3Kids Online The Internet is accessible from almost any location School * Friends House * Library * Home * Cell Phone * Gaming UnitKids need your help navigating the Internet to avoid its risksStart a dialog and explore the Internet with them
4ONLINE RISKS Exposure to Inappropriate Material Sexual Solicitation Harassment and BullyingTheft of Personal InformationPredators areOn the same websites as your childrenMale or femaleAny ageAny professionExperts at “grooming” methods
5Online Enticement and “Grooming” To entice your children, predatorsOffer attention and affectionSend money and giftsPersuade them to keep the relationship secretTalk about inappropriate and sexual topicsSend sexually explicit imagesAsk to meet in personAre patient when developing a relationship
6Where Did This Sexual Solicitation Occur? Computer Location70% at home22% at someone else’s house4% at School3% at Library
7Exposure to Inappropriate Material PornographyHateful, racist, and violent contentDetails of illegal activityWhere to get drugsHow to make drugs and explosivesUnderage drinkingLock-pickingGambling websites
8Revealing Too MuchPersonal information that can lead a predator to your doorstepPhotos and videos should never be posted online if they showBackgrounds that reveal identifying informationSexually provocative posesToo much skinName Age Birthday Phone Number Schedule School Location
9Spyware, Spam, and Scams Check the legitimacy of a website Only download from trustworthy sourcesDon’t give out information to soliciting sites and sIf an offer seems too good to be true, it usually is
10What Is Cyberbullying? Spreading rumors and gossip Posting pictures without consentStealing passwords to assume someone’s identityHarassing or threatening with offensive language
11What to Do Children who are cyberbullied should Not respond to harassing messagesSave the evidenceSet up new accountsIf you feel like your child is in immediate danger, contact your local law-enforcement agency
12E-mail, IM, and Chatrooms Instant messaging is most popularScreen names and addresses should be chosen wiselyOnline identities are easily createdWho are your children communicating with?
13Online Gaming Children connect with users all over the world Voice-enabled chat allows users to hear and speak to each otherCyberbullying is commonMany games are inappropriate for children
14File-sharing Download and share media with P2P It’s illegal to share copyrighted materials without permissionIt’s easy to unknowingly download or distribute viruses and illegal materialMusic Movies Videos Photos Documents Software
17Social Networking Sites ProsEnhance Communication SkillsImprove writing skillsSpark creativityHelp teens develop a personal identity and express themselvesKeep in touch with friends and familyConsInformation can be inadvertently revealed in picturesSexually provocative Pictures can be used for exploitation.Teens Reveal to much personal informationTeens are to trusting of what people tell them on-line
18Safer Social Networking Make your own profile and add your children as friendsLearn the site’s safety featuresHave children use privacy settingsExamine their list of friends and browse their friends’ pages
19Real-Life Consequences Profiles and blogs are not only viewed by your friends, but also byParents, guardians, and relativesTeachers and principalsColleges and universitiesEmployersONLINE PREDATORSIf it is on the Internet, IT IS NOT PRIVATE.
20Webcams Kids and teens use webcams to Stay connected with friends and familyMake videos with friendsRecord videos and post on websitesExpress themselves through video blogsPredators use them to gain information about the location and lifestyle of the teens and to try and sexually exploit them possible by blackmail. There are viruses that can be installed on computers that allow the predator to active and view your web cam remotely with out your knowledge.
21Webcams Children should Webcams can be used for Check their surroundings for revealing informationRemember that videos can be saved, accessed, and alteredWebcams can be used forManipulation and exploitationSelf-production of child pornographyPeople will use items in the background to try and identify you or find something that they will be able to use to blackmail you with. If your child showed something that would be embarrassing or get them in trouble the predator will use that web cam broadcast and threaten to show their friends or family if you don’t do what they say. This also included still pictures that are sent via file transfer, , or web posting.
22Cell Phones Teach children Never to post their cell phone number onlineNot to respond to harassing textsSending explicit images of themselves puts them at risk for exploitation
24Set Your Own Rules Establish rules for Internet use What sites can your child visit?Who can they talk to?How much time can they spend online?Keep the computer in a common room (not in secluded areas like a bedroom or basement)
25CommunicateDiscuss the importance of telling you or a trusted adult if anything ever makes your child feel scared, uncomfortable, or confused while onlineCommunicatePrepare yourself beforehandBe open with your children and encourage them to confide in you
26Be Informed Learn everything you can about the Internet Ask your kids to show you places they goLearn chat room lingo by going to for a list of acronyms like POS = Parent Over ShoulderKnow what other access your child may have including text messaging.
27Safeguard Consider safeguarding options Filtering applications restrict access to inappropriate materialMonitoring software records websites visited, chat conversations, and other contentSpector Pro * WebWatcher * SpyAgnet * eBlaster * KeyloggerPasswordsAsterwin (Shows windows saved password behind *******)
28Encourage ReportingOf the 1 in 7 youth who encountered a sexual solicitation or approach, only 12% told a parentOnly 5% of sexual solicitations were reported to authorities such as a law-enforcement agency, an Internet service provider, or a hotline
30EDUCATE ENGAGE EMPOWER Learn about the issue Use NetSmartz to enhance your children’s abilities to recognize and avoid potential dangersEMPOWERGive your children the confidence to make safer choices online and in the real world
31Visit our websites Send us an e-mail Call 1-800-843-5678 Send us anCall
33IM Archiving Cant View without proper program installed Yahoo AIM C:\Program Files\Yahoo!\Messenger\Profiles\USER_NAME\Archive\MessagesAIMC:\Program Files\AIM6\Chat Logs\AIMLogger\USER_NAME\IM LogsC:\Documents and Settings\user\My Documents\AIMLogger\USER_NAME\IM LogsMySpaceC:\Program Files\MySpace\IM
34Temporary Internet Files Remnant Files from Internet UseWill show vested websites, pictures, and videos viewed on the Web.Will contain remnants of Web Based usage.Yahoo, MSN, AOL, Hotmail, GmailCookiesSmall text files left by web sites to save preferences, habits, and/or login information.Both can be Deleted from the Internet Options manually or be set to delete when the browser is closed. (User specified size)