CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

Size: px
Start display at page:

Download "CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito"

Transcription

1 CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito

2 What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

3 What is a Chatroom? Yahoo! Chat Room Internet Relay Chat (IRC)

4 Knowing The Rules Before your child goes online, you should: Go over the rules of the online service Discuss house rules regarding computer use Usage time (per day/until when) What websites your child can visit What programs or services your child can use What parental controls will be used What information may be shared with others

5 Remember this: Chatroom Behavior Anything you say or type, no matter how private you think it is, or who you say it to, may be heard or seen by others You do not really know who you are talking to, even though they may talk like you or say they are the same age as you If you are on your parent s account, what you say or do might come back to them

6 Chatroom Behavior Before you put or if you have put personal information online your should tell an adult Information you give others can lead to you being contacted at your home or by telephone If you are contacted by someone that makes you uncomfortable, you need to let a parent or adult know immediately If you are in doubt of what to do and an adult is around, don t log off and show the adult If an adult is not around try to save the chat conversation, print it out, write down the screen name, and log off

7 Let s take a look at some profiles 123DOOM Name: Spencer Age: 14 Sex: Male I m 14, turning 15 in January. If not at the computer playing Doom or Diablo II, you can usually find me at the mall or skate park. My favorite song would have to be 50 cent, In Da Club Anything else you want to know, IM me, I don t bite..

8

9 Let s take a look at some profiles pink-princess Name: Katrina Age: 15 Sex: Female Hey, I'm Katrina! I m 15 but almost 16. Can t wait to drive! I'm 5'5 about 105. I m kinda shy, but once you get to know me I open up! Don't be afraid to message me... I'll talk to anyone unless you're a pervert!

10

11 Let s take a look at some profiles thatshot!!:p Name:Jenny Age: 14 Sex: Female Hey peeps, I m in eighth grade. I like chatting, field hockey, blogging, and just being around cute guys. I ve just started making money as a model. It s real easy. If ya want IM me and I ll tell ya how 2.

12 Convicted of Sexual Crimes. Sentenced to 5 1/2 years in prison.

13 Why Would Someone Want your telephone/ cell #? Want your last name? Want a picture of you? How could they go about getting this information online?

14 Let s Take a Look at MySpace Real name Other personal information I know about Amanda I can harass her via or AIM

15 Let s Take a Look at MySpace When creating you're space in myspace.com you don't have to answer all the questions AMANDA GREEN Even if you don t put your real name someone else might put it accidentally.

16 Google search found tikichic13 on the live journal website Here we find what sports Amanda might participate in

17

18 Another Example Lets look at how a predator can get information you didn t know was on the internet just using your screen name. Amanda01

19 Predators often snoop around chatrooms for potential victims. Victims don t even have to type anything!

20 By simply typing in Amanda s username a predator can determine if that teenager has created a profile. In this case AIM would even say if she is currently online and even what chatroom she is in.

21 A Profile can provide a considerable amount of information about a member.

22 In addition, a predator can harass and frighten by sending or instant messages with a simple click of b tt

23 By Google selecting Groups the Advanced enables online Groups users to search Search for option newsgroup a predator can messages. narrow his search to isolate messages from Amanda.

24 By simply typing in her a predator can search for all the messages that she has posted on any newsgroup.

25 The Profile page tells the predator how many messages Amanda has posted, where the messages were posted, when the messages were posted and provides the text of each message.

26 Messages may contain opinions or questions but are also used by many to conduct business or personal affairs - much like a local newspaper.

27 With a telephone number a predator can determine a last name and possibly an address.

28 This search revealed the last name of the person who has phone service for the number Amanda provided. It can be assumed that this is Amanda s phone number. Most of these services allow individuals to change or completely eliminate their personal data from the directories.

29 Useful and legitimate resources on the Internet can be misused. For instance, having Amanda s telephone number enables the predator to determine in what state she resides.

30 With a last name a predator is able to With search each for additional an address piece which of can be information, compared to the the predator acquired can phone make new searches number. using other services.

31 Regardless of how many results are shown, the predator can determine Amanda s address by scanning the results for the known phone number.

32 With her complete address a predator can even locate the home on a map.

33

34 A predator can even locate the closest school she is likely to attend.

35 The predator The results is taking will find pieces the schools of information on a all over the map internet and may like provide pieces a link of a to puzzle the and putting school s it all together. homepage.

36 Complete Information Gathered From the entire search we were able to determine: that she is female; her first and last name; her account; that she likes seashells, rollerblading and English; that she has a baby brother; that she is looking for a Pink Razr phone; the mother s and brother s full name the home telephone number and possibly when the mother returns from work; her complete address; a map and directions on how to get to her house; and the nearest public school. Total search time: 45 minutes

37 Julie s Story

38 Online Safety Tips for Parents Talk to them about their internet usage and to report unusual activity to you (Even if they do something wrong they have to feel comfortable telling you) Keep the computer in a central room Choose a family oriented Internet provider that offers parental controls or blocking software Select non-descriptive screen names for children Remind them never provide their real name, phone # etc. to anyone online, and never agree to meet face to face without your permission Set reasonable guidelines for online usage Be familiar with people & websites your children frequently visit

39 What to do BEFORE something happens Various tools can be used to monitor or record you child s computer usage. All of these utilities require that you install it before an incident occurs. Alternatives to monitoring software: Enabling archiving in instant messaging programs Monitoring Internet History Monitoring websites your child visits and the content they post Enabling content filtering with your ISP or internet browser

40 What is Archiving? Archiving is an option, available in some instant messaging and chat programs, that enables the user to record or log all of the chats that occur using that program. This option is usually found under the preferences or options menu. It maybe called message archive or message history With an archiving feature enabled, chats are saved without any proactive steps taken by the user. Example: Your child is contacted via instant message and inappropriate acts are discussed. You child closes the window, but does tell you about the incident. With archiving enabled, you can go back to the archive and retrieve that chat converstation.

41 Retrieving Archived Yahoo! IM s Click the Contacts menu, Message Archive option, then select the abuser s screen name from the archive window

42 Monitoring Internet History History Button

43 MySpace Privacy Settings, among other things, contains options to limit who can send you friend requests, who can post to your blog, what user information is available to others, and making a profile private. IM Privacy Settings lets the user set who they allow to IM them: no one, friends, all.

44 Content Filtering Most Internet Service Providers (ISPs), such as AOL, Comcast, or Cablevision, offer parental controls or other types of content filtering Parental controls and content filtering can limit certain users to only permitted sites, restrict certain users from prohibited sites, or block access to sites containing certain terms These types of controls could also restrict what kind of activities a user can conduct including restricting program use, preventing installation of programs, etc.

45 Content Filtering - IE Internet Explorer has a built in Content Advisor that will give you the ability to limit users activities The Content Advisor can be password protected to prevent your child from changing the settings. Details about how the Content Advisor works and how to enable it can be found at: curity/contentadv/config.mspx Or conduct and internet search for internet explorer content advisor Other browsers may have similar options.

46 What to do if something happens If your child has been: Contacted via , instant messenger or telephone by a stranger or someone who makes them uncomfortable Bullied, harassed, or stalked by someone online or in person Provided personal identifying information about themselves to strangers Take note or save information about the incident Screen name or address Exact language of the chat or may be significant Date and time of incident Services utilized (i.e. , chat program, message board, etc)

47 Saving IM Communications If the message window is still open, you can save the message as a file. This file will contain the abuser s screen name and content of the conversation. The procedure to save the message is similar in most messenger programs.

48 Saving AIM Messages Click the File menu options, and select Save, enter the location and file name

49 Saving Chatroom Conversations Similar to saving IM chats, you may be able to save the chat session (i.e. File menu, Save options) If this option is not available, highlight all the text and save it to a text file An additional option is to print the chat session

50 s contain headers Headers As simple as TO/FROM addresses As complex as a list of every routing point along the s path from A to B Investigators can collect information at each point Trained investigators can analyze this information to find out where the came from who sent it

51 Getting Headers Click Full Headers Link

52 Getting MSN / Hotmail Headers - Select Options - Mail Display Settings - Message Headers - Full Headers

53 MSN / Hotmail Headers

54 America Online Headers Click Details

55 Other Information If the incident involves MySpace be sure to note the MySpace display name (i.e. honey123) but also the MySpace Friend ID: When noting Screen name beware of hacker language (i.e. substitution of numbers or strange character for letters) Best practice would be to cut and paste the screen name to a text file to avoid any confusion vs OIIIOO vs OIIIOO

56 THE END Questions?

57 Contact Information Mahwah Police Department Police Officer Joe Horn Police Officer Rosario Zito Detective Guido Bussinelli

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet

Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet Chatroom and messaging safety Staying away from pornography Avoiding internet bullying Keeping your child safe on the internet AT A GLANCE Using the internet and messaging safely Not everyone who uses

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

Internet Safety Guide for Parents

Internet Safety Guide for Parents Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

Class 2: Manage Your Digital Footprint. Student Handbook

Class 2: Manage Your Digital Footprint. Student Handbook Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal

More information

Guidelines for Preventing and Dealing with Bullying Issues

Guidelines for Preventing and Dealing with Bullying Issues Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.

More information

Computer Security Self-Test: Questions & Scenarios

Computer Security Self-Test: Questions & Scenarios Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Verizon Family Protection Powered by McAfee. User Guide

Verizon Family Protection Powered by McAfee. User Guide Verizon Family Protection Powered by McAfee User Guide ii Contents Welcome to Verizon Family Protection Powered by McAfee User Guide 3 Setting up Family Protection 5 Managing your family's protection...6

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

Instant Messaging and Chat Rooms Play It Safe!

Instant Messaging and Chat Rooms Play It Safe! CMSGu2011-09 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Instant Messaging and Chat Rooms Play It Safe! National Computer Board Mauritius

More information

McAfee Family Protection

McAfee Family Protection User Guide The Easiest, Most Complete Way to Keep Your Children Safe Online Quick Start Easy CD Installation STEP 1: First, ensure that your computer meets or exceeds the minimum systems requirements listed

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life. Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Virus What is a virus? It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It can also be defined as a set of codes written to cause

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate.

The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Quick Start Guide 2 The internet has opened up a virtual world to children that offers them amazing ways to learn, play and communicate. Going online for youngsters is fun, creative and exciting but it

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

TAVISTOCK COLLEGE POLICIES & PROCEDURES

TAVISTOCK COLLEGE POLICIES & PROCEDURES TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by

More information

NetAlert Protecting Australian Families Online

NetAlert Protecting Australian Families Online NetAlert Protecting Australian Families Online 1 Contents Message from the Prime Minister 2 NetAlert Protecting Australian Families Online 4 Your family your choice 5 SEE your way to internet safety 6

More information

Cybersafety and protocols for conducting online life?

Cybersafety and protocols for conducting online life? Cybersafety and protocols for conducting online life? Sunderland is an exciting place to live. We lead the way in making use of services online. We are one of the most connected cities in the UK. Whatever

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents stalking Most victims are stalked by someone they know. Stalking is serious, often violent, and can escalate over time. This handbook provides information on stalking and available resources. Idaho Coalition

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

Who's chatting to your kids?

Who's chatting to your kids? N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Chatting online and child safety

Chatting online and child safety Chatting online and child safety A guide for parents and carers on how to help children keep safe while chatting Children and chatting Chat: What is it? The internet offers great opportunities to interact

More information

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1 P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,

More information

Online Safety How to Protect Yourself and Your Family

Online Safety How to Protect Yourself and Your Family Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing

More information

Cyber-Safety Keeping Australians Safe Online

Cyber-Safety Keeping Australians Safe Online Cyber-Safety Keeping Australians Safe Online AIMIA Digital Policy Group DIGITAL POLICY GROUP Contents DIGITAL POLICY GROUP Facebook 2 Google 4 Yahoo!7 8 ebay 10 Summary 12 Key Contacts 12 Millions of people

More information

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and

More information

Email Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Email Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1 P a g e 1 Email Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to using email. Throughout the class, we will orient ourselves to the general layout of email service and

More information

A Time to Tell Troop Meeting Guide

A Time to Tell Troop Meeting Guide A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

Bo Holland is the Founder & CEO of AllClear ID with deep expertise in Identity theft prevention, security, and technology

Bo Holland is the Founder & CEO of AllClear ID with deep expertise in Identity theft prevention, security, and technology AllClear ID (www.allclearid.com) is an identity protection company based in Austin, Texas, and is powered by Debix, a leader in identity protection technology. Our leading technology and customer service

More information

Information Technology Security Awareness Training. MIS Department

Information Technology Security Awareness Training. MIS Department Information Technology Security Awareness Training Introduction Who am I? Why are we here? Ensure confidentiality of data Protect stability of IT infrastructure Shield District from legal liability Satisfy

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook. Migrate Archived Outlook Items Outlook includes archiving functionality that is used to free up space on the mail server by moving older items from the mail server to PST files stored on your computer

More information

Internet Safety Guide for Parents.

Internet Safety Guide for Parents. Internet Safety Guide for Parents. Parents Guide Cover: Photo of teenager. A shark is falling out of his schoolbag and saying, C U L-8-R. See You Later. how safe is your child from cyber-sharks? Thomas

More information

HPUG_1014. Shaw Home Phone. User Guide

HPUG_1014. Shaw Home Phone. User Guide HPUG_1014 Shaw Home Phone. User Guide Hello. Welcome to the wonderful world of Shaw Home Phone. This tiny book tells you every detail you need to know to use all of your new phone features like a superstar.

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Internet Safety. A guide to staying smart & safe online

Internet Safety. A guide to staying smart & safe online Internet Safety A guide to staying smart & safe online What you will learn Privacy how to keep your information safe & secure Safety how to protect yourself & your family online It s not just about computers

More information

Facebook Guidelines For Parents

Facebook Guidelines For Parents Facebook Guidelines For Parents By Jayne A. Hitchcock Copyright 2010 As kids go online at younger and younger ages, parents need to be aware of what they are doing on the Internet, most importantly on

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

Set internet safety parental controls with Windows

Set internet safety parental controls with Windows How to Microsoft lets parents set up internet safety settings on a Windows computer for their kids, using Family Safety. Family Safety provides a website and a free program that you install on the computers

More information

Sexual Assault of a Child VOIR DIRE QUESTIONS

Sexual Assault of a Child VOIR DIRE QUESTIONS ATTORNEYS Sexual Assault of a Child VOIR DIRE QUESTIONS 1. What are your feelings or opinions about criminal defense attorneys? 2. Have you ever had a bad experience with a criminal defense attorney? If

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

Use Yahoo Messenger for a Video or Audio Conference

Use Yahoo Messenger for a Video or Audio Conference Use Yahoo Messenger for a Video or Audio Conference About These Instructions: These instructions are intended primarily for those who are new to instant messaging. If you already use Yahoo Messenger and

More information

Email Tips For Job Seekers

Email Tips For Job Seekers Email Tips For Job Seekers About Your Email Address Most potential employers will ask for a copy of your email address. If you don t have an email, sign up for one. You will have to provide either your

More information

Military Community and Family Policy Social Media. Guide. Staying Connected

Military Community and Family Policy Social Media. Guide. Staying Connected Military Community and Family Policy Social Media Guide Staying Connected Introduction...3 Table of Contents Social Media Tools and Platforms...3 Social Networks...3 Blogs and Microblogs...7 Podcasts...8

More information

Wayland Email Account Setup Instructions

Wayland Email Account Setup Instructions Wayland Email Account Setup Instructions 1. Open Internet Explorer and type http://email.wbu.edu in the address bar. If you have problems with this address, you can also go to www.hotmail.com. 2. Type

More information

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter

More information

THE BASICS Changing Your Name and Social Security Number in New York State

THE BASICS Changing Your Name and Social Security Number in New York State THE BASICS Changing Your Name and Social Security Number in New York State WHY WOULD I WANT TO CHANGE MY NAME? You can change your name for any reason. Sometimes, when a person has been harassed or abused,

More information

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to

More information

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating

More information

Create a New List. Table of Contents

Create a New List. Table of Contents Table of Contents Create a New List...1 Required Fields...1 List Name...1 List short name...1 Password...2 One note about some of the peculiarities of Dada Mail:...2 List Owner...2 Description...3 Privacy

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information

Internet Monitoring Versus Web Filtering

Internet Monitoring Versus Web Filtering Internet Monitoring Versus Web Filtering SpectorSoft Corporation 1555 Indian River Blvd. Bldg. B-210 Vero Beach, FL 32960 1-772-770-5670 phone 1-772-770-3442 fax info@spectorsoft.com www.spectorsoft.com

More information

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Internet Basics. Basic Terms and Concepts. Connecting to the Internet Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Provider ecorrespondence instructions when you don t have a My Secure L&I account:

Provider ecorrespondence instructions when you don t have a My Secure L&I account: Provider ecorrespondence instructions when you don t have a My Secure L&I account: What you will need: Internet explorer 9 or higher, Google Chrome or Firefox. These are free internet browsers which can

More information

Cybersecurity Protecting Yourself, Your Business, Your Clients

Cybersecurity Protecting Yourself, Your Business, Your Clients Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric

More information

Classroom Mobile Device Rules & Agreement for Students

Classroom Mobile Device Rules & Agreement for Students Classroom Mobile Device Rules & Agreement for Students In order to use the Google Chromebook for required class activities, you must be responsible and follow these rules and policies at all times. Remember,

More information

When Your Child Has Been Abducted by a Stranger. If this is an emergency, CALL 911.

When Your Child Has Been Abducted by a Stranger. If this is an emergency, CALL 911. If this is an emergency, CALL 911. While this checklist will help guide the search for your child, it is important that all actions you take are done so in consultation with the police. Immediate Steps

More information

www.xxxchurch.com Online Predators & Strangers

www.xxxchurch.com Online Predators & Strangers www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through

More information

Copyright 2011 Smart VA Ltd All Rights Reserved.

Copyright 2011 Smart VA Ltd All Rights Reserved. Copyright 2011 Smart VA Ltd All Rights Reserved. No part of this guide may be reproduced or transmitted in any form whatsoever, electronic, or mechanical, including photocopying, recording, or by any informational

More information

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766 FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY www.cheezo.org 303-271-6766 A Message from District Attorney Peter Weir One of the priorities of the District Attorney s Office

More information

Teens and Cyberbullying

Teens and Cyberbullying Teens and Cyberbullying EXECUTIVE SUMMARY OF A REPORT ON RESEARCH Conducted for NATIONAL CRIME PREVENTION COUNCIL (NCPC) Released February 28, 2007 By the National Crime Prevention Council Survey conducted

More information

THIS HAD BETTER BE GOOD

THIS HAD BETTER BE GOOD THIS HAD BETTER BE GOOD A nd trust me, it is. What would you think if I told you that you can make an international call of high quality sound, and it would cost you nothing? I know, it sounds like one

More information

Current Internet Facts

Current Internet Facts Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet

More information

1. Go to www.iowagrants.gov. Click on Returning Users Sign in Here. 2. Click on forgot id. IowaGrants How to Register

1. Go to www.iowagrants.gov. Click on Returning Users Sign in Here. 2. Click on forgot id. IowaGrants How to Register IOWAGRANTS: REGISTRATION INSTRUCTIONS Registration is a two-phase process. Phase I is Account Activation with the state s A & A system. Phase II is Registration within the IowaGrants system. To minimize

More information