+ All Categories
Home > Documents > PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Date post: 28-Mar-2015
Category:
Upload: giovanna-chisenhall
View: 223 times
Download: 1 times
Share this document with a friend
Popular Tags:
38
PARENTS/COMMUNITIES INTERNET SAFETY PRESENTATION:
Transcript
Page 1: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

PARENTS/COMMUNITIES

INTERNET SAFETY PRESENTATION:

Page 2: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Internet 101Internet 101

ShoppingShopping BankingBanking ResearchResearch Travel BookingTravel Booking Distance LearningDistance Learning Share Share

Photos/VideosPhotos/Videos

Download MusicDownload Music Download MoviesDownload Movies Play GamesPlay Games ChatChat Read/WriteRead/Write Job SearchJob Search

Page 3: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Kids OnlineKids Online

The Internet is accessible from almost The Internet is accessible from almost any locationany location

School * Friends House * Library * Home * Cell Phone * Gaming UnitSchool * Friends House * Library * Home * Cell Phone * Gaming Unit

Kids need your help navigating the Internet Kids need your help navigating the Internet to avoid its risksto avoid its risks

Start a dialog and explore the Internet Start a dialog and explore the Internet with themwith them

Page 4: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

OONLINE NLINE RRISKSISKS Exposure to Inappropriate MaterialExposure to Inappropriate Material

Sexual SolicitationSexual Solicitation

Harassment and BullyingHarassment and Bullying

Theft of Personal InformationTheft of Personal Information

Predators are Predators are On the same websites as your childrenOn the same websites as your children Male or femaleMale or female Any ageAny age Any professionAny profession Experts at “grooming” methodsExperts at “grooming” methods

Page 5: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Online Enticement and Online Enticement and “Grooming”“Grooming”

To entice your children, predatorsTo entice your children, predators Offer attention and affectionOffer attention and affection Send money and giftsSend money and gifts Persuade them to keep the relationship secretPersuade them to keep the relationship secret Talk about inappropriate and sexual topicsTalk about inappropriate and sexual topics Send sexually explicit imagesSend sexually explicit images Ask to meet in personAsk to meet in person Are patient when developing a relationshipAre patient when developing a relationship

Page 6: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Where Did This Sexual Where Did This Sexual Solicitation Occur?Solicitation Occur?

Computer LocationComputer Location 70% at home70% at home 22% at someone else’s house22% at someone else’s house 4% at School4% at School 3% at Library3% at Library

Page 7: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Exposure to Inappropriate Exposure to Inappropriate MaterialMaterial

PornographyPornography Hateful, racist, and violent contentHateful, racist, and violent content Details of illegal activityDetails of illegal activity

Where to get drugsWhere to get drugs How to make drugs and explosivesHow to make drugs and explosives Underage drinkingUnderage drinking Lock-pickingLock-picking Gambling websitesGambling websites

Page 8: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Revealing Too MuchRevealing Too Much

Personal information that can lead a Personal information that can lead a predator to your doorsteppredator to your doorstep

Photos and videos should never be posted Photos and videos should never be posted online if they showonline if they show Backgrounds that reveal identifying Backgrounds that reveal identifying

informationinformation Sexually provocative poses Sexually provocative poses Too much skinToo much skin

Name Age Birthday Phone NumberSchedule School Location

Page 9: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Spyware, Spam, and ScamsSpyware, Spam, and Scams

Check the legitimacy of a websiteCheck the legitimacy of a website

Only download from trustworthy sources Only download from trustworthy sources

Don’t give out information to soliciting Don’t give out information to soliciting sites and e-mailssites and e-mails

If an offer seems too good to be true, If an offer seems too good to be true, it usually isit usually is

Page 10: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

What Is Cyberbullying?What Is Cyberbullying?

Spreading rumors and gossipSpreading rumors and gossip

Posting pictures without consentPosting pictures without consent

Stealing passwords to assume Stealing passwords to assume someone’s identitysomeone’s identity

Harassing or threatening with offensive Harassing or threatening with offensive languagelanguage

Page 11: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

What to DoWhat to Do

Children who are cyberbullied shouldChildren who are cyberbullied should Not respond to harassing messagesNot respond to harassing messages Save the evidenceSave the evidence Set up new accountsSet up new accounts

If you feel like your child is in immediate If you feel like your child is in immediate danger, danger, contact your local law-enforcement agencycontact your local law-enforcement agency

Page 12: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

E-mail, IM, and ChatroomsE-mail, IM, and Chatrooms

Instant messaging is most popular Instant messaging is most popular

Screen names and e-mail addresses Screen names and e-mail addresses should be chosen wiselyshould be chosen wisely

Online identities are easily createdOnline identities are easily created

Who are your children communicating Who are your children communicating with? with?

Page 13: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Online GamingOnline Gaming

Children connect with users all over the Children connect with users all over the worldworld

Voice-enabled chat allows users to hear Voice-enabled chat allows users to hear and speak to each otherand speak to each other

Cyberbullying is commonCyberbullying is common

Many games are inappropriate for childrenMany games are inappropriate for children

Page 14: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

File-sharingFile-sharing

Download and share media with P2PDownload and share media with P2P

It’s illegal to share copyrighted materials It’s illegal to share copyrighted materials without permissionwithout permission

It’s easy to unknowingly download or It’s easy to unknowingly download or distribute viruses and illegal material distribute viruses and illegal material

Music Movies Videos PhotosDocuments Software

Page 15: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

File-Sharing ProgramsFile-Sharing Programs

Page 16: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

What is Social Networking?What is Social Networking?

Page 17: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Social Networking SitesSocial Networking Sites

ProsPros Enhance Communication SkillsEnhance Communication Skills Improve writing skillsImprove writing skills Spark creativitySpark creativity Help teens develop a personal identity and Help teens develop a personal identity and

express themselvesexpress themselves Keep in touch with friends and familyKeep in touch with friends and family

ConsCons Information can be inadvertently revealed in picturesInformation can be inadvertently revealed in pictures Sexually provocative Pictures can be used for exploitation. Sexually provocative Pictures can be used for exploitation. Teens Reveal to much personal information Teens Reveal to much personal information Teens are to trusting of what people tell them on-lineTeens are to trusting of what people tell them on-line

Page 18: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Safer Social NetworkingSafer Social Networking

Make your own profile and add your Make your own profile and add your children as friendschildren as friends

Learn the site’s safety featuresLearn the site’s safety features

Have children use privacy settingsHave children use privacy settings

Examine their list of friends and browse Examine their list of friends and browse their friends’ pagestheir friends’ pages

Page 19: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Real-Life ConsequencesReal-Life Consequences

Profiles and blogs are not only viewed by Profiles and blogs are not only viewed by your friends, but also byyour friends, but also by Parents, guardians, and relativesParents, guardians, and relatives Teachers and principalsTeachers and principals Colleges and universitiesColleges and universities EmployersEmployers ONLINE PREDATORSONLINE PREDATORS

If it is on the Internet, IT IS NOT PRIVATE.If it is on the Internet, IT IS NOT PRIVATE.

Page 20: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

WebcamsWebcams

Kids and teens use webcams toKids and teens use webcams to Stay connected with friends and familyStay connected with friends and family

Make videos with friendsMake videos with friends

Record videos and post on websitesRecord videos and post on websites

Express themselves through video blogsExpress themselves through video blogs

Page 21: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

WebcamsWebcams

Children shouldChildren should Check their surroundings for revealing Check their surroundings for revealing

informationinformation Remember that videos can be saved, Remember that videos can be saved,

accessed, and alteredaccessed, and altered

Webcams can be used forWebcams can be used for Manipulation and exploitationManipulation and exploitation Self-production of child pornographySelf-production of child pornography

Page 22: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Cell PhonesCell Phones

Teach childrenTeach children Never to post their cell phone number onlineNever to post their cell phone number online

Not to respond to harassing textsNot to respond to harassing texts

Sending explicit images of themselves puts Sending explicit images of themselves puts them at risk for exploitation them at risk for exploitation

Page 23: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

WWHAT HAT YYOU OU CCAN AN DDOO

Page 24: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Set Your Own RulesSet Your Own Rules

Establish rules for Internet useEstablish rules for Internet use What sites can your child visit?What sites can your child visit? Who can they talk to?Who can they talk to? How much time can they spend online?How much time can they spend online?

Keep the computer in a common roomKeep the computer in a common room(not in secluded areas like a bedroom or (not in secluded areas like a bedroom or basement)basement)

Page 25: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

CommunicateCommunicate

Discuss the importance of telling you or Discuss the importance of telling you or a trusted adult if anything ever makes your a trusted adult if anything ever makes your

child feel scared, uncomfortable, or child feel scared, uncomfortable, or confused while onlineconfused while online

CommunicateCommunicate Prepare yourself beforehandPrepare yourself beforehand Be open with your children and encourage Be open with your children and encourage

them to confide in youthem to confide in you

Page 26: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Be InformedBe Informed

Learn everything you can about the InternetLearn everything you can about the Internet

Ask your kids to show you places they goAsk your kids to show you places they go

Learn chat room lingo by going to Learn chat room lingo by going to www.cybertipline.comwww.cybertipline.com for a list of acronyms like for a list of acronyms like POS = Parent Over ShoulderPOS = Parent Over Shoulder

Know what other access your child may have Know what other access your child may have including text messaging.including text messaging.

Page 27: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

SafeguardSafeguard

Consider safeguarding optionsConsider safeguarding options Filtering applications restrict access to Filtering applications restrict access to

inappropriate materialinappropriate material

Monitoring software records websites visited, Monitoring software records websites visited, chat conversations, and other contentchat conversations, and other content

Spector Pro * WebWatcher * SpyAgnet * eBlaster * KeyloggerSpector Pro * WebWatcher * SpyAgnet * eBlaster * Keylogger

PasswordsPasswords Asterwin (Shows windows saved password behind *******)Asterwin (Shows windows saved password behind *******)

Page 28: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Encourage ReportingEncourage Reporting

Of the Of the 1 in 71 in 7 youth who encountered a youth who encountered a

sexual solicitation or approach, only sexual solicitation or approach, only 12%12% told a parenttold a parent

Only Only 5%5% of sexual solicitations were of sexual solicitations were reported to authorities such as a law-reported to authorities such as a law-enforcement agency, an Internet service enforcement agency, an Internet service provider, or a hotlineprovider, or a hotline

Page 29: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

RRESOURCESESOURCES

Page 30: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

EDUCATEEDUCATE Learn about the issueLearn about the issue

ENGAGEENGAGE Use NetSmartz to enhance your children’s Use NetSmartz to enhance your children’s

abilities to recognize and avoid potential abilities to recognize and avoid potential dangersdangers

EMPOWEREMPOWER Give your children the confidence to make Give your children the confidence to make

safer choices online and in the real worldsafer choices online and in the real world

Page 31: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Visit our websitesVisit our websites http://www.NetSmartz.orghttp://www.NetSmartz.org http://www.NetSmartzKids.orghttp://www.NetSmartzKids.org

Send us an e-mailSend us an e-mail [email protected][email protected]

Call 1-800-843-5678Call 1-800-843-5678

Page 32: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Additional ResourcesAdditional Resources

CyberTipline CyberTipline http://www.cybertipline.comhttp://www.cybertipline.com

NetSmartz411 NetSmartz411 http://www.NetSmartz411.orghttp://www.NetSmartz411.org

ICAC ICAC http://www.icactraining.orghttp://www.icactraining.org

Page 33: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

IM Archiving IM Archiving Cant View without proper program installed Cant View without proper program installed

YahooYahoo C:\Program Files\Yahoo!\Messenger\Profiles\C:\Program Files\Yahoo!\Messenger\Profiles\

USER_NAME\Archive\MessagesUSER_NAME\Archive\Messages AIMAIM

C:\Program Files\AIM6\Chat Logs\AIMLogger\C:\Program Files\AIM6\Chat Logs\AIMLogger\USER_NAME\IM LogsUSER_NAME\IM Logs

C:\Documents and Settings\user\My Documents\C:\Documents and Settings\user\My Documents\AIMLogger\USER_NAME\IM LogsAIMLogger\USER_NAME\IM Logs

MySpaceMySpace C:\Program Files\MySpace\IMC:\Program Files\MySpace\IM

Page 34: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Temporary Internet FilesTemporary Internet Files Temporary Internet FilesTemporary Internet Files

Remnant Files from Internet UseRemnant Files from Internet Use Will show vested websites, pictures, and videos Will show vested websites, pictures, and videos

viewed on the Web.viewed on the Web. Will contain remnants of Web Based E-Mail usage.Will contain remnants of Web Based E-Mail usage.

Yahoo, MSN, AOL, Hotmail, GmailYahoo, MSN, AOL, Hotmail, Gmail

CookiesCookies Small text files left by web sites to save preferences, Small text files left by web sites to save preferences,

habits, and/or login information.habits, and/or login information.

Both can be Deleted from the Internet Options Both can be Deleted from the Internet Options manually or be set to delete when the browser manually or be set to delete when the browser is closed. (User specified size)is closed. (User specified size)

Page 35: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Temporary Internet FilesTemporary Internet Files

Page 36: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Internet HistoryInternet History Internet HistoryInternet History

History of web pages visited (user specific)History of web pages visited (user specific)

Page 37: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Typed URL’s Typed URL’s (Uniform Resource Locator)(Uniform Resource Locator)

Web Address that are typed in to the Web Address that are typed in to the address bar, not clicked on as a link, or address bar, not clicked on as a link, or from the Favorites menu.from the Favorites menu. They are cleared if the Internet History is They are cleared if the Internet History is

clearedcleared

Page 38: PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Thank You!


Recommended