Norwalk Police Department Community Services & Crime Prevention Unit Partnered with the National Center for Missing & Exploited Children and Federal Bureau.

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Thank you for your cooperation. We will begin shortly.
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Facebook Twitter MySpace Cell Phones ???!!!!
Don’t be bullied, or be a bully.
SESSION TEN Online Relationships. Social Networking Sites There are a number of things to think about when using social networking sites: Be careful what.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
Internet Online Safety How to have FUN and Stay in Control.
 NYS Internet Crimes Against Children Task Force E-Safety Mr Trofimczuk E-Safety 1.
Forms of Cyberbullying
Internet Safety for Students
INTERNET SAFETY.
A Guide to Internet Safety High School
Cyber and Internet Safety El Rodeo School September 11, 2013.
How to keep your kids safe online
The Internet is Forever
e-safety and cyber bullying
Using internet and cell phones safely
1 “Technology and Social Networking”. 2 Objectives 1.Describe technology that youth are using for social networking. 2.Recognize benefits and dangers.
Concept: Internet Safety Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful.
An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.
Youth and the Internet Info for Parents. Internet: Strengths and Weaknesses Internet is the free exchange of ideas Little to no regulation on information.
Internet Safety Awareness
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Internet Safety Christopher M. Sattele PLS: SP10 ENGOL P. Hutton.
Introduction Online gaming Webcams and videos File sharing , IM, and chat rooms Social networking.
What is Social Networking? Social networking sites provide teens and young adults with a virtual environment where they share stories, pictures, videos,
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Kara LaRose, School Counselor Willow Dale Elementary School
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
Video: SNL Clip Quick Facts Online teens admit that they frequently communicate with people they have never met. – 54% have Instant Messaged a stranger.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
INTERNET SAFETY Tips for becoming a “surfer” dude!
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Internet Safety Mrs. Oliver Technology
Internet Safety Social Networking & Cyber Bullying.
By: Zach Oltmanns.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
By: Jithin and Rey.  Cyber bullying is a form of bullying, which is carried out through an internet service such as , chat room, discussion group,
CHAT ROOMS What Makes Them Dangerous And How YOU Can Make Them Safe! MARY B. CONYERS PROTECT EVERYCHILD P. O. Box 749, Knightdale, NC
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
Being Good Digital Citizens with Today’s Technologies.
Cyberbullying Crossing the Line (With a Few Extra Vocabulary Words Added for Clarification Purposes Only)
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
T HINK ! Before You Post A lesson on Internet Safety Source:
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
94% of teens aged 12 – 17 use the Internet. 84% of online teens have a social networking profile. 84% of teens have cell phones; more than 88% are texting.
8 THINGS PARENTS CAN DO TO PREVENT CYBER BULLYING Belhaven Middle School, Linwood NJ from the New Jersey Principals and Supervisors Association Cyber Safety.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Cyber and Internet Safety (Parents’ Night)
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Working to Keep our Children Safe in a World Filled with Technology
Appropriate Use of Technology
Jeopardy iT Final Jeopardy iT $100 $100 $100 $100 $100 $100 $200 $200
SOCIAL MEDIA: ARE YOU PLAYING IT SAFE?.
Intervention and Prevention
Presentation transcript:

Norwalk Police Department Community Services & Crime Prevention Unit Partnered with the National Center for Missing & Exploited Children and Federal Bureau of Investigation Presented by Sergeant Andre Velez Norwalk, CT Police Department

INTERNET SAFETY Preventing Cyber-Bullying and Cyber- Stalking Norwalk Police Department Sergeant Andre Velez Crime Prevention Unit Presented By:

Outline How Children Get In Trouble Online How Children Get In Trouble Online Cyberbullying Cyberbullying Computer Intrusions Computer Intrusions Copyright Infringement Copyright Infringement Threats Threats Online Communities Online Communities Myspace etc. Myspace etc.

How Children Get In Trouble Online

How can kids get in trouble Cyber Bullying Cyber Bullying Online Harassment/Stalking Online Harassment/Stalking Computer Intrusions (hacking) Computer Intrusions (hacking) Copyright Infringement: Copyright Infringement: duplication/distribution of commercial software, MP3s, etc. duplication/distribution of commercial software, MP3s, etc. Threats against schools or others Threats against schools or others (themselves)

What is Cyberbullying?

What is Cyberbulling? (cyberbullying, cyber-bullying, online bullying) Definition: Definition: Cyber bullying is willful and repeated harm inflicted through the medium of electronic text. Cyber bullying is willful and repeated harm inflicted through the medium of electronic text. Like bullying, cyber bullying involves recurring harm and can be distinguished from peer harassment as a subset of aggressive behavior because bullying represents a pattern of behavior committed over a period of time. Like bullying, cyber bullying involves recurring harm and can be distinguished from peer harassment as a subset of aggressive behavior because bullying represents a pattern of behavior committed over a period of time.

The anonymity, ease of provocation, and almost infinite source of targets means the Internet is full of predators from pedophiles targeting children to serial bullies targeting... anybody.

Cyber Bullying Cyber Bullies use electronic information and communication devices such as: Instant Messaging (IM) Instant Messaging (IM) Text Messages Mobile Phones Pagers Online Gaming Defamatory websites Defamatory websites to bully or otherwise harass an individual or group through personal attacks or other means. to bully or otherwise harass an individual or group through personal attacks or other means.

37% of teens online have used IM to write something that they would not have said in person Source: Childnet International

Threats It is against the law to use the Internet to: It is against the law to use the Internet to: make threats to do harm to anyone make threats to do harm to anyone Make threats to damage anyones property Make threats to damage anyones property Make threats to damage anyones school Make threats to damage anyones school

Illegal Computer Access (Hacking) It is against the law to: Use the Internet to access someone elses computer without their permission. Use someone elses Internet account without their permission. Use someone elses Internet password without their permission.

Software Piracy Public Domain: no copyright, can be copied and distributed Public Domain: no copyright, can be copied and distributed freely. freely. Freeware: has copyright. Can be distributed without advance Freeware: has copyright. Can be distributed without advance payment but donations may be requested if used. payment but donations may be requested if used. Shareware: copyrighted. Can be distributed without advance Shareware: copyrighted. Can be distributed without advance payment but expectation of payment if used. payment but expectation of payment if used. Licensed software: copyrighted. Expectation of payment prior to Licensed software: copyrighted. Expectation of payment prior to use. use. License Restrictions: per machine. Home/office License Restrictions: per machine. Home/office Criminal and civil law violations. Bottom line? If the software costs money, and you are using it in violation of the user agreement, its stolen...

Chat Rooms & Instant Messaging

Chat Rooms People in chat-rooms can talk anonymously and say anything they choose. Fact v. Fiction People in chat-rooms can talk anonymously and say anything they choose. Fact v. Fiction Some sites require its users to provide info such as name, address, , likes/dislikes and info on family & friends as the cost of participation. (Keep personal safety and responsibility in mind) Some sites require its users to provide info such as name, address, , likes/dislikes and info on family & friends as the cost of participation. (Keep personal safety and responsibility in mind) Areas where people can meet on-line to exchange ideas, information and be educational. Areas where people can meet on-line to exchange ideas, information and be educational.

Instant Messaging Instant Messaging (IM) Instant Messaging (IM) A real time conversation where the 2 people communicating are seeing their responses immediately. A real time conversation where the 2 people communicating are seeing their responses immediately. Commonly referred to as Commonly referred to as IM IM Chatting Chatting

Consider this when Instant Messaging Choose an non identifiable, non gender specific screen name Choose an non identifiable, non gender specific screen name Never give out any personal information. Never give out any personal information. real name, telephone or cell phone number, mailing address, passwords, real name, telephone or cell phone number, mailing address, passwords, Never accept files or downloads from people you don't know or from people you do know, if you werent expecting them. Never accept files or downloads from people you don't know or from people you do know, if you werent expecting them. Never arrange to meet someone offline that you only know through IM conversations. Never arrange to meet someone offline that you only know through IM conversations. Know how to save copies of your IM conversations. Know how to save copies of your IM conversations.

Information You DO NOT want to tell Strangers Full Name Full Name Nicknames Nicknames DOB DOB Hair color Hair color Eye color Eye color Personality Personality Siblings & Their Ages Siblings & Their Ages Location Location School School Future School Future School Best/Close Friends Best/Close Friends Online Best Bud Online Best Bud Pets & Their Names Pets & Their Names Stupidest Thing You Ever Did Fav color Fav Food Least Fav Food Funniest person(s) you know (or wish you knew) Fav Vacation Spot, Fav. Thing To Do In The Summer Fav Thing To Do In The Fall Fav Thing To Do In The Winter

Information You DO NOT want to tell Strangers Job Job Things you like to do Things you like to do Things you collect Things you collect Best Advice Best Advice Words or Phrases You Overuse Words or Phrases You Overuse Dream Car Dream Car Coolest Experience In Life Coolest Experience In Life Little-Known Talent You Possessed Special Skills or Talents Special Awards You Have Won Traits You Look For Most In a Guy/Girl You Want To Be Future Goals Religion (if any) Church (if any) Groups/Singers you enjoy Non- Sport Game You Enjoy Non-Sport Game Which You Excel

Online Communities Homepages/Webpages

Thinking about a Home Page? Before you create a personal page on the internet... Before you create a personal page on the internet... What are you going to include? What are you going to include? Consider all the facts before deciding to put a picture of you, your family, your friends, or any other person or thing that might be used to identify you on the Web. Consider all the facts before deciding to put a picture of you, your family, your friends, or any other person or thing that might be used to identify you on the Web. Does everyone who creates a personal page on the Internet get stalked, harassed or worse? Does everyone who creates a personal page on the Internet get stalked, harassed or worse? ***of course NOT*** ***of course NOT*** Be aware that… *Anything you put on the internet can be easily be saved forever by Strangers whom you did not intend to have. *What you post can be used to easily identify you and/or those you care about.

Popular Online Communities My Space A free social networking website that uses the Internet for online communication through an interactive network of photos, blogs, user profiles, groups, and an internal system. Face Book A facebook is a book that is made up of photographs of individuals along with their names. Facebooks are often published at the start of the academic year by the administrations of colleges and universities, with the intention of helping students, faculty, and staff to get to know each other better. Xanga Xanga A free web-based journal-hosting community of online journal-hosting, based in NYC Intended for people who are at least 13 years old.

If only she knew where her pics would end up... MyTeenEx.com is a free site that allows browsers to view thousands of user-submitted amateur pictures. MyTeenEx.comamateur pictures

My Space.com Not what you think…

My space.com- My space.com- very popular place on the Internet where people network, send messages to one another, post pictures of themselves and others, and make cyber- friends. very popular place on the Internet where people network, send messages to one another, post pictures of themselves and others, and make cyber- friends. A few users of Myspace have been involved in incidents recently involving luring or enticement of minors. Myspace has also been used for cyber bullying, cyber stalking and harassment. A few users of Myspace have been involved in incidents recently involving luring or enticement of minors. Myspace has also been used for cyber bullying, cyber stalking and harassment.

Lets look at someones my space profile – (the actual screen name is blocked out below) He calls himself, Danny

Heres Dannys profile…he likes poetry, plants, flowers and watching movies by the fire.

Danny loves his country and is here for dating, serious relationships, friends and networking. So far he has 14 friends listed

Danny has posted some pics of his tatoos. Says here that he is looking for a girlfriend!

Lets look at another web site………………………… how about … State of Arizona, government-operated sex offender registration site.

Hey! Theres Danny. Surprise! His myspace page never mentioned that he is a level 3, high-risk sex offender.

Did You Know? Employers and Colleges are now checking the internet to include Myspace.com, for profiles and web pages of applicants Employers and Colleges are now checking the internet to include Myspace.com, for profiles and web pages of applicants Also these employers and colleges can and will deny employment or admission based on information you place on the internet if they believe your character comes into question. Also these employers and colleges can and will deny employment or admission based on information you place on the internet if they believe your character comes into question. Bottom Line watch what you place on the internet for everyone to see. Bottom Line watch what you place on the internet for everyone to see.

Dangers of the Internet

Some Risks of Getting Online Distribution of Pornography Distribution of Pornography Sexual Predators Sexual Predators Misinformation and Hidden Messages Misinformation and Hidden Messages Loss of Privacy Loss of Privacy Cyber bullying/Harassment/Stalking Cyber bullying/Harassment/Stalking Development of Childhood Behavior Disorder Development of Childhood Behavior Disorder

Resources Who can I call for help?

National Center for Missing and Exploited Children 24 Hour hotline THE-LOST 24 Hour hotline THE-LOST CyberTipLine: CyberTipLine: Norwalk Police Department or your local Police Local CSP State Police Barrack FBI New Haven 600 State Street New Haven, Connecticut newhaven.fbi.gov (203) newhaven.fbi.gov ***Always dial in case of an emergency

Sgt. Andre Velez Norwalk Police Department Community Services Division Crime Prevention Unit Tel # Thank You!