2 Internet 101 Shopping Banking Research Travel Booking Distance LearningShare Photos/VideosDownload MusicDownload MoviesPlay GamesChatRead/WriteJob Search
3 Kids Online The Internet is accessible from almost any location School * Friends House * Library * Home * Cell Phone * Gaming UnitKids need your help navigating the Internet to avoid its risksStart a dialog and explore the Internet with them
4 ONLINE RISKS Exposure to Inappropriate Material Sexual Solicitation Harassment and BullyingTheft of Personal InformationPredators areOn the same websites as your childrenMale or femaleAny ageAny professionExperts at “grooming” methods
5 Online Enticement and “Grooming” To entice your children, predatorsOffer attention and affectionSend money and giftsPersuade them to keep the relationship secretTalk about inappropriate and sexual topicsSend sexually explicit imagesAsk to meet in personAre patient when developing a relationship
6 Where Did This Sexual Solicitation Occur? Computer Location70% at home22% at someone else’s house4% at School3% at Library
7 Exposure to Inappropriate Material PornographyHateful, racist, and violent contentDetails of illegal activityWhere to get drugsHow to make drugs and explosivesUnderage drinkingLock-pickingGambling websites
8 Revealing Too MuchPersonal information that can lead a predator to your doorstepPhotos and videos should never be posted online if they showBackgrounds that reveal identifying informationSexually provocative posesToo much skinName Age Birthday Phone Number Schedule School Location
9 Spyware, Spam, and Scams Check the legitimacy of a website Only download from trustworthy sourcesDon’t give out information to soliciting sites and sIf an offer seems too good to be true, it usually is
10 What Is Cyberbullying? Spreading rumors and gossip Posting pictures without consentStealing passwords to assume someone’s identityHarassing or threatening with offensive language
11 What to Do Children who are cyberbullied should Not respond to harassing messagesSave the evidenceSet up new accountsIf you feel like your child is in immediate danger, contact your local law-enforcement agency
12 E-mail, IM, and Chatrooms Instant messaging is most popularScreen names and addresses should be chosen wiselyOnline identities are easily createdWho are your children communicating with?
13 Online Gaming Children connect with users all over the world Voice-enabled chat allows users to hear and speak to each otherCyberbullying is commonMany games are inappropriate for children
14 File-sharing Download and share media with P2P It’s illegal to share copyrighted materials without permissionIt’s easy to unknowingly download or distribute viruses and illegal materialMusic Movies Videos Photos Documents Software
17 Social Networking Sites ProsEnhance Communication SkillsImprove writing skillsSpark creativityHelp teens develop a personal identity and express themselvesKeep in touch with friends and familyConsInformation can be inadvertently revealed in picturesSexually provocative Pictures can be used for exploitation.Teens Reveal to much personal informationTeens are to trusting of what people tell them on-line
18 Safer Social Networking Make your own profile and add your children as friendsLearn the site’s safety featuresHave children use privacy settingsExamine their list of friends and browse their friends’ pages
19 Real-Life Consequences Profiles and blogs are not only viewed by your friends, but also byParents, guardians, and relativesTeachers and principalsColleges and universitiesEmployersONLINE PREDATORSIf it is on the Internet, IT IS NOT PRIVATE.
20 Webcams Kids and teens use webcams to Stay connected with friends and familyMake videos with friendsRecord videos and post on websitesExpress themselves through video blogsPredators use them to gain information about the location and lifestyle of the teens and to try and sexually exploit them possible by blackmail. There are viruses that can be installed on computers that allow the predator to active and view your web cam remotely with out your knowledge.
21 Webcams Children should Webcams can be used for Check their surroundings for revealing informationRemember that videos can be saved, accessed, and alteredWebcams can be used forManipulation and exploitationSelf-production of child pornographyPeople will use items in the background to try and identify you or find something that they will be able to use to blackmail you with. If your child showed something that would be embarrassing or get them in trouble the predator will use that web cam broadcast and threaten to show their friends or family if you don’t do what they say. This also included still pictures that are sent via file transfer, , or web posting.
22 Cell Phones Teach children Never to post their cell phone number onlineNot to respond to harassing textsSending explicit images of themselves puts them at risk for exploitation
24 Set Your Own Rules Establish rules for Internet use What sites can your child visit?Who can they talk to?How much time can they spend online?Keep the computer in a common room (not in secluded areas like a bedroom or basement)
25 CommunicateDiscuss the importance of telling you or a trusted adult if anything ever makes your child feel scared, uncomfortable, or confused while onlineCommunicatePrepare yourself beforehandBe open with your children and encourage them to confide in you
26 Be Informed Learn everything you can about the Internet Ask your kids to show you places they goLearn chat room lingo by going to for a list of acronyms like POS = Parent Over ShoulderKnow what other access your child may have including text messaging.
27 Safeguard Consider safeguarding options Filtering applications restrict access to inappropriate materialMonitoring software records websites visited, chat conversations, and other contentSpector Pro * WebWatcher * SpyAgnet * eBlaster * KeyloggerPasswordsAsterwin (Shows windows saved password behind *******)
28 Encourage ReportingOf the 1 in 7 youth who encountered a sexual solicitation or approach, only 12% told a parentOnly 5% of sexual solicitations were reported to authorities such as a law-enforcement agency, an Internet service provider, or a hotline
30 EDUCATE ENGAGE EMPOWER Learn about the issue Use NetSmartz to enhance your children’s abilities to recognize and avoid potential dangersEMPOWERGive your children the confidence to make safer choices online and in the real world
31 Visit our websites Send us an e-mail Call 1-800-843-5678 Send us anCall
33 IM Archiving Cant View without proper program installed Yahoo AIM C:\Program Files\Yahoo!\Messenger\Profiles\USER_NAME\Archive\MessagesAIMC:\Program Files\AIM6\Chat Logs\AIMLogger\USER_NAME\IM LogsC:\Documents and Settings\user\My Documents\AIMLogger\USER_NAME\IM LogsMySpaceC:\Program Files\MySpace\IM
34 Temporary Internet Files Remnant Files from Internet UseWill show vested websites, pictures, and videos viewed on the Web.Will contain remnants of Web Based usage.Yahoo, MSN, AOL, Hotmail, GmailCookiesSmall text files left by web sites to save preferences, habits, and/or login information.Both can be Deleted from the Internet Options manually or be set to delete when the browser is closed. (User specified size)