Browse Definitions :
Definition

sexting

Sexting is the act of sending or receiving sexually-explicit images and messages, typically between cell phones.

In many states, sending or receiving nude photographs of an underage person is a felony, and can result in jail time and 20 years as a registered sex offender. The legal issue is less clear-cut when sexting messages are only sent from one young person to another. However, in some countries, including the United States, teenagers who have exchanged such messages have been charged with transmission or possession of child pornography.

A 2009 survey of 1,300 teens (aged 13-19) and young adults (aged 20-26) conducted by the National Campaign to Prevent Teen and Unplanned Pregnancy found that 39% of teens and 59% of young adults had sent a sexually suggestive message online or through text. The survey also found that 20% of teens and 38% of young adults had sent nude photos.

A number of vendors offer products and services designed to deter sexting. Mobile Media Guard, for example, a service introduced by Parental Solutions, is a smartphone application that allows parents to view all images sent and received on their child’s cell phone. The company maintains a real-time record of the images on a secure website.

The term “sexting” was first introduced in 2005 by the Sunday Telegraph Magazine. The word is a portmanteau (an abbreviation that combines two words and their meanings) created from “sex” and “texting.”

This was last updated in October 2010

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close