Presentation is loading. Please wait.

Presentation is loading. Please wait.


Similar presentations

Presentation on theme: "INTERNET SAFETY PRESENTATION: PARENTS/COMMUNITIES."— Presentation transcript:


2 Internet 101 Shopping Banking Research Travel Booking
Distance Learning Share Photos/Videos Download Music Download Movies Play Games Chat Read/Write Job Search

3 Kids Online The Internet is accessible from almost any location
School * Friends House * Library * Home * Cell Phone * Gaming Unit Kids need your help navigating the Internet to avoid its risks Start a dialog and explore the Internet with them

4 ONLINE RISKS Exposure to Inappropriate Material Sexual Solicitation
Harassment and Bullying Theft of Personal Information Predators are On the same websites as your children Male or female Any age Any profession Experts at “grooming” methods

5 Online Enticement and “Grooming”
To entice your children, predators Offer attention and affection Send money and gifts Persuade them to keep the relationship secret Talk about inappropriate and sexual topics Send sexually explicit images Ask to meet in person Are patient when developing a relationship

6 Where Did This Sexual Solicitation Occur?
Computer Location 70% at home 22% at someone else’s house 4% at School 3% at Library

7 Exposure to Inappropriate Material
Pornography Hateful, racist, and violent content Details of illegal activity Where to get drugs How to make drugs and explosives Underage drinking Lock-picking Gambling websites

8 Revealing Too Much Personal information that can lead a predator to your doorstep Photos and videos should never be posted online if they show Backgrounds that reveal identifying information Sexually provocative poses Too much skin Name Age Birthday Phone Number Schedule School Location

9 Spyware, Spam, and Scams Check the legitimacy of a website
Only download from trustworthy sources Don’t give out information to soliciting sites and s If an offer seems too good to be true, it usually is

10 What Is Cyberbullying? Spreading rumors and gossip
Posting pictures without consent Stealing passwords to assume someone’s identity Harassing or threatening with offensive language

11 What to Do Children who are cyberbullied should
Not respond to harassing messages Save the evidence Set up new accounts If you feel like your child is in immediate danger, contact your local law-enforcement agency

12 E-mail, IM, and Chatrooms
Instant messaging is most popular Screen names and addresses should be chosen wisely Online identities are easily created Who are your children communicating with?

13 Online Gaming Children connect with users all over the world
Voice-enabled chat allows users to hear and speak to each other Cyberbullying is common Many games are inappropriate for children

14 File-sharing Download and share media with P2P
It’s illegal to share copyrighted materials without permission It’s easy to unknowingly download or distribute viruses and illegal material Music Movies Videos Photos Documents Software

15 File-Sharing Programs

16 What is Social Networking?

17 Social Networking Sites
Pros Enhance Communication Skills Improve writing skills Spark creativity Help teens develop a personal identity and express themselves Keep in touch with friends and family Cons Information can be inadvertently revealed in pictures Sexually provocative Pictures can be used for exploitation. Teens Reveal to much personal information Teens are to trusting of what people tell them on-line

18 Safer Social Networking
Make your own profile and add your children as friends Learn the site’s safety features Have children use privacy settings Examine their list of friends and browse their friends’ pages

19 Real-Life Consequences
Profiles and blogs are not only viewed by your friends, but also by Parents, guardians, and relatives Teachers and principals Colleges and universities Employers ONLINE PREDATORS If it is on the Internet, IT IS NOT PRIVATE.

20 Webcams Kids and teens use webcams to
Stay connected with friends and family Make videos with friends Record videos and post on websites Express themselves through video blogs Predators use them to gain information about the location and lifestyle of the teens and to try and sexually exploit them possible by blackmail. There are viruses that can be installed on computers that allow the predator to active and view your web cam remotely with out your knowledge.

21 Webcams Children should Webcams can be used for
Check their surroundings for revealing information Remember that videos can be saved, accessed, and altered Webcams can be used for Manipulation and exploitation Self-production of child pornography People will use items in the background to try and identify you or find something that they will be able to use to blackmail you with. If your child showed something that would be embarrassing or get them in trouble the predator will use that web cam broadcast and threaten to show their friends or family if you don’t do what they say. This also included still pictures that are sent via file transfer, , or web posting.

22 Cell Phones Teach children
Never to post their cell phone number online Not to respond to harassing texts Sending explicit images of themselves puts them at risk for exploitation


24 Set Your Own Rules Establish rules for Internet use
What sites can your child visit? Who can they talk to? How much time can they spend online? Keep the computer in a common room (not in secluded areas like a bedroom or basement)

25 Communicate Discuss the importance of telling you or a trusted adult if anything ever makes your child feel scared, uncomfortable, or confused while online Communicate Prepare yourself beforehand Be open with your children and encourage them to confide in you

26 Be Informed Learn everything you can about the Internet
Ask your kids to show you places they go Learn chat room lingo by going to for a list of acronyms like POS = Parent Over Shoulder Know what other access your child may have including text messaging.

27 Safeguard Consider safeguarding options
Filtering applications restrict access to inappropriate material Monitoring software records websites visited, chat conversations, and other content Spector Pro * WebWatcher * SpyAgnet * eBlaster * Keylogger Passwords Asterwin (Shows windows saved password behind *******)

28 Encourage Reporting Of the 1 in 7 youth who encountered a sexual solicitation or approach, only 12% told a parent Only 5% of sexual solicitations were reported to authorities such as a law-enforcement agency, an Internet service provider, or a hotline


30 EDUCATE ENGAGE EMPOWER Learn about the issue
Use NetSmartz to enhance your children’s abilities to recognize and avoid potential dangers EMPOWER Give your children the confidence to make safer choices online and in the real world

31 Visit our websites Send us an e-mail Call 1-800-843-5678
Send us an Call

32 Additional Resources CyberTipline NetSmartz411 ICAC
NetSmartz411 ICAC

33 IM Archiving Cant View without proper program installed Yahoo AIM
C:\Program Files\Yahoo!\Messenger\Profiles\USER_NAME\Archive\Messages AIM C:\Program Files\AIM6\Chat Logs\AIMLogger\USER_NAME\IM Logs C:\Documents and Settings\user\My Documents\AIMLogger\USER_NAME\IM Logs MySpace C:\Program Files\MySpace\IM

34 Temporary Internet Files
Remnant Files from Internet Use Will show vested websites, pictures, and videos viewed on the Web. Will contain remnants of Web Based usage. Yahoo, MSN, AOL, Hotmail, Gmail Cookies Small text files left by web sites to save preferences, habits, and/or login information. Both can be Deleted from the Internet Options manually or be set to delete when the browser is closed. (User specified size)

35 Temporary Internet Files

36 Internet History Internet History
History of web pages visited (user specific)

37 Typed URL’s (Uniform Resource Locator)
Web Address that are typed in to the address bar, not clicked on as a link, or from the Favorites menu. They are cleared if the Internet History is cleared

38 Thank You!


Similar presentations

Ads by Google