Presentation is loading. Please wait.

Presentation is loading. Please wait.

Social Networking and Electronic Communication Copyright © Cannady ACOS. All rights reserved.

Similar presentations


Presentation on theme: "Social Networking and Electronic Communication Copyright © Cannady ACOS. All rights reserved."— Presentation transcript:

1 Social Networking and Electronic Communication Copyright © Cannady ACOS. All rights reserved.

2 OBJECTIVE  The objective of this lesson is for each student to practice safe uses of social networking and electronic communication.  Sample(s) of Behavior (SOBs): Recognizing dangers of online predatorsRecognizing dangers of online predators Protecting personal information onlineProtecting personal information online Recognize risk of identity theftRecognize risk of identity theft

3 ONLINE PREDATORS Using Internet communication tools such as chat rooms, e-mail, and instant messaging can put children at potential risk of encountering online predators.chat roomsinstant The anonymity of the Internet means that trust and intimacy can develop quickly online. Predators take advantage of this anonymity to build online relationships with inexperienced young people. Parents can help protect their kids by becoming aware of the risks related to online communication and being involved in their kids' Internet activities. How do online predators work? Predators establish contact with kids through conversations in chat rooms, instant messaging, e- mail, or discussion boards. Many teens use peer support online forums to deal with their problems. Predators often go to these online areas to look for vulnerable victims. Online predators try to gradually seduce their targets through attention, affection, kindness, and even gifts, and often devote considerable time, money, and energy to this effort. They're aware of the latest music and hobbies likely to interest kids. They listen to and sympathize with kids' problems. They also try to ease young people's inhibitions by gradually introducing sexual content into their conversations or by showing them sexually explicit material.

4 ONLINE PREDATORS Continued Some predators work faster than others, engaging in sexually explicit conversations immediately. This more direct approach may include harassment or stalking. Predators may also evaluate the kids they meet online for future face-to- face contact. Which young people are at risk? Young adolescents are the most vulnerable age group and are at high risk of being approached by online predators. Young adolescents are exploring their sexuality, moving away from parental control, and looking for new relationships outside the family. Under the guise of anonymity, they are more likely to take risks online without fully understanding the possible implications.

5 ONLINE PREDATORS Continued Young people who are most vulnerable to online predators tend to be:  new to online activity and unfamiliar with netiquette  aggressive computer users  the type to try new, edgy activities in life  actively seeking attention or affection  rebellious  isolated or lonely  curious  confused regarding sexual identity  easily tricked by adults  attracted by subcultures apart from their parents' world Kids feel they are aware of the dangers of predators, but in reality, they are quite naive about online relationships.

6 ONLINE PREDATORS Continued How can parents minimize the risk of a child becoming a victim?  Talk to your kids about sexual predators and potential online dangers.  Use parental control software that’s built into new operating systems like Windows Vista or that you can download for free like Windows Live Family Safety Settings. Windows VistaWindows Live Family Safety SettingsWindows VistaWindows Live Family Safety Settings  Insist that your kids follow age limits on social networking Web sites. The recommended age for signing up for social networking sites like Windows Live Spaces or MySpace is usually 13 and over. If your children are under the recommended age for these sites, do not let them use the sites. social networking Web sitessocial networking Web sites  Young children should not use chat rooms—the dangers are too great. As children get older, direct them towards well-monitored kids' chat rooms. Encourage even your teens to use monitored chat rooms.  If your children take part in chat rooms, make sure you know which ones they visit and with whom they talk. Monitor the chat areas yourself to see what kind of conversations take place.  Instruct your children to never leave the chat room's public area. Many chat rooms offer private areas where users can have one-on-one chats with other users—chat monitors can't read these conversations. These are often referred to as "whisper" areas.

7 ONLINE PREDATORS Continued  Keep the Internet-connected computer in a common area of the house, never in a child's bedroom. It is much more difficult for a predator to establish a relationship with your child if the computer screen is easily visible. Even when the computer is in a public area of your home, sit with your child when they are online.  When your children are young, they should share the family e-mail address rather than have their own e-mail accounts. As they get older, you can ask your Internet Service Provider (ISP) to set up a separate e-mail address, but your children's mail can still reside in your account.  Tell your children to never respond to instant messaging or e-mails from strangers. If your children use computers in places outside your supervision— public library, school, or friends' homes—find out what computer safeguards are used.  If all precautions fail and your kids do meet an online predator, don't blame them. The offender always bears full responsibility. Take decisive action to stop your child from any further contact with this person.

8 ONLINE PREDATORS Continued How can your kids reduce the risk of being victimized? There are a number of precautions that kids can take, including:  Never downloading images from an unknown source—they could be sexually explicit.  Using e-mail filters. e-mail filters.e-mail filters.  Telling an adult immediately if anything that happens online makes them feel uncomfortable or frightened.  Choosing a gender-neutral screen name that doesn't contain sexually suggestive words or reveal personal information.  Never revealing personal information about themselves (including age and gender) or information about their family to anyone online and not filling out online personal profiles. For more specific rules about personal information on sites like Windows Live Spaces or MySpace, see How to help your kids use social networking Web sites more safely. How to help your kids use social networking Web sites more safelyHow to help your kids use social networking Web sites more safely  Stopping any e-mail communication, instant messaging conversations, or chats if anyone starts to ask questions that are too personal or sexually suggestive.  Posting the family online agreement near the computer to remind them to protect their privacy on the Internet.

9 ONLINE PREDATORS Continued How can you tell if your child is being targeted? It is possible that your child is the target of an online predator if:  Your child or teen spends a great deal of time online. Most children who are victims of online predators spend a lot of time online, particularly in chat rooms, and may close the doors to their rooms and be secretive about what they do when they go work on their computer.  You find pornography on the family computer. Predators often use pornography to sexually victimize children—supplying things such as Web sites, photos, and sexual e- mail messages as a way to open sexual discussions with potential victims. - Predators may use photos of child pornography to convince a child that it is normal for adults to have sex with children. You should be aware that your child may hide pornographic files on disks, especially if other family members use the computer. - Sexually victimized children tend to become withdrawn and depressed.  Your child is using someone else's online account. Even kids who don't have access to the Internet at home may meet an offender while online at a friend's house or at another public place, even the library. Predators sometimes provide victims with a computer account so they can communicate.

10 ONLINE PREDATORS Continued  Your child or teen receives phone calls from people you don't know, or makes calls (sometimes long distance) to numbers you don't recognize. After establishing contact with your child online, some online predators may try to contact young people to engage in phone sex, or to try to set up a real-world, face-to-face meeting. If children hesitate at giving out their home phone number, online sex offenders will provide theirs. - Some even have toll-free 1-800 numbers, so potential victims can call them without their parents' knowledge. Others will tell children to call collect—and then, with Caller ID or Call Display, the predators can easily determine the child's phone number. - Do not allow your child to meet a stranger they have met online, in person, without your supervision.  Your child or teen receives mail, gifts, or packages from someone you don't know. It's common for offenders to send letters, photographs, and gifts to potential victims. Online sex offenders even send airline tickets to entice a child or teen to meet them in person.  Your child or teen withdraws from family and friends, or quickly turns the computer monitor off or changes the screen if an adult enters the room. Online predators work hard to drive wedges between kids and their families, often exaggerating minor problems at home.

11 ONLINE PREDATORS Continued What can you do if your child is being targeted?  If your child receives sexually explicit photos from an online correspondent, or if she or he is solicited sexually in e-mail, instant messaging, or some other way online, contact your local police. Save any documentation including e-mail addresses, Web site addresses, and chat logs to share with the police.  Check your computer for pornographic files or any type of sexual communication—these are often warning signs.  Monitor your child's access to all live electronic communications, such as chat rooms, instant messaging, and e-mail. Online predators usually meet potential victims in chat rooms at first, and then continue communicating with them through e-mail or instant messaging.

12 ONLINE PREDATORS Continued 12 Internet Safety Tips 12 Internet Safety Tips (Safety tips for protecting kids online)  If possible, keep the computer in a visible place in the house. Ask questions. Walk by and check what is on the screen. If your child quickly closes the screen, this is a red flag and should be investigated.  Spend time on the Internet with your children. Go online with your children as often as possible and help them identify inappropriate communications. Give them a chance to show you what they have learned or the things they like. Send E-Greetings and Christmas cards to family and friends or participate in interactive games together. Ask your children to tell about their cyberspace friends, just as you would want to know their real-life friends.  Schedule Internet use for your children. Limit young grade-schoolers to 30-60 minutes a few times a week; older kids may need more frequent access for school projects. This will make them more responsible in using the Internet.

13 ONLINE PREDATORS Continued  Set Traffic Limits. Limit your children to 1-3 megabytes they can download/upload per day to prevent them from downloading pornographic films or non-licensed software.  Limit your children to only certain websites, newsgroups and chat rooms. Sit down with your child and agree on types of websites your child may and may not visit. Limit the use of Instant Messaging and chat rooms.  Never give out personal information. Instruct your kids never to give out personal information (name, address, age, telephone number, password, credit card number, and so on) in chat rooms, email, or bulletin boards. Be aware that Web sites for children- even the most reputable ones-sometimes ask for e-mail and home addresses, telephone numbers, and parents' professions before allowing children to enter.  Never have online profiles. Instruct your kids never to have online profiles, so they will not be listed in directories and are less likely to be approached in children's chat rooms, where pedophiles often search for prey.

14 ONLINE PREDATORS Continued  Use nicknames instead of real names. A nickname-an online alias (like KingStar or PinkPanther)-is also vital to protecting privacy because it conceals a person's real identity. Consider sharing the same nickname and e-mail address with your children under 14 so that you can closely monitor the instant and e-mail messages that come to them. Do not allow your children to select sexually suggestive nicknames.  Never allow a child to arrange a face-to-face meeting with someone they met online. Instruct children to never arrange a face-to-face meeting with another computer user without parental permission. Never allow them to get together with someone they "met" online without first checking this "friend" out to the best of your ability. If a meeting is arranged, make the first one in a public place, and be sure to accompany your child. Thus, someone indicating that "she" is a "12-year-old girl" could in reality be a 40-year- old man.

15 ONLINE PREDATORS Continued  Randomly check visited web sites log. Viewing the log of visited web sites can give you enough information about your kid's habits, interests and online friends. Normally you should do this only occasionally but if your child becomes secretive, then you should check more often. If you find that the history of sites visited is deleted in your Web Browser, this is a signal that something is going on and should be investigated.  Teach children netiquette. Good manners can protect kids, too. Words written are just as strong as words spoken. Tell children never to respond to messages or bulletin board postings that are suggestive, obscene, or harassing. Ask them to be sensitive to others' feelings when posting online messages and to avoid being rude, mean, sarcastic, or excessively argumentative. A comment that's meant to be funny could seem insulting and make others mad. Visit message boards and chat rooms with your kids to point out comments that could be misinterpreted.

16 ONLINE PREDATORS Continued  Teach children be careful with e-mails from people they do not know. Instruct your child never to open emails, especially with attachments, from people they do not know. Most likely these emails contain a computer virus or they are mass mailing (spam) e-mails with inappropriate content.

17 ONLINE PREDATORS Continued How to help your kids use social Web sites more safely Whether they’re doing their homework on the family computer in the living room or texting and Web surfing on their cell phone in the backseat of your car, it may seem like your children are connected at all times. Social Web sites are extremely popular among teenagers, and are growing in popularity with younger kids. Kids use social Web sites to connect with others who might live halfway around the world and with their peers whom they pass every day in the hallways at school. Kids can use social Web sites to express their emotions or even to perform unofficial background checks on other people they meet at parties and at school. For example, after they meet someone in person, a kid might visit that other the new acquaintance's Web site to find out if he or she might be someone they’d like to be friends with.

18 ONLINE PREDATORS Continued These days, many kids draw little distinction between real life and online life. They may use social Web sites designed for children such as Webkinz or Club Penguin, or social Web sites designed for adults such as Windows Live Spaces, YouTube, MySpace, Flickr, Twitter, Facebook, and others. Whatever they’re doing, they should understand that many of these Web pages can be viewed by anyone with access to the Internet. Kids can use these sites to: - Chat. - Play games. - Post and browse through photos and videos. - Blog. - Post an online profile. Unfortunately, some of the information kids post on their pages can also make them vulnerable to phishing scams, cyberbullying, and Internet predators. Here are several ways you can help your kids can use social Web sites more safely.phishing scams

19 ONLINE PREDATORS Continued Communicate with your children about their experiences Encourage your children to tell you if something they encounter on one of these sites makes them feel anxious, uncomfortable or threatened. Stay calm and remind your kids they are not in trouble for bringing something to your attention. Let them know you will work with them to help resolve the situation for a positive outcome. Set your own house Internet rules As soon as your children begin to use the Internet on their own, it is a good idea to come up with a list of rules for using the Internet that everyone can agree on. These rules should include whether your children can use social Web sites and how they can use them. For more information on setting rules, see Using family contracts to help protect your kids online.Using family contracts to help protect your kids online Ensure your kids follow age limits on the site The recommended age for signing up for social Web sites is usually 13 and over. If your children are under the recommended age for these sites, do not let them use the sites. It is important to remember that you cannot rely on the services themselves to keep your underage child from signing up.

20 ONLINE PREDATORS Continued  Educate yourself about the site Evaluate the sites that your child plans to use and make sure both you and your child understand the privacy policy and the code of conduct. Find out if the site monitors content that people post. Also, review your child's page periodically. For more suggestions, see Tips on blogging safely for parents and kids. Tips on blogging safely for parents and kidsTips on blogging safely for parents and kids  Insist that your children never meet anyone in person that they’ve communicated with online only, and encourage them to communicate only with people they’ve met in person Kids are in real danger when they meet strangers in person whom they’ve communicated with online only. You can help protect your children by encouraging them to use these sites to communicate with their friends, but not with people they’ve never met in person.  It might not be enough to simply tell your child not to talk to strangers, because your child might not consider someone they’ve "met" online to be a stranger. For more advice on protecting your children on the Internet, see Online predators: What you can do to minimize the risk. Online predators: What you can do to minimize the riskOnline predators: What you can do to minimize the risk  Ensure your kids don't use full names Have your children use only their first names or a nickname, but not a nickname that would attract inappropriate attention. Also, do not allow your children to post the full names of their friends.

21 ONLINE PREDATORS Continued  Be wary of other identifiable information in your child’s profile Many social Web sites allow kids to join public groups that include everyone who goes to a certain school. Be careful when your children reveal this and other information that could be used to identify them, such as their school mascots, their workplaces,or the name of the towns they live in. Too much information can make your children vulnerable to cyberbullying, Internet predators, Internet fraud, or identity theft. For more information, see Recognize phishing scams and fake e-mails see Recognize phishing scams and fake e-mailssee Recognize phishing scams and fake e-mails  Consider using a site that is not very public Some Web sites allow you to password-protect your site or use other methods to help limit viewers to only people your child knows. With Windows Live Spaces, for example, you can set permissions for who can view your site, ranging from anyone on the Internet to only people you choose.  Be smart about details in photographs Explain to your children that photographs can reveal a lot of personal information. Encourage your children not to post photographs of themselves or their friends with clearly identifiable details such as street signs, license plates on their cars, or the name of their school on their sweatshirts.

22 ONLINE PREDATORS Continued  Warn your child about expressing emotions to strangers You've probably already encouraged your kids not to communicate with strangers directly online. However, kids use social Web sites to write journals and poems that often express strong emotions. Explain to your children that many of these words can be read by anyone with access to the Internet and that predators often search out emotionally vulnerable kids. For more information, see 10 things you can teach kids to improve their Web safety. 10 things you can teach kids to improve their Web safety10 things you can teach kids to improve their Web safety  Teach your children about cyberbullying As soon as your children are old enough to use social Web sites, talk to them about cyberbullying. Tell them that if they think they're being cyberbullied, they should share this information right away with a parent, a teacher, or another adult that they trust. It's also important to encourage kids to communicate with other people online in the same way they would face-to-face. Ask kids to treat other people the way they would prefer to be treated.  Removal of your child’s page If your children refuse to abide by the rules you’ve set to help protect their safety and you’ve attempted to help them change their behavior, you can contact the social Web site your child uses and ask them to remove the page. You may also want to investigate Internet-filtering tools (such as Windows Live Family Safety) as a complement to, not a replacement for, parental supervision Windows Live Family SafetyWindows Live Family Safety

23 PROTECTING PERSONAL INFORMATION  Online fraud can be annoying and costly and might pose serious risks to your computer. To help reduce online fraud, learn to recognize scams and take steps to avoid them.  Identity theft is not new, but the cost to consumers has risen since criminals have gone online. Criminals who want to gain access to your online accounts use phishing, hoaxes, or other scams to obtain personal information such as your name, social security number, account name, or password.  What is a phishing scam? Phishing is a type of deception designed to steal your valuable personal data such as credit card numbers, Windows Live IDs, and other account data and passwords. Phishing is also known as identity theft and is a type of social engineering. Windows Live IDsidentity theftsocial engineeringWindows Live IDsidentity theftsocial engineering

24 PROTECTING PERSONAL INFORMATION Continued Common phishing scams:  Spoofs of businesses that you know and trust. These are e-mail messages that purport to be from companies or services that you know and trust such as your bank and could contain urgent messages with threats of account closures or other alarming consequences.  Lottery scams and other advanced fee fraud scams. Lottery scams and other advanced fee fraud scams. Lottery scams and other advanced fee fraud scams. For example, an e-mail message might request your help in a financial transaction such as the transfer of a large sum of money into your account. Or a message might contain a claim that you have received a large inheritance from someone you do not know or that you have won a lottery that you did not enter. For more information, see Scams that promise money, gifts, or prizes. Scams that promise money, gifts, or prizesScams that promise money, gifts, or prizes  Rogue security software scams. Rogue security software scams. Rogue security software scams. These are e-mail messages, Web sites, or pop-up windows that tell you that your computer is unsafe. If you download the software they offer so you can receive help, you could damage your system or waste money on software that you don't need.

25 PROTECTING PERSONAL INFORMATION Continued You might see a phishing scam:  In e-mail messages, even if the messages appear to be from a coworker or someone you know.  On social networking Web sites. social networkingsocial networking  On Web sites that appear to accept donations for charity. donations  On Web sites that spoof familiar sites but that use slightly different Web addresses. slightly different Web addressesslightly different Web addresses  In your instant message (IM) program. instant message (IM) programinstant message (IM) program  On your cell phone or other mobile device.

26 PROTECTING PERSONAL INFORMATION Continued Six signs of a scam  Generic greetings such as "Dear Customer," which indicate that the sender does not know you and should not be trusted.  Alarming or urgent statements that require you to respond immediately.  Requests for personal or financial information, such as user names, passwords, credit card or bank account numbers, social security numbers, dates of birth, or other information that can be used to steal your identity.  Misspellings and grammatical errors, including Web addresses. The Web address might look very similar to the address of a legitimate business, but with a minor alteration. For example, instead of www.microsoft.com, the scammer might use www.micrsoft.com. For more information, see Typos can cost you. Typos can cost youTypos can cost you  The text of the link in the e-mail message to you is different from the Web address that you are directed to when you click the link. You can identify the actual Web address in a link by hovering over the link without clicking it. The Web address appears in a text box above the link.  The "From" line in the original e-mail message to you shows a different Web address than the one that appears when you try to reply to the message.

27 PROTECTING PERSONAL INFORMATION Continued How can I help prevent a scam from happening to me?  The following suggestions could help you avoid online fraud.  Delete spam. Do not open it or reply to it, even to ask to be removed from a mailing list. When you reply, you confirm to the senders that they have reached an active e-mail account and make yourself vulnerable to further abuse. spam  Use caution when you click links in e-mail messages, text messages, pop-up windows, or instant messages. Instead, type Web addresses in a Web browser, or use your online Favorites or bookmarks.  Do not open e-mail attachments or click instant message download links unless you know who sent the message and you were expecting the attachment or link.  Be cautious about providing your personal or financial information online. Do not fill out forms in e-mail messages that ask for personal or financial information.  Create strong passwords and avoid using the same password for your bank and other important accounts. To test the strength of your password, use our Password Checker. For more information, see Creating a strong password for your e-mail account: why you should and how to do it. Create strong passwordsPassword CheckerCreating a strong password for your e-mail account: why you should and how to do it Create strong passwordsPassword CheckerCreating a strong password for your e-mail account: why you should and how to do it

28 PROTECTING PERSONAL INFORMATION Continued  Use Internet Explorer 8 or similar Web browsers that include an additional layer of protection with sites that use Extended Validation (EV) SSL Certificates. With Internet Explorer 8, the address bar turns green to notify you that there is more information available about the Web site you are visiting. The identity of the Web site owner is also displayed on the address bar. Use Internet Explorer 8 Use Internet Explorer 8  Turn on SmartScreen Filter in Internet Explorer 8 to help detect unsafe and potentially unsafe Web sites as you browse. Read the messages warning messages that you see to decide if you want to proceed to a suspicious Web site or not. SmartScreen FilterSmartScreen Filter  Visit Microsoft Update to install the latest security updates and turn on automatic updating. Make sure your computer's firewall is turned on and that you use antivirus and antispyware software that is updated automatically, such as Microsoft Security Essentials. For more information, see Help protect your PC with Microsoft Security EssentialsMicrosoft UpdatefirewallMicrosoft Security EssentialsHelp protect your PC with Microsoft Security Essentials  Check your bank and credit card statements closely to identify and report any transactions that are not legitimate.

29 PROTECTING PERSONAL INFORMATION Continued Never pay bills, bank, shop, or conduct other financial transactions on a public or shared computer or over a public wireless network. If you do log on to public computers, look for computers on networks that require a password, which increases security. What should I do with fraudulent e-mail messages? If you think an e-mail message might be fraudulent, we recommend taking the following precautions. - Delete the message. Do not respond or click links in it. - Report any suspicious activity. (See below for contact information.) - If you believe that someone is using your Windows Live account, you can reset your password. Go to http://login.live.com and click http://login.live.com Forgot your password? Fraudulent e-mail messages sometimes contain unwanted or malicious software (also known as malware). If you think you might have malware on your computer, go to safety.live.com and scan your computer to check for and remove unwanted software.. safety.live.com For more information, see What to do if you've responded to a phishing scam. What to do if you've responded to a phishing scamWhat to do if you've responded to a phishing scam

30 PROTECTING PERSONAL INFORMATION Continued Where to report suspicious activity If you suspect that something is wrong, there are several ways to report the possible fraud. Microsoft - If you suspect that you've received a phishing e-mail message, click report phishing scam on the message toolbar in Windows Live Hotmail or report the message to Microsoft.report the message - To report the Microsoft Lottery fraud, send an e-mail message to lotfraud@microsoft.com. lotfraud@microsoft.com For any other suspicious activity, go to support.live.com.support.live.com For Hotmail, go to the Hotmail Online Solutions CenterHotmail Online Solutions Center

31 PROTECTING PERSONAL INFORMATION Continued United States agencies Federal Trade Commission - To report advance fee fraud in the United States, forward the e-mail message to spam@uce.gov. spam@uce.gov - To report identity theft in the United States, visit the U.S. Federal Trade Commission (FTC) online or call toll free: (877) 438-4338. U.S. Federal TradeCommission (FTC) onlineU.S. Federal TradeCommission (FTC) online - To report other online scams or fraud in the United States, visit Filing a Complaint with the FTC, or call toll free: (877) 382-4357. Filing aComplaint with the FTCFiling aComplaint with the FTC Additional Resources - Visit these Web sites for additional information about how to protect yourself from fraud in the United States. Federal Government - OnGuard Online Federal Government - OnGuard Online Internet Crime Complaint Center Internet Crime Complaint Center United States Postal Inspection Service United States Postal Inspection Service LooksTooGoodToBeTrue.com Anti-phishing working group Anti-phishing working group

32 PROTECTING PERSONAL INFORMATION Continued 7 Practices for Computer Security Access to information and entertainment, credit and financial services, products from every corner of the world — even to your work — is greater than ever. Thanks to the internet, you can play a friendly game with an opponent across the ocean; review and rate videos, songs, or clothes; get expert advice in an instant; or collaborate with far- flung co-workers in a "virtual" office. But the internet — and the anonymity it affords — also can give online scammers, hackers, and identity thieves access to your computer, personal information, finances, and more. With awareness as your safety net, you can minimize the chance of an internet mishap. Being on guard online helps you protect your information, your computer, and your money. To be safer and more secure online, make these seven practices part of your online routine.

33 PROTECTING PERSONAL INFORMATION Continued 1. Protect your personal information. It's valuable. To an identity thief, your personal information can provide instant access to your financial accounts, your credit record, and other assets. If you think no one would be interested in YOUR personal information, think again. ANYONE can be a victim of identity theft. In fact, according to the Federal Trade Commission, millions of people become victims every year. Visit ftc.gov/idtheft to learn what to do if your identity is stolen or your personal or financial information has been compromised – online or in the "real" world. ftc.gov/idtheft How do criminals get your personal information online? One way is by lying about who they are, to convince you to share your account numbers, passwords, and other information so they can get your money or buy things in your name. The scam is called "phishing": criminals send email, text, or pop-up messages that appear to come from your bank, a government agency, an online seller or another organization with which you do business. The message asks you to click to a website or call a phone number to update your account information or claim a prize or benefit. It might suggest something bad will happen if you don't respond quickly with your personal information. In reality, legitimate businesses should never use email, pop-ups, or text messages to ask for your personal information.

34 PROTECTING PERSONAL INFORMATION Continued To avoid phishing scams:  Don't reply to an email, text, or pop-up message that asks for personal or financial information, and don't click on links in the message. If you want to go to a bank or business's website, type the web address into your browser yourself.  Don't respond if you get a message – by email, text, pop-up or phone – that asks you to call a phone number to update your account or give your personal information to access a refund. If you need to reach an organization with which you do business, call the number on your financial statement, or use a telephone directory.  Some identity thieves have stolen personal information from many people at once, by hacking into large databases managed by businesses or government agencies. While you can't enjoy the benefits of the internet without sharing some personal information, you can take steps to share only with organizations you know and trust. Don't give out your personal information unless you first find out how it's going to be used and how it will be protected.

35 PROTECTING PERSONAL INFORMATION Continued  If you are shopping online, don't provide your personal or financial information through a company's website until you have checked for indicators that the site is secure, like a lock icon on the browser's status bar or a website URL that begins "https:" (the "s" stands for "secure"). Unfortunately, no indicator is foolproof; some scammers have forged security icons. And some hackers have managed to breach sites that took appropriate security precautions.  Read website privacy policies. They should explain what personal information the website collects, how the information is used, and whether it is provided to third parties. The privacy policy also should tell you whether you have the right to see what information the website has about you and what security measures the company takes to protect your information. If you don't see a privacy policy — or if you can't understand it — consider doing business elsewhere.

36 PROTECTING PERSONAL INFORMATION Continued 2. Know who you're dealing with. And what you're getting into. There are dishonest people in the bricks and mortar world and on the internet. But online, you can't judge an operator's trustworthiness with a gut-affirming look in the eye. It's remarkably simple for online scammers to impersonate a legitimate business, so you need to know who you're dealing with. If you're thinking about shopping on a site with which you're not familiar, do some independent research before you buy. If it's your first time on an unfamiliar site, call the seller's phone number, so you know you can reach them if you need to. If you can't find a working phone number, take your business elsewhere. Type the site's name into a search engine: If you find unfavorable reviews posted, you may be better off doing business with a different seller. Consider using a software toolbar that rates websites and warns you if a site has gotten unfavorable reports from experts and other internet users. Some reputable companies provide free tools that may alert you if a website is a known phishing site or is used to distribute spyware.

37 PROTECTING PERSONAL INFORMATION Continued File-Sharing: Worth the hidden costs?  Every day, millions of computer users share files online. File-sharing can give people access to a wealth of information, including music, games, and software. How does it work? You download special software that connects your computer to an informal network of other computers running the same software. Millions of users could be connected to each other through this software at one time. Often, the software is free and easy to access.  But file-sharing can have a number of risks. If you don't check the proper settings, you could allow access not only to the files you intend to share, but also to other information on your hard drive, like your tax returns, email messages, medical records, photos, or other personal documents. In addition, you may unwittingly download malware or pornography labeled as something else. Or you may download material that is protected by the copyright laws, which would mean you could be breaking the law.  If you decide to use file-sharing software, be sure to read the End User Licensing Agreement to be sure you understand and are willing to tolerate the potential risks of free downloads.

38 PROTECTING PERSONAL INFORMATION Continued 3. Use security software that updates automatically. Keep your security software active and current: at a minimum, your computer should have anti-virus and anti-spyware software, and a firewall. You can buy stand-alone programs for each element or a security suite that includes these programs from a variety of sources, including commercial vendors or from your Internet Service Provider. Security software that comes pre-installed on a computer generally works for a short time unless you pay a subscription fee to keep it in effect. In any case, security software protects against the newest threats only if it is up-to-date. That's why it is critical to set your security software to update automatically. Some scam artists distribute malware disguised as anti-spyware software. Resist buying software in response to unexpected pop-up messages or emails, especially ads that claim to have scanned your computer and detected malware. That's a tactic scammers have used to spread malware. OnGuardOnline.gov can connect you to a list of security tools from legitimate security vendors selected by GetNetWise, a project of the Internet Education Foundation. Once you confirm that your security software is up-to-date, run it to scan your computer for viruses and spyware. If the program identifies a file as a problem, delete it.

39 PROTECTING PERSONAL INFORMATION Continued Anti-Virus Software  Anti-virus software protects your computer from viruses that can destroy your data, slow your computer's performance, cause a crash, or even allow spammers to send email through your account. It works by scanning your computer and your incoming email for viruses, and then deleting them. Anti-Spyware Software  Installed on your computer without your consent, spyware software monitors or controls your computer use. It may be used to send you pop-up ads, redirect your computer to websites, monitor your internet surfing, or record your keystrokes, which, in turn, could lead to the theft of your personal information. A computer may be infected with spyware if it: - Slows down, malfunctions, or displays repeated error messages - Won't shut down or restart - Serves up a lot of pop-up ads, or displays them when you're not surfing the web - Displays web pages or programs you didn't intend to use, or sends emails you didn't write.

40 PROTECTING PERSONAL INFORMATION Continued Firewalls  A firewall helps keep hackers from using your computer to send out your personal information without your permission. While anti-virus software scans incoming email and files, a firewall is like a guard, watching for outside attempts to access your system and blocking communications to and from sources you don't permit. Don't Let Your Computer Become Part of a "BotNet"  Some spammers search the internet for unprotected computers they can control and use anonymously to send spam, turning them into a robot network, known as a "botnet." Also known as a "zombie army," a botnet is made up of many thousands of home computers sending emails by the millions. Most spam is sent remotely this way; millions of home computers are part of botnets.  Spammers scan the internet to find computers that aren't protected by security software, and then install bad software – known as "malware" – through those "open doors." That's one reason why up-to-date security software is critical.

41 PROTECTING PERSONAL INFORMATION Continued  Malware may be hidden in free software applications. It can be appealing to download free software like games, file-sharing programs, customized toolbars, and the like. But sometimes just visiting a website or downloading files may cause a "drive-by download," which could turn your computer into a "bot.“  Another way spammers take over your computer is by sending you an email with attachments, links or images which, if you click on or open them, install hidden software. Be cautious about opening any attachments or downloading files from emails you receive. Don't open an email attachment — even if it looks like it's from a friend or coworker — unless you are expecting it or know what it contains. If you send an email with an attached file, include a text message explaining what it is.

42 PROTECTING PERSONAL INFORMATION Continued  Keep your operating system and Web browser up-to-date, and learn about their security features.  Hackers also take advantage of Web browsers (like Firefox or Internet Explorer) and operating system software (like Windows or Mac's OS) that don't have the latest security updates. Operating system companies issue security patches for flaws that they find in their systems, so it's important to set your operating system and Web browser software to download and install security patches automatically.  In addition, you can increase your online security by changing the built-in security and privacy settings in your operating system or browser. Check the "Tools" or "Options" menus to learn how to upgrade from the default settings. Use your "Help" function for more information about your choices.  If you're not using your computer for an extended period, disconnect it from the internet. When it's disconnected, the computer doesn't send or receive information from the internet and isn't vulnerable to hackers.

43 PROTECTING PERSONAL INFORMATION Continued 5. Protect your passwords. Keep your passwords in a secure place, and out of plain sight. Don't share them on the internet, over email, or on the phone. Your Internet Service Provider (ISP) should never ask for your password. In addition, hackers may try to figure out your passwords to gain access to your computer. To make it tougher for them: - Use passwords that have at least eight characters and include numbers or symbols. The longer the password, the tougher it is to crack. A 12- character password is stronger than one with eight characters. - Avoid common words: some hackers use programs that can try every word in the dictionary. - Don't use your personal information, your login name, or adjacent keys on the keyboard as passwords. - Change your passwords regularly (at a minimum, every 90 days). - Don't use the same password for each online account you access.

44 PROTECTING PERSONAL INFORMATION Continued 6. Back up important files. If you follow these tips, you're more likely to be free of interference from hackers, viruses, and spammers. But no system is completely secure. If you have important files stored on your computer, copy them onto a removable disc or an external hard drive, and store it in a safe place. 7. Learn what to do in an e-mergency. If you suspect malware is lurking on your computer, stop shopping, banking, and other online activities that involve user names, passwords, or other sensitive information. Malware could be sending your personal information to identity thieves. Confirm that your security software is up-to-date, then use it to scan your computer. Delete everything the program identifies as a problem. You may have to restart your computer for the changes to take effect. If the problem persists after you exhaust your ability to diagnose and treat it, you might want to call for professional help. If your computer is covered by a warranty that offers free tech support, contact the manufacturer. Before you call, write down the model and serial number of your computer, the name of any software you've installed, and a short description of the problem. Your notes will help you give an accurate description to the technician.

45 PROTECTING PERSONAL INFORMATION Continued If you need professional help, if your machine isn't covered by a warranty, or if your security software isn't doing the job properly, you may need to pay for technical support. Many companies — including some affiliated with retail stores — offer tech support via the phone, online, at their store, or in your home. Telephone or online help generally are the least expensive ways to access support services — especially if there's a toll-free helpline — but you may have to do some of the work yourself. Taking your computer to a store usually is less expensive than hiring a technician or repair person to come into your home. Once your computer is backed up and running think about how malware could have been downloaded to your machine, and what you could do to avoid it in the future. Also, talk about safe computing with anyone else who uses the computer. Tell them that some online activity can put a computer at risk, and share the seven practices for safer computing.

46 PROTECTING PERSONAL INFORMATION Continued Tips for Parents Parents sometimes can feel outpaced by their technologically savvy kids. Technology aside, there are lessons that parents can teach to help kids stay safer as they socialize online. Most ISPs provide parental controls, or you can buy separate software. But no software can substitute for parental supervision. Talk to your kids about safe computing practices, as well as the things they're seeing and doing online. Read more about chatting with kids about being online.chatting with kids about being online How to Report: Hacking or a Computer Virus Alert the appropriate authorities by contacting: - Your ISP and the hacker's ISP (if you can tell what it is). You can usually find an ISP's email address on its website. Include information on the incident from your firewall's log file. By alerting the ISP to the problem on its system, you can help it prevent similar problems in the future. - The FBI at www.ic3.gov. To fight computer criminals, they need to hear from you.www.ic3.gov

47 PROTECTING PERSONAL INFORMATION Continued Internet Fraud If a scammer takes advantage of you through an internet auction, when you're shopping online, or in any other way, report it to the Federal Trade Commission, at www.ftc.gov/complaint. The FTC enters internet, identity theft, and other fraud-related complaints into Consumer Sentinel, a secure, online database available to hundreds of civil and criminal law enforcement agencies in the U.S. and abroad.www.ftc.gov/complaint Deceptive Spam If you get deceptive spam, including email phishing for your information, forward it to spam@uce.gov. Be sure to include the full header of the email, including all routing information. spam@uce.gov You also may report phishing email to reportphishing@antiphishing.org. The Anti-Phishing Working Group, a consortium of ISPs, security vendors, financial institutions and law enforcement agencies, uses these reports to fight phishing.reportphishing@antiphishing.org Divulged Personal Information If you believe you have mistakenly given your personal information to a fraudster, file a complaint at www.ftc.gov/complaint, and then visit the Federal Trade Commission's Identity Theft website at ftc.gov/idtheft to learn how to minimize your risk of damage from a potential theft of your identity.www.ftc.gov/complaintftc.gov/idtheft

48 PROTECTING PERSONAL INFORMATION Continued Social Networking Sites Trust your instincts – and tell kids to trust theirs - if you (or they) are suspicious about something on a social networking site. If kids feel threatened by someone or uncomfortable because of something online, encourage them to tell you. You can then help them report concerns to the police and to the social networking site. Most sites have links where users can immediately report abusive, suspicious, or inappropriate online behavior.

49 IDENTITY THEFT Protect yourself from identity theft by being alert to signs of theft Taking the usual precautions against identity theft is important, but equally important is recognizing the signs that identity theft has already taken place. According to the FBI, approximately 500,000 to 700,000 Americans are victims of identity fraud each and every year. However, many people don't realize the theft of their identity for 3 months to 3 years. By the time of discovery, your credit and identity has already suffered much damage. Prevent this from happening to you; recognize the signs of identity theft before it are too late. your creditidentity theftyour creditidentity theft Signs of identity theft Keeping yourself safe from identity theft requires a few simple tips. Here are several you need to be on the lookout for: - Receiving statements for credit cards and bank accounts you never opened - Wrong information on your credit card statements. This information may not just be your balance but can include your social security number, address, your name or initials, and your employer. credit cardcredit card

50 IDENTITY THEFT Continued Not receiving expected bills or information If you get a loan, or make purchases and the bill never comes, don't assume the business made a mistake and you got off scot-free. Often, identity thieves use your account and change the address on the billing information so you purposely don't get the bill. In the meantime, they are already running up charges. get a loanaccountget a loanaccount Having trouble obtaining good lines of credit Company's denying credit or offering rates that you consider bad for no apparent reason is a clear sign something's up. If an identity thief has been at work in the background, your credit ratings may already be in ruin. Denying you credit or getting bad rates is an obvious red flag that your credit is suffering. credit Receiving calls and letters from debt collectors for items and services you never received. If you have any of these things happening to you, your identity may have already been stolen. If not, be on the lookout and stay alert for these tell-tell signs.

51 IDENTITY THEFT Continued Identity Theft Protection Toolbox The Right Tools for Identity Theft Protection Identity theft protection is necessary if you want to do your part to avoid becoming a victim of the crime. With the right arsenal of weapons in your toolbox, you can both lessen the likelihood of it happening and make recovery easier if, despite your best efforts, your identity is stolen anyway. Evaluate Your Passwords It may seem impossible to memorize the sheer volume of passwords that you have for various accounts, so it is tempting to make the task easier by making them all relatively similar. Try to avoid this temptation! accounts If your passwords are all similar, once an identity thief has hacked one account, the others are vulnerable. Make each password unique, try to avoid using personally identifying information (your name, children's names, birthdays, etc), and make sure you change them often.

52 IDENTITY THEFT Continued Credit Monitoring Services The credit bureaus and many other third-party companies offer credit monitoring services that immediately alert you if a change has taken place on your credit record. This can give you forewarning that your credit has been stolen, because it tells you if credit accounts are being opened or if existing accounts are being hacked, without the need to check your credit report on a monthly basis (you are only entitled to one free check of your credit report each year). your credit your credit Identity Theft Insurance Most major insurance companies now offer some sort of identity theft insurance policy that can be purchased for a modest annual premium. These services may help you monitor your credit report, but, most importantly, they assist you in recovering if your identity is stolen. insurance companies insurance companies These companies can also offer financial recompense to help you pay your bills if your accounts are hacked and money stolen, and they will assign an agent to you that will do all the legwork that is required (phone calls, letter writing, etc) to contact all of your creditors (legitimate and illegitimate) and straighten things out. financial If you tried to fit this all into your normal day, it could take years and cause an inordinate amount of stress. However, if your purchase the insurance, they will do it all for you, with minimal participation on your part. With this being the case, the insurance could prove to be the most invaluable tool in your identity theft protection toolbox!

53 SUMMARY   ONLINE PREDATORS  PROTECTING PERSONAL INFORMATION  IDENTITY THEFT

54 Sources  Microsoft. (2010) How to reduce the risk of online fraud http://www.microsoft.com/protect/fraud/phishing/reduce.aspx  Microsoft. (2010) Online predators: Help minimize the risk http://www.microsoft.com/protect/family/guidelines/predators.mspx  Consumer Response Center Federal Trade Commission. 7 Practices for Computer Security http://www.onguardonline.gov/topics/computer-security.aspx  Anderson, Max. (July 26, 2009) Recognize the Signs of Identity Theft before It's Too Late http://www.identitytheftfixes.com/recognize_the_signs_of_identitytheft_before _its_too_late.html  Hunter, Jessica. (September 1, 2008) Identity Theft Protection Toolbox http://www.identitytheftfixes.com/identity theft_protection_toolbox.html#more  Identity Theft Prevention http://www.identitytheftfixes.com/identity _theft_prevention

55 QUESTIONS????


Download ppt "Social Networking and Electronic Communication Copyright © Cannady ACOS. All rights reserved."

Similar presentations


Ads by Google