Presentation is loading. Please wait.

Presentation is loading. Please wait.

Online Safety Threats and Strategies. What are the threats? Most perceived threats are: Most perceived threats are: Predators Predators Inappropriate.

Similar presentations


Presentation on theme: "Online Safety Threats and Strategies. What are the threats? Most perceived threats are: Most perceived threats are: Predators Predators Inappropriate."— Presentation transcript:

1 Online Safety Threats and Strategies

2 What are the threats? Most perceived threats are: Most perceived threats are: Predators Predators Inappropriate content Inappropriate content Actual most common threats are: Actual most common threats are: Cyberbullying Cyberbullying Posting personal information online Posting personal information online Too much information Too much information Unintentional sharing of information Unintentional sharing of information Sending/posting inappropriate images or information on social networking sites or through texts Sending/posting inappropriate images or information on social networking sites or through texts

3 Who is at risk? There is some degree of risk for everyone, but… There is some degree of risk for everyone, but… Those children most at risk are: Those children most at risk are:USUALS Adolescents more at risk than younger children Adolescents more at risk than younger children nhappy heltered ninvolved, unaware, disinterested parents dventurous onely avvy about technology

4 Internet Safety Education Components Components Staying safe Staying safe Digital Citizenship Digital Citizenship Creating a positive digital footprint Creating a positive digital footprint Cyberbullying Cyberbullying Resources Resources Bank of resources that schools can access/share Bank of resources that schools can access/share Schools determine their own plan for Internet Safety education Schools determine their own plan for Internet Safety education

5 What areas of Internet Safety will we consider? Online Safety Online Safety Cyberbullying Cyberbullying Inappropriate Content Inappropriate Content Digital Citzenship Digital Citzenship The Digital Footprint The Digital Footprint Talking to your kids about all of these… Talking to your kids about all of these…

6 Striking a Balance

7 Web Filtering

8 Filtering – why do we do it? CIPA (Childrens Internet Protection Act) CIPA (Childrens Internet Protection Act) To keep students safe To keep students safe To keep students from accessing inappropriate content To keep students from accessing inappropriate content Hate sites Hate sites Inappropriate images and content Inappropriate images and content Sites that promote inappropriate habits (drinking, smoking, drug use, gambling, etc.) Sites that promote inappropriate habits (drinking, smoking, drug use, gambling, etc.) Sites that might put them in danger Sites that might put them in danger Sites that phish for information Sites that phish for information

9 Filtering – how does it work ? Web sites are categorized by our filter company Web sites are categorized by our filter company Sites are blocked by category, such as… Sites are blocked by category, such as… Drug and alcohol use Drug and alcohol use Adult content Adult content Phishing and malware Phishing and malware Non-safe search engines Non-safe search engines Bombs, guns Bombs, guns Individual sites can be unblocked if they are miscategorized Individual sites can be unblocked if they are miscategorized By district By district By site By site By user By user Process Process Teacher requests that the site be unblocked through their principal Teacher requests that the site be unblocked through their principal Principal requests that the site be unblocked through IT Principal requests that the site be unblocked through IT IT checks for security risks or inappropriate content, as well as educational value IT checks for security risks or inappropriate content, as well as educational value Site is unblocked (usually for that site) Site is unblocked (usually for that site) Teacher-student equivalent accounts Teacher-student equivalent accounts

10 Cyberbullying What can you do? Cyberbullying is …the willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices. -Cyberbullying Research Center

11 What are its effects? It makes me hurt both physically and mentally. It scares me and takes away all my confidence. It makes me feel sick and worthless. Can cause: Fear of going to school Fear of going to school Low self-esteem Low self-esteem Family problems Family problems Academic problems Academic problems Potential for school violence Potential for school violence Delinquent behavior Delinquent behavior

12 How common is it? 10% - 40% initial reports 10% - 40% initial reports Probably closer to 20% Probably closer to 20% …repeatedly makes fun of another person online or repeatedly picks on another person through email or text message or when someon posts something online about another person the dont like.

13 What are the challenges? People dont see the harm (not usually physically threatening). People dont see the harm (not usually physically threatening). Areas of responsibility arent clear. Areas of responsibility arent clear.

14 Whos responsible? Theres no evidence of a crime or a threat to physical safety. I dont have the skills to keep up with what my child is doing online.. I cant intervene in behaviors that occur away from school.

15 Where does it happen?

16 How do you escape it? Do you ever feel overconnected? Do you ever feel overconnected? Do you ever feel like you cant get away from it? Do you ever feel like you cant get away from it? Think about how much worse that would be if you were being bullied through those devices… Think about how much worse that would be if you were being bullied through those devices…

17 Why dont kids report it? Embarassed Dont want their devices taken away. Dont think parents can help. Not comfortable sharing it.

18 What can parents do? Communicate Be Aware Dont punish for being a victim. Dont embarrass by flaming out.

19 What can parents do? Dont escalate. Empathize. Document if ongoing. Contact law enforcement.* Be persistent. Block calls or texts. *Threats of violence, child pornography or sexting, photos in places where they would expect privacy (like a locker room), continual harassment or stalking, obscene or harassing phone calls or texts, sexual exploitation, or extortion.

20 What can parents do? Get educated… Cyberbullying Fact Sheet Cyberbullying Fact Sheet Family Media Agreements Family Media Agreements

21 How do you block? Call provider: AT&T: 1-800-331-0500 Verizon: 1-800-922-0204 Sprint:1-888-211-4727 T-Mobile:1-877-453-1304

22 Blocking Online http://mymessages.wireless.att.com Must register – can control messages from there

23 Blocking Online http://support.verizonwireless.com/faqs/TXT%20messaging/faq.html To block unwanted text messages from Internet domains and emails: Log into My Verizon.My Verizon Go to My Services and choose Verizon Safeguards. Select Spam Controls and click on Internet Spam Blocking. Enter the offending Internet domain or email address, then click Save. To block unwanted messages from a cell device: Log into My Verizon.My Verizon Go to My Services and choose Verizon Safeguards. Select Spam Controls and click on Internet Spam Blocking. Enter the offending Device Number, then click Save.

24 Blocking Online http://support.sprint.com/support/article/Block_or_allo w_text_messages_from_your_phone http://support.sprint.com/support/article/Block_or_allo w_text_messages_from_your_phone My Sprint (must register your wireless account) 1.My online tools 2.Block text messages (in the Text Messaging Section) 3.Block messages 4.Block messages from all senders in my block list 5.Enter the phone #, e-mail address, domain or short code 6.Add 7.Save changes

25 Blocking Online http://support.t-mobile.com/docs/DOC-1712 Must be registered on the T-Mobile website

26 Apps you can download… Privacy Star (for Android and Blackberry) $3 per month Handcent SMS (iPhone and Android) Free Check the Android Market or the App Store for other choices

27 Facebook

28

29

30

31

32

33 Merrill Hooney Pablo Picasso Bob Smith Mary Smith If they select you here, you will only be able to see what they make public.

34 Facebook When you first set up the Facebook account, select a username that does not reflect your real name (can be edited later under Account Settings) Its also a good idea to use or create an e-mail address that does not reflect your real name.

35 How do I talk to my kids?

36 Questions? Internet Safety Resources For Parents: http://d20internetsafetyforparents.wikispaces.com/ http://d20internetsafetyforparents.wikispaces.com/ For Teachers: http://d20internetsafety.pbworks.com/w/page/7173096/FrontPage http://d20internetsafety.pbworks.com/w/page/7173096/FrontPage


Download ppt "Online Safety Threats and Strategies. What are the threats? Most perceived threats are: Most perceived threats are: Predators Predators Inappropriate."

Similar presentations


Ads by Google