Skip to main content

Home/ Digiteen/ Group items tagged for

Rss Feed Group items tagged

10More

Facebook keeps 'deleted' user photos for years - 13 views

  • Even if you delete incriminating photos on your Facebook profile, the company is keeping them accessible to anyone online for up to 30 months.
    • Antonio R
       
      woahhhhh that seems really creepy. i dont think that is right for a company to have a deleted photo of you for 30 months. if you delete it, then you delete it for a reason, not so even more people that are in a company to see you doing something that you thought people to see but then relized it was stupid to put this on in the first place.
  •  
    This article points out that up to 30 months after photos are deleted from Facebook that they are still there. If someone has the direct URL to a photo, it is still accessible. Students should be taught about this and we should educate ourselves as well. Once something is uploaded it is out there. Period. You cannot take it back.
  • ...5 more comments...
  •  
    Facebook is keeping photos up to 30 months after they are deleted!
  •  
    this is a really interesting article. I wonder if other IM sites like MySpace or AIM.
  •  
    this artical is very interesting and it is true that facebook is keeping the deleted photos up for 30 months after they are deleted !!!!!!
  •  
    i think this artical is really interesting because it is good to know that you should be careful when posting pictures on facebook.
  •  
    This is a very interesting article. Safety is really important and dont every do anything stupid because it will never be deleted. You should NEVER do anything bad on the internet because it is not a different life it is just the internet!
  •  
    i think this is an interesting article and its good to no about the information it gave us and that you should be careful what you post on the internet. its the interenet and its not a different life and anyone can see it
  •  
    WOW! 30 months? That's amazing, yet horrible. Very interesting article, it shows that there's more to social media than you think. Great post. You really should be careful when posting things on the internet.
4More

10 Ways To Stay Safe Online... - 0 views

  • 10 Ways To Stay Safe Online 1. Be a responsible cyber citizen. If you use the Internet, you're a citizen of a global community-a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws. 2. Use anti-virus software. A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks! 3. Do not open email from unknown sources. Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension-even if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe. 4. Use hard-to-guess passwords and keep them private. Do not write passwords down on small pieces of paper taped to your computer. You would be surprised how many people are sloppy about keeping their passwords private. Passwords that are easy to-guess are a bad choice. In other words, if your name is "Dan" do not make your password "Dan." Change your passwords regularly and don't give your passwords to anyone! Tell your family that combinations of letters, numbers and symbols are harder to crack than just words. 5. Protect computers with firewalls. Install firewalls for your family-it is not difficult. A firewall helps prevent hackers from breaking into your computer or the computers that belong to your family. Firewalls help prevent thieves from stealing and using private information including your phone number and credit card numbers, which may be stored on a family computer. 6. Do not share access to your computers with strangers. Learn about file sharing risks. Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. Check your operating system and other program help files to learn how to disable file sharing. Do not share access to your computer with strangers! 7. Disconnect from the Internet when not in use. The Internet is a two-way road. You get information and also send information. Turning off the Internet makes sure that someone else on the Internet can't enter your computer and cause harm. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. 8. Back-up your computer regularly. Help your family back up all household computers onto external media such as CD's or diskettes. 9. Regularly download security protection update "patches". Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own. 10. Help your family to check computer security on a regular basis. Evaluate computer security at least twice a year. To help remember, do it when you change the clocks for daylight-savings time! Check for all of the items listed previously.
  •  
    Safe ways online and how to keep your privacy.
  •  
    website uses ten safety rules to stay safe online. 1. Be a responsible cyber citizen. 2. Use anti-virus software. 3. Do not open email from unknown sources4. Use hard-to-guess passwords and keep them private.5. Protect computers with firewalls.6. Do not share access to your computers with strangers. Learn about file sharing risks.7. Disconnect from the Internet when not in use.8. Back-up your computer regularly.9. Regularly download security protection update "patches". 10. Help your family to check computer security on a regular basis.
  •  
    When online you should follow these tips to stay safe.
6More

Solutions for Digital Safety - Youth and Media - 1 views

  • 1. Communication with your daughter or son is key. Build a trusting relationship through dialogue.
  • 2. Create an account to understand how the site works, but not to stalk your kids. They need room to explore, but if you are familiar with the media and technology that they consume, you can provide valuable guidance and suggestions. Surveillance, while possible, damages a trusting parent/child relationship.
  • 3. Ask your kids how they choose to represent themselves and why. Use MySpace as a resource to start a conversation about contemporary fashion, ideals, and media images.
  • ...2 more annotations...
  • 4. Talk about private/ public issues with your kids. Help them to understand the consequences of making certain information publicly accessible. Get them to think through all of the possible audiences who might come into contact with their online information
  • 5. Talk through what kids should do if they receive unwanted attention online or if they find themselves the victims of cyberbullying. A growing number of sites provide useful information about how to confront such problems, including Net Family News , NetSmartz and SafeTeens.
  •  
    "Because being connected is such an integral part of teens’ lives, some youth may hesitate telling their parents about the harassment they encounter for fear that their online privileges will be taken away. The best way to combat cyber bullying or other forms of harassment is not to reign in or limit a teen’s use of technology, but to make sure adults keep the lines of communication open. In addition to keeping the computer in a public space, parents should also become more aware of what their children are doing online. They should consider the Internet as an opportunity to engage in conversation with their children about their interests, talents, and network of friends. It is important to emphasize with youth that there is a distinct connection between what happens online and in the "real world." Adults should communicate to youth that their actions have implications in a real world setting. Regarding cyber bullying in particular, adults must also relay traditional techniques of combating bullying, among them being to report incidents, keep records, and not to engage the bully. “It’s not new bullying, it’s just a vehicle,” says Nancy Mullin-Rindler, director of the Project on Teasing and Bullying at Wellesley College (Paulson, 2003). In addition, because research has shown that the majority of cyber bullies have been victims of traditional bullying, this approach—-combating the behavior versus limiting the technology—-would ultimately help in preventing both cyber and conventional bullying. Cyber bullying poses a stickier problem for schools that are finding themselves in the middle of First Amendment debates. Despite the fact that whatever happens online (no matter where the location) typically spreads to the school environment, inevitably impacting students’ learning, does a school principal have the right to punish someone for what they say outside of school parameters? Because of this legal quagmire, schools’
2More

30+ Places To Find Creative Commons Media - 1 views

  •  
    Useful sites that can be used for mult-media end-products.
  •  
    SitePoint has gathered up over 30 of the best resources online for audio, video, images and more for finding just the perfect Creative Commons licensed item for use in your next project.
10More

Technology reshapes the ways we communicate. - Free Online Library - 0 views

  • We will continue to see, for example, incredible breakthroughs in miniaturization min·i·a·tur·ize  tr.v. min·i·a·tur·ized, min·i·a·tur·iz·ing, min·i·a·tur·iz·esTo plan or make on a greatly reduced scale.min ..... Click the link for more information. and chip memory. Chip memory is evolving from about 20 million transistors on a 16-megabit
  • New telecommunications technologies are revolutionizing the ways we share information
  • Other forms of memory also are constantly expanding. A 5.5-inch CD-ROM CD-ROM: see compact disc. CD-ROM in full compact disc read-only memoryType of computer storage medium that is read optically (e.g., by a laser). ..... Click the link for more information. can already store up to 65,000 pages of documents - about 30 yards of books.
  • ...7 more annotations...
  • six of the key technological components of
  • this revolution are digital systems, fibre optics fibre opticsThin transparent fibres of glass or plastic that transmit light through their length by internal reflections, used for transmitting data, voice, and images. ..... Click the link for more information., new wireless technologies, satellite
  • technologies, new levels of network intelligence and multi-media networking.
  • The ongoing push toward all-digital networks is making it possible to send any type of
  • information - sound, image, data and full-motion video Video transmission that changes the image 30 frames per second (30 fps). Motion pictures are run at 24 fps, which is the minimum frequency required to eliminate the perception of moving frames and make the images appear visually fluid to the eye. ..... Click the link for more information. -
  • Video conferencing See videoconferencing. (communications) video conferencing - A discussion between two or more groups of people who are in different places but can see and hear each other using electronic communications. ..... Click the link for more information., one of the burgeoning areas in the industry, is expected to grow by more than 25 per cent annually in Canada in the next four years.
  • New wireless technologies are also providing new levels of reachability and mobility when and wherever the communication of information is desired or neede
3More

BPL Kids Page- Netiquette - 0 views

  • Some tips about netiquette for kids: 1. Avoid hurting someone's feelings with e-mail. Sometimes, online, people can't tell that you are joking. When you write an e-mail message, make sure the person you're sending it to will know whether you are happy, sad, angry, joking, etc. You can do this by using smileys, such as :). 2. Respect other people's online rights. People on the Internet have rights just as they do in everyday life. If someone sends you a threatening letter, or makes crank phone calls to your house, it can be annoying and sometimes very scary. The same is true on the Internet. If someone sends you e-mail which threatens you or makes you feel uncomfortable, talk to a parent or other adult right away. 3. Avoid insulting someone unless you want to start a flame war. A flame war is when angry people try to punish each other with e-mail. Sometimes this can be done by sending so many messages that a mailbox gets jammed, and sometimes this is done by sending a few very nasty messages meant to hurt someone's feelings. If you insult someone with e-mail, they will probably get angry just as they would if you insulted them face to face. 4. If someone insults you, be calm. Starting a flame war is serious business on the Net. Even if you are angry with someone, you don't need to take things any further. Try being calm, ignoring the message, or sending a polite message asking for them to explain what they meant. It may have been a misunderstanding
  • 5. Avoid "crashing" discussion groups or forums. People on the Net frequently get together online to talk about things they may have in common. This can be done on a listserv, a bulletin board, a chat group, etc. If you join the discussion just for the fun of "crashing" it, or ruining it, people will definitely get angry. 6. Respect the privacy of other people. If someone tells you something secret, it should be kept secret. This includes passwords, full names, addresses, or interests. Sharing your own password with someone else, even someone you like, is never a good idea. Passwords and personal information are private, and are never safe to share with others. 7. Be responsible online. When you are at the computer, you are in control. Avoid using the computer to harm other people. Taking things which are not yours (such as files, passwords, or credit card numbers), spreading rumors about other people online, and infecting other computers with viruses (on purpose) are examples of harming other people online. 8. Help other people learn more about the Net. Chances are someone else taught you a lot of what you know about the Internet. The Net is growing quickly, and it's difficult to keep up. Other kids, or even your parents and teachers, may need help understanding what it's all about. Try to help them if you can. Who knows? They might show you a thing or two someday!
  •  
    This is a a summary for kids for on netiquette when they are using the internet
4More

digiteen - Digital Rights and Responsibilities - 0 views

  • Those freedoms extended to everyone in a digital world - electronic responsibility for actions and deeds AUP (inside and outside of school) Use online material ethically (citing sources) Report cyberbullies and threats
  • ocially Rights and Responsibilities has a lot of influence over us, and our daily life. Everything we do in our online lives or even just online we have to think if it is within our rights or whether we have the responsibilty to do something. For many of us we found this so hard to do because our rights and responsibilities online are soo very different to them offline, which is why it is importtant for children to incorporate these ideas into their daily lives and at a young enough age for them to adapt to them quickly.
  • ...1 more annotation...
  • You need to be aware of which sites people can gain access to your profile and without your permission. Some examples are: Facebook, MySpace. Beware of sites where people can change your password just by knowing your user name. An itunes account is a good example of where this is the case. If your not sure, test it out for your self by clicking on "forgotten your password?" and seeing whether the new pass word is accepted. If you become a victim of cyberbullying, make sure you contact people responsible for the site. If you join a forum, make should you read through the rules and regulations for members. This can be especially important if the forum is a special interest forum where you may get asked to leave if you post "off topic" mails. Use the Internet respectfully: don't post embarrassing pictures of your friends onto sites without their permission!
7More

Google Promotes Online Safety With 'Good to Know' Campaign - Search Engine Watch (#SEW) - 0 views

  • Google Promotes Online Safety With 'Good to Know' Campaign
  • Google is about to launch its first online safety campaign. Teaming with the Citizens Advice Bureau (CAB), Google will promote “safe computer usage” for users: by logging out of computers when they're finished using them, specialized child protection, use of cookies in web browsers, and 'two-factor authorization' which sees the user entering a password and then a unique verification code sent to their mobile device
  • Gillan Guy, the CAB's chief executive, said that “Information is a powerful tool for preventing problems from arising in the first and safety, personal data and identity theft are among the top concerns of people of using internet”.
  • ...1 more annotation...
  • Google & the Citizens Advice Bureau created a few tips to stay safe online: Always make sure to have a strong password. Try to always have a unique password to you that no one else will know. Using a long password will keep it safe. Try to always have a mixture of letters, numbers, and symbols. Some people remember their password with a song or lyrics or a mixture of the two. When you get a suspicious email with personal information on it, go directly to the site: don't click on the link in the email. Unless you're expecting the email, it's probably not from them and is known as a "Phishing attack" that's trying to get your personal info and steal from you. Always look for 'https' in the URL. A website is running through a secure connection when it's through https. This will safeguard your emails, credit card numbers, and all other info from watching eyes. Just as you make sure not to leave your front door open, you need to make sure you're always signing out of your computer. Make sure to always sign out of social media accounts and all other accounts that you may have signed into. Try and only use safe networks that are secure. Internet cafes are nice but not always the safest place for you to be browsing the Internet. With all the apps out there, make sure that you always have the latest app. Make sure you trust all your apps and the sources your apps come from. Always lock and passcode lock your phone. Never store personal details on your phone because anyone could take it and have all your info. Two-step verification is a must if accounts offer it. This will make you or anyone else go through two different steps of verification to access your account – much like Facebook when you login. You have to login and then tell which computer you're logging in from, then it texts you. By doing this it will keep your account safe.
  •  
    On this website, I have highlighted a few sections that I thought were important. In the pink, I highlighted what Google is launching and why. In the yellow, I highlighted a quote someone said. The green highlight shows 7 tips that are very important for not only students, but everyone else to stay safe online.
  •  
    Google gives information on how to be safe online. "Good to Know" campaign.
  •  
    "Google will promote "safe computer usage" for users: by logging out of computers when they're finished using them, specialized child protection, use of cookies in web browsers, and 'two-factor authorization' which sees the user entering a password and then a unique verification code sent to their mobile device."
2More

Gaming Addiction Statistics - Facts, Articles, & Research - TechAddiction - 0 views

  • Gaming addiction is not yet classified as a mental health disorder or "true" addiction like gambling or alcohol addiction. However, some gamers clearly struggle to keep their playing habits under control and may place more importance on their gaming accomplishments than their happiness and success in the real world (e.g., academic achievement, friendships, relationships, career advancement, health, etc.). As gaming addiction becomes more of a concern for parents, spouses, families, educators, and those in the mental health community, it is important for those hoping to learn more about this issue to get their gaming addiction statistics and facts from reputable sources.
  •  
    Addition is a way to damage your health. Your health is very important and addiction can damage it in a minutes. "Gaming addiction is not yet classified as a mental health disorder or "true" addiction like gambling or alcohol addiction. However, some gamers clearly struggle to keep their playing habits under control and may place more importance on their gaming accomplishments than their happiness and success in the real world (e.g., academic achievement, friendships, relationships, career advancement, health, etc.). As gaming addiction becomes more of a concern for parents, spouses, families, educators, and those in the mental health community, it is important for those hoping to learn more about this issue to get their gaming addiction statistics and facts from reputable sources. "
2More

10 Ways Google Recommends You Stay Safe Online | Edudemic - 0 views

  • Passwords are the first line of defense against cyber criminals. It’s important to pick strong passwords that are different for each of your important accounts and to change them regularly. Here are some ideas to help create strong passwords. Use a unique password for all your important accounts. Use unique passwords for your accounts, especially important accounts like email and online banking. You are likely to have dozens of accounts across the web, and you cannot guarantee the security of all of them. Criminals target sites that lack strong security, in order to harvest usernames and passwords that they test against other popular sites. When you use the same password across the web, a cyber criminal can learn the password from a less secure site and then use that password to compromise your important accounts. Use a long password The longer your password is, the harder it is to guess. There are almost one quintillion possible 10-character passwords (that’s 4,000 times as many possibilities as if your password only has eight characters) … and that’s if you only use numbers and letters. Use a password with a mix of letters, numbers, and symbols Using numbers, symbols and mixed-case letters in your password increases the difficulty of guessing or cracking your password. For example, there are more than 6 quadrillion possible variations for an eight-character password with numbers, symbols, and mixed-case letters – 30,000 times more variations than an eight-character password with only lowercase letters. Try using a line from a song, film or play Some passwords are easy to guess or crack: Simple words or phrases like “password” or “letmein,” keyboard patterns such as “qwerty” or “qazwsx,” patterns such as “abcd1234” or personal information like your birthday or street name.So choose a combination of letters, numbers, or symbols to create a unique password that’s unrelated to your personal information.One idea you can try is to choose a line from your favorite song, film or play, like “To be or not to be: That is the question.” Then use numbers, symbols and mixed-case letters to recreate it: “2bon2bT1tq” is a password with quadrillions of variations. The more unusual the phrase you choose the better!Or you could pick a random word or phrase, and insert letters and numbers into the beginning, middle, and end, such as “sPo0kyh@ll0w3En.” Make sure your password recovery options are up-to-date and secure Make sure your recovery email address is up to date so that you can receive emails in case you need to reset your password. Sometimes you can also add a phone number to receive password reset codes via text message. Additionally, many websites (including Google Accounts) will ask you to choose a question to verify your identity if you ever forget your password. If you’re able to create your own question, try to come up with a question that has an answer only you would know. Try to find a way to make your answer unique – you can do this by using some of the tips above – so that even if someone guesses the answer, they won’t know how to enter it properly. Keep your password reminders in a secret place that isn’t easily visible Don’t leave notes with your passwords in plain site, on your computer or desk. If you do decide to save your passwords in a file on your computer, create a unique name for the file so people don’t know what’s inside. Avoid giving the file an obvious name, such as “my passwords.” If you have a difficult time remembering multiple passwords, a trusted password manager may be a good solution. Spend a few minutes checking out the reviews and reputations of these services.
  •  
    To stay safe you need a good password. If you follow these rules when making your password you will have a far less chance of cyber crimes.
1More

How do people who are from different cultures live and get along with each other in NYC - 0 views

  •  
    The thing that stood out to me the most here, is the word respect. Everyone should have respect for different cultures online. Having respect can get you a long ways in life. "The best way I would believe would be open communication, respect for others beliefs, ethnicity, privacy, and the rights of an individual in general. An action of one person can make a negative or positive impact on society as a whole. If someone chooses to belittle another for something as serious as their beliefs or as trivial as the way they dress, they set in motion negative responses which will inevitably affect many others"
2More

Why must I indicate a claim for individual copyright materials in my program? | Screenr... - 0 views

  • Film and television programs contain a number of separate copyright materials including the visual images and associated sounds, the screenplay or narration, and other material incorporated in the film such as the music, sound recordings and artistic works. When a film or television program is copied, communicated or retransmitted under the royalty collection services, there are royalties for each of the separate copyright materials. By indicating a claim to a copyright material, you are warranting to Screenrights that you own or control the right to claim royalties for that specific copyright material incorporated in the program.
  •  
    This article explains why you must indicate a claim for individual copyright materials.
2More

Protecting your information teenagers.ashx (application/pdf Object) - 0 views

  •  
    Personal information is disclosed to, and used responsibly by, many legitimate online businesses to conduct business and online social interactions. However, if not managed carefully, it is possible for personal information to be accessed and misused for marketing, identity theft or for cyberbullying or cyberstalking.
  •  
    Parents watch what your teens put online because other teens or older people could be stalking your child.
1More

10 Tips for Responding to Cultural Differences - 0 views

  •  
    This article tells the reader the proper way to respond when faced with cultural differences. The article is mainly for if people who are traveling, but I think it works the for communicating with people from other cultures too. "The ability to keep opinions flexible and receptive to new stimuli is important to intercultural adjustment. Even if you don't understand why people do a particular thing, be careful not to jump to conclusions"
2More

Facebook Increasingly Becomes a Helpful Tool for Employers in Job Interviews | Moneylan... - 0 views

  • Privacy advocates say that, for now, it is legal for a prospective employer, during a job interview, to insist that you log into your Facebook page and then click through your “friends only” posts, photos and messages. The ACLU put a stop to companies demanding that applicants turn over their login and password credentials, but “shoulder surfing,” as it’s been dubbed, is legal for the time being. Aleecia M. McDonald, a privacy researcher and resident Fellow at the Stanford Center for Internet and Society, says high unemployment makes it hard to stamp out this practice. “When you have a job market where there are more job seekers than hirers, you’re going to see things like demanding to see your Facebook wall because if you say no, someone else is waiting for that interview.”
  •  
    This article talks about interviewers insisting on "shoulder surfing" your Facebook page and whether this should be allowed.
2More

Literacy Rate - How Many Are Illiterate - 0 views

  •  
    "The literacy rate in the US has many educators in search of answers about this problem that has plagued our country for decades. Instead of decreasing, the numbers of literacy has steadily increased over the years. This raises a lot of questions about our education system, how it is ran, and why there is such a problem with illiterate people in our country. The NAAL (National Assessment of Adult Literacy) administered tests which revealed that an estimated 14% of US residents would have extreme difficulty with reading and written comprehension. These people can legally be defined as illiterate. This could lead to numerous problems for these people now and in the future. When looking to apply for a job, there are forms that have to be filled out. Adults with literacy issues are unable to fill out these forms which decrease their chances of getting a job and raises unemployment issues."
  •  
    This tells about the way literacy has increased in the US, and how people with low literacy rates are illiterate.
1More

Digital Literacy Resource - Privacy and the Internet - 0 views

  •  
    You should always think about what you are going to post before you do it.  "It's your profile, you can include what you want to include-right? Before you post, think. Are you prepared to have those words and images represent you for months, and even years to come? Your postings on profiles and to chats and blogs may have cyberlives much longer than what you might have imagined or intended, and may reach a much wider audience than you could have anticipated. This simple fact is illustrated in the following examples from around the country: Students who posted party photos online later found that those photos were used by their university's administration when it needed to make a case regarding alcohol abuse among minors. A student's application for a position as a resident advisor was rejected by university staff who reviewed the applicant's Facebook page and found the material there to be inappropriate. A graduate's job application was rejected when the hiring organization deemed objectionable some of the content he had posted online. Students were reprimanded for extreme and possibly libelous statements they made about a professor in Facebook postings. Are your online postings private? No, not at all. Many postings can and will be viewed by hiring committees, admissions personnel, marketing agencies, and other unintended audiences. Privacy is a complicated matter in American law, evoking everything from Fourth Amendment rights to civil rights. Explore the following topics to learn more about the ins and outs of privacy in the online environment."
6More

ACLU, 12-Year Old Sue Minnesota School Over Facebook Incident - Technology News - redOrbit - 1 views

  •  
    A 12 year old student at a school in Minnewaska was forced to give up her password and username in order for her school to view comments made about the student. The ACLU filed a suit on behalf of the student against the Minnewaska Area Schools.  
  • ...3 more comments...
  •  
    A girl in Minnesota had her passwords and usernames forcefully taken from her by a school. The school said it was cyberbulling, but many people disagree. A rights group took up the case for the girl and i suing on the 4th amendment search and seizure and the 1st amendment right to free speech.
  •  
    Girl posts something about a hall monitor hating her on Facebook, school demands she gives them her username and password. The students parents were not present. No warrant was issued by the police. The student filed a law suit with the ACLU against the school.
  •  
    This article is about a 12 year old girl (R.S.) that had to give her Facebook username and password to her school because of a hall monitor she didn't like. The school didn't notify her parents, and her parents never said the school to take that action. The ACLU is suing the school under the first amendment law (Unlawful search and seizure). 
  •  
    This article is about a girl who was forced to give her username and password for her Facebook account, to her school. The school didn't have a warrant or permission of any kind to take her information, which violates her constitutional rights. The American Civil Liberties Union is suing the school for this violation.
  •  
    The article "ACLU, 12-Year Old Sue Minnesota School Over Facebook Incident" was about a 12-year old girl. The girl in this article was refered as R.S. Issues starting coming up when R.S. had something on Facebook that said the school's hall monitor hated her. The school forced her to give them her username and password then searched her page. After, a son's mom complained to the school that R.S. and her son were talking about sex online. Once the school demanded to go through her account again, the ACLU charged them for not giving her the freedom of speech and unreasonably searching though her stuff. This was violating the First and Fourth Amendment since the two incidents. In the end R.S. didn't get in trouble but the school did.
1More

Profanity - Wikipedia, the free encyclopedia - 0 views

  •  
    Other words commonly used to describe profane language or its use include: cuss, curse, derogatory language, swearing, expletive, oath, bad word, dirty word, strong language, irreverent language, obscene language, choice words, and blasphemous language. In many cultures it is less profane for an adult to curse than it is for a child, who may be reprimanded for cursing.
« First ‹ Previous 41 - 60 of 619 Next › Last »
Showing 20 items per page