3 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone and follow dial-in information. ü All attendees are muted throughout the webcast. ü Ask questions using the Questions Pane or via the Twitter hashtag. ü A webcast recording and the presentation deck will be available soon at gaggle.net/webcasts.
4 Today s Speakers Peter Johnson Project Manager, NetSmartz411 NCMEC Kathy Boehle Student Safety Supervisor Gaggle
6 National Center for Missing & Exploited Children Charles B. Wang International Children s Building 699 Prince Street Alexandria, VA The-Lost
7 A resource for parents, guardians, and other concerned adults to understand the opportunities and challenges children face online
8 Child Exploitation Child Pornography Online Enticement of Children for Sexual Acts Prostitution of Children Child Sexual Molestation Child Sex Tourism Unsolicited Obscene Material Sent to a Child Misleading Domain Names Misleading Words/Digital Images
10 What is Internet Safety? Prevention of meeting an online friend in real life? Learning not to chat (video or text) with strangers online? Not posting a sexually suggestive image of yourself? Writing something inappropriate about someone else? Using bad language? Searching for age inappropriate material? Cyberbullying prevention(victim or bully)? Installing monitoring Gaming safety?
11 New Trend in Online Safety Sextortion Is form of sexual exploitation that employs non-physical forms of coercion to extort sexual favors from the victim or money Traditionally a form of corruption used by or against government officials, now being used against teens to extort sexual explicit photos or money from the victim Often the victim is convinced to share one explicit photo by a friend. After that photo is shared the offender threatens the victim by saying the image will be sent to family and friends or to law enforcement, convincing the victim they broke the law Consequences have included dissemination of more explicit images, money transfers and threats of suicide by the victim Photoshopping victims faces onto explicit images is occasionally used
12 What can I do? If you ever feel that your child is in immediate danger, call 911 or contact your local law enforcement. If you suspect a child is being groomed by someone online, contact the CyberTipline:
13 What can I do? Be Involved and Proactive. Over the past few years, studies from around the world show that parental involvement and oversight is the main determining factor in prevention of online victimization Only 13% of parents know their child was bothered by something online. (Pew Internet Research Center 2012) Only 7% of U.S. parents are worried about cyberbullying, even though 33% of teenagers have been victims of cyberbullying (Pew Internet and American Life Survey, 2011) 17% of children who pay for their own phone sent sext compared to 3% who s parent/guardian pays (Pew Internet Research Center 2012)
14 What can I do? Do not let the technology get in the way of having a conversation. Start a discussion with your students: What is personal information? Why should you keep it private? Besides me, who do you feel that you can talk to if you are in a scary or uncomfortable situation? What would you do if anyone online asked to meet you face-to-face? Have you ever gotten a text from someone you do not know? If so, what did you do about it?
15 A Child s Digital Footprint Anything and everything your child post online probably can not ever be completely removed from the Internet Images Comments Tweets Likes SnapChats These types of activities, the day-to-day online behaviors, are the ones that could have the longest term impact on your children's lives. High schools, coaches, colleges, military, employers could see something your child has posted that would give them pause in the future.
16 Additional Resources NetSmartz Workshop is a program that creates interactive, educational safety resources for children ages 5 to 17. Through age-appropriate activities, games, videos and safety presentations, NetSmartz prepares children to behave responsibly when confronted with issues such as cyberbullying, inappropriate content, online exploitation, revealing too much information, sexting and scams. Report internet crimes or issues unrelated to the exploitation of children to the FBI at
17 Gaggle Safety Management Formerly Gaggle Human Monitoring Service (HMS) Discovers millions of inappropriate words and images in student , text messages, discussion boards, attachments and computer files, leading to thousands of warnings sent to school district administrators and law enforcement every
18 Gaggle Safety Management Text Monitoring & Image Filtering Transparent access to all student activities through extensive text monitoring and a proprietary Anti-Pornography Scanner. Student Safety Representatives Trained professionals greatly improve the safety and security of students, both online and in the real world, by reviewing suspicious content
19 Gaggle Safety Management Improves the safety and security of students. Removes the need for educators to review questionable communications so that they can concentrate on classroom instruction. Detects issues early, alerting school district officials at any hour if a threat is imminent, allowing educators and parents to intervene positively. Contacts local law enforcement if the situation is dangerous and all school district contacts are unreachable. Allows administrators and law enforcement to review communications that could threaten student health, safety or well-being. Reports all child pornography incidents and any sexually suggestive messages related to potential exploitation of
21 Gaggle Safety Management
22 Gaggle Safety Management
23 Gaggle Safety Management
24 Gaggle Safety Management
25 Gaggle Safety Management
27 Questions & Answers Peter Johnson Project Manager, NetSmartz411 NCMEC Kathy Boehle Student Safety Supervisor Gaggle
28 Thank you! ü A webcast recording and the presentation deck will be available soon at gaggle.net/webcasts. ü Register for an upcoming Gaggle Webcast at gaggle.net/webcasts. ü Follow us on ü Read the Gaggle Speaks blog at gaggle.net/speaks. ü Request a demo at gaggle.net/demo.
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
2 So you got naked online... OK... so I guess if you have picked this up and started to read, it s likely that you have done something online that you are now regretting. Or perhaps you are trying to help
Social Networking CHALLENGES Every Parent Should Know by makers of www.netnanny.com 801-508-3600 firstname.lastname@example.org 6949 S. High Tech Drive, Midvale UT 84047 This document provides parents with
Let s Fight It Together What we can all do to prevent cyberbullying A GUIDE TO USING LET S FIGHT IT TOGETHER Welcome to Let s Fight It Together. This resource packs aims to help children, young people,
A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children A joint initiative by: 30-01 11/08 (50,000) Brunswick Press Ltd. (21848) CONTENTS PAGE 1.
Changes to special educational needs and disability support Easy read guide for children and young people Who is this guide for? This guide will be useful if you: are a child or a young person have a learning
A TEEN DATING VIOLENCE AND ABUSE PREVENTION CURRICULUM HIGH SCHOOL EDITION SINCE 1991 TABLE OF CONTENTS INTRODUCTION 01-10 BIBLIOGRAPHY/RESOURCES 11-15 LESSON 01: WHAT IS DATING ABUSE? 16-31 LESSON 02:
FIRST Youth Protection Program Message from FIRST President & FIRST YPP Manager FIRST Youth Protection Program 2 What is FIRST? FIRST is a 501(c)(3) not-for-profit organization devoted to helping young
Parenting 2.0 Summary Report: Parents Use of Technology and the Internet Report prepared by: Jessie Connell, M.A. March 2012 http://www.cehd.umn.edu/fsos/parent20 For questions, please contact: Jodi Dworkin,
U.S. Department of Justice U.S. Department of Justice The National Strategy for Child Exploitation Prevention and Interdiction A REPORT TO CONGRESS AUGUST 2010 I. EXECUTIVE SUMMARY... 1 II. A GRAVE THREAT
You and your child For parents of children who have been sexually abused Department of Human Services Acknowledgements Published in consultation with many services that work with families where child sexual
Yahoo s Code of Ethics Winning with Integrity Winning with Integrity Yahoos, Yahoo is the place where millions of people go to see what is happening with the people and the things that matter to them most.
A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram
THIS IS ABUSE Discussion Guide This is Abuse Discussion Guide 2 Contents Introduction Background to the This is Abuse campaign Note to facilitators Key messages Section One: Preparing for the sessions:
Understanding the Legal System When Your Child Has Been Sexually Abused P.O. Box 8782, Silver Spring, MD 20907 301-565-2277 877-496-SALI fax 301-565-3619 This booklet is not intended to and does not provide
The Manual for Parents and Students About Special Education Services in Texas 2012 Revised and Updated September 2011 A JOINT PROJECT OF www.thearcoftexas.org www.disabilityrightstx.org Table of Contents
THAK YOU! A big thanks to Sam Carbaugh, cartoonist and illustrator, for lending us his skills to make this booklet more enjoyable. He did the cover art and a bunch of the cartoons inside. The others are
Skills to Pay the Bills Problem Solving and Critical Thinking Everyone experiences problems from time to time. Some of our problems are big and complicated, while others may be more easily solved. There
Updated 13/01/15 A Guide To Being in Care For Children and Young People 1 Contents Introduction Page 3 Pathways into Care Page 3-6 Role of your Social Worker Page 6 Adoption Page 7 Special Guardianship
OSHKOSH CORPORATION The Oshkosh Way A Corporate Code of Ethics & Standards of Conduct The Oshkosh Way Dear fellow employee: We exist to serve and delight our customers and shareholders. That s our mission.
a threat made in school ADAM S BACKGROUND LEADING UP TO THE CRIME Adam, 15, is the youngest of four children. His parents are divorced. He lives with his mother, has regular contact with his father, and
Who can you trust? A Sexual Exploitation and Relationships Education Programme Developed by Taking Stock www.safeguardingsheffieldchildren.org.uk FRIEND OR FOE WHO CAN YOU TRUST? Taking Stock is a Sheffield-based