Presentation is loading. Please wait.

Presentation is loading. Please wait.

Thank you for your cooperation. We will begin shortly.

Similar presentations


Presentation on theme: "Thank you for your cooperation. We will begin shortly."— Presentation transcript:

1 Thank you for your cooperation. We will begin shortly.

2 © 2011 PCAV

3 1. Welcome and Introduction 2. Warm-up Exercise 3. Part1: Benefits, Risks, and Concerns 4. Part 2: Becoming Tech-Savvy 5. Part 3: Prevention, Intervention, and Responding 6. Part 4: A Few Technology Safety Tips 7. Closing Remarks, Evaluation and Post-Test

4  Emphasizes adult responsibility  Victim and perpetrator prevention and bystander education  Train adults in sexual abuse and prevention (SAFE-T)  Technology Safety Training Provide. Inform. Assist.

5  Technology safety program:  Children and teens (4-8 grade)  Parents/guardians  Educators  Trainers  Encourages safe online behavior  Addresses benefits and risks of technology use  Provides adult participants with resources and concrete tools  Presentation covers topics in manner that is age appropriate for group in attendance  Funded by grants  Internet Crimes Against Children Task Force (ICAC)  Comcast Foundation www.technicoolvt.org

6

7 Technology our children may be using:  Computers/laptops  Gaming consoles  Cell phones  Hand held gaming devices  Smart phones  Internet Places our children may be accessing technology:  Home  School  Friend’s house  Public library  After school programs  Unsecure wireless networks

8 Benefits, Risks and Concerns of Technology

9  Communication  Learning  Being informed  Networking  Entertainment  Employment  IT Skills

10  Cyberbullying  “Sexting”  Meeting online predators  Unsafe communities  Sharing inappropriate personal information, pictures, or video  Finding/searching inappropriate material  Scams  Violent Online Gaming www.cybersafefamily.com

11 Becoming Tech- Savvy

12

13 Type of Instant Message Program Users availability status User’s contacts (often called a ‘Buddy List’ or ‘Friends List’) Chat/dialogue screen

14 Type of Instant Message Program Room ‘Subject’ Message bar Chat screen Contacts/ others available for chat Users availability status

15 Anatomy of a Facebook Profile User name & status Personal information Photos & video of the user Comments by user and user friends Friends list, Friends photos, # of friends *Most other social networking sites user profiles include the same types of information User photo

16 Anatomy of a Twitter Profile User photo Name & Personal information Comments by user and user friends “Followers” Status bar

17 Prevention, Intervention, and Responding

18 *This is the MOST IMPORTANT part  Listen  Open dialogue  Keep your cool  Educate them on safe-internet and technology practices  Explain to them that something you put on the internet or send through technology can never be erased (digital memory)  Discuss media messages and technology  Encourage them to confide in you  Have conversations frequently

19  Monitor your child’s activities  Ask your kids to show you where they go online  Have discussions with them about what they do online  Ask about who they are talking to online  Watch how long they spend online  Let them know you would like to see their user profile(s)  Set ground rules for technology and internet  Know what access your child has to technology and internet  Google them to see what information is online about them

20  Learn everything you can about technology and the internet  Look for community classes on computers and software  Attend presentations (like this one!) or webinars on tech safety  Enlist your child as your teacher  Great for conversation starting and dialogue  Also lets you see what they already know  Research technology safety

21  Check your browser’s history and cookie files  Help create safe passwords and collect them  Ask children about any unfamiliar email addresses  Invest in monitoring and/or filtering software  Use safe web browsers/kid-friendly search engines *Remember, software programs are not substitutes for adult supervision Visit www.getparentalcontrols.org and www.internetsafety101.org for reviews of parental controls and for a list of internet service providers with parental control features, safe web searches and kid-friendly search engines

22  Keep technology in a common room  Have children shut down devices and store them outside of their bedrooms in a common room  Before bed  At other times you’ve indicated in your technology-use rules  Be aware of wireless networks in and around the home

23  Limit access time and establish curfew  Create a safe space/common room to keep devices  Identify what programs or websites can be used and visited  Define what they can use technology for (i.e. homework)  Require permission and discussion of particular tech/internet use (i.e. social networking sites or “friending”)  Agree to talk to children about concerns before automatically saying “no”  Set up consequences for not following the set rules * Before creating rules, communicate with your children about what types of activities they like to do online, where they go, who they talk to, etc. *Make rules and agreements age-appropriate See “Family Internet Agreement” in folder for examples of internet rules you can set with your child/dren.

24 A Few Specific Tech-Safety Tips

25 Go to www.netsmarz.org to watch a kid-friendly video, Password Rap, that details how to make safe passwords.  Different passwords for different accounts  Difficult for others to guess  At least 8 characters with a mix of capitals, lower case, numbers, and special characters  Give only to parents/guardians

26 See “Family Cell Phone Use Contract” in folder for example of cell phone rules you can set with your child/dren.  Only give their number to people they know in real life and trust  Respond to calls and texts only if they know the number  Inform your child that any pictures/videos taken with their cell phone are saved (even if they have deleted them)  Educate them about “sexting”  Teach them how to block numbers from their cell  Create a “Family Cell Phone Use Contract”

27 What to do if your child is being cyber-bullied What to do if you suspect your child is cyber-bullying  Be approachable and supportive  Believe what they are telling you  Collect evidence  Contact the school  Contact the parents of the offender  Contact the service provider  Teach them to not retaliate  Teach them empathy  Explain the hurtful nature of cyberbullying  Apply reasonable consequences  Set firm limits and follow through  Closely monitor computer, cell phone and gaming usage

28 If your child is at risk of:  Threats of violence  Extortion  Obscene or sexually explicit phone calls or text messages  Stalking or hate crimes  Child pornography

29 Evaluation & Post Test

30


Download ppt "Thank you for your cooperation. We will begin shortly."

Similar presentations


Ads by Google