Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Activity 1: Your Digital Footprint Name __________________

Part A: Google Yourself


In a new browser window, go to www.Google.com and then search your name. If you have a common
name, it may be helpful to add your city to the search keywords. It is valuable to know what
information is available to others to view online. Answer the following questions:

How many results came up when you Google your name? ________________

How many are specifically you? _______________

What kinds of information came up (i.e. team sports, awards, articles, social media connections)?

Could someone track you down with the information that came up? ________________

Can someone find your address, phone number, school or other information that would lead them
to you? ______

How many of the results are from postings about you that were done by someone else?  _______

Did they get my permission to post it first? _________

Is there anything that you didn’t realize was posted publicly? __________

Did anything surprise you? ________

Part B: Social Media


Search your name on social media websites like Facebook and Twitter.  

What can people find out about you there? _______

Can they track you down? _______

Do you wish that something was not posted? _________ (yes or no)

Are there any surprises? __________


What would you like to change?

Activity 2: Planning for Your Safety Online


Part A: Online Safety
Review the resources provided in this unit. Write about 5 things you must do to protect yourself
online and why you must do each.

Five things I must do to protect myself online Why it is important that I do this
1.
2.
3.
4.
5.

Part B: Social Media Safety


Social Media opportunities are based upon rapid-fire short responses. The problem with this is that
sometimes people do not think before responding, and they put their safety and identity in
jeopardy.

1. Predators – people who use false identity to troll social media sites in hopes of establishing a
sense of trust so that they can meet and abuse another human being. What is your plan for
protecting yourself from predators?

2. (Over) Sharing Information – telling others where you live, where your friends are meeting,
where you go to school, or posting your phone #, address put you in a dangerous situation.
What can you do to make sure you and your friends are safe?

3. Hidden Details in Photos – photos contain EXIF information (about the camera used to take
the photo). If you are using your cell phone, that gives others (who know how to retrieve it)
information about access to your phone and your location. What can you do to make sure
you and your friends are safe?
4. Cyberbullying – it might seem like fun to put others down online, and it often starts out as
friendly teasing, but things can turn ugly fast and words can be easily misinterpreted. What
can you do to make sure your words and those of your friends are not perceived as cyber-
bullying?

5. A Picture Paints a Thousand Words – a picture can be just as damaging to you or another
person as words, sometimes even more. What can you do to avoid damage to yourself and
others via social media?

You might also like