Who's chatting to your kids?
|
|
|
- Gervais Brendan Farmer
- 9 years ago
- Views:
Transcription
1 N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000 For further information about safe ways to enjoy the best of the internet visit the: Australian Communications and Media Authority web site The Australian Internet Safety Advisory Board web site The Virtual Global Taskforce web site To report any information to police call Crime Stoppers (Tasmania only ) The information in this booklet was compiled by the Queensland Police Service with support by the Queensland State Government. WES T E R To report any information to police call Crime Stoppers (Tasmania only ) 08/05
2 Online Chat Rooms Is your child at risk? What should you do? Mobile Phones What can I do? Who's chatting to your kids? The internet has brought the world into our living rooms, and in doing so has provided us with access to vast information resources and the opportunity to meet and communicate with people from all over the world. However, advances in technology have also been embraced by sex offenders who have proven to be exceptionally skilled at utilising new modes of communication to exploit and harm our children. While the internet is fundamentally a great place for children, there are some areas of cyberspace that are not appropriate. This brochure provides you with practical information about internet safety and ways you can minimise potential risks to your children. 2
3 Online Chat Rooms Online chat rooms have proven to be a dangerous destination for children who are unsupervised, or who have not been provided with sufficient information and guidance to ward off approaches by sexual predators. These individuals listen to and empathise with the problems of children, and are aware of their latest music, hobbies and interests. Some attempt to lower a child's inhibitions by slowly introducing sexual context and content into their conversations, while others immediately engage in sexually explicit conversation. Some collect and trade childpornographic images, while others may seek a face-to-face meeting with your child. Investigations conducted by Australian law enforcement agencies have identified that some individuals gradually seduce children through the use of attention, affection and even gifts. The standard rules you teach your children about meeting new people in the real world also apply when they meet and 'chat' with people online. Consider for a moment whether you would feel comfortable if your child spoke to a total stranger on the street for several hours. Or if the phone rang at home and your child told a stranger all about themselves - their age, address, school or mobile phone number? Just as you wouldn't let your child give their personal details to someone they meet on the street, they shouldn't give them to anyone in a chat room. The following guide has been prepared by Australian law enforcement agencies in Australia and is based on internet investigations involving child victims. 3 4
4 Is your child at risk? You find pornography on your child's computer. Child sex offenders may use pornography as part of the process to facilitate open sexual discussion, and it may be used to show the child that sex between children and adults is acceptable and normal. Your child is receiving phone calls from people you don't know or is calling numbers you don't recognise. It is very rare that a child sex offender will not attempt to speak directly to a child they have met in a chat room. Investigations to date have proven that most want to talk to the child on the telephone for the purpose of setting up an actual meeting. While your child may be hesitant to give out your home phone number, the sex offender will give out theirs. If you do not have a silent number and your child calls, the offender can easily obtain your number using the 'caller ID' function on their telephone. Your child is spending a large amount of time on the internet. The longer your child is online, particularly in 'chat' rooms, the higher the likelihood that they will be approached inappropriately, or be exposed to objectionable material. While exploring the internet can be a valuable experience, parents should consider monitoring the amount of time children spend online. Children are at greatest risk from online sexual predators in the evening, during weekends and school holidays. Be aware that the visitors to chat rooms are from all over the world, not just Australia. Research by law enforcement investigators specialising in this field have shown that some offenders are online for up to 16 hours at a time. Your child is receiving gifts or mail from people you don't know. Sex offenders use many strategies to gain the confidence and trust of a child. They will send letters and use gifts as part of this process, and have even sent plane tickets in order for the child to travel across the country to meet them. When you enter the room your child changes the screen or turns the computer off. If your child is engaged in inappropriate conversation or is looking at pornographic images it is likely that they will attempt to hide this from you. Your child is becoming withdrawn or displaying behavioural problems. Child sex offenders are masters at exploiting the every day issues that trouble children. They will provide your child with a sympathetic and comforting ear, and will turn insignificant family problems into major issues in order to gain the affection of your child. Children may also become withdrawn after sexual victimisation. 5 6
5 What should you do? Be aware of the programs and files that are on your computer. If you don't feel that you have the knowledge or technical ability to do this, ask a friend, colleague or qualified technician. If you believe your child may be at risk, you should consider talking with them about the dangers associated with online conversations. Spend time exploring the internet with your children, and let them teach you about their favourite web sites. Keep the computer in a room the whole family accesses, not in your child's bedroom. Opportunities for exploitation by a sexual predator are limited if the computer monitor is visible to all members of the family. Consider installing filtering and/or computer blocking software provided by your Internet Service Provider. The Netalert web page provides information on a number of commercially available products. ( Ensure you are able to access your child's and randomly check the contents. Remember they may also be a member of free accounts other than the one provided by your Internet Service Provider such as 'Hotmail' and 'Yahoo'. Check your phone bill for unusual outgoing calls, or consider using a 'caller ID' device to identify incoming calls. Consider approaching your telephone company to discuss the options they may be able to provide to ensure your privacy and security. Your child could encounter an online sexual predator at any place outside your supervision. Inquire with your child's school, public library, or anywhere that you believe your child accesses the internet to ascertain what safety measures they have in place. Tell your children: - Not to send a picture of themselves to someone they don't know, and to never place a full profile and picture of themselves anywhere on the internet. - Never give out personal information including their name, home address, phone number or school. - Never arrange a face-toface meeting with someone they have chatted with on the internet. Every element of society has dangers associated with it, and the internet is no different. Like learning to cross the street, it is important that we take the time to guide, assist and supervise our children in the use of the internet. If any of the following situations occur, you should immediately contact your local police station: Your child or anyone in the household has received child pornography. Your child has been sexually solicited. Your child has received sexually explicit images. If any of these scenarios occur, keep you computer turned off in order to preserve evidence. 7 8
6 Mobile Phones What can I do? Over the past decade there has been an incredible growth in the use of mobile phones, with over a billion people currently connected worldwide by mobile handsets. Aside from voice and text communications, the new generation of mobiles also provide access to picture messaging, video clips, games and internet access. These services can be great fun for children, as they offer the increased ability to interact with others. It is important to be aware that mobile phones can also pose a risk to children. Sexual predators who chat with children on the internet frequently go on to make phone calls to the child. This is made easier and less detectable by parents when the child has access to their own mobile phone. Also, many mobile phones are now capable of accessing the internet. This means that children can access chat services or via the new generation of mobile phones, and also have the potential to be exposed to inappropriate material through internet web pages. Even phones that do not have internet access can enter text message based chat rooms which some carriers provide. These chat rooms only require a mobile phone s normal text message capability. Choose a mobile phone for your child that does not feature internet access, or alternatively speak with your carrier to block internet access. All carriers are able to do this. Talk to your carrier about blocking other services that are not required by your child s phone. This gives parents the opportunity to limit incoming and outgoing calls, text messages and picture messages. If you are concerned, check the received and dialled call register of your child s mobile phone, and phone bills for numbers other than known friends or family. Consider limiting your child s access to the phone. For example, advise your child to use the mobile phone for emergencies and calls to home only. Talk to your child about the appropriate use of camera phones. It is important that they seek another person s permission before taking a photograph, and that your child tells you if anyone else s use of a camera phone makes them feel uncomfortable. Stress the importance of not responding to any messages from strangers. If your child receives persistent calls or messages from a stranger, you should report it to the police, taking a note of the number and saving any messages or pictures on the mobile handset. Remind your child to be careful about giving out their phone number and in particular not to give it to strangers. Remember, ultimately your child s safety rests with you. 9 10
Online Safety How to Protect Yourself and Your Family
Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing
Affirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
Internet Safety Guide for Parents
Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both
Guideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
A U.S. Postal Inspector s Guide to Internet Safety for Children
A U.S. Postal Inspector s Guide to Internet Safety for Children A U.S. Postal Inspector s Guide to INTERNET SAFETY FOR CHILDREN The Internet is a global community that allows people to share information
Cyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Internet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
St Bernadette s Catholic Primary School. E-Safety Policy
St Bernadette s Catholic Primary School E-Safety Policy St Bernadette s Catholic Primary School - e-safety policy Our Vision St Bernadette s Catholic Primary School embrace the positive impact and educational
~Osgood Public Library ~ Milan Branch Library Computer and Internet Acceptable Use Policy
~Osgood Public Library ~ Milan Branch Library Computer and Internet Acceptable Use Policy The Library is committed to providing technology tools and information in a variety of formats to meet the needs
Reporting the crime to the police
Section 4 Reporting the crime to the police Why report the crime to the police? It is your choice whether you report the crime to the police. Some people choose not to report or may not report straight
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
Social Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
9. Children, Technology and Gambling
9. Children, Technology and Gambling This document is part of a series of Building a Stronger South Australia policy initiatives from the Government of South Australia. 1. Future Fund 2. Jobs and Skills
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
How To Protect Children From Abuse
CREATING A NETWORK OF PREVENTION AND PROTECTION To report suspected abuse of a minor, call the Pennsylvania Child Abuse Hotline 1-800-932-0313 If you suspect child abuse by clergy, church officials, church
Cybersmart Guide for Families
Australia s regulator for broadcasting, the internet, radiocommunications and telecommunications www.acma.gov.au Cybersmart Guide for Families Safe internet use in the library and at home Introduction
Common Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
Basic Computer Security Part 3
Basic Computer Security Part 3 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
Social Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
Guidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
Integrative Psycho-Therapy and Assessment Services, P.L.L.C. PSYCHOTHERAPIST-PATIENT SERVICES AGREEMENT
Integrative Psycho-Therapy and Assessment Services, P.L.L.C. PSYCHOTHERAPIST-PATIENT SERVICES AGREEMENT Welcome to my practice. This document (the Agreement) contains important information about my professional
Young people and drugs
Young people and drugs Many parents worry about whether their son or daughter is taking illegal drugs, how they can tell, and what to do about it. While there s a lot of concern about illegal drugs in
SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
Services for Children, Young People and Families
Services for Children, Young People and Families CHILDREN IN CARE SAFER CARE POLICY (FOSTER CARE) March 2013 Author: Len Pilkington Date to be Reviewed: March 2014 1. Statutory Framework The Fostering
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks.
Trinity High School Acceptable Use Policy (AUP) for Computers and the school networks. This policy is divided into 5 main areas: 1. Aims and Objectives of the AUP 2. General Computer Use 3. Use of the
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.
Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
PSYCHOTHERAPY CONTRACT
Aaron J. Dodini, Ph.D. Licensed Clinical Psychologist Licensed Marriage & Family Therapist PSYCHOTHERAPY CONTRACT Welcome to my practice. This document contains important information about my professional
Education Committee inquiry into PSHE and SRE in schools. Written evidence submitted by Childnet International
Education Committee inquiry into PSHE and SRE in schools Written evidence submitted by Childnet International Executive Summary 1. As a children s internet safety charity we have been pleased to see the
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect
YOUNG PEOPLE, MUSIC & THE INTERNET
YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading
How people with learning disabilities use TV, telephones, mobiles and the internet. Shop.
How people with learning disabilities use TV, telephones, mobiles and the internet. Shop. EasyRead version of the report: People with learning disabilities and communications services. Shop. What is in
Today s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
Youth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
CITY OF YORK SAFEGUARDING CHILDREN BOARD GUIDANCE. The use of photographic images of children in schools
CITY OF YORK SAFEGUARDING CHILDREN BOARD GUIDANCE The use of photographic images of children in schools Published 2004 Revised October 2013 Using Images of Children: photographs, videos, websites and webcams
RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois
6.55 Page 1 of 1 INSTRUCTION Acceptable Use Policy Computer equipment, including access to the Internet, is to be used in a responsible, efficient, ethical and legal manner in accordance with the mission
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
The rules you have to follow when you are on Licence
The rules you have to follow when you are on Licence Information taken from: PI 20/2012 & PSI 40/2012 Licences and Licence Conditions Annex A Developed and illustrated by www.changepeople.co.uk 1 Anyone
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet
Chatroom and messaging safety Staying away from pornography Avoiding internet bullying Keeping your child safe on the internet AT A GLANCE Using the internet and messaging safely Not everyone who uses
SOCIAL MEDIA IN SCHOOLS. Guidelines for school staff using social media and other technologies. Licenced for NEALS
SOCIAL MEDIA IN SCHOOLS Guidelines for school staff using social media and other technologies Licenced for NEALS TITLE: Social Media In Schools: Guidelines for school staff using social media and other
Current Internet Facts
Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet
BANK VIEW HIGH SCHOOL
BANK VIEW HIGH SCHOOL POLICY & PROCEDURES FOR E-SAFETY Chair of Governors Date./ / 20. Review Date./ / 20. Bank View High School E-Safety Policy INTRODUCTION Our policy applies to all students, staff,
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
FIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
