Summer Safety: Tips to Help Avoid Abduction and Harm

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Summer Safety: Tips to Help Avoid Abduction and Harm"

Transcription

1 Summer Safety: Tips to Help Avoid Abduction and Harm

2 Why is Summer Safety Important? During the summer months children tend to be Outdoors more Home alone more Supervised less

3 We Believe No Child Should Be At Risk A parent or guardian is the best person to teach a child about personal safety. There is no perfect age to begin teaching children about personal safety. A child s ability to comprehend and practice safety skills is affected by age, educational, and devel0pmental levels. Source: National Center for Missing & Exploited Children. Personal Safety for Children: A Guide for Parents and Guardians. Copyright 2002.

4 Safety Tips to Teach Children

5 Teach Children Their name, address, telephone number How to use the telephone Whose homes they may visit when you re not there Where they may and may not go in the neighborhood Source: National Center for Missing & Exploited Children. Know the Rules Summer Safety Tips for Parents and Guardians. Copyright 1993.

6 Home Alone Safety: Teach Children Not to open the door unless you have instructed them it is okay in each and every instance Not to tell anyone they are home alone Source: National Center for Missing & Exploited Children. Know the Rules Summer Safety Tips for Parents and Guardians. Copyright 1993.

7 In an Emergency: Teach Children What to do How to reach you Cell phone, work phone Who else they may call Neighbors, family members, other trusted adults Source: National Center for Missing & Exploited Children. Know the Rules Summer Safety Tips for Parents and Guardians. Copyright 1993.

8 Potentially Dangerous Situations: Teach Children How to recognize and avoid potentially dangerous situations To say NO and make a scene To immediately get out of these situations To immediately tell you or another trusted adult if something happens

9 Vehicle Safety: Teach Children Never to approach or enter a vehicle, occupied or not, unless accompanied by you or another trusted adult

10 General Tips for Adults

11 Stranger-Danger Myth Do not confuse your children with the concept of strangers Statistically incorrect Kids don t get it Adults don t model it Inability to access help Remember most children are victimized by someone they know, love, or trust

12 Know Where They Are Know their daily habits Know their friends Check in with them Have them check in with you Make sure they are supervised when outside and away from home Source: National Center for Missing & Exploited Children. Know the Rules General Tips for Parents and Guardians to Help Keep Their Children Safer. Copyright 2000.

13 Listen and Observe Where don t they want to go? Who don t they want to see? Is someone showing them too much attention? Has their behavior or attitude changed?

14 Precautionary Measures Take color photographs every 6 months Keep a description of your child Keep copies of your child s fingerprints Consider having a DNA sample taken from your child Know where your child s medical records are located Source: National Center for Missing & Exploited Children. Just in Case Guidelines in case your child might someday be missing. Copyright 1985 and 2004.

15 Babysitters and Other Childcare Providers Check references with other families, friends, and neighbors Drop in unexpectedly Ask your children about the experience Check the national sex offender registry Source: National Center for Missing & Exploited Children. Know the Rules General Tips for Parents and Guardians to Help Keep Their Children Safer. Copyright 2000.

16 Camps: Questions to Ask Do they complete a background screening check on the individuals working with children? Is there constant adult supervision of children including when on field trips and at off-site activities? Source: National Center for Missing & Exploited Children. Know the Rules Summer Safety Tips for Parents and Guardians. Copyright 1993.

17 Childcare Facilities: Questions to Ask Is the facility licensed? Are all staff members trained? Can parents/guardians come and go as they wish? Source: National Center for Missing & Exploited Children. Know the Rules Summer Safety Tips for Parents and Guardians. Copyright 1993.

18 Childcare Facilities: Questions to Ask Can you visit and observe the personnel several times before making a decision? Can you visit unannounced after placement? Source: National Center for Missing & Exploited Children. Know the Rules Summer Safety Tips for Parents and Guardians. Copyright 1993.

19 Disaster Preparation Stay together with your family if possible Have a plan in case you are separated Give children identification information to keep with them, attach information to them in a waterproof holder Take digital photos in advance and them to family members Make photocopies of important documents and mail them to family members Source: National Center for Missing & Exploited Children. Safety Tips for Families in Disaster Preparation. Copyright 2005.

20 Home Alone Have a plan in case you are late Keep a list by the telephone that includes 911/the emergency number in your area Your number Another trusted adult Poison-control center Source: National Center for Missing & Exploited Children. Know the Rules After-School Safety for Children Who Are Home Alone. Copyright 2000.

21 Public Places and Parks Make a plan in case you are separated Practice appropriate actions and responses with your children Talk to your children about who can help them if they re lost, need assistance, or are in trouble Keep a photograph of your child with you Source: National Center for Missing & Exploited Children. Know the Rules For Child Safety in Amusement or Theme Parks. Copyright 2000.

22 Public Places and Parks Have children carry identification and emergency contact information with them. Be sure your child dresses in brightly colored clothing. Accompany younger children to the restroom and have older ones go together. Do not use public places as babysitters. Example: Don t drop kids off at the mall. Source: National Center for Missing & Exploited Children. Know the Rules For Child Safety in Amusement or Theme Parks. Copyright 2000.

23 Youth Sporting Programs: Questions to Ask Is there a background check for coaches? What is the coach s philosophy about winning and sportsmanship? Are there other adults who supervise off-site travel? Do the children use a locker room to dress? Are there multiple supervising adults present? Source: National Center for Missing & Exploited Children. Know the Rules For Child Safety in Youth Sports. Copyright 2000 and 2005.

24 Youth Sporting Programs: Questions to Ask Do you have input into the sports activity? Does the coach promise to make your child a champion? Does the coach ask to spend time alone with your child? Do you talk to your child about how he or she likes the coach or sport? Source: National Center for Missing & Exploited Children. Know the Rules For Child Safety in Youth Sports. Copyright 2000 and 2005.

25 The Internet For a child sex offender s purposes, it is one of the most effective tools ever invented

26 NetSmartz Workshop Interactive, educational safety resource from the National Center for Missing & Exploited Children Designed for children aged 5 to 17, parents, guardians, educators, and law enforcement Uses age-appropriate, 3-D activities to teach children how to stay safer while on the Internet and in the real world

27 Internet Safety Keep online computers in a supervised area of the home Consider installing filtering and/or monitoring software Set reasonable rules and guidelines for computer use Research the sites that your child uses or wants to use for privacy settings they allow

28 Internet Safety Let your children show you what they like to do online Remind them to be careful not to reveal personal information about themselves through photos, videos, or text Teach your children never to arrange a faceto-face meeting with anyone without your permission, you going along with your children to the meeting, and being sure to meet in a public place

29 Internet Safety Be aware of other computers your child may be using on/at Cell phones, friends houses, libraries Learn online acronyms such as POS = Parent Over Shoulder Make sure screen names are not too revealing Remember: Not everything online is true and people may not be who they seem to be

30 Online Reporting If your children are being stalked, harassed, or threatened in any way Report the incident to your service provider and your local law-enforcement agency If materials received are lewd, obscene, or illegal also report it to NCMEC s CyberTipline at or THE-LOST ( ).

31 If Your Child Is Missing IMMEDIATELY call law enforcement Limit access to your home until law enforcement arrives Call the National Center for Missing & Exploited Children (NCMEC) at THE-LOST ( )

32 Resources for Children with Special Needs National Dissemination Center for Children with Disabilities (NICHCY): James Stanfield Company: National Rehabilitation Hospital (NRH):

33 For Additional Information or to Receive NCMEC Publications THE-LOST ( )

34 Additional Program Materials Download Safety Tips Know the Rules Summer Safety Tips for Children Know the Rules Summer Safety Tips for Parents/Guardians Keeping Kids Safer on the Internet Summer Safety Education Survey and Certificate We welcome your feedback about this presentation. Follow the link below to take a quick survey and receive your Certificate.

35 Remember There is no substitute for your attention and supervision!

PERSONAL SAFETY FOR CHILDREN A GUIDE FOR PARENTS

PERSONAL SAFETY FOR CHILDREN A GUIDE FOR PARENTS PERSONAL SAFETY FOR CHILDREN A GUIDE FOR PARENTS The data on abducted children contained in this report is taken from The Second National Incidence Studies of Missing, Abducted, Runaway, and Thrownaway

More information

The webcast will begin shortly. Please stand by.

The webcast will begin shortly. Please stand by. The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone

More information

Back Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved.

Back Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved. 1 2 3 5 6 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Social Networking Using E-Mail Instant Messaging Cell Phones/ Wireless Devices and Texting Posting Videos and Photos Online

More information

A U.S. Postal Inspector s Guide to Internet Safety for Children

A U.S. Postal Inspector s Guide to Internet Safety for Children A U.S. Postal Inspector s Guide to Internet Safety for Children A U.S. Postal Inspector s Guide to INTERNET SAFETY FOR CHILDREN The Internet is a global community that allows people to share information

More information

Back Cover. Copyright 2006 and 2009 National Center for Missing & Exploited Children. All rights reserved.

Back Cover. Copyright 2006 and 2009 National Center for Missing & Exploited Children. All rights reserved. 1 2 3 4 5 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Using E-mail Instant Messaging Social Networking Cellular Telephones/ Wireless Devices and Texting Posting Videos and Photographs

More information

Child Safety on the Information Highway. www.missingkids.com

Child Safety on the Information Highway. www.missingkids.com Child Safety on the Information Highway www.missingkids.com Cyberspace, the Web, the Net, the Information whatever it s called, millions of people are now going online to exchange electronic mail, surf

More information

CHILD-PROTECTION RESOURCES FOR CHILDCARE PROVIDERS

CHILD-PROTECTION RESOURCES FOR CHILDCARE PROVIDERS CHILD-PROTECTION RESOURCES FOR CHILDCARE PROVIDERS While we don t know the exact numbers of children who participate in childcare programs, every year it is possible millions of children are involved in

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

~Osgood Public Library ~ Milan Branch Library Computer and Internet Acceptable Use Policy

~Osgood Public Library ~ Milan Branch Library Computer and Internet Acceptable Use Policy ~Osgood Public Library ~ Milan Branch Library Computer and Internet Acceptable Use Policy The Library is committed to providing technology tools and information in a variety of formats to meet the needs

More information

What do you. you know about. Online Predators?

What do you. you know about. Online Predators? What do you you know about Online Predators? Some people may think of a stereotype when they think about an online predator Some people think of a ster e o type n. stereotype 1. A conventional, formulaic,

More information

Parent / Guardian Consent for Technology Use in Schools

Parent / Guardian Consent for Technology Use in Schools Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,

More information

CYBRARIAN Corporation. CYBRARIAN Software. Creating Library Policies Governing PC and Internet Use

CYBRARIAN Corporation. CYBRARIAN Software. Creating Library Policies Governing PC and Internet Use CYBRARIAN Corporation CYBRARIAN Software Creating Library Policies Governing PC and Internet Use TABLE OF CONTENTS Table of Contents... 2 A Sample Library PC and Internet Use Policy... 3 Getting Started...

More information

Who's chatting to your kids?

Who's chatting to your kids? N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000

More information

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the

More information

A Publication of the GCPS Information Management Division

A Publication of the GCPS Information Management Division GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,

More information

Ocean County Library policies concerning Computer and Internet Use and Rules of Conduct apply to guest users as well as library card holders.

Ocean County Library policies concerning Computer and Internet Use and Rules of Conduct apply to guest users as well as library card holders. Overview The Ocean County Library provides computers and internet access as a means to enhance information, learning, recreational and cultural opportunities for the residents of Ocean County. As information

More information

Red Cloud Community Schools Acceptable Use and Internet Safety Policy

Red Cloud Community Schools Acceptable Use and Internet Safety Policy Red Cloud Community Schools Acceptable Use and Internet Safety Policy The Red Cloud Community School system maintains quality technology systems (hardware, software, and services) for the purposes of enhancing

More information

SafeMinistryTraining.com.au Course Notes

SafeMinistryTraining.com.au Course Notes SafeMinistryTraining.com.au Course Notes 1. Introduction Welcome to the Safe Ministry Training course. We all want our churches to be safe places for everyone kids as well as adults. The purpose of this

More information

Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009

Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009 Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009 Access to Electronic Media and other Technologies Terms and Conditions REASONS FOR PROVIDING ELECTRONIC

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Public School Network Access and Use Policy

Public School Network Access and Use Policy Public School Network Access and Use Policy Nova Scotia Department of Education October 7, 2011 1 Public School Network Access and Use Policy Nova Scotia Department of Education October 7, 2011 This policy

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life. Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Pride Academy Charter School

Pride Academy Charter School 2010-2011 Computer and Internet Use Policy For Staff and Students General Computer and Network Use Pride Academy believes that the use of technology and computer-assisted communications is vital to our

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

Internet Safety Guidelines

Internet Safety Guidelines Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can

More information

MEMBER INFORMATION Member First Name: Middle: Last: F Date of Birth: / / Child s Student Identification Number:

MEMBER INFORMATION Member First Name: Middle: Last: F Date of Birth: / / Child s Student Identification Number: Office Use: Entry Date: / / Expiration Date: / / Member #: Receipt Number for Membership Payment: Unit Name: (please circle) 01: Pathfinders Children s Center 02: Mary Bremer Patrick Teen Center MEMBER

More information

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009

More information

SOUTH COLONIE 4526.1 INSTRUCTIONAL TECHNOLOGY

SOUTH COLONIE 4526.1 INSTRUCTIONAL TECHNOLOGY 4526.1 INSTRUCTIONAL TECHNOLOGY The Board of Education is committed to the optimization of student learning and teaching. The Board considers a computer network to be a valuable tool for education, and

More information

THE FACTS ABOUT SEXTING

THE FACTS ABOUT SEXTING C A N Y O N S S C H O O L D I S T R I C T C I V I L R I G H T S A N D A C C O M M O D A T I O N S O F F I C E THE FACTS ABOUT SEXTING WHAT IS SEXTING? Should parents be concerned about sexting? Yes, especially

More information

Online Safety How to Protect Yourself and Your Family

Online Safety How to Protect Yourself and Your Family Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing

More information

Facebook Guidelines For Parents

Facebook Guidelines For Parents Facebook Guidelines For Parents By Jayne A. Hitchcock Copyright 2010 As kids go online at younger and younger ages, parents need to be aware of what they are doing on the Internet, most importantly on

More information

Crime Prevention Recommendations for Children

Crime Prevention Recommendations for Children Crime Prevention Recommendations for Children For the purpose of this chapter, children will be defined as elementary age (grades K through 6) and lower. Begin With the Basics Make sure children know their

More information

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Revised: 6-04, 8-09, 1-12 REGULATION #5420 Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN. A guide for responsible adults

DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN. A guide for responsible adults DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN A guide for responsible adults DARKNESS TO LIGHT We are a national nonprofit organization that seeks to empower adults to prevent child sexual abuse.

More information

ECB Guidance for Coaches Working with Children

ECB Guidance for Coaches Working with Children ECB Guidance for Coaches Working with Children Coaches have a vital role to play in safeguarding children in cricket and, at a club, will often become the focus for children and their activities. The ECB

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

MEA-MFT Teachers Conference

MEA-MFT Teachers Conference MEA-MFT Teachers Conference Online Safety: Cyber Predators - Presented by Desireé Caskey You can be anyone you want to be on the Internet Topics for Today What our students are saying - Internet Landscape

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

Internet Safety Guide for Parents

Internet Safety Guide for Parents Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both

More information

AFL QUEENSLAND YOUTH MANAGEMENT POLICY

AFL QUEENSLAND YOUTH MANAGEMENT POLICY AFL QUEENSLAND YOUTH MANAGEMENT POLICY GUIDELINES FOR MANAGING YOUTH AFL TEAMS Any person who will manage and supervise the AFL Queensland staff and/or community volunteers involved in an AFL youth team

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 (Return this page to the Executive Staff member or Principal) MEMPHIS CITY SCHOOLS EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No. 14197 As a condition of using the MCS network, I

More information

CITY OF YORK SAFEGUARDING CHILDREN BOARD GUIDANCE. The use of photographic images of children in schools

CITY OF YORK SAFEGUARDING CHILDREN BOARD GUIDANCE. The use of photographic images of children in schools CITY OF YORK SAFEGUARDING CHILDREN BOARD GUIDANCE The use of photographic images of children in schools Published 2004 Revised October 2013 Using Images of Children: photographs, videos, websites and webcams

More information

SAMPLE Standard Operating Procedure for Recovery Community Centers

SAMPLE Standard Operating Procedure for Recovery Community Centers SAMPLE Standard Operating Procedure for Recovery Community Centers 1 Our mission is to provide a comprehensive array of crisis, behavioral health, trauma and recovery services that contribute to the well-being

More information

Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet

Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet Chatroom and messaging safety Staying away from pornography Avoiding internet bullying Keeping your child safe on the internet AT A GLANCE Using the internet and messaging safely Not everyone who uses

More information

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and

More information

Considerations for Schools and Summer Camps

Considerations for Schools and Summer Camps Protecting Your Jewish Institution: Security Strategies for Today s Dangerous World 79 Considerations for Schools and Summer Camps By and large, the entire contents of this manual apply to religious schools

More information

Palace Wood Primary School. Photographing and Filming Policy

Palace Wood Primary School. Photographing and Filming Policy Palace Wood Primary School Photographing and Filming Policy Written by Mark Chatley Ratified by Governors Autumn 2015 Date for Review Autumn 2018 Signed Chair of Governors Signed Headteacher This policy

More information

Family Friendly Volunteering

Family Friendly Volunteering Family Friendly Volunteering Ideas from A-Z A FREE VolunteerSpot ebook Great Service Ideas for Families, Students, Youth Groups, and Scouts 2008 by VolunteerSpot DOING GOOD just got easier Copyright holder

More information

A Time to Tell Troop Meeting Guide

A Time to Tell Troop Meeting Guide A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

More information

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766 FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY www.cheezo.org 303-271-6766 A Message from District Attorney Peter Weir One of the priorities of the District Attorney s Office

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Computer, Network, and Internet Use Student Policy (As of 8/1/09)

Computer, Network, and Internet Use Student Policy (As of 8/1/09) Computer, Network, and Internet Use Student Policy (As of 8/1/09) I. Overview a. Purpose The intent of this regulation is to provide students with general requirements for utilizing Buffalo Valley Public

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

101 Characteristics of Americans/American Culture

101 Characteristics of Americans/American Culture 101 Characteristics of Americans/American Culture To help you compare and contrast what you observe of American culture and your own, mark the similarities and differences between your culture and what

More information

Brazil Public Library COMPUTER LAB AND INTERNET USE POLICY

Brazil Public Library COMPUTER LAB AND INTERNET USE POLICY Brazil Public Library COMPUTER LAB AND INTERNET USE POLICY Users of the Computer Lab are expected to abide by the Computer and Internet use policy. Users will be expected o keep noise to a minimum while

More information

Polly Klaas Foundation P. O. Box 800, Petaluma, CA 94953 707 769-1334 or 800 587-4357

Polly Klaas Foundation P. O. Box 800, Petaluma, CA 94953 707 769-1334 or 800 587-4357 Polly Klaas Foundation P. O. Box 800, Petaluma, CA 94953 707 769-1334 or 800 587-4357 GUIDELINES FOR RECOVERY OF MISSING CHILDREN Includes Suggestions for Runaways The following list is not intended to

More information

THE BASICS Custody and Visitation in New York State

THE BASICS Custody and Visitation in New York State THE BASICS Custody and Visitation in New York State This booklet answers common questions about custody and visitation when the parents cannot agree about who is responsible for taking care of the children.

More information

Network and Internet Access Agreement for Students

Network and Internet Access Agreement for Students Dublin City School District Network and Internet Access Agreement for Students Property Page 1 of 7 Any student age 18 and older is to read this form (). Page 5 of this form should then be completed and

More information

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained

More information

Nationwide support services for families and professionals in the prevention, investigation, and prosecution of abducted, endangered, and sexually

Nationwide support services for families and professionals in the prevention, investigation, and prosecution of abducted, endangered, and sexually Nationwide support services for families and professionals in the prevention, investigation, and prosecution of abducted, endangered, and sexually exploited children As the nation s resource center for

More information

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000

More information

Summer College & Career Exploration Camps Parental Consent Form

Summer College & Career Exploration Camps Parental Consent Form Summer College & Career Exploration Camps Parental Consent Form This form must be completed, signed and returned to TCC one week prior to the camp start date. Email the completed form to wfdinfo@tcc.edu

More information

STRATEGIC PLAN. For implementing safety training within communities of Symantec employees. All Rights Reserved

STRATEGIC PLAN. For implementing safety training within communities of Symantec employees. All Rights Reserved STRATEGIC PLAN For implementing safety training within communities of Symantec employees Executive Summary Identifying additional ways to reach and teach consumers about online safety, security, privacy

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

Understanding Consent to Sexual Activity. Public Legal Education and Information Service of New Brunswick

Understanding Consent to Sexual Activity. Public Legal Education and Information Service of New Brunswick Understanding Consent to Sexual Activity Public Legal Education and Information Service of New Brunswick NO means NO Understanding Consent to Sexual Activity This pamphlet provides information on what

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

WEST CHICAGO PUBLIC LIBRARY DISTRICT INTERNET AND ELECTRONIC INFORMATION NETWORK POLICY

WEST CHICAGO PUBLIC LIBRARY DISTRICT INTERNET AND ELECTRONIC INFORMATION NETWORK POLICY INTERNET AND ELECTRONIC INFORMATION NETWORK POLICY The Internet and the Library's Mission The West Chicago Public Library District offers access to the Internet, a worldwide electronic information network.

More information

Services for Children, Young People and Families

Services for Children, Young People and Families Services for Children, Young People and Families CHILDREN IN CARE SAFER CARE POLICY (FOSTER CARE) March 2013 Author: Len Pilkington Date to be Reviewed: March 2014 1. Statutory Framework The Fostering

More information

School-Based Health Education Standards:

School-Based Health Education Standards: School-Based Health Education Standards: Accessing Valid Health Information (A.V.I.) Interpersonal Communication (I.C.) California Healthy Kids Resource Center (C.H.K.R.C.) Hello. This is the third module

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

RYE CITY SCHOOL DISTRICT RYE, NEW YORK 4526-R2

RYE CITY SCHOOL DISTRICT RYE, NEW YORK 4526-R2 4526-R2 STUDENT ACCEPTABLE USE OF TECHNOLOGY REGULATION Educational Purpose Being a successful digital citizen in an ever increasing technological society is a goal for all students of the Rye City School

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

a resource guide for parents and guardians INTERNET SAFETY North Carolina Department of Justice

a resource guide for parents and guardians INTERNET SAFETY North Carolina Department of Justice ATTORNEY GENERAL ROY COOPER a resource guide for parents and guardians INTERNET SAFETY what you don't know can hurt your child North Carolina Department of Justice Computers and the Internet have revolutionized

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

Too Good for Drugs Grade 5

Too Good for Drugs Grade 5 Dear Parent: Our class is participating in Too Good for Drugs, a prevention program designed by the Mendez Foundation to teach skills for living healthy, drug-free lives. We are excited about this opportunity

More information

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law. OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance

More information

Upcoming September dates: Dear Families, We are excited to be back at school and we look forward to sharing our summer stories with one another.

Upcoming September dates: Dear Families, We are excited to be back at school and we look forward to sharing our summer stories with one another. BLUERIDGE ELEMENTARY SCHOOL 2650 Bronte Drive North Vancouver BC V7H 1M4 Telephone: 604 903 3250 Fax: 604 903 3251 Safe Arrival/Callback: 604 903 3252 blueridgea endance@sd44.bc.ca Dear Families, We are

More information

Domestic Violence and Protective Orders

Domestic Violence and Protective Orders Domestic Violence and Protective Orders Domestic violence (also called family violence) is a pattern of behavior and a method of control which results in physical injury or places one in reasonable apprehension

More information

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT E-MAIL, INTERNET AND COMPUTER USE Policy Manual page 1 STUDENT E-MAIL, INTERNET AND COMPUTER USE Access to the Internet is being offered by Mentor Public Schools through the IT Department. The District is also pleased to provide its students

More information

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

Internet and Computer Use Policy and Guidelines

Internet and Computer Use Policy and Guidelines Internet and Computer Use Policy and Guidelines Definition of Terms The term LSLC Member Libraries refers to the thirteen Member Libraries of the Library System of Lancaster County, their branches, staff,

More information

ipad Acceptable Use Regulation

ipad Acceptable Use Regulation ipad Acceptable Use Regulation The Mamaroneck School District has purchased Apple ipads for selected students of the Mamaroneck School District. These students will be issued ipads with predetermined applications

More information

2013 Satisfaction Survey. How are we doing? Easier to Read Version

2013 Satisfaction Survey. How are we doing? Easier to Read Version 2013 Satisfaction Survey How are we doing? Easier to Read Version We asked people some questions about their support. Here is some of what people said and the changes we will make. That someone who knows

More information

Social, Security, and Privacy Implications of Computing

Social, Security, and Privacy Implications of Computing Social, Security, and Privacy Implications of Computing February 17, 2006 Damira Pon University at Albany, SUNY 1 Cyber Ethics 2 Relativity applies to physics, not ethics - Albert Einstein 3 Cyber Ethics

More information

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS Code No. 605.6E1(B) I am the parent or guardian of the student named

More information