherorpacca127
World Information Architecture Day 2025 - UX at a Crossroads
World Information Architecture Day 2025 - UX at a CrossroadsWorld Information Architecture Day 2025 - UX at a Crossroads
World Information Architecture Day 2025 - UX at a Crossroads
Joshua Randall
Computational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the WorldComputational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the World
HusseinMalikMammadli
UiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilitiesUiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilities
DianaGray10
THE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIA
THE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIATHE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIA
THE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIA
Srivaanchi Nathan
DealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures CapitalDealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures Capital
Yevgen Sysoyev
Future-Proof Your Career with AI Options
Future-Proof Your  Career with AI OptionsFuture-Proof Your  Career with AI Options
Future-Proof Your Career with AI Options
DianaGray10
Field Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci ResearchField Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci Research
Vipin Mishra
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
Technology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptxTechnology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptx
kaylagaze
Transform Your Future with Front-End Development Training
Transform Your Future with Front-End Development TrainingTransform Your Future with Front-End Development Training
Transform Your Future with Front-End Development Training
Vtechlabs
BoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is DynamicBoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is Dynamic
Ortus Solutions, Corp
Wondershare Dr.Fone Crack Free Download 2025
Wondershare Dr.Fone Crack Free Download 2025Wondershare Dr.Fone Crack Free Download 2025
Wondershare Dr.Fone Crack Free Download 2025
maharajput103
What Makes "Deep Research"? A Dive into AI Agents
What Makes "Deep Research"? A Dive into AI AgentsWhat Makes "Deep Research"? A Dive into AI Agents
What Makes "Deep Research"? A Dive into AI Agents
Zilliz
DevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdfDevNexus - Building 10x Development Organizations.pdf
DevNexus - Building 10x Development Organizations.pdf
Justin Reock
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog GavraReplacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
Replacing RocksDB with ScyllaDB in Kafka Streams by Almog Gavra
ScyllaDB
1.1. Evolution-and-Scope-of-Business-Analytics.pptx
1.1. Evolution-and-Scope-of-Business-Analytics.pptx1.1. Evolution-and-Scope-of-Business-Analytics.pptx
1.1. Evolution-and-Scope-of-Business-Analytics.pptx
Jitendra Tomar
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-StoryRevolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
ssuser52ad5e
Deno ...................................
Deno ...................................Deno ...................................
Deno ...................................
Robert MacLean
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & TipsTrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc Webinar - Building your DPIA/PIA Program: Best Practices & Tips
TrustArc
Fl studio crack version 12.9 Free Download
Fl studio crack version 12.9 Free DownloadFl studio crack version 12.9 Free Download
Fl studio crack version 12.9 Free Download
kherorpacca127
World Information Architecture Day 2025 - UX at a Crossroads
World Information Architecture Day 2025 - UX at a CrossroadsWorld Information Architecture Day 2025 - UX at a Crossroads
World Information Architecture Day 2025 - UX at a Crossroads
Joshua Randall
Computational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the WorldComputational Photography: How Technology is Changing Way We Capture the World
Computational Photography: How Technology is Changing Way We Capture the World
HusseinMalikMammadli
UiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilitiesUiPath Document Understanding - Generative AI and Active learning capabilities
UiPath Document Understanding - Generative AI and Active learning capabilities
DianaGray10
THE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIA
THE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIATHE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIA
THE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIA
Srivaanchi Nathan
DealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures CapitalDealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures Capital
Yevgen Sysoyev
Future-Proof Your Career with AI Options
Future-Proof Your  Career with AI OptionsFuture-Proof Your  Career with AI Options
Future-Proof Your Career with AI Options
DianaGray10
Field Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci ResearchField Device Management Market Report 2030 - TechSci Research
Field Device Management Market Report 2030 - TechSci Research
Vipin Mishra
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
Technology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptxTechnology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptx
kaylagaze
Transform Your Future with Front-End Development Training
Transform Your Future with Front-End Development TrainingTransform Your Future with Front-End Development Training
Transform Your Future with Front-End Development Training
Vtechlabs

Online privacy

  • 1. ONLINE PRIVACY ONLINE PRIVACY: Involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet.
  • 2. RULE #1 PICTURES EASILYAND VIDEOS CAN EASILY BE COPIED AND SHARED WITHOUT YOU KNOWING.
  • 3. RULE #2 YOU CAN COME ACROSS DISGUTING SEXUAL PICTURES AND ADVERTISEMENTS
  • 4. RULE #3 YOU COULD GIVE AWAY YOUR PERSONAL INFORMATION TO SOMEONE YOU DONT WANT TO HAVE IT
  • 5. RULE #4 YOU CAN END UP IN WEIRD CONVERSATIONS THAT CAN BE REALLY UNCOMFORTABLE
  • 6. RULE #5 PEOPLE CAN TYPE WHATEVER THEY WANT BUT IT DOESNT MEAN THAT ITS TRUE!!!!!
  • 7. RULE #6 IF YOU END UP SHARING PRIVATE INFORMATION, YOU MAY BE IN FOR AN INCREADIBLY EMBARRASSING MOMENT!
  • 8. DO YOU THINK WHAT YOU DO ONLINE IS PRIVATE? THE INTERNET IS A PUBLIC PLACE. PARENTS, TEACHERS, COACHES, AND ANYONE WHO WANTS TO SEE WHAT YOU DO IN SOCIAL NETWORKING SITES, CHATROOMS, NEWGROUPS, ETC.
  • 9. DO YOU THINK POSTING SEXY POSES OF YOURSELF ONLINE WILL GET YOU ATTENTION?
  • 10. DO YOU THINK POPSTING EMBARRASSING PICTURES OF OTHERS WILL MAKE THEM LOOK BAD? IT MAKES YOU LOOK BAD. RESPECTING YOURSELF ALSO MEANS RESPECTING OTHERS!!!
  • 11. DID YOU KNOW??? IT`S ILLEGAL FOR YOU OR YOUR FRIENDS TO SEND OUT NAKED PICTURES OF YOURSELF!!!