Digital Safety

Req 7 — Smart Online Safety

7.
Online Safety. Discuss the following with your counselor:

Online safety is real-world safety. A stolen password can drain money. A fake message can steal an account. A shared photo can damage trust, reputation, and mental health. This requirement uses an inherited-action structure because each topic asks you to discuss how a different kind of digital risk works and how to lower it.

Requirement 7a

7a.
Online Safety. Discuss How to avoid being the victim of online crimes.

How online crimes usually start

Most online crimes do not begin with a movie-style hacker attack. They start with a trick: a fake message, a fake login page, a fake giveaway, or pressure to click fast before you think.

Habits that reduce your chances of becoming a victim

Official Resources

Protect Your Personal Information From Hackers and Scammers (website) FTC guidance on passwords, personal information, device security, and scam prevention. Link: Protect Your Personal Information From Hackers and Scammers (website) — https://consumer.ftc.gov/protect-your-personal-information-hackers-scammers#keep
Passkeys Explained in Under 4 Minutes (video)

Requirement 7b

7b.
Online Safety. Discuss Common online financial scams.

Scams usually target emotion first

Financial scams often work by making you excited, scared, embarrassed, or rushed. Once emotion takes over, people stop checking details.

Common examples

How to spot them earlier

Slow down. Check the sender, website address, reviews, and whether the payment method has buyer protection. Real businesses do not need panic to make a sale.

Official Resources

Common Online Scams (video)
10 Common Internet Scams (video)

Requirement 7c

7c.
Online Safety. Discuss Effective online security.

Build layers instead of trusting one tool

Effective online security is not one magic app. It is a stack of habits:

Think of accounts like doorways

Your email account is especially important because it can reset many other accounts. Protecting email well protects the rest of your digital life too.

A strong online security baseline

Simple habits that protect most people from common attacks
  • Protect the main account: Secure your email first.
  • Add a second layer: Use two-factor authentication or passkeys.
  • Patch known problems: Install updates on phones, computers, and apps.
  • Review what you share: Lock down privacy settings and remove unused apps with access to your accounts.

Official Resources

Effective Online Security (video)

Requirement 7d

7d.
Online Safety. Discuss Identity theft and how to prevent it.

What identity theft is

Identity theft happens when someone uses your personal information to pretend to be you. That might mean opening accounts, making purchases, filing false claims, or taking over an existing account.

How to prevent it

Official Resources

Preventing Identity Theft (video)

Requirement 7e

7e.
Online Safety. Discuss How criminals use social media to target victims.

Why social media gives criminals an advantage

Social media reveals routines, interests, friend groups, schools, locations, and emotional pressure points. That information can help criminals pretend to know you, guess security questions, or choose the best time to scam or approach you.

Safer social media habits

A mock social media post with risky details like live location, school logo, and travel plans highlighted

Official Resources

How Criminals Use Social Media (video)

Requirement 7f

7f.
Online Safety. Discuss How bullying, texting, and sharing photos can become crimes.

When online behavior crosses the line

Not every mean message is automatically a crime, but some digital behavior can become criminal depending on what is shared, how often it happens, and whether threats, harassment, coercion, or exploitation are involved.

Examples of risky behavior

Why this matters

A message sent in ten seconds can have legal, school, and personal consequences that last much longer. Digital evidence also sticks around. Screenshots, cloud backups, and forwarded images make “I deleted it” a weak defense.

Online safety is really about pattern recognition: urgency, secrecy, oversharing, weak boundaries, and false trust. Next, you will use the same kind of practical thinking while moving through cities, vehicles, stations, and airports.