Welcome to the Internet Security Seminar

Size: px
Start display at page:

Download "Welcome to the Internet Security Seminar"

Transcription

1 Welcome to the Internet Security Seminar

2 How to be Safe on Social Networking Sites Teach your child to: Be as anonymous as possible Use privacy settings Think before they post Don t friend people you don t know Avoid in-person meetings Be honest about their age

3 Teach your child to: How to be Safe on Social Networking Sites Remember social networking sites are public spaces Avoid posting anything that could embarrass them later or expose them to danger Remember that people aren t always who they say they are Check comments regularly Avoid inappropriate content and behavior, and, if encountered, report it to the social networking site

4 How to be Safe on Social Networking Sites Parents should search social networking sites their teens visit to see what information they are posting. Make sure you are added to your teen s friend list so you can view their information and verify that their profiles are set to private (as they should be!). If you re uncertain whether your child has a profile, do a simple online search by typing your child s name into a search engine like Google, or into the search option of the site in question.

5 How to be Safe on Social Networking Sites "One of the most important questions to ask that teens really understand is: 'Are you willing to share this information in front of your school assembly? Have a discussion with them about what's appropriate and what's not. Look at their images and see if you think there's something that shouldn't be on the profile and then have them either remove it or let us know you're concerned and then we'll work with you." Hemanshu Nigam Chief Security Officer Fox Interactive Media and MySpace

6 Online Bullying Gone are the days when a child s home is a refuge from playground or neighborhood bullies. The Internet is the new playground, and there are no off-hours. Tech-savvy students are turning to cyberspace to harass their peers using a new method of bullying cyberbullying.

7 Online Bullying The popularity of instant messaging, , web pages, text messaging, and blogging means that kids are potential targets all day, every day. Victimization on the Internet through cyberbullying is increasing in frequency and scope. Electronic bullies can remain virtually anonymous.

8 Online Bullying Temporary accounts and pseudonyms in chat rooms, instant messaging programs, and other Internet venues can make it very difficult for adolescents to determine the identity of aggressors. Individuals now have the ability to hide behind some measure of anonymity when using their personal computer or cellular phone to bully another individual.

9 What is Cyberbullying? Cyberbullying is willful and repeated harm (i.e., harassing, humiliating, or threatening text or images) inflicted through the Internet, interactive technologies, or mobile phones. 43% of teens aged 13 to 17 report that they have experienced some sort of cyberbullying in the past year.

10 Cyberbullying Tactics Gossip: Posting or sending cruel gossip to damage a person s reputation and relationships with friends, family, and acquaintances Exclusion: Deliberately excluding someone from an online group Impersonation: Breaking into someone s or other online account and sending messages that will cause embarrassment or damage to the person s reputation and affect his or her relationship with others Harassment: Repeatedly posting or sending offensive, rude, and insulting messages

11 Cyberbullying Tactics Cyber stalking: Posting or sending unwanted or intimidating messages, which may include threats Flaming: Online fights where scornful and offensive messages are posted on websites, forums, or blogs Outing and Trickery: Tricking someone into revealing secrets or embarrassing information, which is then shared online Cyber threats: Remarks on the Internet threatening or implying violent behavior, displaying suicidal tendencies

12 Get the Discussion Started Information you can glean from your child s online use will help to ensure a safer online environment for your child. See Enough Is Enough s Rules N Tools SM Internet Safety Guidelines at:

13 Get the Discussion Started Ask your child: 1. Are your profiles set to private? 2. Would it be easy for someone to track you down? 3. How many online friends do you have? 4. What kind of information do you consider safe? Unsafe? 5. Have you posted anything that you wouldn t want your school assembly to see?

14 Ask your child: Get the Discussion Started 6. What messages do your pictures and postings portray? 7. Have you been contacted by a stranger? 8. Have your friends ever put themselves at risk? If so, what did you do about it? 9. Have you ever said/posted anything online you wish you could take back? 10. Has anyone ever hurt your feelings by anything they posted about you online?

15 Online Gaming Remember when games were played outside and Pac Man was considered high-tech? Today, it is difficult to distinguish the visuals in an online game from real life. Kids no longer need to go to the arcade to play video games against other kids.

16 Online Gaming The web allows children to play video games with friends around the block or strangers around the world. Kids and adults from all over the globe can now convene in cyberspace to compete in online martial arts matches or band together for a fantasy quest. But, as games become more realistic and playing partners can be anonymous strangers, several concerns have emerged of which parents should be aware.

17 Online Gaming What is online gaming? Children see the online gaming world as a virtual playground. Gaming consoles operate much in the same way as a computer children can log online, put on a headset, turn on a webcam, and talk to and play with any of the millions of gamers around the world. Many online games have associated online communities, making online games a form of social activity beyond single-player games.

18 Online Gaming "Online gaming devices are just like a computer and a lot of parents don't realize that. There are messaging, chat and IM features. Using an Xbox, you can receive messages from any of the major platforms. Even if you're in the game, somebody who has your game ID or screen name can send a text message to you and it will pop up on the screen and you can chat just like you do on a computer." Chad Gallagher, Child Exploitation Squad, FBI

19 How to Stay Safe on Gaming Sites Setting ground rules at home is essential, but remember, your kids can play games from a friend s computer as well as at an Internet café. To help protect your children at home, talk to them about the dangers of online gaming, be ready to listen if they seem upset about something that happened while they were on the computer, and encourage them to use wisdom when deciding what types of online games to play.

20 How to Stay Safe on Gaming Sites You can help keep your child s gaming experiences safe, age-appropriate, friendly, fun, and even educational by educating yourself about the gaming community, game ratings, and how to use the privacy and safety tools built into the games. Check out the safety features and parental controls offered by all the major gaming consoles including Xbox, Wii, and PlayStation.

21 How to Stay Safe on Gaming Sites Teach your child to: Use voice chat wisely Be aware of voice masking technology Use suitable screen names (gamertags) Be aware of cyberbullies (griefers)

22 As a parent: How to Stay Safe on Gaming Sites Use parental controls on all gaming devices Review games and ratings before buying Disallow webcam use while gaming Set time limits Know who your child is playing with Talk to your child about coming to you if anyone bullies them, asks them for inappropriate pictures or makes them feel uncomfortable

23 Protecting Kids on Mobile Devices The first step is realizing that all of the Internet's dangers are accessible in most mobile devices children use today. Enough Is Enough recommends that parents apply Rules 'N Tools across all Internet-enabled devices children use and talking with your mobile provider to select a set of mobile parental controls for your family. Set clear rules with your children regarding when they are allowed to talk, text and surf the Internet via their mobile device. Your child should only communicate with parent-approved contacts. Talk to your children about respecting others online. Your child should never text something to someone else that they would not say to them in real life. Communication should always be truthful, encouraging and helpful. If your child receives a threatening, mean or sexual message from someone they should come to you immediately. Advise your child never to share personal information through their mobile device including date of birth, address, full name etc.

24 Protecting Kids on Mobile Devices Talk to your children about never using vulgar or sexually explicit language through their mobile device. If anyone begins using vulgar or sexually explicit language that should talk to you and also block further communication. Talk to your children about privacy. Discuss with them how there is no such thing as privacy through their mobile device--and there are no "take-backs" with what they post, text, upload or send. Content your kids send through the Internet or their mobile device can be distributed across the world, without their permission or knowledge. Decide whether your children are allowed to post content to their social networking sites and other websites through their mobile device. Content posted should be parent-approved. If your child receives a text message from an unknown source, they should not reply. Your child should never let someone they don't know use their phone. Don't text while walking or driving.

25 Questions to ask your provider include: Choosing a Mobile Device Does this device connect with the Internet, and if so, how can Internet access be turned off or blocked? Can I limit my child from visiting certain sites through this mobile device? Do you provide filtering and monitoring solutions? If so, how can they be installed? How will I received reports regarding what my child has accessed? Does this device send and receive texts, s, photos, and video messages? If so, how can these features be turned off and/or monitored? Does this device include time limiting software to limit the length of calls and times of day calls are made and received? Can I limit the phone's address/contact list to a parent-approved list? Can this phone block individuals from sending content and texts to my child?

26 Mobile Statistics 20% of 16 year olds and 30% of 17 year olds have received a sext (a sexually implicit text) Pew Internet & American Life Project. "Teens and sexting: How and Why Minor Teens are Sending Sexually Suggestive Nude images Via Text Messaging." A pew Internet Guide to Teens, Mobile Phones and Social Media. M Communications Studies, Lehnart Amanda, December 2009 By 2015, Mobile adult content revenues are expected to reach $2.8 billion and mobile adult subscriptions will reach $1 billion. Juniper Research. "Videochat and Subscription services to drive mobile adult revenues to $2.8bn by 2015" October, % of teens use the internet Pew Internet & American Life Project, 2013 The Average Age for a Person's first Cell Phone is now 13 Pew Internet & American Life Project, in 10 teens text more than 100 times a day Pew Internet & American Life Project, % of teens believe sending and receiving sexts is very common at their age MTV-Associated Press, 2011

27 Mobile Statistics 65% of young adults (20-25) believed sending and receiving texts is very common at their age MTV-Associated Press, % of teen sexters sent texts to someone who the just met The National Campaign to Prevent Teen and Unplanned Pregnancy, % of teens have sent or posted nude or seminude photographs or videos of themselves. Gwenn Schurgin O'Keeffe, Kathleen Clarke-Pearson and COUNCIL ON COMMUNICATIONS AND MEDIA, March % of teenage cell phone owners use them for social media; 54% for text; and 24% for instant messaging. Gwenn Schurgin O'Keeffe, Kathleen Clarke-Pearson and COUNCIL ON COMMUNICATIONS AND MEDIA, March % of teens say it is common for sexually suggestive text messages to get shared with people other than the intended recipient. The National Campaign to Prevent Teen and Unplanned Pregnancy, 2008

28 Mobile Statistics 48% of teens say they have received a sexually suggestive message a (via text, or IM). The National Campaign to Prevent Teen and Unplanned Pregnancy, % of teens have sent or posted sexually suggestive s or text messages. The National Campaign to Prevent Teen and Unplanned Pregnancy, % of teens (12-17) own their own cell phone. Pew Internet & American Life Project. "How Do They Even Do That?" A Pew Internet Guide to Teens, Mobile phones and Social Media. M Communications Studies, Lenhart, Amanda. June 2010 Of teen device owners 27% go online via their cell phone and 19% go online via their portable gaming device. Ibid

29 Mobile Statistics Percentage of teen cell phone owners who use the following functions on their device: 88% text 83% take pictures 64% exchange pictures 60% play music 54% record videos 46% play games 32% exchange video 31% instant message 27% general Internet use 23% social networking sites 21% 11% purchase products through their mobile phone. Ibid

30 Sexting What it is? Cell phone users, often teens and "tweens", create and exchange provocative and nude, sexual images of themselves using their cell phone's built-in digital camera. When teens and tweens engage in this illicit activity, it can lead to serious repercussions. Police are currently investigating teens throughout the country for sending nude images of themselves, with consequences ranging from suspension to felony charges for the creation and distribution of child pornography. As a parent during the digital age, it can be difficult to enforce boundaries and stay on top of everything your kids are doing, but if you're footing the bill, it is well within your right to ask your children what they are doing and play your part to help protect them.

31 Mobile Statistics Percentage of teen cell phone owners who have experienced negative aspects: 54% received spam/unwanted texts 52% talking while driving 34% texting while driving 26% bullied or harassed 15% received a sext message 4% sent a sext. Ibid

32 Mobile Statistics People who send a sext, sent it to: 60% boyfriend/girlfriend 21% someone they had a crush on 19% ex-boyfriend or ex-girlfriend 14% best friend 18% friends other than best friend 11% someone they don t know 4% classmates 14% someone else Teen Online & Wireless Safety Survey: Cyberbullying, Sexting and Parental Controls. Cox Communications Teen Online and Wireless Safety Survey in Partnership with the National Center for Missing and Exploited Children, 2009.

33 Mobile Statistics People who received sexts, received them from: 75% received from boyfriend/girlfriend 49% someone they had a crush on 20% ex-boyfriend/ex-girlfriend 20% best friend 23% friends other than best friend 18% someone they don t know 13% someone else Teen Online & Wireless Safety Survey: Cyberbullying, Sexting and Parental Controls. Cox Communications Teen Online and Wireless Safety Survey in Partnership with the National Center for Missing and Exploited Children, 2009.

34 Mobile Statistics Why sext senders sent sext messages: 43% were asked 40% to have fun 21% to impress someone 18% to feel good about themselves 8% to try to date someone 4% as a joke 3% to make someone jealous 1% as a dare 29% some other reason Teen Online & Wireless Safety Survey: Cyberbullying, Sexting and Parental Controls. Cox Communications Teen Online and Wireless Safety Survey in Partnership with the National Center for Missing and Exploited Children, 2009.

35 Mobile Statistics Friends of sext senders report that: 30% say the photo was forwarded to someone they didn t want to see it 13% were made fun of by the person that they sent the photo to 12% accidentally sent the picture to the wrong person 10% say that the person their friend sent it to threatened to send it to somebody else 9% say that the photo was posted online where many people could see it 6% report that photo was forwarded to an authority figure and their got in trouble Teen Online & Wireless Safety Survey: Cyberbullying, Sexting and Parental Controls. Cox Communications Teen Online and Wireless Safety Survey in Partnership with the National Center for Missing and Exploited Children, 2009.

36 Mobile Statistics 86% of sexters are not caught. Of those caught, 9% were caught by a parent, 1% were caught by a teacher, 3% were caught by an authority figure, and 3% were caught by someone else. 23% of teens think sexting is fine as long as the people sending and receiving the sext think it s ok (3% don t think there is any problem with sexting.) 52% of teens agree with the statement: people my age are old enough to decide for themselves whether it is all right for them to send nude or sexually suggestive photos of themselves to other people 48% of teens agree that adults are overreacting when teens send sexually suggestive text messages and s to each other. Teen Online & Wireless Safety Survey: Cyberbullying, Sexting and Parental Controls. Cox Communications Teen Online and Wireless Safety Survey in Partnership with the National Center for Missing and Exploited Children, 2009.

37 Key Report Findings: *5 Tips to Help Parents Protect Kids from Sexting: Talk to your kids about what they are doing online and outline the risks. Talk to your kids about sex and relationships in the offline and online world. Make sure your kids understand that messages or pictures they send over the Internet or on their cell phones are not truly private or anonymous. Also make sure they know anyone can-- and often will--forward their pictures of messages to others. (Ask your daughter what her boyfriend will do with those pictures once they break up). And check up on what your kids are posting online. Know who your kids are communicating with online and via cell phones: Do your best to learn who your kids are spending time with online and on the phone by checking their IM buddy lists, social networking friends and mobile device address/contact list.

38 Key Report Findings: *5 Tips to Help Parents Protect Kids from Sexting: Consider placing limits on electronic communication. Check out the parental controls offered by your mobile provider. Many mobile carriers offer family plans that allow you to limit the amount and type of text messages your kids can send. Also disable attachments on text messages. Set expectations: Make sure you are clear with your teen about what you consider appropriate behavior online and through text. *Adapted from 'Tech Talk: Sexting', ConsumerReports.org, February 24, 2009 & "Sex & Tech", Five Tips to Help Parents Talk to Their Kids About Sex and Technology, National Campaign to Prevent Teen and Unplanned Pregnancy.

39 Resources I-Safe: Illinois Attorney General s Office: Enough is Enough:

40 Internet Safety Videos Enough is Enough:

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour: #300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

www.xxxchurch.com Online Predators & Strangers

www.xxxchurch.com Online Predators & Strangers www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

Internet Safety. A guide to staying smart & safe online

Internet Safety. A guide to staying smart & safe online Internet Safety A guide to staying smart & safe online What you will learn Privacy how to keep your information safe & secure Safety how to protect yourself & your family online It s not just about computers

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Parent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009

Parent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009 Parent/Teen Cell Phone Survey 2009 Final Revised Topline 10/1/09 Data for June 26 September 24, 2009 Princeton Survey Research Associates International for the Pew Internet & American Life Project Sample:

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000

More information

Current Internet Facts

Current Internet Facts Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet

More information

Back Cover. Copyright 2006 and 2009 National Center for Missing & Exploited Children. All rights reserved.

Back Cover. Copyright 2006 and 2009 National Center for Missing & Exploited Children. All rights reserved. 1 2 3 4 5 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Using E-mail Instant Messaging Social Networking Cellular Telephones/ Wireless Devices and Texting Posting Videos and Photographs

More information

E-Safety Awareness. Parents and Carers

E-Safety Awareness. Parents and Carers E-Safety Awareness Parents and Carers Bullying online by people in my school year has left me with significant mental health issues for which I am now on medication and in therapy for. So it s really damaged

More information

Wisconsin Anti-Bullying Center

Wisconsin Anti-Bullying Center Patrick Evans, M.S. CESA 7 - Project Management Consultant Green Bay, Wisconsin Certified Trainer Wisconsin Emergency Management Multi-Hazard Emergency Planning for Schools Writer, Editor, Contributor,

More information

Website. cybersafekids.com.au WELCOME TO CYBERIA. Queensland University of Technology. 2007. really doing online?

Website. cybersafekids.com.au WELCOME TO CYBERIA. Queensland University of Technology. 2007. really doing online? WELCOME TO CYBERIA ONLINE WORLD OF DIGITAL NATIVE Website Robyn Treyvaud robynt@cse.edu.au cybersafekids.com.au CURRENT BOOKMARKS http://del.icio.us/rtreyvaud Queensland University of Technology. 2007

More information

Bullying 101: Guide for Middle and High School Students

Bullying 101: Guide for Middle and High School Students Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the

More information

Back Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved.

Back Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved. 1 2 3 5 6 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Social Networking Using E-Mail Instant Messaging Cell Phones/ Wireless Devices and Texting Posting Videos and Photos Online

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

A Time to Tell Troop Meeting Guide

A Time to Tell Troop Meeting Guide A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

More information

Cyberbullying. How common is cyberbullying?

Cyberbullying. How common is cyberbullying? Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

Who's chatting to your kids?

Who's chatting to your kids? N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

Internet Safety Guidelines

Internet Safety Guidelines Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can

More information

TAVISTOCK COLLEGE POLICIES & PROCEDURES

TAVISTOCK COLLEGE POLICIES & PROCEDURES TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by

More information

Ten Tips for Parents. To Help Their Children Avoid Teen Pregnancy

Ten Tips for Parents. To Help Their Children Avoid Teen Pregnancy Ten Tips for Parents To Help Their Children Avoid Teen Pregnancy Ten Tips for Parents To Help Their Children Avoid Teen Pregnancy The National Campaign to Prevent Teen Pregnancy has reviewed research

More information

CYBERBULLYING TEACHER S GUIDE:

CYBERBULLYING TEACHER S GUIDE: TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12

Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12 Digital Citizenship: Etiquette My Online code & Breaking Down Hate Speech Grades 9-12 Essential Question: What does it mean to do the right thing online? How can you create a community culture in which

More information

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect

More information

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life. Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

RELATIONSHIP REDUX: Tips and Scripts for Talking to Your Kids About Relationships. By Bill Albert and Jessica Sheets

RELATIONSHIP REDUX: Tips and Scripts for Talking to Your Kids About Relationships. By Bill Albert and Jessica Sheets RELATIONSHIP REDUX: Tips and Scripts for Talking to Your Kids About Relationships By Bill Albert and Jessica Sheets BEFORE WE GET STARTED The teen years are a time of exploration, discovery, learning,

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Guidelines for Preventing and Dealing with Bullying Issues

Guidelines for Preventing and Dealing with Bullying Issues Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.

More information

Girls & Cyber- bullying

Girls & Cyber- bullying MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts

More information

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents

More information

Lessons for Teens: Risky Internet and Social Networking

Lessons for Teens: Risky Internet and Social Networking Lesson Plan # 4 Online/Electronic Lure Presenter Overview: Most teens regularly and safely interact online with people they don t know via social networking, media and gaming sites. Although news organizations

More information

Finchley Catholic High School. Anti Bullying Policy

Finchley Catholic High School. Anti Bullying Policy Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can

More information

Class 2: Manage Your Digital Footprint. Student Handbook

Class 2: Manage Your Digital Footprint. Student Handbook Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal

More information

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Nancy Willard, M.S., J.D., Director Center for Safe and Responsible Internet Use URL: http://cyberbully.org or http://csriu.org

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

e-rate toolkit Cyberbullying: Crossing the Line

e-rate toolkit Cyberbullying: Crossing the Line e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

Parent Guide to Cyber bullying and Cyber threats

Parent Guide to Cyber bullying and Cyber threats School Address: 4450 S Mendenhall Rd Memphis, TN 38141 Tel: (901) 367 7814 Fax: (901) 367 7816 www.sememphis.org MEMPHIS SCHOOL OF EXCELLENCE Parent Guide to Cyber bullying and Cyber threats Young people

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

Internet Safety Guide for Parents

Internet Safety Guide for Parents Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both

More information

Online Safety How to Protect Yourself and Your Family

Online Safety How to Protect Yourself and Your Family Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing

More information

ONLINE PREDATORS & PREDATORS

ONLINE PREDATORS & PREDATORS the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.

More information

2010 Middle School Internet Safety Survey Results

2010 Middle School Internet Safety Survey Results When you are online, people can say whatever they want. ~ 8th Grader A friend pressured me to tell her my password. ~ 5th Grader Plainview Old Bethpage Central School District 21 Middle School Internet

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

Protect Your Privacy Online

Protect Your Privacy Online Protect Your Privacy Online By Kathiann M. Kowalski Keep personal information private for your own good! High school sophomore Karra H. never expected to see herself on a Web site featuring scantily clad

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

Helping to keep your children safe online

Helping to keep your children safe online Helping to keep your children safe online Chat speak how many of these do you know? gr8 BRB DEGT LMIRL POS KPC P911 PAL PAW PIR Adults often have anxieties about new media Everything that s already in

More information

How Can Parents Keep Teens Safe from Online Sexual Exploitation?

How Can Parents Keep Teens Safe from Online Sexual Exploitation? protectchildren.ca How Can Parents Keep Teens Safe from Online Sexual Exploitation? The Internet and new technologies have become central to teens lives. While these technologies offer a variety of benefits

More information

UNSUPERVISED AND ONLINE

UNSUPERVISED AND ONLINE UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163

More information

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter

More information

A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by:

A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by: A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children A joint initiative by: 30-01 11/08 (50,000) Brunswick Press Ltd. (21848) CONTENTS PAGE 1.

More information

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766 FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY www.cheezo.org 303-271-6766 A Message from District Attorney Peter Weir One of the priorities of the District Attorney s Office

More information

A Publication of the GCPS Information Management Division

A Publication of the GCPS Information Management Division GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,

More information