Presentation is loading. Please wait.

Presentation is loading. Please wait.

PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

Similar presentations


Presentation on theme: "PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :"— Presentation transcript:

1 PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :

2 Internet 101 Shopping Shopping Banking Banking Research Research Travel Booking Travel Booking Distance Learning Distance Learning Share Photos/Videos Share Photos/Videos Download Music Download Music Download Movies Download Movies Play Games Play Games Chat Chat Read/Write Read/Write Job Search Job Search

3 Kids Online The Internet is accessible from almost any location The Internet is accessible from almost any location School * Friends House * Library * Home * Cell Phone * Gaming Unit School * Friends House * Library * Home * Cell Phone * Gaming Unit Kids need your help navigating the Internet to avoid its risks Kids need your help navigating the Internet to avoid its risks Start a dialog and explore the Internet with them Start a dialog and explore the Internet with them

4 O NLINE R ISKS Exposure to Inappropriate Material Exposure to Inappropriate Material Sexual Solicitation Sexual Solicitation Harassment and Bullying Harassment and Bullying Theft of Personal Information Theft of Personal Information Predators are Predators are On the same websites as your children On the same websites as your children Male or female Male or female Any age Any age Any profession Any profession Experts at grooming methods Experts at grooming methods

5 Online Enticement and Grooming To entice your children, predators To entice your children, predators Offer attention and affection Offer attention and affection Send money and gifts Send money and gifts Persuade them to keep the relationship secret Persuade them to keep the relationship secret Talk about inappropriate and sexual topics Talk about inappropriate and sexual topics Send sexually explicit images Send sexually explicit images Ask to meet in person Ask to meet in person Are patient when developing a relationship Are patient when developing a relationship

6 Where Did This Sexual Solicitation Occur? Computer Location Computer Location 70% at home 70% at home 22% at someone elses house 22% at someone elses house 4% at School 4% at School 3% at Library 3% at Library

7 Exposure to Inappropriate Material Pornography Pornography Hateful, racist, and violent content Hateful, racist, and violent content Details of illegal activity Details of illegal activity Where to get drugs Where to get drugs How to make drugs and explosives How to make drugs and explosives Underage drinking Underage drinking Lock-picking Lock-picking Gambling websites Gambling websites

8 Revealing Too Much Personal information that can lead a predator to your doorstep Personal information that can lead a predator to your doorstep Photos and videos should never be posted online if they show Photos and videos should never be posted online if they show Backgrounds that reveal identifying information Backgrounds that reveal identifying information Sexually provocative poses Sexually provocative poses Too much skin Too much skin Name Age Birthday Phone Number Schedule School Location

9 Spyware, Spam, and Scams Check the legitimacy of a website Check the legitimacy of a website Only download from trustworthy sources Only download from trustworthy sources Dont give out information to soliciting sites and s Dont give out information to soliciting sites and s If an offer seems too good to be true, it usually is If an offer seems too good to be true, it usually is

10 What Is Cyberbullying? Spreading rumors and gossip Spreading rumors and gossip Posting pictures without consent Posting pictures without consent Stealing passwords to assume someones identity Stealing passwords to assume someones identity Harassing or threatening with offensive language Harassing or threatening with offensive language

11 What to Do Children who are cyberbullied should Children who are cyberbullied should Not respond to harassing messages Not respond to harassing messages Save the evidence Save the evidence Set up new accounts Set up new accounts If you feel like your child is in immediate danger, contact your local law-enforcement agency

12 , IM, and Chatrooms Instant messaging is most popular Instant messaging is most popular Screen names and addresses should be chosen wisely Screen names and addresses should be chosen wisely Online identities are easily created Online identities are easily created Who are your children communicating with? Who are your children communicating with?

13 Online Gaming Children connect with users all over the world Children connect with users all over the world Voice-enabled chat allows users to hear and speak to each other Voice-enabled chat allows users to hear and speak to each other Cyberbullying is common Cyberbullying is common Many games are inappropriate for children Many games are inappropriate for children

14 File-sharing Download and share media with P2P Download and share media with P2P Its illegal to share copyrighted materials without permission Its illegal to share copyrighted materials without permission Its easy to unknowingly download or distribute viruses and illegal material Its easy to unknowingly download or distribute viruses and illegal material Music Movies Videos Photos Documents Software

15 File-Sharing Programs

16 What is Social Networking?

17 Social Networking Sites Pros Pros Enhance Communication Skills Enhance Communication Skills Improve writing skills Improve writing skills Spark creativity Spark creativity Help teens develop a personal identity and express themselves Help teens develop a personal identity and express themselves Keep in touch with friends and family Keep in touch with friends and family Cons Cons Information can be inadvertently revealed in pictures Information can be inadvertently revealed in pictures Sexually provocative Pictures can be used for exploitation. Sexually provocative Pictures can be used for exploitation. Teens Reveal to much personal information Teens Reveal to much personal information Teens are to trusting of what people tell them on-line Teens are to trusting of what people tell them on-line

18 Safer Social Networking Make your own profile and add your children as friends Make your own profile and add your children as friends Learn the sites safety features Learn the sites safety features Have children use privacy settings Have children use privacy settings Examine their list of friends and browse their friends pages Examine their list of friends and browse their friends pages

19 Real-Life Consequences Profiles and blogs are not only viewed by your friends, but also by Profiles and blogs are not only viewed by your friends, but also by Parents, guardians, and relatives Parents, guardians, and relatives Teachers and principals Teachers and principals Colleges and universities Colleges and universities Employers Employers ONLINE PREDATORS ONLINE PREDATORS If it is on the Internet, IT IS NOT PRIVATE.

20 Webcams Kids and teens use webcams to Kids and teens use webcams to Stay connected with friends and family Stay connected with friends and family Make videos with friends Make videos with friends Record videos and post on websites Record videos and post on websites Express themselves through video blogs Express themselves through video blogs

21 Webcams Children should Children should Check their surroundings for revealing information Check their surroundings for revealing information Remember that videos can be saved, accessed, and altered Remember that videos can be saved, accessed, and altered Webcams can be used for Webcams can be used for Manipulation and exploitation Manipulation and exploitation Self-production of child pornography Self-production of child pornography

22 Cell Phones Teach children Teach children Never to post their cell phone number online Never to post their cell phone number online Not to respond to harassing texts Not to respond to harassing texts Sending explicit images of themselves puts them at risk for exploitation Sending explicit images of themselves puts them at risk for exploitation

23 W HAT Y OU C AN D O

24 Set Your Own Rules Establish rules for Internet use Establish rules for Internet use What sites can your child visit? What sites can your child visit? Who can they talk to? Who can they talk to? How much time can they spend online? How much time can they spend online? Keep the computer in a common room (not in secluded areas like a bedroom or basement) Keep the computer in a common room (not in secluded areas like a bedroom or basement)

25 Communicate Discuss the importance of telling you or a trusted adult if anything ever makes your child feel scared, uncomfortable, or confused while online Discuss the importance of telling you or a trusted adult if anything ever makes your child feel scared, uncomfortable, or confused while online Communicate Communicate Prepare yourself beforehand Prepare yourself beforehand Be open with your children and encourage them to confide in you Be open with your children and encourage them to confide in you

26 Be Informed Learn everything you can about the Internet Learn everything you can about the Internet Ask your kids to show you places they go Ask your kids to show you places they go Learn chat room lingo by going to for a list of acronyms like POS = Parent Over Shoulder Learn chat room lingo by going to for a list of acronyms like POS = Parent Over Shoulder Know what other access your child may have including text messaging. Know what other access your child may have including text messaging.

27 Safeguard Consider safeguarding options Consider safeguarding options Filtering applications restrict access to inappropriate material Filtering applications restrict access to inappropriate material Monitoring software records websites visited, chat conversations, and other content Monitoring software records websites visited, chat conversations, and other content Spector Pro * WebWatcher * SpyAgnet * eBlaster * Keylogger Spector Pro * WebWatcher * SpyAgnet * eBlaster * Keylogger Passwords Passwords Asterwin (Shows windows saved password behind *******) Asterwin (Shows windows saved password behind *******)

28 Encourage Reporting Of the 1 in 7 youth who encountered a sexual solicitation or approach, only 12% told a parent Of the 1 in 7 youth who encountered a sexual solicitation or approach, only 12% told a parent Only 5% of sexual solicitations were reported to authorities such as a law- enforcement agency, an Internet service provider, or a hotline Only 5% of sexual solicitations were reported to authorities such as a law- enforcement agency, an Internet service provider, or a hotline

29 R ESOURCES

30 EDUCATE EDUCATE Learn about the issue Learn about the issue ENGAGE ENGAGE Use NetSmartz to enhance your childrens abilities to recognize and avoid potential dangers Use NetSmartz to enhance your childrens abilities to recognize and avoid potential dangers EMPOWER EMPOWER Give your children the confidence to make safer choices online and in the real world Give your children the confidence to make safer choices online and in the real world

31 Visit our websites Visit our websites Send us an Send us an Call Call

32 Additional Resources CyberTipline CyberTipline NetSmartz411 NetSmartz411 ICAC ICAC

33 IM Archiving Cant View without proper program installed Yahoo Yahoo C:\Program Files\Yahoo!\Messenger\Profiles\USER_NAME\Arc hive\Messages C:\Program Files\Yahoo!\Messenger\Profiles\USER_NAME\Arc hive\Messages AIM AIM C:\Program Files\AIM6\Chat Logs\AIMLogger\USER_NAME\IM Logs C:\Program Files\AIM6\Chat Logs\AIMLogger\USER_NAME\IM Logs C:\Documents and Settings\user\My Documents\AIMLogger\USER_NAME\IM Logs C:\Documents and Settings\user\My Documents\AIMLogger\USER_NAME\IM Logs MySpace MySpace C:\Program Files\MySpace\IM C:\Program Files\MySpace\IM

34 Temporary Internet Files Temporary Internet Files Temporary Internet Files Remnant Files from Internet Use Remnant Files from Internet Use Will show vested websites, pictures, and videos viewed on the Web. Will show vested websites, pictures, and videos viewed on the Web. Will contain remnants of Web Based usage. Will contain remnants of Web Based usage. Yahoo, MSN, AOL, Hotmail, Gmail Yahoo, MSN, AOL, Hotmail, Gmail Cookies Cookies Small text files left by web sites to save preferences, habits, and/or login information. Small text files left by web sites to save preferences, habits, and/or login information. Both can be Deleted from the Internet Options manually or be set to delete when the browser is closed. (User specified size) Both can be Deleted from the Internet Options manually or be set to delete when the browser is closed. (User specified size)

35 Temporary Internet Files

36 Internet History Internet History Internet History History of web pages visited (user specific) History of web pages visited (user specific)

37 Typed URLs (Uniform Resource Locator) Web Address that are typed in to the address bar, not clicked on as a link, or from the Favorites menu. Web Address that are typed in to the address bar, not clicked on as a link, or from the Favorites menu. They are cleared if the Internet History is cleared They are cleared if the Internet History is cleared

38 Thank You !


Download ppt "PARENTS/COMMUNITIES I NTERNET S AFETY P RESENTATION :"

Similar presentations


Ads by Google