The webcast will begin shortly. Please stand by.

Size: px
Start display at page:

Download "The webcast will begin shortly. Please stand by."

Transcription

1 The webcast will begin shortly. Please stand

2 Making Student Safety A

3 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone and follow dial-in information. ü All attendees are muted throughout the webcast. ü Ask questions using the Questions Pane or via the Twitter hashtag. ü A webcast recording and the presentation deck will be available soon at gaggle.net/webcasts.

4 Today s Speakers Peter Johnson Project Manager, NetSmartz411 NCMEC Kathy Boehle Student Safety Supervisor Gaggle

5 gaggle.net/realstories

6 National Center for Missing & Exploited Children Charles B. Wang International Children s Building 699 Prince Street Alexandria, VA The-Lost

7 A resource for parents, guardians, and other concerned adults to understand the opportunities and challenges children face online

8 Child Exploitation Child Pornography Online Enticement of Children for Sexual Acts Prostitution of Children Child Sexual Molestation Child Sex Tourism Unsolicited Obscene Material Sent to a Child Misleading Domain Names Misleading Words/Digital Images

9 CyberTipline

10 What is Internet Safety? Prevention of meeting an online friend in real life? Learning not to chat (video or text) with strangers online? Not posting a sexually suggestive image of yourself? Writing something inappropriate about someone else? Using bad language? Searching for age inappropriate material? Cyberbullying prevention(victim or bully)? Installing monitoring Gaming safety?

11 New Trend in Online Safety Sextortion Is form of sexual exploitation that employs non-physical forms of coercion to extort sexual favors from the victim or money Traditionally a form of corruption used by or against government officials, now being used against teens to extort sexual explicit photos or money from the victim Often the victim is convinced to share one explicit photo by a friend. After that photo is shared the offender threatens the victim by saying the image will be sent to family and friends or to law enforcement, convincing the victim they broke the law Consequences have included dissemination of more explicit images, money transfers and threats of suicide by the victim Photoshopping victims faces onto explicit images is occasionally used

12 What can I do? If you ever feel that your child is in immediate danger, call 911 or contact your local law enforcement. If you suspect a child is being groomed by someone online, contact the CyberTipline:

13 What can I do? Be Involved and Proactive. Over the past few years, studies from around the world show that parental involvement and oversight is the main determining factor in prevention of online victimization Only 13% of parents know their child was bothered by something online. (Pew Internet Research Center 2012) Only 7% of U.S. parents are worried about cyberbullying, even though 33% of teenagers have been victims of cyberbullying (Pew Internet and American Life Survey, 2011) 17% of children who pay for their own phone sent sext compared to 3% who s parent/guardian pays (Pew Internet Research Center 2012)

14 What can I do? Do not let the technology get in the way of having a conversation. Start a discussion with your students: What is personal information? Why should you keep it private? Besides me, who do you feel that you can talk to if you are in a scary or uncomfortable situation? What would you do if anyone online asked to meet you face-to-face? Have you ever gotten a text from someone you do not know? If so, what did you do about it?

15 A Child s Digital Footprint Anything and everything your child post online probably can not ever be completely removed from the Internet Images Comments Tweets Likes SnapChats These types of activities, the day-to-day online behaviors, are the ones that could have the longest term impact on your children's lives. High schools, coaches, colleges, military, employers could see something your child has posted that would give them pause in the future.

16 Additional Resources NetSmartz Workshop is a program that creates interactive, educational safety resources for children ages 5 to 17. Through age-appropriate activities, games, videos and safety presentations, NetSmartz prepares children to behave responsibly when confronted with issues such as cyberbullying, inappropriate content, online exploitation, revealing too much information, sexting and scams. Report internet crimes or issues unrelated to the exploitation of children to the FBI at

17 Gaggle Safety Management Formerly Gaggle Human Monitoring Service (HMS) Discovers millions of inappropriate words and images in student , text messages, discussion boards, attachments and computer files, leading to thousands of warnings sent to school district administrators and law enforcement every

18 Gaggle Safety Management Text Monitoring & Image Filtering Transparent access to all student activities through extensive text monitoring and a proprietary Anti-Pornography Scanner. Student Safety Representatives Trained professionals greatly improve the safety and security of students, both online and in the real world, by reviewing suspicious content

19 Gaggle Safety Management Improves the safety and security of students. Removes the need for educators to review questionable communications so that they can concentrate on classroom instruction. Detects issues early, alerting school district officials at any hour if a threat is imminent, allowing educators and parents to intervene positively. Contacts local law enforcement if the situation is dangerous and all school district contacts are unreachable. Allows administrators and law enforcement to review communications that could threaten student health, safety or well-being. Reports all child pornography incidents and any sexually suggestive messages related to potential exploitation of

20

21 Gaggle Safety Management

22 Gaggle Safety Management

23 Gaggle Safety Management

24 Gaggle Safety Management

25 Gaggle Safety Management

26

27 Questions & Answers Peter Johnson Project Manager, NetSmartz411 NCMEC Kathy Boehle Student Safety Supervisor Gaggle

28 Thank you! ü A webcast recording and the presentation deck will be available soon at gaggle.net/webcasts. ü Register for an upcoming Gaggle Webcast at gaggle.net/webcasts. ü Follow us on ü Read the Gaggle Speaks blog at gaggle.net/speaks. ü Request a demo at gaggle.net/demo.

29 Making Student Safety A

Summer Safety: Tips to Help Avoid Abduction and Harm

Summer Safety: Tips to Help Avoid Abduction and Harm Summer Safety: Tips to Help Avoid Abduction and Harm Why is Summer Safety Important? During the summer months children tend to be Outdoors more Home alone more Supervised less We Believe No Child Should

More information

Back Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved.

Back Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved. 1 2 3 5 6 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Social Networking Using E-Mail Instant Messaging Cell Phones/ Wireless Devices and Texting Posting Videos and Photos Online

More information

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Back Cover. Copyright 2006 and 2009 National Center for Missing & Exploited Children. All rights reserved.

Back Cover. Copyright 2006 and 2009 National Center for Missing & Exploited Children. All rights reserved. 1 2 3 4 5 7 8 9 10 12 Back Cover Where Do Kids Connect? Browsing the Internet Using E-mail Instant Messaging Social Networking Cellular Telephones/ Wireless Devices and Texting Posting Videos and Photographs

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Child Safety on the Information Highway. www.missingkids.com

Child Safety on the Information Highway. www.missingkids.com Child Safety on the Information Highway www.missingkids.com Cyberspace, the Web, the Net, the Information whatever it s called, millions of people are now going online to exchange electronic mail, surf

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Internet Safety Guidelines

Internet Safety Guidelines Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

Parenting & Technology: The Internet, Texting & Social Networks

Parenting & Technology: The Internet, Texting & Social Networks Parenting & Technology: The Internet, Texting & Social Networks Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety online Instant messaging,

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

What do you. you know about. Online Predators?

What do you. you know about. Online Predators? What do you you know about Online Predators? Some people may think of a stereotype when they think about an online predator Some people think of a ster e o type n. stereotype 1. A conventional, formulaic,

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2 Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...

More information

Nationwide support services for families and professionals in the prevention, investigation, and prosecution of abducted, endangered, and sexually

Nationwide support services for families and professionals in the prevention, investigation, and prosecution of abducted, endangered, and sexually Nationwide support services for families and professionals in the prevention, investigation, and prosecution of abducted, endangered, and sexually exploited children As the nation s resource center for

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

MEA-MFT Teachers Conference

MEA-MFT Teachers Conference MEA-MFT Teachers Conference Online Safety: Cyber Predators - Presented by Desireé Caskey You can be anyone you want to be on the Internet Topics for Today What our students are saying - Internet Landscape

More information

Social, Security, and Privacy Implications of Computing

Social, Security, and Privacy Implications of Computing Social, Security, and Privacy Implications of Computing February 17, 2006 Damira Pon University at Albany, SUNY 1 Cyber Ethics 2 Relativity applies to physics, not ethics - Albert Einstein 3 Cyber Ethics

More information

www.xxxchurch.com Online Predators & Strangers

www.xxxchurch.com Online Predators & Strangers www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through

More information

a resource guide for parents and guardians INTERNET SAFETY North Carolina Department of Justice

a resource guide for parents and guardians INTERNET SAFETY North Carolina Department of Justice ATTORNEY GENERAL ROY COOPER a resource guide for parents and guardians INTERNET SAFETY what you don't know can hurt your child North Carolina Department of Justice Computers and the Internet have revolutionized

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour: #300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

CREATING A NETWORK OF PREVENTION AND PROTECTION

CREATING A NETWORK OF PREVENTION AND PROTECTION CREATING A NETWORK OF PREVENTION AND PROTECTION To report suspected abuse of a minor, call the Pennsylvania Child Abuse Hotline 1-800-932-0313 If you suspect child abuse by clergy, church officials, church

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766 FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY www.cheezo.org 303-271-6766 A Message from District Attorney Peter Weir One of the priorities of the District Attorney s Office

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

A U.S. Postal Inspector s Guide to Internet Safety for Children

A U.S. Postal Inspector s Guide to Internet Safety for Children A U.S. Postal Inspector s Guide to Internet Safety for Children A U.S. Postal Inspector s Guide to INTERNET SAFETY FOR CHILDREN The Internet is a global community that allows people to share information

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Online Safety How to Protect Yourself and Your Family

Online Safety How to Protect Yourself and Your Family Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Cyber Security. Keeping the internet safe for you and your family

Cyber Security. Keeping the internet safe for you and your family Cyber Security { Keeping the internet safe for you and your family The Five Things you MUST do Learn the lay of the land Protect your identity Become a sceptic Be aware of stranger danger Be a good cyber

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

LARKS HILL JUNIOR & INFANT SCHOOL

LARKS HILL JUNIOR & INFANT SCHOOL LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

MySpace Bebo Facebook cyberbullying contact by adults with a sexual interest in children

MySpace Bebo Facebook cyberbullying contact by adults with a sexual interest in children YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING sites Social networking sites, such as MySpace, Bebo and Facebook, are very popular with children,

More information

MEMBER INFORMATION Member First Name: Middle: Last: F Date of Birth: / / Child s Student Identification Number:

MEMBER INFORMATION Member First Name: Middle: Last: F Date of Birth: / / Child s Student Identification Number: Office Use: Entry Date: / / Expiration Date: / / Member #: Receipt Number for Membership Payment: Unit Name: (please circle) 01: Pathfinders Children s Center 02: Mary Bremer Patrick Teen Center MEMBER

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Derby and Derbyshire Safeguarding Children Boards. E-Safety Strategy 2015

Derby and Derbyshire Safeguarding Children Boards. E-Safety Strategy 2015 Derby and Derbyshire Safeguarding Children Boards 1) Definition of e-safety E-Safety Strategy 2015 E-Safety is a term which encompasses both the internet and other ways in which young people communicate

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

E-Safety Awareness. Parents and Carers

E-Safety Awareness. Parents and Carers E-Safety Awareness Parents and Carers Bullying online by people in my school year has left me with significant mental health issues for which I am now on medication and in therapy for. So it s really damaged

More information

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY

FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the

More information

AGNH7_040910:Layout 1 5/19/10 10:05 AM Page 1. how safe is your child from\ online predators? NH Attorney General Michael Delaney

AGNH7_040910:Layout 1 5/19/10 10:05 AM Page 1. how safe is your child from\ online predators? NH Attorney General Michael Delaney AGNH7_040910:Layout 1 5/19/10 10:05 AM Page 1 how safe is your child from\ online predators? NH Attorney General Michael Delaney AGNH7_040910:Layout 1 5/19/10 10:05 AM Page 2 Even YOUR CHILD can become

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000

More information

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO CERTIFICATE NUMBER (FOR COMPTROLLER S USE ONLY) TO: CITY COUNCIL FROM (ORIGINATING DEPARTMENT): Police Department DATE: 5/26/2015 SUBJECT: Informational update

More information

Boundaries: Protecting Children, Young People and Yourself from Technology Dangers

Boundaries: Protecting Children, Young People and Yourself from Technology Dangers Boundaries: Protecting Children, Young People and Yourself from Technology Dangers Presented by Robert Hugh Farley MS Farley International Consultant in Crimes against Children for the VIRTUS Program 10

More information

Children s Internet Protection Plan. IIBGA Children s Internet Protection Plan (CIPA) Plan. Children s Internet Protection Act (CIPA) Safety Plan

Children s Internet Protection Plan. IIBGA Children s Internet Protection Plan (CIPA) Plan. Children s Internet Protection Act (CIPA) Safety Plan IIBGA Children s Internet Protection Plan (CIPA) Plan IIBGA Children s Internet Protection Act (CIPA) Safety Plan [Revise and edit as necessary to fit USD goals and include in Handbook] Goals: It is the

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

Safer Internet Day Quiz

Safer Internet Day Quiz Safer Internet Day Quiz Safer Internet Day 2014 is all about helping to create a better internet together. But do you make good decisions online? Test your internet safety knowledge by taking our Safer

More information

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life. Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in

More information

Eanes Independent School District Responsible Use Guidelines for Technology

Eanes Independent School District Responsible Use Guidelines for Technology Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the

More information

15 Dangerous Apps Every Parent Should Know About

15 Dangerous Apps Every Parent Should Know About 15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

2011 NCSA / McAfee Internet Home Users Survey

2011 NCSA / McAfee Internet Home Users Survey 2011 NCSA / McAfee Internet Home Users Survey National Cyber Security Alliance McAfee Zogby International October 2011 Methodology and Sample Characteristics IBOPE Zogby International was commissioned

More information

Who's chatting to your kids?

Who's chatting to your kids? N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000

More information

Internet Safety: Teens

Internet Safety: Teens Internet Safety: Teens Table of Contents PRESENTER S GUIDE Part I: What s new in this version? Part II: Presentation length Part III: 5 things to know before giving a NetSmartz presentation Part IV: Glossary

More information

Cyber Safety Handbook 2014

Cyber Safety Handbook 2014 Cyber Safety Handbook 2014 Mission & Vision Statements Mission To provide students with an excellent, all-round education in a Christian environment. Cricos No: 01645K Vision Woodcroft College aspires

More information

3.30 General School Administration Chain of Command 3.30-E Exhibit Organizational Chart for Administration

3.30 General School Administration Chain of Command 3.30-E Exhibit Organizational Chart for Administration SECTION 3 SCHOOL ADMINISTRATION 3.10 Goals and Objectives 3.30 Chain of Command 3.30-E Exhibit Organizational Chart for Administration 3.40 Superintendent 3.50 Administrative Personnel Other Than the Superintendent

More information

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology

More information

Living Online: Using Technology Wisely Lesson. Guide

Living Online: Using Technology Wisely Lesson. Guide Living Online: Using Technology Wisely Lesson Guide Target Audience Adolescents 11-14 Time Entire program 1 hour, depending on discussion Program Objectives Ways to portray a positive image online How

More information

Dear Educators, Parents and Caregivers

Dear Educators, Parents and Caregivers Dear Educators, Parents and Caregivers PAW, POS, PAL, LMIRL, KPC, TDTM, WYRN these are not typos, acronyms for governmental agencies or professional acronyms used within engineering or mathematical arenas.

More information

Communicating about bullying

Communicating about bullying Communicating about bullying Bullying is a widespread and serious problem that can happen anywhere. It is not a phase children have to go through, it is not just messing around, and it is not something

More information

Nower Hill High School

Nower Hill High School Nower Hill High School An introduction to E-Safety Louise Voden, Ben Ford & PC Ian Scanlon Outcomes: Highlight the potential risks young people may face online Describe the technologies and functions Outline

More information

!! What dangers do your!children!face when they go online?!! All!who!participate!in!activities!online!face!risks!when!they!use!the!

!! What dangers do your!children!face when they go online?!! All!who!participate!in!activities!online!face!risks!when!they!use!the! What dangers do yourchildrenface when they go online? Allwhoparticipateinactivitiesonlinefaceriskswhentheyusethe Internet,includingadults.Theworldisconstantlychangingwithnew technologyavailabledaily.itmayfeeloverwhelmingwhenwefocuson

More information

E-Safety and Acceptable Use Policy

E-Safety and Acceptable Use Policy E-Safety and Acceptable Use Policy This policy has been written in consultation with pupils and staff so that they understand that there are dangers associated with Internet use, and they know what behaviour

More information

Social Media Curriculum Overview

Social Media Curriculum Overview Lessons in K 2 Social Media Curriculum Overview 1. Going Places Safely ( KINDERGARTEN) https://www.commonsensemedia.org/educators/lesson/going places safely k 2 How do I go places safely on the computer?

More information

Webliography: Cyber Safety Online Resources

Webliography: Cyber Safety Online Resources Webliography: Cyber Safety Online Resources Acronyms Slang Terminology/Online Chat Abbreviations Define your world. Urban Dictionary. http://www.urbandictionary.com. The Urban Dictionary will provide individuals

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

Social networking and Facebook information for foster carers

Social networking and Facebook information for foster carers Social networking and Facebook information for foster carers It is important that foster carers understand about social networking, including the opportunities and the dangers, and that they can discuss

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

How safe is your child online?

How safe is your child online? OFFICE OF THE Arizona Attorney General Mark Brnovich 1275 West Washington Street Phoenix, Arizona 85007 602.542.2123 TUCSON OFFICE: 400 West Congress South Building Suite 315 Tucson, Arizona 85701 520.628.6504

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

Cyberbullying, Sexting & Predators Oh My!

Cyberbullying, Sexting & Predators Oh My! Cyberbullying, Sexting & Predators Oh My! Addressing Youth Risk in the Digital Age in a Positive and Restorative Manner Nancy Willard Center for Safe and Responsible Internet Use Cyber Savvy Cyber Savvy

More information

Online Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk

Online Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk Online Reputation Luke www.ceop.police.uk www.thinkuknow.co.uk Child Exploitation Online Protection Centre (CEOP) Never give out your personal information Parents 1 When should I report to CEOP? How to

More information

RIVERVIEW SCHOOL DISTRICT

RIVERVIEW SCHOOL DISTRICT No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK

More information

CYBER BULLYING AND OTHER INTERNET DANGERS

CYBER BULLYING AND OTHER INTERNET DANGERS CYBER BULLYING AND OTHER INTERNET DANGERS A guide for parents/carers on cyber safety Disconnecting mobile phones and the internet isn t the answer - connecting with our children and young people is! Contents

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

How Can Parents Keep Teens Safe from Online Sexual Exploitation?

How Can Parents Keep Teens Safe from Online Sexual Exploitation? protectchildren.ca How Can Parents Keep Teens Safe from Online Sexual Exploitation? The Internet and new technologies have become central to teens lives. While these technologies offer a variety of benefits

More information

Networking and Social Media Policy

Networking and Social Media Policy Networking and Social Media Policy 1 Objectives This policy sets out the Millfields Community School policy on social networking. New technologies are an integral part of our lives and are powerful tools

More information

Are you protecting yourself online?

Are you protecting yourself online? OFFICE OF THE Arizona Attorney General Mark Brnovich Internet safety and substance abuse guide for teens office of the arizona attorney general Mark Brnovich 1275 West Washington Street Phoenix, Arizona

More information