The basic presentation covers 3 core topics dealing with Internet safety. Each presentation will be customized in order to fit your needs. We can also customize the program to fit specific circumstances your school/organization may be facing.
MANAGING YOUR DIGITAL REPUTATION
We are now in a world where everyone has two reputations, a “Real World” reputation and a “Digital Reputation”. During the presentation, real life examples are provided to discover how your “Digital Reputation” can affect your “Real World” reputation. The presentation then offers necessary up-to-date solutions to managing your “Digital Reputation.”
"Cyber-bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by someone using the Internet, mobile devices and/or other interactive digital technologies. The presentation focuses on exposing the latest trends and techniques used to cyber-bully someone. Learn more about the newest tricks, apps and websites and how to properly deal with instances of cyber-bullying.
SOCIAL NETWORKING AND DIGITAL FOOTPRINTS
Just telling a person to be careful out there is no longer enough. Social Networking websites such as Facebook have been singled out as the greatest contributors to creating digital reputations. As technology evolves, so do the challenges tech-users face. The goal of this section is to provide answers and solutions to the most recent changes in technology. We teach participants how to effectively manage their digital footprints in order to best reduce the chances of something being posted now affecting them in the future.
TECH DATING ABUSE
Thirty text messages an hour. Dozens of cell phone calls through the night. Embarrassing pictures and comments posted on the Internet for the world to see. In this section, we identify healthy and unhealthy relationships and how technology has made it easier for high school and college students to find themselves in an unhealthy relationship.
GANGS IN CYBERSPACE
We expose how gangs are structured, how gangs recruit, how gang members can be identified by law enforcement, and how the information from your digital life can affiliate you with a gang.
Click here to See products and services