Half of Canadian youth aged 16 to 20 have been sent a sext (a nude, partly nude or sexy photo) that they didn’t ask for. Whether you call them sexts, nudes, naked selfies or just pics, if you receive an intimate image like this, it’s your job to make the right choice about the sender’s privacy. There is no excuse to forward a sext that someone sent you.

As a parent, you may find some relief in learning that fewer youth take and send sexts (nude or semi-nude photos) than you may think. However, almost half of youth who have taken and sent a sext say that the recipient then forwarded that image to other people without their consent. This culture of sharing among youth is a major concern and can have devastating consequences for the person in the picture and the person who forwards it.

In this lesson, students learn about the “sneaky excuses” that can convince us to do things that we know are wrong. After learning about the different types of these excuses, students watch and discuss a series of videos in which the excuses are used to justify forwarding sexts without the original sender’s consent. Finally, students create their own videos in which the excuses used to justify sharing sexts with other people are illustrated and most importantly, countered.

Digital literacy is a vital tool for education, employment and economic participation, civic engagement, and even health and wellness. It reinforces existing inequalities based on socioeconomic status, ethnicity, education, immigration status and gender. Given the importance of digital literacy skills to under-represented populations, MediaSmarts and YWCA Canada have partnered to develop and deliver DigitalSmarts, a digital literacy skills program.

My youngest daughter has a brand new Instagram account, and she’s excited about it. Unlike my older two, she actually does use it to post. Since she doesn’t have a cell phone she uses her tablet at home, so her posts are always things we are doing around the house: artwork or craft projects she’s done, what we’re having for dinner, or the occasional nice outfit she wants to share.

It’s more important than ever to double-check info that you see online—for your own sake and for other people’s. The How to tell fact from fake online guide offers fact-checking tips that will take you a minute or less to do. You’ll be surprised how quickly you can fact-check things once you get the hang of it!

MediaSmarts’ research has shown that kids with rules in the home about tech use are less likely to do things like post their contact information, visit gambling or pornography sites and talk to strangers online. Having a family agreement or set of rules for using devices is also a great way for parents and kids to work together on how to be safe, wise and responsible online.

The other day I was on the phone with my sister – our land line, not a cell phone – and I said to her, “You’re my person.” This is a well-known phrase from the TV show Grey’s Anatomy; Meredith Grey and Cristina Yang used to say it to each other to cement the closeness of their friendship.

This lesson plan explores the relationship between technology and the law by examining how the criminal law responds to technologically facilitated violence (TFV). Not only will it enhance students’ understanding of the legal meaning of key terms such as “violence”, it will also engage them in dialogue about the surrounding social and legal issues and the ways in which new and emerging technologies are affecting the relationship between the law and technology. Through the exploration of Canadian case studies, and subsequent discussion, students will develop their knowledge on legal implications of various forms of TFV such as harassing communications, criminal harassment, unauthorized use of computer systems, non-consensual disclosure of intimate images (sometimes referred to as “revenge porn”), and hate propaganda. Students will use materials from The eQuality Project’s “Technology-Facilitated Violence: Criminal Case Law” database to research recent Canadian case law involving TFV, better understand the concept of “violence” and the wide range of acts that fall within TFV, as well as the available criminal legal resources and potential outcomes for those affected.

In this activity, students :

  • think about the importance of making sure they have trustworthy information before they make a decision on a political or electoral issue
  • explore a series of scenarios designed to teach five strategies for verifying information: find the original, verify the source, check other information, read factchecking articles, and turn to places you trust 
  • reflect on the impact of false and misleading information in politics