1
What does your
Digital Identity
say about You?
2
Child Tech Contract Tips
! It is my responsibility to be sure the devices are being recharged each night in the _____________. ! My devices must be turned off at ___ pm each school night and ____ pm in the summer and weekend nights. ! I will not use my devices to take pictures of nudity (or search for), violence or other inappropriate content. ! I will not use my devices for malicious purposes. (Cyber Harassment, Crank calling, etc.) ! Your devices does not go to school with you. *Half days, field trips and after school activities will require special consideration.
! Child must go over any new apps/social network accounts/video games with parent/guardian prior to use
! Child must go over any updates to the apps prior to using the update
© Cyber Education Consulting 2012-2014
3
Child Tech Contract Tips
! Do not use this technology to cheat (gain a advantage over other person). ! Do not involve yourself in the digital drama. Anything you do through technology leaves a trail. ! I will not hack or attempt to get around filters or monitors, this includes searches on how to get around software. ! Mom and Dad or guardian will meet all of your followers/digital friends in the real world, no exceptions.
! I will not share any personal info while online, this includes but is not limited to: family members birthdays, vacation plans, photos, or video without prior approval.
! Mom and Dad or Guardian will have access to all phone passwords and voice mail, social networking, video game passwords. NO HIDDEN ACCOUNTS! ! Parents or Guardian the right to go through any devices/accounts whenever they want. Assume everything you do online is being monitored and act accordingly. Let your friends know that you are being monitored as well.
© Cyber Education Consulting 2012-2014
A Digital Life! Social Networking
! Webcams & Videos
! Cell Phones
! Apps
! File-sharing
! Personal Finance
! Video Games
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2014
Streaming Content: You are connecting to a fileserver. No data is stored on your device after you leave the site
Downloading Content: You are making a duplicate copy of the original file and storing it onto your computer
http://www.clker.com/clipart-bathtub-1.html
http://www.clker.com/clipart-blue-shower.html
Streaming v. Downloading
© Cyber Education Consulting 2012-2014
Official Streaming: The site DOES have copyright permissions. Sites like Netflix, Amazon, iTunes, etc.
Unofficial Streaming: The site your DOESN’T have copyright permissions.
Official Streaming v. Unofficial Streaming
© Cyber Education Consulting 2012-2014
How unofficial streaming worksStep One:
User visits a website that has a database
that can be searched for content.
Step Two:When the user clicks
the play button, the first website requests the file from the second
website.
Step Three: The video content actually exists on a
second website, hosted on a server, that the user never
sees.
Step Four:The server streams the file back to the user’s computer, bypassing the first website.
8
A Digital Life! Social Networking
! Blogging ! Vlogging ! Phlogging
! Webcams & Videos
! Cell Phones
! Apps
! File-sharing
! Personal Finance
! Video Games
My Childhood
© Cyber Education Consulting 2012-2017
Online Gaming
© Cyber Education Consulting 2012-2017
Screen Name Search Screen Name
Screen Name
Screen Name
Screen Name
Screen NameScreen Name
Screen Name
Screen Name
Screen Name
Screen Name
Screen Name
Screen Name
Screen Name
Screen Name
Name
Screen Name
Screen Name and Full Name
Screen Name
Screen Name
Screen Name
Screen Name
Screen Name and Full Name Screen Name
Screen Name
The Google screen name search lead to:•NAME
•AGE
•RELATIONSHIP STATUS
•FAMILY ISSUES
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2017
Diep.IO
© Cyber Education Consulting 2012-2017
Diep.IO
14
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2017
Friends
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2017
Unfriending
© Cyber Education Consulting 2012-2017
Unfriending
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2017
In Game Chats
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2017
Group Chat
© Cyber Education Consulting 2012-2017
Online Purchases
© Cyber Education Consulting 2012-2017
Online Purchases
Blogging !Click the location
on the Google Map to find out who is tweeting around that area.
! It took only seconds to find students profiles from this area.
Links to Local Twitter Accounts
© Cyber Education Consulting 2012-2017
Blogging
© Cyber Education Consulting 2012-2014
Digital Etiquette Video/Photo
• Anything done on a live stream can be recorded
• Do not live stream or record video in class
© Cyber Education Consulting 2012-2017
YouTubeSuper Chat
InstagramLive.me
HouseParty
Watermarking Photos
• You own the copyright to all social media photos (along with the social media site)
• Watermark your photos before posting so they will be harder to steal
• Remember we all have “stolen” a photo (used without permission)
© Cyber Education Consulting 2012-2017
PhotoShopped Photos
© Cyber Education Consulting 2012-2017
! Webcam is extremely popular.
! Chats like “omegle” stickcam, ustream, are live but are not as anonymous as they claim.
! Remember that any communication done one these sites can be recorded and posted elsewhere on the Internet.
! Nothing done on these sites should considered private!!!
Webcams & Videos
© Cyber Education Consulting 2012-2017
Webcams & Videos
© Cyber Education Consulting 2012-2017
What is a Sextortion?
© Cyber Education Consulting 2012-2017
• Sextortion occurs when someone threatens to distribute your private and sensitive material if you don’t provide them images of a sexual nature, sexual favors, or money
• May also threaten to harm your friends or relatives by using information they have obtained
• 90% of minors are targeted through social media manipulation
• Can happen through live webcamming hacks, social media, and text messages
• If someone is a victim of sextortion, call your local FBI office (858) 320-1800
YouTube
© Cyber Education Consulting 2012-2017
Musical.ly app
• Shoot, save and share short videos up to 15 seconds long.
• Edit videos with creative effects and filters, such as slow motion, time lapse, and hyper speed.
• Record and upload your own original audio tracks for others to use.
• -Collaborate with friends and people from around the world with
• the unique duet function.
• Share to Facebook, Instagram, Twitter, Vine, and other• social media networks.
• Save videos privately so only you can see them.
• Use hands free recording to record themselves when no one’s around to help.
© Cyber Education Consulting 2012-2017
Musical.ly Privacy
Click Here
Click Here
Click Here
© Cyber Education Consulting 2012-2017
Musical.ly Blocking a Fan
© Cyber Education Consulting 2012-2017
Click Here
Click Here
Click Here
Click Here
Musical.ly Deleting Videos
© Cyber Education Consulting 2012-2017
Click Here Click Here
Click H
ere
Musical.ly Reporting Abuse
© Cyber Education Consulting 2012-2017
Click Here
Click Here
Click Here
Click Here
Click Here
• You control how long your friends can view your message (Video or Photo)
• They will have that long to view your message and then it disappears “forever”.
• The app will let you know if they take a screenshot
• There are apps that will save everything without needing to open the app
© Cyber Education Consulting 2012-2017
Snapchat Privacy Check
© Cyber Education Consulting 2012-2017
Snapchat Friends
© Cyber Education Consulting 2012-2017
•To video-chat, simply press the video camera icon. Your call will immediately go out, and as long as Chat 2.0 installed on both devices
• If you don’t want them to see your face, you can tap on the green camera icon again and you’ll be able to see your friend’s feed without them seeing you.
• For voice calls, you simply have to press the phone icon.
Snapchat “Chat 2.0”
• There are many: Tinder, Grindr, Yellow, and many more
• Uses GPS to show people that live nearby to talk/chat
• Most apps are for ages 13 and up
• Some are designed for younger ages (Yellow)
© Cyber Education Consulting 2012-2014
Hook up Apps
TinderYellow
• There are many: Oovoo, WeChat, WhatsApp, Kik and 100’s more
• Free Texts - send messages, photos and videos
• Does not require a cell phone, uses WiFi
• Some allow you to connect with strangers nearby using GPS
© Cyber Education Consulting 2012-2014
Free Messaging Apps
OovooWeChat
Echosec Searches• Echosec is a web application
that uses location-based metadata to search for social media and other open source information.
• Echosec is a location-based search platform that provides public safety, security, journalism, and intelligence professionals actionable knowledge based on social media and other information.
• There is a free and paid version.
© Cyber Education Consulting 2012-2017
Echosec Results
© Cyber Education Consulting 2012-2017
“GPS” Searches
© Cyber Education Consulting 2012-2014
“Public Photo” Searches
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2014
Photo Zoom Privacy
Tag Searches
© Cyber Education Consulting 2012-2017
© Cyber Education Consulting 2012-2014
Gamer Tag Searches
© Cyber Education Consulting 2012-2014
“About Me” and “Privacy”
Anonymous Profiles
© Cyber Education Consulting 2012-2017
“Like Searches”
© Cyber Education Consulting 2012-2017
“Like” Privacy
Click Here
Click Here
© Cyber Education Consulting 2012-2017
“Like” Privacy
Click Here
Click Here
© Cyber Education Consulting 2012-2017
Instagram Settings
Click Here
Click Here
Turn it on
© Cyber Education Consulting 2012-2017
Instagram Story Settings
Click Here
Click Here
Click Here
Click Here
© Cyber Education Consulting 2012-2017
Click Here
Click Here
Click Here
Click Here
Instagram Comment Settings
© Cyber Education Consulting 2012-2017
Reporting abuse on Instagram
Step Two
Step One
Step Two
Click here
Reporting Instagram Profiles to Administration
Screen Capture the following:
• First the offensive content
• Second the people who have “liked” it
• Third the people who commented on it
• Share images with an adult you trust
© Cyber Education Consulting 2012-2017
68
Instagram Unfollow
Click Here
Click Here Click Here
© Cyber Education Consulting 2012-2017
Click Here
69
Instagram Removing a Follower
Click Here Click Here
Click Here
© Cyber Education Consulting 2012-2017
70
Instagram Blocking a UserClick Here
Click Here
Click Here
© Cyber Education Consulting 2012-2017
71
Finding Multiple Accounts
© Cyber Education Consulting 2012-2017
Click Here
Click Here z
Click Here username username
username 1
username 2
72
Deactivating Instagram Account
Step Two Click Here
Step One Click Here
To deactivating a Instagram account the user must first
go to www.instagram.com
YOU CANNOT DELETE THE ACCOUNT FROM THE MOBILE APP!
Step Two Click Here
73
Deactivating Instagram Account
74
Deactivating Instagram Account
75
Deleting Instagram Account
https://www.instagram.com/accounts/remove/request/permanent/
Create A Professional Profile
• Create a profile that is for volunteer service ONLY
• Do NOT include friends or family
• Keep it set to private until you graduate
• Start a professional profile in 9th grade
© Cyber Education Consulting 2012-2017
App Permissions
© Cyber Education Consulting 2012-2017
78
Removing Geo Tagging App Permission Controls (Apple)
© Cyber Education Consulting 2012-2017
79
Removing Geo Tagging App Permission Controls (Android)
© Cyber Education Consulting 2012-2017
Privacy in the Digital Age
© Cyber Education Consulting 2012-2017
There is none, anything can be shared:! Screenshots ! Hacks (Friends/Others)
Parents/Guardians are responsible for anything their child does online! Anything posted! Any sites visited! Anything downloaded
Monitoring the Digital AgeI can be hard as a parent to keep up:! Go through devices, understand all apps they download, make them the experts and teach you! Parents must have all passwords to all accounts
There are apps to monitor, but the best is device in hand! Teen Safe (www.teensafe.com)! mSpy (www.mspy.com)
© Cyber Education Consulting 2012-2017
• Can track where your kids go on the Net (Not Cell)
• Block sites you don’t want them to see,
• Limit their screen time, and turn the Internet off at night.
• It requires absolutely zero technical expertise to set up
• Can manage all of it from an app on your iPhone.
Circle by Disney
© Cyber Education Consulting 2012-2017
Hidden Apps/Secret AppsApps that a child can place apps inside a folder and apply password-protection to that folder
Some names of the apps:• Applocker• Hide It Pro• Vault Hide• Secret Calculator Icon
© Cyber Education Consulting 2012-2017
Hidden Apps/Secret AppsApps that a child can place apps inside a folder and apply password-protection to that folder
Some names of the apps:• Applocker• Hide It Pro• Vault Hide• Secret Calculator Icon
© Cyber Education Consulting 2012-2017
Hidden Apps/Secret Apps Solutions
© Cyber Education Consulting 2012-2017
Hidden Apps/Secret Apps Solutions Android
• Know at a glance when and where your kids spend time online.
• Use simple settings to make the Web safe for kids to explore.
• Easily protect kids’ private information and online reputations.
© Cyber Education Consulting 2012-2017
Hiding apps on a AndroidANDROID has a “Hide Applications” feature built in
Select Apps Icon
Select Menu button
Select Hide apps
Select Show hidden apps
Any apps shown here were previous
hidden from you
© Cyber Education Consulting 2012-2017
www.commonsensemedia.org
© Cyber Education Consulting 2012-2017
www.accountkiller.com
© Cyber Education Consulting 2012-2017
What do you use it for?
How does it work?
What does it have access to?
Who else can see it/is on it?
What are the privacy settings?
Is there a Chat feature in the Game/App?
Is there a way for strangers to send direct messages?
Can you block/mute/report someone?
Does the App/Game have a geolocation setting?
Does it have in app purchases?
What do I know about the TECH?
Source: http://resources.uknowkids.com/
© Cyber Education Consulting 2012-2017
Get to know the apps your children devices
Take the devices out of the bedroom
Get to know the followers/friends on all social media, video games in real life
Set up contract and/or just get everyone on the same page
Do NOT demonize technology or your child for things they bring you
Decide how you are going to monitor what they do online
What do I do Next?
© Cyber Education Consulting 2012-2017
Cyber Education Consulting Jon Moffat
Thank You For Your Time
© Cyber Education Consulting 2012-2017
Parents and Youth Contract: Technology UseI know that social media use is a privilege. I respect that my parents love me and want to keep mesafe. My Parent/Guardian respect that I am becoming a young adult and want the privilege. I realizethat technology is a requirement to do homework, but I will use my time wisely and avoidmultitasking. These are family rules we all must follow. With that in mind, we agree:
1. I am required to contribute to the cost of my devices. My contribution is: $___/month or I willmaintain grades/chores/behavior as follows:____________________________2. All devices must be turned off at ______ pm each school night and TBD pm in the summerand Friday and Saturday nights. It is my responsibility to be sure the cell phone is beingrecharged each night in the _____________.3. I agree that if I am unable to keep up with my responsibilities, the use of all devices can betaken away from me. This can happen even if I have contributed to the cost of the devices.4. I will not use any device to take pictures of nudity, (or search for) violence .5. I will not take a picture or video of anyone without that person’s permission.6. I will not use any device to call anyone for malicious purposes. (bullying, prank calling, etc.)7. Do not ever ignore a phone call if the screen reads “Mom” or “Dad” or “Guardian”. Not ever. 8. Your cellphone does not go to school with you. *Half days, field trips and after schoolactivities will require special consideration. (You can always revise this to turned off duringschool hours)9. If your phone is lost, stolen or damaged you are responsible for the replacement costs orrepairs. (If necessary)
10. Child must go over any new apps/social network accounts/video games with parent/guardianprior to use. Child must go over any updates to the apps prior to using the update.
11. Do not use this technology to cheat (gain a advantage over other person).12. Do not involve yourself in the digital drama. If you are found to be a participant you will loose
tech privileges. Anything you do through technology leaves a trail. 13. I will not hack or attempt to get around filters or monitors, this includes searches on how to
get around software.14. Mom and Dad or Guardian will meet all of your followers/digital friends in the real world, no
exceptions. Decide on a number of followers to start.15. I will limit the amount of time I am the devices. These limitations include use during meals or
when spending time with family or extended family. I will balance the time I spend online toinclude equal or greater amount of time learning something new.
16. I will not enable or disable any privacy settings on any devicewithout my parent/guardian permission.
17. Parent/Guardian will have access to all phone passwords and voice mail, social networking,video game passwords. Including new social network and electronic devices. You mustupdate changes to passwords.
18. I understand that Parent/ Guardian have the right to look at my text messages and my phonehistory. Parents will not secretly monitor activity, the child should know you are goingthrough devices regularly.
19. If friends send inappropriate content I will let a Parent/Guardian know. The Parent/Guardianwill not blame the child, or the technology for any reported digital behavior.
20. I will not share any personal info while online, this includes but is not limited to: familymembers birthdays, vacation plans, photos, or video without prior approval. Parent/Guardianwill get child’s (depending on the age of the child) permission before posting their image on
20. I will not share any personal info while online, this includes but is not limited to: familymembers birthdays, vacation plans, photos, or video without prior approval. Parent/Guardianwill get child’s (depending on the age of the child) permission before posting their image onsocial media.
21. I will not create any type of account without my Parent/Guardians permission. Parent/Guardian have permission to check all devices for new accounts.
22. Parents/Guardian have the right to go through any devices/accounts at any time. Assumeeverything you do online is being monitored and act accordingly. Let your friends know thatyou are being monitored as well.
The consequences for not following through with these limits on all devices are: Loss of device use as determined by Mom and Dad.Signed (Child) ________________________ Signed (Child) ________________________ Signed (Parent or Guardian) _______________________ Signed (Parent or Guardian) _______________________ Date ________ © Cyber Education Consulting 2012-2017