SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

Size: px
Start display at page:

Download "SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?"

Transcription

1 SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers Division. We are here today to talk with you about some important issues related to using the internet and social media. You might not believe it, but it was not so long ago that we didn t have iphones, ipads, tablets, xbox 360 however did we get by without all those devices?! With all of this new technology, there has been an explosion of internet use by young people. Let me show you what I mean. I m going to ask a couple of questions: How many of you have your own cell phones or smart phone? Now how many of you have an ipad or other tablet that has internet access? How many of you have access to a laptop or PC? Ok, so most/all of you have access to a device that connects you to the internet. Now how many of you are on Facebook? What about twitter? How many of you have an Instagram account? What about Snapchat? Do any of you use some other social media that I have not mentioned? Like what? I m going to let you in on a little secret--we are not surprised by your answers to those questions. According to a study that came out earlier this year (or, early 2015): o Almost 75% of teens (ages 13-17) have a smart phone. 1 o 92% of teens report going online daily, 24% say they go online almost constantly. o 71% use Facebook, 52% use Instagram, 41% use Snapchat, and 33% use Twitter. 2 You know what? It s a great thing that you are using internet and social media. Research shows that the internet and social media are a great way to make friends, to communicate with your friends, and connect with your family. We want you to remember that, because although we are going to be talking about some scary things that can happen when you use the internet, and ways that you can get into trouble, we want you to know that we are not trying to discourage you from using the internet and social media in a safe and appropriate way. Having said that, there are some issues that you need to be aware of when you use the internet and social media. [if you found real-world examples from in or near your community, incorporate those stories here]. That s why we are here today. We are going to talk about some bad people out there called internet predators, or cyber predators, who use information you post 1 Lenhart A. (2015). Teens, Social Media, and Technology Overview Pew Research Center. 2 Underwood, M., et al. (2015). #Being Thirteen: Social Media and the Hidden World of Young Adolescents Peer Culture. 1

2 on the internet and social media to try and harm you. So we want to talk to you about ways to use the internet safely to protect yourselves from these bad people. [If you were able to contact the teachers in advance and learn the names of some or all of the students, and visited their social media sites, during this portion you can demonstrate to them how easy it is to gain access to personal information about the kids and their families. A scripted sample might look like this: Is Jessica in class today? Could you raise your hand, Jessica? How s life over at 123 Oak Street? How are your brothers Joe and Steve doing? I ask you these questions because I want you to know how easy it is for someone you don t know to obtain information about you and your family. Pretty scary, huh? Feel free to use other similar examples as warranted or necessary] [If there is time e.g., a presentation of 45 minutes to an hour you can state the following:] In addition, we are going to talk about some of the consequences that can happen when you use the internet in an unsafe or inappropriate way. We are also going to talk about some rights that are available to you if you do get into trouble, or are accused of getting into trouble. The first thing we are going to do is show a short film called, Disconnected, and then afterwards we will talk about some of the things you learn in the movie. Pay attention, because during our discussion we are going to be handing out prizes for good answers! Discussion Regarding Disconnected Q: So what did you think of the video? What was going on in the video? Allow the kids to give you their impressions. Potential follow-up questions: Do you think what happened in that video is realistic? Why/why not? Q: Who knows what a cyber-predator is? A Cyber predator uses the Internet to hunt for victims to take advantage of ANY way, including sexually, emotionally, psychologically or financially. Cyber predators know how to manipulate people, and especially teenagers and one of the things that they are really good at is creating trust and friendship where none should exist we will talk more about that later. Q: Do you think cyber-predators target people that are your age? Why or why not? There are many reasons. First, being your age is not always easy. You are not a kid anymore, and you have lots more responsibility than you used to, but at the same time you aren t adult and you probably wish you had more freedom it s tough! 2

3 I would be willing to bet that there are at least a couple of you in here that think your parents should give you more freedom, am I right? Predators may target people your age because you are going through tough times, not getting along with your parents, being bullied, or generally just bored and wanting something new to do. Another reason is that you guys are more active online and with technology than anyone else. Your generation is one of the first to grow up with smart phones and with social media. When I was growing up we didn t have twitter, or snapchat, or even digital pictures. We literally had to drop film from our cameras off to be developed. I got my first cell phone when I was and it was as big as a basketball. Today it is super easy to communicate with friends near and far. It also just as easy for strangers to initiate communications with you. Not all strangers are dangerous of course. But some are and you should always make every effort to protect yourself and your friends and families. Q: Has anyone ever heard the term grooming? Does anyone know what it is? "Grooming" is a tactic used by predators to influence and control young people. The predators groom victims in order to get what they want. They do different things, like pretending to be your friend, flattering you, or making promises, or even giving you gifts, to make you think that you can trust them. Sometimes they may lie about their age or who they are, but that s not always the case. Once they have your trust, it becomes easier for them to convince you to meet them in person, or send them naked pictures, or give them information, such as a password, or credit card information, that they then use to hurt you and your family. Q: Did you see the predator grooming Peter in the video? How? Gave him a phone Lied about his age, pretended that his parents also got on his case empathized, tried to make him feel like he was the only one that understood Peter? Q: Now, let s say you are communicating with someone you ve met online and they say. If the person is a predator, why do you think they would say that? Online Tactic Intent 3

4 Let s go private. Online Tactic Where s your computer in the house? Who s your favorite band? Designer? Film? Gear? I know someone who can get you a modeling job. Intent Engage in private conversation through a separate chat room, instant messaging, or phone texting Determine if parents or caregivers are in close proximity Discover what types of gifts to offer - e.g. concert tickets, clothing, CDs Flattery I know a way you can earn money fast. Appeal to a young person s natural interest in earning spending money You seem sad. Tell me what s bothering you. What s your phone number? If you don t... [do what I ask], I ll... [tell your parents OR share your photos in a photo blog / Webcam directory / fi lesharing network]. You are the love of my life. Show sympathy to encourage child to confi de in groomer and potentially pull them away from family support Establish off-line contact - usually happens at a later stage, after the target feels comfortable with the groomer Intimidation and manipulation - used as the groomer learns more and more about the target Manipulation - becoming appealing to someone by making him or her feel special and building companionship Q: In the beginning of the film, was there anything about Peter s behavior that may have seemed strange to his friend? Seemed to be hiding his phone Didn t want to hang out with his friend or play soccer Sounded like it had been a while since he had hung out with his friend Q: What are some other warning signs that someone might give? Receiving gifts, such as money, bus tickets, cell phones, webcams 4

5 Frequently calling or texting unknown numbers or someone that you don t know Ditching his or her friends family and friends Getting upset when not online Hiding his/her phone/computer screen from you Q: If you were Peter s friend and you were worried about him, what would you have done? First and foremost if you think someone is in danger You can also tell a trusted adult Regardless what you do, do SOMETHING, it could save your friend s life! In the workbooks we ve given you there is a list of numbers and groups that you can contact. Q: In the film, the predator is an older man. Who else might be an internet predator? Generally men age 26 or older. 99% if of predators are male. Generally not pedophiles. They typically target teens, not young children. Rarely lie about being an adult. Only 5% pretend to be teens. Predators target vulnerable teens and exploit their natural desires for attention and affections. While these statistics are interesting they are just that statistics. The truth is that ANYONE can be a predator!!! It can be someone who is a leader in the community. Someone who is married and has a family. Someone who is rich. Unfortunately, they are not always easy to spot, which is why you have to always be smart! Q: Do you think Peter should have known that the person with whom he was talking to was not who she said she was? Why? 5

6 The point to get across here to the kids is that they should always be aware of the possibility that someone is a predator but, at the same time, there may not be blatant warning signs. That s why it is so important to err on the side of caution, don t share personal information, don t post things that give away where you live, or go to school. Q: What forms of technology did Peter use to communicate with the predator in the film? Did anyone catch how the predator figured out where Peter lives? Laptop/IM-ing; texting; possibly social media Picture Peter sent him had street address info in background. Q: Can you think of other ways a cyber predator might try to talk to you? 82% of online sex crimes against minors, the offender used the victim s social networking site to gain information about the victim s likes and dislikes. (47 Journal of Adolescent Health (2010). 65% of online sex offenders used the victim s social networking site to gain home and school information about the victim. (47 Journal of Adolescent Health (2010). Geotagging It s really, really important that you always remember that even when you think your posts or conversations are private, they may not be. Better safe than sorry, especially when you are putting things out into cyberspace that could give away your address, your age, your phone number, your school all of these things can be used by a predator to get more information about you and potentially find you in real life. Remember that anyone who tries to get you to do something that makes you uncomfortable is not someone that you can trust! Q: How do you stay safe online? What are some of the ways that you can stay safe online? Don t overshare Don t post pics that give away where you live or go to school 6

7 Don t put information like your birthday, or hometown, online. Make your settings private Never give out passwords Change passwords regularly So that is all of the questions we have you guys did a great job! It s clear you paid attention to the film, and are taking this topic seriously. Before we go, we want to draw your attention to the workbook that we passed out. You will notice that it contains lots of information and not just about internet predators. In the middle section, we have put together a Guide that we hope you will take a look at. The Guide talks about all of the different ways that you might find yourself in trouble for using the internet in an unsafe and inappropriate way, as well as your rights if you find yourself in trouble. We encourage you to read it closely, and hope that it will help you make good decisions when you are using the internet. Thanks for having us! 7

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Internet Safety Guide for Parents

Internet Safety Guide for Parents Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

Related KidsHealth Links

Related KidsHealth Links Grades 9 to 12 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

Cyber bullying, sexting and Facebook. Know the law, know your rights

Cyber bullying, sexting and Facebook. Know the law, know your rights Cyber bullying, sexting and Facebook Know the law, know your rights 2 Cyber bullying, sexting and Facebook Contents 4 Cyber bullying 10 Sexting 14 Facebook 17 More information 18 Useful websites Disclaimer

More information

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

Now you are 18 Reputation and Social Media

Now you are 18 Reputation and Social Media Now you are 18 Reputation and Social Media Information presented (as of November 2015) is not intended as legal advice and cannot be relied on as such. YOUR REPUTATION Your reputation is what people think

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

DEFINITION OF CHILD PORNOGRAPHY

DEFINITION OF CHILD PORNOGRAPHY DEFINITION OF CHILD PORNOGRAPHY Photographic, film, video or other visual representation, that shows a person who is under the age of 18 years and is engaged in an explicit sexual activity for example

More information

A guide for parents and carers

A guide for parents and carers A guide for parents and carers YOU AND YOUR CHILD Sexual exploitation affects thousands of children and young people across the UK every year. As a parent or carer, you could have an important role to

More information

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

Internet Safety & Autism

Internet Safety & Autism Being able to use new technology is an important part of life for most teenagers and adults. You can use the Internet for activities like banking, buying tickets to events, ordering food, DVDs and clothes,

More information

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

A Parents' Guide to. 2014 ConnectSafely.org

A Parents' Guide to. 2014 ConnectSafely.org A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram

More information

Connectedness and the Emotional Bank Account

Connectedness and the Emotional Bank Account Connectedness and the Emotional Bank Account Directions This is a self-guided activity that can be completed by parents, teens or both. It contains five parts and should take about 45 minutes to complete.

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

Related KidsHealth Links. Discussion Questions

Related KidsHealth Links. Discussion Questions Grades 6 to 8 Personal Health Series Online Safety and Cyberbullying KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible

More information

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their

More information

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life. Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for

More information

A Time to Tell Troop Meeting Guide

A Time to Tell Troop Meeting Guide A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

More information

exaggerated, electronic, gaming clan, meetup, pact, savvy

exaggerated, electronic, gaming clan, meetup, pact, savvy Lesson Plan # 4 Online/Electronic Lure Presenter Overview: Most teens regularly and safely interact online with people they don t know via social networking, media and gaming sites. Although news organizations

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

Teacher Guide TEEN SAFETY

Teacher Guide TEEN SAFETY The Vulnerable Teacher Guide TEEN SAFETY This companion to the online course provides questions and topics for classroom discussion and activities. 2012 ShieldTheVulnerable.org 1277 Treat Blvd #530 Walnut

More information

CYBER BULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING. Read this CYBERBULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING

CYBER BULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING. Read this CYBERBULLYING CYBERBULLYING CYBERBULLYING CYBERBULLYING Read this CYBER BULLYING An initiative of the Department of Basic Education If you re like most teenagers, you spend a lot of time on a cell phone or instant messenger chatting with friends and uploading

More information

Staying Safe.....on social media and online

Staying Safe.....on social media and online Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or

More information

Learning English with CBC Radio Living in Alberta. Social Media: How Kids Use the Internet

Learning English with CBC Radio Living in Alberta. Social Media: How Kids Use the Internet Learning English with CBC Radio Living in Alberta Social Media: How Kids Use the Internet by Maroro Zinyemba Project Manager: Justine Light Daylight Consulting Inc. Integration Enhancement Topic: Social

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

The webcast will begin shortly. Please stand by.

The webcast will begin shortly. Please stand by. The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

15 Dangerous Apps Every Parent Should Know About

15 Dangerous Apps Every Parent Should Know About 15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges

More information

Related KidsHealth Links

Related KidsHealth Links Grades 6 to 8 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

Share Aware Lesson 2 - Lucy

Share Aware Lesson 2 - Lucy Share Aware Lesson 2 - Lucy Class Key Stage 2 Time 40 mins Date October 2015 Learning Objectives Learning Outcomes Key Vocabulary Resources We are learning about online safety and how to access available

More information

A Parents' Guide to ConnectSafely.org

A Parents' Guide to ConnectSafely.org A Parents' Guide to 2013 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? For young people, Instagram is a media-sharing app with a whole lot of emphasis on

More information

Central England People First s friendly guide to downloading

Central England People First s friendly guide to downloading Central England People First s friendly guide to downloading What is Skype? Skype is a computer programme that turns your computer into a telephone. This means that you can speak to other people using

More information

Merton Safeguarding Children Board. Supporting Merton s young people to stay safe online. An e-safety strategy

Merton Safeguarding Children Board. Supporting Merton s young people to stay safe online. An e-safety strategy Merton Safeguarding Children Board Supporting Merton s young people to stay safe online An e-safety strategy 2014-2015 1.0 Foreword Helping children and young people to stay safe online will always be

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

Preventing Sexual Abuse

Preventing Sexual Abuse 115 Chapter 12 Preventing Sexual Abuse As children become more independent, they meet more people and relate to them in many different ways. Just as they must learn to move around the house and community

More information

SafeMinistryTraining.com.au Course Notes

SafeMinistryTraining.com.au Course Notes SafeMinistryTraining.com.au Course Notes 1. Introduction Welcome to the Safe Ministry Training course. We all want our churches to be safe places for everyone kids as well as adults. The purpose of this

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents

More information

S SAFE. PRIMARY SCHOOL SOCIAL NETWORKING & CYBER BULLYING The SMART Challenge. Safe Meeting Accepting Reliable Tell

S SAFE. PRIMARY SCHOOL SOCIAL NETWORKING & CYBER BULLYING The SMART Challenge. Safe Meeting Accepting Reliable Tell S is for SAFE: Answer the questions below using your own ideas and the clues if you need to! S SAFE Who can see your information? What might others do with it? How can you stop others getting information

More information

trust Parenting involves Communicating WithYour Teen:

trust Parenting involves Communicating WithYour Teen: Alabama Cooperative Extension System, Alabama A&M and Auburn Universities HE-0785 PRINCIPL E S OF Communicating WithYour Teen: trust Parenting involves allowing our children to have more responsibilities

More information

It s hard to know what to do when you know or suspect that a friend or family member is living with violence.

It s hard to know what to do when you know or suspect that a friend or family member is living with violence. How can you help? A B It s hard to know what to do when you know or suspect that a friend or family member is living with violence. How do I know what is the right thing to do? Should I say something or

More information

Cyberbullying and children and young people with SEN and disabilities: the views of young people SEN and disability: developing effective

Cyberbullying and children and young people with SEN and disabilities: the views of young people SEN and disability: developing effective Cyberbullying and children and young people with SEN and disabilities: the views of young people SEN and disability: developing effective anti-bullying practice Cyberbullying and children and young people

More information

For parents and carers of children with autism

For parents and carers of children with autism For parents and carers of children with autism The NSPCC helps parents and carers talk to their children about staying safe. It s part of our work to prevent abuse from happening to any child. And it

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Tips and techniques Don t view conversations about staying safe as a one-off. It s much better to have conversations little and often.

Tips and techniques Don t view conversations about staying safe as a one-off. It s much better to have conversations little and often. The NSPCC helps parents and carers talk to their children about staying safe. It s part of our work to prevent abuse from happening to any child. And it s what this guide is all about. Simple conversations,

More information

The Digital Life of Teens

The Digital Life of Teens The Digital Life of Teens Trends, Concerns, and Impacts Yoon Hyung Choi Amanda Purington Main Themes Digital Media Usage and Access How do teens and tweens access digital media? What do they do online?

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Mortgage Secrets. What the banks don t want you to know.

Mortgage Secrets. What the banks don t want you to know. Mortgage Secrets What the banks don t want you to know. Copyright Notice: Copyright 2006 - All Rights Reserved Contents may not be shared or transmitted in any form, so don t even think about it. Trust

More information

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow Estimated time: 40 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Protect Your Privacy Online

Protect Your Privacy Online Non-fiction: Protect Your Privacy Online Protect Your Privacy Online By Kathiann M. Kowalski Keep personal information private for your own good! High school sophomore Karra H. never expected to see herself

More information

Safer Internet Day Quiz

Safer Internet Day Quiz Safer Internet Day Quiz Safer Internet Day 2014 is all about helping to create a better internet together. But do you make good decisions online? Test your internet safety knowledge by taking our Safer

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

Internet safety and addiction

Internet safety and addiction Internet safety and addiction. 1 Internet Safety Tips for Children and Teens 1. Personal Information. Don t give.. personal information without your parents permission. This means you should not your last

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

It s Not Right! Neighbours, Friends and Families for Older Adults. What You Can Do to Keep Yourself Safe From Abuse

It s Not Right! Neighbours, Friends and Families for Older Adults. What You Can Do to Keep Yourself Safe From Abuse It s Not Right! Neighbours, Friends and Families for Older Adults What You Can Do to Keep Yourself Safe From Abuse Everyone has the right to be safe and free from abuse. No one should experience abuse.

More information

A Publication of the GCPS Information Management Division

A Publication of the GCPS Information Management Division GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,

More information

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012

More information

Simple conversations to keep your child safe from abuse

Simple conversations to keep your child safe from abuse Simple conversations to keep your child safe from abuse Helping you find the right words We want to help parents and carers talk to their children about staying safe. The Underwear Rule is just one way

More information

Outsmarting On-line Predators. Christina Kilbourne

Outsmarting On-line Predators. Christina Kilbourne Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

C-SAVE. Level Middle/High School Ethics-copyright. Scenario #2 - Scott s Sorry Slumdog Choice

C-SAVE. Level Middle/High School Ethics-copyright. Scenario #2 - Scott s Sorry Slumdog Choice Grade Level- Middle/High School Ethics-plagiarism Scenario #1 - Brian and His Research Paper Brian has a research paper due next week on the impact of cyber security threats to our national security. He

More information

Protect Your Privacy Online

Protect Your Privacy Online Protect Your Privacy Online By Kathiann M. Kowalski Keep personal information private for your own good! High school sophomore Karra H. never expected to see herself on a Web site featuring scantily clad

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

Internet Safety Guidelines

Internet Safety Guidelines Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can

More information

Their stories are tragic. A new chapter starts now. now.

Their stories are tragic. A new chapter starts now. now. ! Their stories are tragic. A new chapter starts now. now.! Bully is a movie that tells powerful stories about children and their families dealing with extreme pain and tragic consequences related to bullying.

More information

A: We really embarrassed ourselves last night at that business function.

A: We really embarrassed ourselves last night at that business function. Dialog: VIP LESSON 049 - Future of Business A: We really embarrassed ourselves last night at that business function. B: What are you talking about? A: We didn't even have business cards to hand out. We

More information

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour: #300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital

More information

Chatting online and child safety

Chatting online and child safety Chatting online and child safety A guide for parents and carers on how to help children keep safe while chatting Children and chatting Chat: What is it? The internet offers great opportunities to interact

More information

NOTE: In order to authentically capture the issue, we have drawn on real cases, which have elements that some parents may find distressing.

NOTE: In order to authentically capture the issue, we have drawn on real cases, which have elements that some parents may find distressing. CONVERSATION CASE What makes cyberbullying so toxic, invasive, and harmful? How do teens think about cyberbullying and how can they help be part of the solution instead of part of the problem? has been

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

MODULE: RELATIONSHIPS ONLINE

MODULE: RELATIONSHIPS ONLINE MODULE: RELATIONSHIPS ONLINE DRAFT 23 Everett Street Cambridge, MA 02138, USA youthandmedia@cyber.law.harvard.edu http://youthandmedia.org {1} Overview: This module explores the topic of healthy relationships

More information

How Can Parents Keep Teens Safe from Online Sexual Exploitation?

How Can Parents Keep Teens Safe from Online Sexual Exploitation? protectchildren.ca How Can Parents Keep Teens Safe from Online Sexual Exploitation? The Internet and new technologies have become central to teens lives. While these technologies offer a variety of benefits

More information