Accountability & responsibility in a digital world | Paul Davis | TEDxStMaryCSSchool

TEDx Talks
6 Jul 201513:43

Summary

TLDRThe speaker shares a personal journey from receiving a computer at age 12 to a 26-year career in tech. He emphasizes the importance of online safety, digital responsibility, and the impact of digital trails and footprints. He urges students to respect technology, as misuse can lead to severe consequences, including criminal charges. The talk concludes with advice on dealing with cyberbullying and the importance of maintaining a positive online reputation for future opportunities.

Takeaways

  • 💻 The gift of a computer at a young age sparked the speaker's interest in technology, leading to a lifelong career in IT.
  • 🔧 The speaker emphasizes the importance of learning and using technology responsibly, inspired by his mother's values.
  • 👨‍👧 The speaker's life changed when he started educating children and parents about online safety, which became a rewarding endeavor.
  • 🏫 The speaker believes that parents and educators have a crucial role in guiding children to use technology safely and responsibly.
  • 📢 He argues against the idea of 'accidental' cyberbullying, stating that every digital action is intentional and leaves a trace.
  • 👮‍♂️ The speaker highlights the legal implications of online actions, including the potential for criminal charges and the involvement of law enforcement.
  • 👪 He stresses that devices are owned by parents, not children, and that parents are ultimately responsible for the technology's use.
  • 🔗 The speaker explains the concepts of 'digital trails' and 'digital footprints,' illustrating how every online action is recorded.
  • 🕵️‍♂️ He warns that digital evidence can be used to track and identify individuals involved in cyberbullying or other online misconduct.
  • 📚 The speaker encourages students to consider their reputation and the long-term consequences of their online behavior.
  • 🤝 He concludes by urging students to respect their parents and use technology in a way that would make them proud.

Q & A

  • What was the initial reason the speaker's mother bought him a computer?

    -The speaker's mother bought him a computer thinking he was going to play games on it.

  • How did the speaker's early experience with the computer influence his career path?

    -The speaker started coding immediately after receiving the computer, which led him to explore technology, programming, and circuit boards, eventually leading to his first job in tech at under 20 years old and a 26-year career in information technology.

  • What event at the speaker's daughter's school prompted a significant change in his life?

    -The speaker's life turned around when the principal at his daughter's school talked to him about why kids get in trouble using technology, leading him to speak to kids, parents, and various organizations about online safety.

  • How many people has the speaker reportedly spoken to regarding online safety?

    -The speaker has spoken to over 25,000 kids and over 1,200 principals, as well as various other organizations including the Ontario provincial police and the Department of National Defense.

  • What does the speaker believe is the most rewarding aspect of his current work?

    -The speaker finds education and giving knowledge back to the community, similar to what his mother did for him, the most rewarding aspect of his work.

  • What is the speaker's stance on the responsibility for children getting in trouble online?

    -The speaker believes that the responsibility lies with the parents, who are supposed to guide their children in the use of technology.

  • According to the speaker, what are the two action items involved in cyberbullying?

    -The two action items involved in cyberbullying are: 1) creating the harmful content by typing or taking a picture, and 2) transmitting the content by posting or sending it to another device.

  • Why does the speaker emphasize that cyberbullying is not accidental?

    -The speaker emphasizes that cyberbullying is not accidental because it involves intentional actions: creating and transmitting harmful content, which leaves digital trails.

  • What does the speaker suggest about the ownership of technology used by children?

    -The speaker suggests that parents own the technology used by children, as they are the ones who make the financial transactions, sign contracts, and pay the bills.

  • What is the difference between 'digital trails' and 'digital footprints' according to the speaker?

    -According to the speaker, 'digital trails' refer to the paths that data takes as it is transmitted from one device to another, while 'digital footprints' are the physical records of data written to a hard drive, memory card, or cloud storage.

  • What advice does the speaker give to students who experience cyberbullying?

    -The speaker advises students to not respond to the bully, but to collect evidence such as screenshots and bring it to a trusted adult for help.

  • How does the speaker connect a person's online activity with their future opportunities?

    -The speaker connects online activity with future opportunities by explaining that employers can look up a candidate's online presence and judge them based on their digital trails, which can potentially supersede their educational qualifications.

Outlines

00:00

💻 Early Exposure to Technology and Its Impact

The speaker reflects on how receiving a computer at the age of 12 led to a lifelong career in technology. Initially, the mother's intention was for gaming, but it became a tool for the speaker to explore programming and circuit boards. This early start in technology allowed the speaker to secure a job in a tech firm before turning 20. The speaker emphasizes the importance of parental guidance in technology use, drawing from personal experience and advocating for open conversations about online safety with both kids and parents.

05:00

👥 The Consequences of Digital Actions and Cyberbullying

The speaker delves into the concept of digital trails and footprints, explaining how online actions leave permanent records that can be traced and investigated. Using various examples, such as text messages, emails, and social media posts, the speaker illustrates the permanence of digital communication and its potential legal implications. The talk also addresses the issue of cyberbullying, stressing that it is intentional and not accidental, and encourages students to be respectful and accountable for their online behavior.

10:00

🚨 The Legal and Ethical Implications of Online Behavior

This section of the script discusses the serious nature of digital actions, emphasizing that they can lead to legal consequences, especially in cases of cyberbullying. The speaker advises students on how to handle being cyberbullied, urging them to collect evidence and report it to a trusted adult. The speaker also warns about the long-term effects of one's online reputation, which can impact future job prospects, and concludes by reminding students to consider their parents' values and the responsibility that comes with using technology.

Mindmap

Keywords

💡Coding

Coding refers to the process of writing instructions in a programming language to create software or applications. In the video, the speaker's journey into technology began with coding at a young age, which was facilitated by receiving a computer from his mother. This early start in coding allowed the speaker to explore various aspects of technology and eventually led to a career in information technology.

💡Technology

Technology encompasses the tools, systems, and methods used to solve problems and accomplish tasks more efficiently. The speaker's interest in technology was sparked by his initial experience with coding and later expanded to include programming, circuit boards, and other aspects of tech. The video emphasizes the transformative power of technology in the speaker's life and career.

💡Information Technology (IT)

Information Technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit, and manipulate data. The speaker has dedicated his professional life to IT, highlighting the field's importance in modern society. The video underscores the speaker's commitment to IT and its role in shaping his career path.

💡Cyberbullying

Cyberbullying is the use of electronic communication to bully others, typically by sending messages of an intimidating or threatening nature. The speaker addresses the issue of cyberbullying, emphasizing that it is not accidental but intentional and leaves digital trails that can have serious consequences, including legal repercussions.

💡Digital Trails

Digital trails refer to the electronic footprints left behind by individuals when they engage in online activities. The speaker explains that every action online, such as sending a text message or an email, leaves a trace that can be investigated and traced back to the individual. This concept is central to the video's message about the permanence of online actions and their potential consequences.

💡Accountability

Accountability is the responsibility one has for one's actions, especially when they have consequences for others. The speaker discusses the importance of accountability, particularly in the context of online behavior, where individuals must be aware of the impact of their actions and the fact that they can be held responsible for them.

💡Parental Guidance

Parental guidance involves the oversight and direction provided by parents to their children, especially in matters of safety and appropriate behavior. The speaker argues that parents play a crucial role in guiding children on how to use technology responsibly and safely, emphasizing the need for parents to be involved and aware of their children's online activities.

💡Online Safety

Online safety refers to the protection of oneself and one's information while using the internet. The speaker discusses the importance of being safe online, including the need for education on how to avoid cyberbullying and other online threats. The video serves as a call to action for both children and parents to be vigilant about online safety.

💡Intent

Intent refers to the purpose or willingness behind an action. The speaker clarifies that actions such as cyberbullying are not mistakes or accidents but are intentional, with the individual making a conscious decision to harm others. This concept is used to emphasize the seriousness of online actions and the need for individuals to think before they act.

💡Digital Footprints

Digital footprints are the permanent records of one's online activities, including the content they create and interact with. The speaker differentiates between digital trails, which are the paths of online actions, and digital footprints, which are the lasting records left behind. The video highlights the importance of understanding that online actions can leave lasting marks on one's digital reputation.

💡Reputation

Reputation is the belief or opinion about someone's character or actions, often formed based on past behavior. The speaker warns that the actions individuals take online can build their reputation, which can affect future opportunities, such as employment. The video stresses the importance of maintaining a positive digital reputation to avoid potential negative consequences.

Highlights

A 12-year-old's journey into coding began with a computer gifted by his mother, leading to a lifelong career in technology.

The speaker's first job in tech was at a tech firm just under the age of 20, marking the beginning of a 26-year professional dedication to IT.

A pivotal moment occurred when the speaker was asked to address technology misuse in his daughter's school, shifting his focus to online safety.

The speaker emphasizes the importance of parental guidance in children's use of technology, holding them responsible for their children's online actions.

Over 25,000 kids and 1,200 principals have been spoken to by the speaker, highlighting the scale of his educational outreach on technology safety.

The speaker refutes the idea of accidental cyberbullying, asserting that every online action is intentional and leaves a trace.

The concept of 'digital trails' and 'digital footprints' is introduced to explain the permanence of online actions and their potential legal implications.

Examples of digital trails include text messages, emails, and social media posts, all of which can be traced back to the sender.

The speaker clarifies that the cloud is not virtual but a physical hard drive that stores data, leaving a digital footprint.

The importance of respecting technology and its owners is stressed, as misuse can lead to serious consequences, including legal action.

A personal anecdote about a mobility store's policy on phone ownership highlights the legal and financial responsibilities of parents.

The speaker warns against the misuse of technology, stating that it is not a matter of 'if' but 'when' one will be caught for cyberbullying.

Advice for victims of cyberbullying includes documenting evidence and seeking help from trusted adults.

The impact of one's online reputation on future job prospects is discussed, with digital trails potentially overshadowing education.

The speaker concludes by urging students to consider their parents and act in a way that would make them proud when using technology.

Transcripts

play00:05

when I was 12 years old my mother

play00:07

purchased a computer for me thinking

play00:09

that I was going to play games on it

play00:11

when she gave it to me she didn't

play00:13

understand what I was going to do with

play00:14

it and I started coding right away and

play00:17

it's because of my mom and the gift that

play00:19

she gave me that allowed me to in

play00:22

basically explore

play00:24

technology programming circuit boards

play00:28

and it was from that point on after

play00:30

programming and hanging out with

play00:31

like-minded individuals that allowed me

play00:32

to explore my interest even more that I

play00:35

got my first job when I was just under

play00:36

20 years old with a tech firm and I

play00:38

thought this is it my career is going to

play00:40

be in Tech and for the past 26 years

play00:43

professionally I've dedicated my life to

play00:44

information technology and I've always

play00:46

said it's fun but it was four years ago

play00:49

at my daughter's school where the

play00:50

principal talked to me about why kids

play00:51

get in trouble using

play00:53

technology that my life turned around

play00:55

and what I did was I spoke to the kids

play00:56

in my daughter's school about being safe

play00:58

online and I also had a conversation

play01:00

with the principal about speaking to the

play01:01

parents because I've always said the

play01:03

kids and for those at St Mary remember

play01:05

this I don't blame any of you guys for

play01:06

getting in trouble online I've always

play01:08

put the responsibility on parents who's

play01:11

you know they put the technology in your

play01:13

hand and they're supposed to guide you I

play01:14

mean that's our responsibility I said so

play01:16

please let me reach out to these parents

play01:19

along with the kids and he did one thing

play01:21

led to another and you just heard the

play01:22

stats in terms of uh how many kids I've

play01:24

spoken to over 25,000 parents over 1,200

play01:27

principles twice at the Ontario

play01:29

provincial police twice at the

play01:30

Department of National Defense and what

play01:32

I found out 4 and 1/2 years ago as I

play01:34

started speaking is that this is the

play01:36

most rewarding Time of My Life Education

play01:38

and giving knowledge back when my mother

play01:40

gave me I'm now able to give to you and

play01:42

I've always always followed in the

play01:44

footsteps of a mom who at the time was a

play01:47

single mom because my parents had split

play01:49

up and she gave me all the values to

play01:52

move forward in life and every day that

play01:53

I do something I always think about am I

play01:55

going to make my mom proud because she

play01:57

gave me the opportunity to where I am

play01:59

today so having said that at a young age

play02:02

you have a ton of accountability and

play02:04

responsibility the responsibility is

play02:07

yours the accountability is to your

play02:10

parents I speak to principles all the

play02:12

time where I hear stories of kids coming

play02:14

into the office who have participated in

play02:16

cyber building and have said that was a

play02:19

mistake I didn't mean to do that it was

play02:21

an

play02:22

accident and I look at the principles

play02:24

and I say those are pathetic excuses

play02:27

because there's no such thing as

play02:28

accidental cyber bullying or it was M AK

play02:31

I can give you a very simple example of

play02:32

how cyberbullying occurs number one you

play02:34

have to type in or take a picture to do

play02:36

the hurt to initiate the pain that's an

play02:39

action item so if I make an

play02:40

inappropriate comment I've typed that

play02:41

out then I have to actually transmit it

play02:45

meaning I post it or I send it from one

play02:47

device to another device so the person

play02:49

sees it two action items don't equal a

play02:53

mistake or an accident they equal intent

play02:56

meaning it was intentional I met a

play02:59

father who said to me I don't know what

play03:00

my son was thinking when he made that

play03:01

comment and I looked at him I said I

play03:03

know what he was thinking he was

play03:04

thinking about hurting someone because

play03:06

he had to think about it before he typed

play03:07

it and then transmit it so I want to put

play03:10

excuses aside and I want everyone to

play03:12

step up you are empowered with

play03:14

technology that's how privileged you are

play03:16

because you live in the greatest country

play03:17

in the world where your parents have

play03:18

worked so hard to empower you with that

play03:20

technology be respectful because they

play03:22

own it you know before I came over here

play03:25

today I stopped off at a mobility store

play03:27

and I walked in and I said my daughter

play03:29

wants to buy a phone I want to give it

play03:32

to her and I asked the lady how old does

play03:34

she need to be she says 18 I said no I

play03:37

want her to come in I want her to pick

play03:38

she says she has to be 18 so students if

play03:41

I asked you how many of you own your

play03:43

phones the majority will put up your

play03:44

hands the reality is you don't your

play03:47

parents own those devices you see what

play03:48

happened was when you purchased the

play03:49

phone was that your parents made the

play03:53

financial transaction number two they

play03:55

signed the contract with the telephone

play03:57

company cuz you can't cuz you're not an

play03:59

adult number three they pay the monthly

play04:01

bill now you may have earned your money

play04:02

to pay for the phone which I think is

play04:04

responsible and you might actually give

play04:05

them the money every month to pay for

play04:06

the bill but it's their name that is on

play04:08

the contract and makes the financial

play04:10

transactions all the time if a principal

play04:13

confiscates a phone hands it over to a

play04:15

police officer and that police officer

play04:16

investigates it your name doesn't come

play04:18

up your parents name comes up so I

play04:21

always tell kids you love care and

play04:22

respect your parents think about how use

play04:24

these Technologies when you go online

play04:26

because every time you go online you

play04:28

leave digital Trails of all your actions

play04:31

now some people say digital Trails

play04:33

digital Footprints are the same thing I

play04:34

actually break them down into two let's

play04:37

talk about digital Trails let me give

play04:38

you some examples sending a text message

play04:41

the sending device the receiving device

play04:43

the servers in between if I send a text

play04:46

text message that is hateful threatening

play04:48

bullying or racist I can delete the

play04:50

message off my device not to get in

play04:52

trouble but the person who received it

play04:54

now has a copy on their device if they

play04:57

report it to law enforcement and they

play04:58

investigate it they can contact my phone

play05:00

company their phone company and get

play05:01

information as to when that I sent the

play05:03

message and when that message was

play05:05

received when you go online and you send

play05:06

an email emails leave so many digital

play05:09

Trails it's unimaginable how many

play05:11

servers they hit before they actually

play05:12

hit the recipient's device let's say I

play05:14

want to use your teachers as an example

play05:16

let's say your teachers come to school

play05:17

and they give you a test and then they

play05:19

sit behind their computer and they

play05:20

decide they're going to email 25 friends

play05:22

and family about a big party they're

play05:23

having on the weekend well that's a

play05:25

mistake because the school board will

play05:26

know when they send the email at what

play05:28

time from what computer computer to whom

play05:30

what was the context of that email and

play05:31

if that computer was in class where the

play05:33

teacher supposed to be teaching and they

play05:34

sent it from that computer the school

play05:36

board will know what about if your

play05:37

principales come to school and they

play05:38

decide to surf the web and they decide I

play05:40

need to do some shopping I'm a principal

play05:42

I can't leave but I need to go online

play05:43

and do some shopping so they spend an

play05:45

hour at walmart.ca to do some shopping

play05:47

after an hour they come out of the

play05:48

office with a big smile on their face

play05:49

cuz they're getting the orderers ship to

play05:50

their home and they'll think well no one

play05:51

will know well they're mistaken cuz the

play05:52

school board will know when they went

play05:54

online how long they were online and

play05:55

when they left these are Trails of their

play05:58

actions every time you post post

play05:59

something on BlackBerry Messenger kick

play06:01

Facebook Twitter every example up there

play06:04

leaves a trail you know that ask website

play06:08

where you thought it was Anonymous well

play06:09

for those at same M I busted that myth I

play06:12

showed them exactly where askfm servers

play06:14

reside and now how law enforcement have

play06:16

access to your um IP addresses the

play06:20

context of what was sent received and

play06:22

posted I know you guys use this thing

play06:24

called Yik something y Yik Yak I'm

play06:27

making fun you know what most people

play06:29

think well no one will know that's

play06:31

completely Anonymous look at the legal

play06:33

section within yikyak you know what you

play06:35

will find you will find how they will

play06:36

relinquish information to law

play06:38

enforcement law enforcement with a

play06:40

simple subpoena none of these Trails

play06:44

disappear and they lead to your digital

play06:46

Footprints let me give you examples of

play06:48

digital Footprints what you write to

play06:50

your hard drive is now physically

play06:52

written what you write to a memory card

play06:54

a flash drive your smartphone if you're

play06:56

a console gamer a lot of them have hard

play06:58

drives it will write information to the

play07:00

hard drive cloud storage people think

play07:02

the cloud it's virtual it's out there

play07:04

the cloud is a physical hard

play07:06

drive except it gives you easy access to

play07:09

what you posted up on the web but it's

play07:11

physically written somewhere on a hard

play07:13

drive so go back to point number one

play07:15

it's written there and of course your

play07:17

Footprints stamped every time you visit

play07:19

a social networking site why because

play07:21

it's posted so now let's talk about

play07:22

digital trails and Footprints you

play07:25

transmit something from your smartphone

play07:27

to Facebook you left the trail and and

play07:29

you've left a footprint you transmit

play07:30

something from your computer to cloud

play07:32

storage you've got the stamp the

play07:34

footprint on your computer you've got

play07:36

the trail to the cloud storage you've

play07:37

got another footprint on cloud storage

play07:39

handheld device to Instagram you post a

play07:41

simple comment you like a picture you

play07:43

you've left a trail of what is

play07:45

permanently online in a digital

play07:47

footprint and we can go through example

play07:48

after example after example but I'm here

play07:51

to tell you you leave both trails and

play07:53

Footprints every time you go online now

play07:56

when your teachers and I were growing up

play07:58

we had a saying a picture's worth a

play07:59

thousand words but that was all up to

play08:01

interpretation so if we put the same

play08:03

picture in front of 10 people their

play08:05

thousand words would all be different

play08:06

now a picture is a book a digital book

play08:09

so what you look at visually when I look

play08:12

at it as a programmer as a coder I look

play08:15

at it digitally meaning time day

play08:18

location aperture setting lighting

play08:20

settings all kinds of information is

play08:22

written to a picture so that picture is

play08:24

of me believe it or not and I'm in bam

play08:27

but I'm at a Hill Called Sunshine now

play08:29

the only way you will know by looking at

play08:31

that picture that I'm at sunshine is by

play08:33

looking at the map behind me if you look

play08:36

closely enough because I analyze the

play08:37

picture you can see in the reflection of

play08:39

my visor the chairlift that's off to the

play08:42

side and the chair L chairlift has a

play08:44

name and if you Google that name you

play08:45

would see Sunshine but what happens if

play08:48

you couldn't see the chairlift or you

play08:50

couldn't see the map well analyzing the

play08:53

picture using binary code because binary

play08:55

code is what makes up picture zeros and

play08:56

ones you would analyze the time day Loc

play08:59

of where the picture was taken which is

play09:02

precise because I remember sending that

play09:03

picture over to my wife and they were

play09:05

able to decode it so these trails are

play09:08

real you know how sophisticated pictures

play09:10

are you know the bad people in this

play09:13

earth that want to bring harm to all

play09:14

different countries I won't use their

play09:15

word and give them acknowledgement they

play09:18

send messages within images within jpegs

play09:22

because an image is made up of zeros and

play09:23

one's binary code they actually embed

play09:25

messages in certain components of the

play09:26

pictures and when it pictures received

play09:29

that person that is intended to receive

play09:30

the picture is now decoding it and

play09:32

they're looking at what the message is

play09:34

and law enforcement have to go through

play09:35

pictures so think about that from the

play09:37

National Security level angle and then

play09:39

think about it when they're

play09:40

investigating a picture that was

play09:41

transmitted from one device to another

play09:42

in case it was an inappropriate picture

play09:46

I let Google track me give you one more

play09:48

example about digital Trails I was in

play09:50

Calgary for two weeks and one day I

play09:52

decided I'm going to let Google track me

play09:53

so here's what I did I had Google follow

play09:56

me from the moment I woke up in my hotel

play09:58

to every school I went to I went to two

play10:00

schools that day so I left my hotel I

play10:02

went to school a after school a I went

play10:04

to Starbucks after Starbucks I went to

play10:05

school B after school B before I went

play10:07

and spoke to the parents of both schools

play10:09

together I went back to the hotel I took

play10:10

a nap after that I had a light bite I

play10:13

went back to the school and then after

play10:15

that I was invited to a function which

play10:16

was on the the West End of Calgary after

play10:19

that I went back to the hotel it tracked

play10:21

everywhere I was going

play10:23

precisely so to just finalize it the

play10:27

trails don't lie so listen when it comes

play10:29

of cyber bullying students I've always

play10:31

said it's not a matter of if you're

play10:32

going to get caught it's a matter of how

play10:33

and when you will get caught but today

play10:35

I'm not going to lecture you on cyber

play10:35

bullying because you love care and

play10:37

respect each other and that's obviously

play10:38

the best reason why you would hurt

play10:39

another person if you happen to go home

play10:41

this weekend and Bully another person

play10:43

online digitally from your home on your

play10:45

computer in your bedroom the next day

play10:47

when your principes are investigating

play10:49

what happened they actually have to

play10:51

address the bully because two students

play10:52

are involved now principles have three

play10:55

options number one give the bully a

play10:56

warning number two suspend the bully

play10:58

from school number three call the police

play11:01

if your principal has to call the police

play11:02

well a suspension can still be issued

play11:05

but now the police don't care about that

play11:06

you see they care about criminal law and

play11:08

they want to see if what you did

play11:10

violated criminal law and you all know

play11:13

everyone in this

play11:14

room you're not a kid anymore you're now

play11:17

a young offender and so these charges

play11:20

can be laid against you the day after

play11:22

you turn 12 years old it's called 12

play11:23

years plus a day you're criminal

play11:25

criminally chargeable by law but like I

play11:28

said earlier you don't have to worry

play11:30

about that because you love care and

play11:31

respect each other I just need you to

play11:32

know that in the back of your head so

play11:34

what happens if you get saber bullied

play11:35

I've always told kids every day don't

play11:39

ever respond to a bully I know it's an

play11:42

emotional piece move away from it what I

play11:44

need you to do is I need you to print

play11:46

out every picture post comment chat

play11:48

session screenshot get all of that

play11:50

evidence together and bring it to an

play11:52

adult someone you trust show them what

play11:54

has hurt you let the adult in your life

play11:56

whether it be a teacher a principal a

play11:58

guidance counselor your parents a police

play12:00

officer show it to them let them deal

play12:02

with it we the adults that's our ethical

play12:05

and moral duty in life is to help guide

play12:07

and protect you bring it to us say I

play12:09

need help and let us deal with it let

play12:11

the bullies get caught let them get

play12:13

dealt with they've left Trails behind

play12:15

but I need you to speak out and finally

play12:18

when you leave school you're going to

play12:19

leave with two things guaranteed to you

play12:21

students an education and a reputation

play12:24

you've spent every year of your life

play12:26

earning an

play12:27

education you've also built up a

play12:29

reputation social media what happens

play12:32

when you go looking for a job you're

play12:33

going to submit a resume a resume is

play12:35

going to have your first name last name

play12:36

your address your email address your

play12:38

phone number where you went to school

play12:40

what jobs you had when an employer looks

play12:42

that up they have the ability to look

play12:46

you up online and now judge you based on

play12:48

your online activity those negative

play12:51

digital Trails can supersede your

play12:53

education so you could be the best

play12:54

qualified for the job but if the trails

play12:57

say you post inappropriate pictures you

play12:59

disrespect people you do something that

play13:02

just goes against what they like as a

play13:04

candidate they take both documents they

play13:06

put them together they rip them up you

play13:07

know that's a violation of your human

play13:08

rights right you know what the problem

play13:10

is no one's ever going to know it

play13:11

happened why because it's happening

play13:14

online so please when you go online I

play13:16

want you to do something I want you to

play13:18

think your parents whether they're here

play13:21

or not and always think I'm not going to

play13:23

make them proud if you have that voice

play13:25

in the back of your head when you use

play13:27

the technology that they gave you you

play13:28

will will always always make the right

play13:31

decisions thank you very much for

play13:33

listening

Rate This

5.0 / 5 (0 votes)

Etiquetas Relacionadas
CyberbullyingDigital ResponsibilityYouth EmpowermentTech EducationParental GuidanceOnline SafetySocial MediaCriminal LawEducational TalksDigital Footprint
¿Necesitas un resumen en inglés?