FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY

Size: px
Start display at page:

Download "FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766"

Transcription

1 FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY

2 A Message from District Attorney Peter Weir One of the priorities of the District Attorney s Office is the protection of our most vulnerable citizens, our children. While the allure of the internet and modern technology is here to stay, danger lurks in chat rooms and social media sites. Cheezo and our Child Sex Offender Internet Investigations Unit help protect children by going undercover to investigate internet predators and by teaching them the safety tools they need to be safe online. First Judicial District Attorney Peter Weir THE CHEEZO EDUCATIONAL PROGRAM Has been setup as a 501(c)(3) non-profit organization. There is no charge for presentations or appearances. We do accept donations in support of our educational programs under this non-profit. Donations can be made to: District Attorney Community Partnership c/o Investigator Mike Harris 500 Jefferson County Parkway Golden, Colorado or online at (Click on donation link at bottom of homepage) For tax purposes our TAX ID Number is

3 INTERNET INVESTIGATIONS The District Attorney s Child Sex Offender Internet Investigation (CSOII) Unit was created in 1996 by DA Investigators Mike and Cassandra Harris. The CSOII Unit is nicknamed Cheezo, which is also the name of their yellow five-foot-tall cool cat mascot. The Harris investigative team was the first in Colorado, and one of the first in the United States, to pro actively seek out online predators. They divide their time between online investigations and presenting safety and educational programs to parents and children in the community. The District Attorney s Office is proud of their Internet safety programs presented to schools, parent groups and other organizations. They have presented over 3000 times to kids and adults. Investigator Mike Harris says, Presenting to kids in an assembly about being safe online is more powerful than any arrest we make. The District Attorney s CSOII Unit also offers these presentations in Spanish. Harris and his team go online undercover, following sex offenders into areas on the Internet frequented by kids. They have made over 785 arrests. If someone sends your child an inappropriate message or picture, contact your local law enforcement agency. Remember to save all messages and photographs for the law enforcement agencies use. Even if a crime has not yet occurred, alarming communications should be reported to law enforcement. It is illegal for an adult to engage in sexual talk with a child under the age of 15 and/or to talk about meeting a child for sexual purpose by , text messaging, or online in chat rooms, social networking or game sites. It is illegal for an adult to send naked pictures of themselves to a child under 15 using cell phones or personal computers , text messaging, or online in chat rooms, social networking or game sites. It is illegal for an adult to ask a child under the age of eighteen for their naked pictures by , text messaging or online in chat rooms, game or social networking sites. To contact the CSOII Unit to book a free presentation, or to inquire about Internet and cell phone safety concerns you can call , Cheezo@jeffco.us, or

4 INTERNET SAFETY TIPS KNOW THE DANGERS ASSOCIATED WITH THE SITES THAT YOUR CHILDREN FREQUENT Whether they prefer MySpace, Facebook, Runescape, or others its important to talk to your child about the dangers associated with social networking sites. Communication is the most important tool you have. You control your child s environment at home, but when they are away from home someone else might not have your same rules and concerns. TEACH CHILDREN THE OBVIOUS RULES Tell your children NOT to put their photos on the Internet or to give out their names, addresses, phone numbers, schools, or other personal information. Once a picture is posted online or shared through text messaging it is impossible to know where that picture has gone. You can t get it back. Pictures can be manipulated. Pictures can be saved by sex offenders. EDUCATE YOURSELF, THEN YOUR CHILD Banning a child from certain sites may only motivate them to spend more time there. Talk to your child about how to be safe online and on their cell phone. Talk with your child about the dangers of posting personal information. Talk about people who may be online and may not actually be who they say they are. INSTALL AN INTERNET FILTER OR FAMILY SAFETY SOFTWARE Software is an effective way to filter dangerous content. This software usually comes with time management tools, remote monitoring, and keystroke recognition. Check with your Internet Service Provider (ISP). Some ISPs have filters that you can purchase or they may provide filters for free. Visit a local electronics store to examine and purchase a filtering software program or research a filtering software package online. Choose one that is best for your family. There are safety features available for cell phones from numerous sources and providers. TALK WITH YOUR CHILDREN ABOUT ENCOUNTERING PORNOGRAPHY. Teach your child that if they encounter pornography to turn off the power and get an adult. This can prevent a child from attempting to stop the situation by clicking more buttons and thereby spreading the attack or being exposed to more pornography. Talk with your child about the dangers of pornography and how it can become an addiction. Many teenagers are now becoming addicted and obsessed with the viewing of pornography. The addiction to pornography can become just as dangerous as an addiction to drugs. MANAGE YOUR CHILD S TIME ON THE INTERNET/CELL PHONES Schedule your child s Internet usage. When you set guidelines or limits on their Internet usage you reduce their chances of being exposed to inappropriate content. Many children use their phone to text message late into the night. We have found many children even sleep with their cell phone. We recommend that you have your child turn their phones over to parents at a certain time in the evening.

5 SET GUIDELINES AND ENFORCE CONSEQUENCES IF THEY ARE NOT FOLLOWED. Providing guidelines will ensure that your child knows the rules for using the Internet and cell phones, as well as the consequences if they break the rules. If you enforce consequences consistently, children will be more likely to follow the rules. KEEP TECHNOLOGY OUT OF CHILDREN S BEDROOMS. Keep technology devices in a room that is commonly used by the entire family, where children will be less inclined to view material that may not be acceptable. Based on conversations with children in Jefferson County, we have learned that 65% have technology devices in their bedrooms at night. CREATE A RELATIONSHIP WITH YOUR CHILD THAT FOSTERS TRUST AND OPEN COMMUNICATION. Open communication and trust is the key. Many times parents overreact. If your child comes to you about pornography on the computer or about being approached by a stranger, they should be applauded. Many parents immediately react out of fear and love. They tell their child that they cannot go to that specific site or prohibit Internet usage altogether. That defeats all trust and closes the door to communication. IF YOU DON T UNDERSTAND THE INTERNET, A WEBSITE OR A GAME SITE, ASK YOUR CHILD TO SHOW YOU. Children like to show off their skills and knowledge about the Internet. You also are accomplishing other things when you ask for your child s help. You are spending valuable one-on-one time with them while communicating with your child and learning where they go and what they do online. COMPROMISE COMMUNICATE Teenagers are attracted to social networking sites. Many parents do not allow their children to be on these sites. Our office recognizes that this is a tough decision for parents to make. If a child is determined to be on a favorite site, they WILL find a way. Some teenagers have two different accounts one for parents, and one for their friends. In Internet safety classes with teenagers, we warn them that if they can t show mom and dad their account then they are putting themselves in harm s way. We suggest that children set their account settings to private and limit who can access those accounts. If your child is communicating with someone online that they don t know Face-2-Face, it could be anyone. Instruct them not to give out any personal information. VIDEO GAMES GAME SITES (PLAY THE GAME DON T GIVE OUT YOUR NAME) Many children and teenagers frequent popular game sites online, such as Club Penguin, Runescape, Xboxlive, and Nintendo (online) just to mention a few. They are fun and very attractive to kids. Many of these sites let you communicate with others who are also playing in these games. We tell kids that if they want to communicate with others, talk only about the game.

6 TECHNOLOGY SAFETY TIPS The most important message the District Attorney s Office wants to relay to children is if you don t know someone Face-2-Face you should not communicate with them. Personal information posted online by a child can help a stranger find them. It takes very little personal information for someone to find out where a child lives, goes to school, or spends their free time. Personal information can include names, addresses, phone numbers, schools, hobbies, clubs, sports or other activities in which a child might be involved. Pictures are also personal information. A picture of a child can assist a stranger in finding them. Once a child sends their picture to someone or a website, either online using their computer or cell phone, it is gone forever. This is the same for written communication. All account settings for children, including teens, should be set to private. Parents should limit the number of friends with access to their child s accounts. The information posted by their child should be viewed only by those they know Face-2-Face. Many kids have up to 500 friends on their social networking sites like Facebook or MySpace. This means that they do not know everyone Face- 2-Face and that they could inadvertently have a predator as a listed friend.

7 STRANGER DANGER - INTERNET STRANGER In recent years we ve seen an increase in the number of children approached by online predators in Jefferson County and throughout Colorado. Some of these children have actually been sexually assaulted by these sex offenders. Parents are often shocked to find that their child has been communicating with a sex offender. Some parents believe their children are safe if they do not have Internet access in their home. Unfortunately, kids are very resourceful and technologically savvy. They may use the Internet at their friends homes or school. Today, most kids have Smart Phones ; they take Internet access with them wherever they go. The District Attorney s Child Sex Offender Internet Investigations (CSOII) Unit takes a dual approach to protecting children online. While we aggressively pursue those who lure kids on the Internet, we believe we are more effective presenting our Internet safety programs to children, parents and teachers. Parents and teachers have done a great job educating children about meeting strangers on the street. The CSOII team continues to stress the danger with those strangers, but also educates children about strangers online. District Attorney Investigator in Charge Mike Harris heads the CSOII Unit. He developed an Internet safety program targeting elementary school children. This program is the only one of its kind. Investigator Harris believes that these younger children, first through third grade, are the ones who are most likely to make inadvertent mistakes online. The CSOII unit still provides online safety education for fourth grade through high school students, but believes they have a better chance of in-stilling lasting safety messages in the younger students. The program specifically designed for the younger children is called Stranger Danger Internet Stranger. Investigator Harris uses a mascot named Cheezo to help captivate and cement the educational safety messages in these young students. This program has been extremely successful and has drawn great reviews with a long lasting impression from the children and parents who have seen the program. The Internet and advances in technology are here to stay. We encourage parents to attend a presentation so they can see this message and continue the dialogue long after we are gone.

8 ipods/ipads/tablets We continue to see teenagers making bad decisions when using technology. Many parents are surprised to find their children turning their ipod/ipad/tablet into a texting instrument by downloading free applications available today like Text Free, Text Plus, Text Now. In circumstances where teens have lost their cell phone privileges, or simply are not allowed to have a cell phone, they can download free texting apps turning their device into a texting instrument, unbeknownst to their parents. Teens with cell phones can also download these free texting applications in an effort to hide the content of the text messages they are sending. Many parents are vigilant in checking their teens cell phone messages, but have no idea that their teens are text messaging from these free apps. Most parents know nothing about the function of these free sites. We suggest that when checking your teens messages and mail, that you also check their apps. There are new apps coming out everyday. Teenagers find them and use them before we even know they exist. Teens with cell phones can also download these free texting applications in an effort to hide the content of the text messages they are sending. Many parents are vigilant in checking their teens cell phone messages, but have no idea that their teens are text messaging from these free apps. Most parents know nothing about the function of these free sites. We suggest that when checking your teens messages and mail, that you also check their apps. There are new apps coming out everyday. Teenagers find them and use them before we even know they exist.

9 APPS Parents need to be vigilant in checking their children s apps and those which can be used to communicate and / or send pictures. Many parents check their child s main messages and , but stop there. Parents do not stop; this is just the beginning of keeping your child safe. It is important to check your child s messages, mail, contacts and photos. Consider enabling parental controls so your child can t just add an app. This allows you as the parent to consider the suitability of the app your child wants to download. Parents should be concerned with apps which have the capability for the user to communicate or send pictures/videos. Any app which someone can communicate anonymously should be considered high risk. Your child might be anonymous, but so will the person whom they are communicating with. One of the most popular texting apps today for teens is kik. The users of kik can text message and send pictures to each other. The individuals using kik are from all over the world. This app allows the user to be anonymous. Parents can also consider monitoring apps to better monitor what your child is doing. We have had some parents at safety presentations ask questions about invasion of privacy with these apps. We don t consider it invasion of privacy we call it Parenting. Most of these apps the child knows it is on their phone. Many parents don t get these monitoring apps because they don t trust their child, but rather they don t trust who is out there that might trick and hurt their child.

10 LOCATION SERVICES The location services settings on cell phones, ipods, ipads and/tables are very important. The settings can broadcast the location of the user and can be changed intentionally or inadvertently. The device has its own location services feature, as do most apps. It is important to understand these privacy settings because depending how they are set, you or your child may be unknowingly providing your exact location to a stranger. How to turn off location services on ipod, ipad or iphone: You can turn off location services completely or on an app-by-app basis. Most do it by an app-by-app basis. The only problem with this is one needs to ensure each time a new app is added they go and check to ensure the location services settings are turned off for that newly added app. 1. Go to settings on your device. 2. Go to Privacy. 3. Once Privacy comes up go to location services. At this point it will either be on or off. 4. Click on location services and it will list the individual apps you want on or off. Camera should definitely be off as you do not want the location properties to attach to pictures taken. Go through all the apps to determine what you want on or off. If you want to prevent your child from changing the location services setting do the following: 1. Go to settings on your device. 2. Go to General. 3. Go to Restrictions If you previously set up restrictions you will be prompted for the pass code. If not, choose Enable Restrictions and enter a pass code which you will remember and your child can t guess. 4. Click on Don t Allow Changes. Android Phones: 1. Tap Settings and select Users. 2. Tap Add user or profile. 3. Tap to add a restricted profile. You will be prompted to set up a lock using a PIN, password or pattern. Choose a password or PIN which you can remember and isn t to easy to be figured out. 4. All the installed apps on the device will then be displayed. Each can be turned on or off. 5. Choose Settings and from here you can choose to disable the location services.

11 SEXTING Sexting is a blend of texting and sex. Today s teens live in a culture that has become very sexualized and they are reacting to it. Sexting is the act of sending sexually explicit messages and/or photos through text messaging on cell phones. Middle and high school teens often talk sexually by text messaging. They also send naked pictures of themselves. It is against the law for anyone to send or receive naked pictures of anyone under the age of eighteen. That includes sending naked pictures of themselves. If you send or receive naked pictures of someone under 18 you can be charged with Sexual Exploitation of a Child, a class 3 felony, which could result in having to register as a sex offender. The Latest in Internet and Cell Phone Danger for Teens Many teenagers take sexually explicit or even nude pictures of themselves and send them to others either online or through text messaging. This is called Sexting. Sexting occurs more frequently than parents can imagine. These photos become Sextortion when they are used as a tool of exploitation or extortion. Recently a Colorado teenage girl made the mistake of sending her naked picture to a 20-year-old man in California. This teenage girl thought this young man liked her and she had feelings for him. She accepted him as a friend on Facebook site. After receiving the teenage girl s naked picture, the man threatened her, telling her that if she didn t send him $ dollars or send him more naked pictures of herself, he would send her naked picture to all her friends on Facebook. The teenage girl was faced with the possibility of her naked picture being distributed to all her friends and felt pressured to comply. The teenager finally told her mother, who then alerted law enforcement. This 20-year-old man was identified and prosecuted. He was sentenced to prison. These Sextortion cases are very concerning to law enforcement as frightened victims might give in to demands such as posing for explicit photos, having sex with the perpetrator or sending them money. District Attorney Investigator in Charge Mike Harris asks parents and possible victims of Sextortion to report incidents to law enforcement. These threats and demands need to be investigated and the suspects stopped.

12 A TRUE STORY Never assume that anything you send or post online is private. A 16-year-old girl was asked by her 17-year-old boyfriend to send him a naked picture of herself. She felt pressured by the boyfriend to send the picture but she reluctantly did it. She took a picture of herself with her cell phone and then sent it to him in a text message. The teen asked her boyfriend not to show it to anyone. He promised he wouldn t it, he told her it was just for him and that he wouldn t show it to anyone else. Approximately two hours later the boyfriend sent the naked picture of his girlfriend to his best friend and told him not to show it to anyone else. The best friend also promised not to show it to anyone else. Ten days later this 16-year-old girl went to school and found the naked picture she had sent her boyfriend taped to her locker. The same naked photo was also found taped in ten other places around the school. The 16-year-old was humiliated and embarrassed. She was taunted and ridiculed. She was so devastated that she ultimately dropped out of school. The two teenage boys responsible for this were charged with Sexual Exploitation of a Child. They were adjudicated and now have to register as sex offenders until they are both 26-years-old. The 16-year-old girl was also charged and given a deferred adjudication. Sexting can be devastating and your children need to know how seriously it can affect their lives. Once you post a photo online or send one through in a text message, that photo is in cyberspace forever.

13 FACE-2-FACE Our most important and #1 Message for kids communicating with any technology device (computer, smart phone, Tablet, ipad, ipod, or gaming device) is to only talk with people they know Face-2-Face. ONLINE GAMES Many kids play online games. Parents need to have rules in place if your child plays interactive online games. Interactive meaning that the players can communicate with each other in real time while playing the games. There are so many online games available for kids that it is impossible to name all of them. We have a simple rule, Play the Game, Don t Give Out Your Name. You can talk about the game, but not about You. Never give out your personal when you are gaming. Personal information includes where you go to school, where you live, what sports you play, hobbies you have, or what you do for fun.

14 PARENTS NEED TO KNOW Some adults use technology to contact and lure children for sexual purposes. If an adult is communicating with a child through technology and asks, attempts to ask, says, or does the following, they have committed a crime: 1. Asking anyone under the age of eighteen (18) for their naked or partially naked picture. 2. An adult sending their naked picture or picture of their private parts to anyone under the age of fifteen (15) is a felony. 3. An adult communicating with anyone under the age of fifteen (15) about meeting them for sex or sexual contact is a felony, even if a meeting does not occur. 4. An adult meeting anyone under the age of fifteen (15) for sex is a felony. 5. There are many other things which can be illegal with an adult communicating with someone under the age of eighteen (18) and if unsure we encourage you to contact law enforcement. WHAT TO DO? If you suspect that your child is communicating with a predator through technology, even if it hasn t escalated to the points listed above, consider the following steps: 1. Stop the communications immediately and take the technology devicebeing used until law enforcement is contacted. 2. Do not contact the suspect or allow them to know parents are aware of communications. 3. Note the location where the communications are taking place, such as Facebook, text messaging, apps, or gaming sites. 4. Save, screen capture or print out the communications and/or pictures. 5. Obtain your child s password for signing onto their device. 6. Obtain your child s user name, or screen name, along with the password for signing onto the site they are communicating. 7. Note the user name, or screen name of person communicating with your child. The Cheezo unit can always be contacted at or by , cheezo@jeffco.us.

15 RESOURCES CHEEZO HOT LINE: or Child Sex Offender Internet Investigations Unit (CHEEZO): CHEEZO FACEBOOK for Parents and Kids: Jefferson County District Attorney s Office: CBI Sex Offender Registry Convicted Sex Offender Site: National Center for Missing and Exploited Children: The Online Safety Project: Netsmartz: SPECIAL THANKS TO OUR DONORS: Larry A. Mizel and MDC/Richmond American Homes Foundation 4350 S Monaco Street, Suite 500 Denver, CO Mandi and Allen/Moose Hill Cantina W Colfax Avenue, Lakewood, Colorado, Gary Scott and Dynasty Painting 4451 E Lake Circle, Littleton, Colorado,

16

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

Internet Safety Guide for Parents

Internet Safety Guide for Parents Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both

More information

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life. Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for

More information

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

Who's chatting to your kids?

Who's chatting to your kids? N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000

More information

The webcast will begin shortly. Please stand by.

The webcast will begin shortly. Please stand by. The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

Online Safety How to Protect Yourself and Your Family

Online Safety How to Protect Yourself and Your Family Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

www.xxxchurch.com Online Predators & Strangers

www.xxxchurch.com Online Predators & Strangers www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

Class 2: Manage Your Digital Footprint. Student Handbook

Class 2: Manage Your Digital Footprint. Student Handbook Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the

More information

How To Avoid The Identity Theft Predators

How To Avoid The Identity Theft Predators Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Kingsley Park Primary School. 1-1 ipad Program BYOD

Kingsley Park Primary School. 1-1 ipad Program BYOD Kingsley Park Primary School 1-1 ipad Program BYOD 2016 Kingsley Park Primary School ipad 1-1 BYOD Program In 2015 KPPS implemented a 1-1 BYOD [bring your own device] Program for Grades 4-6. We will be

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Lessons for Teens: Risky Internet and Social Networking

Lessons for Teens: Risky Internet and Social Networking Lesson Plan # 4 Online/Electronic Lure Presenter Overview: Most teens regularly and safely interact online with people they don t know via social networking, media and gaming sites. Although news organizations

More information

YOUNG PEOPLE, MUSIC & THE INTERNET

YOUNG PEOPLE, MUSIC & THE INTERNET YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading

More information

A Parents' Guide to. 2014 ConnectSafely.org

A Parents' Guide to. 2014 ConnectSafely.org A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram

More information

Appropriate Use of Social Media and Cell Phones. Karen Haase. karen@ksbschoollaw.com KSB School Law @KarenHaase

Appropriate Use of Social Media and Cell Phones. Karen Haase. karen@ksbschoollaw.com KSB School Law @KarenHaase Appropriate Use of Social Media and Cell Phones Karen Haase karen@ksbschoollaw.com KSB School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging You ve taken photos with a

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow Estimated time: 40 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

A U.S. Postal Inspector s Guide to Internet Safety for Children

A U.S. Postal Inspector s Guide to Internet Safety for Children A U.S. Postal Inspector s Guide to Internet Safety for Children A U.S. Postal Inspector s Guide to INTERNET SAFETY FOR CHILDREN The Internet is a global community that allows people to share information

More information

Appropriate Use of Social Media and Cell Phones

Appropriate Use of Social Media and Cell Phones Appropriate Use of Social Media and Cell Phones Karen Haase Harding & Shultz (402) 434-3000 khaase@hslegalfirm.com H & S School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging

More information

A Publication of the GCPS Information Management Division

A Publication of the GCPS Information Management Division GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Outsmarting On-line Predators. Christina Kilbourne

Outsmarting On-line Predators. Christina Kilbourne Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information

More information

Statutory Rape: What You Should Know

Statutory Rape: What You Should Know Statutory Rape: What You Should Know 2013 Why Do You Need To Read This? Many teens are concerned about the laws regarding something commonly called statutory rape. This brochure will explain what statutory

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Related KidsHealth Links

Related KidsHealth Links Grades 9 to 12 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards

More information

Summer Safety Tips for Kids

Summer Safety Tips for Kids Summer Safety: Tips to Help Avoid Abduction and Harm Why is Summer Safety Important? During the summer months children tend to be Outdoors more Home alone more Supervised less We Believe No Child Should

More information

UNSUPERVISED AND ONLINE

UNSUPERVISED AND ONLINE UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163

More information

Learning English with CBC Radio Living in Alberta. Social Media: How Kids Use the Internet

Learning English with CBC Radio Living in Alberta. Social Media: How Kids Use the Internet Learning English with CBC Radio Living in Alberta Social Media: How Kids Use the Internet by Maroro Zinyemba Project Manager: Justine Light Daylight Consulting Inc. Integration Enhancement Topic: Social

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

Cyber Security. Keeping the internet safe for you and your family

Cyber Security. Keeping the internet safe for you and your family Cyber Security { Keeping the internet safe for you and your family The Five Things you MUST do Learn the lay of the land Protect your identity Become a sceptic Be aware of stranger danger Be a good cyber

More information

e-rate toolkit Cyberbullying: Crossing the Line

e-rate toolkit Cyberbullying: Crossing the Line e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

15 Dangerous Apps Every Parent Should Know About

15 Dangerous Apps Every Parent Should Know About 15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges

More information

Parenting & Technology: The Internet, Texting & Social Networks

Parenting & Technology: The Internet, Texting & Social Networks Parenting & Technology: The Internet, Texting & Social Networks Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety online Instant messaging,

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security

More information

Cyber Safety Handbook 2014

Cyber Safety Handbook 2014 Cyber Safety Handbook 2014 Mission & Vision Statements Mission To provide students with an excellent, all-round education in a Christian environment. Cricos No: 01645K Vision Woodcroft College aspires

More information

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2 Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...

More information

Private Today, Public Tomorrow

Private Today, Public Tomorrow Estimated time: 45 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

County Court Restraining Orders

County Court Restraining Orders Answers to Your Questions About County Court Restraining Orders Excellence in Customer Service Colorado Judicial Branch http://www.courts.state.co.us June 2002 CIVIL LAW In a civil case, the person seeking

More information

2010 Middle School Internet Safety Survey Results

2010 Middle School Internet Safety Survey Results When you are online, people can say whatever they want. ~ 8th Grader A friend pressured me to tell her my password. ~ 5th Grader Plainview Old Bethpage Central School District 21 Middle School Internet

More information

C-SAVE. Level Middle/High School Ethics-copyright. Scenario #2 - Scott s Sorry Slumdog Choice

C-SAVE. Level Middle/High School Ethics-copyright. Scenario #2 - Scott s Sorry Slumdog Choice Grade Level- Middle/High School Ethics-plagiarism Scenario #1 - Brian and His Research Paper Brian has a research paper due next week on the impact of cyber security threats to our national security. He

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

Where can I get help after a sexual assault?

Where can I get help after a sexual assault? Sexual Assault What is assault? Assault is when someone uses force to hurt you. Slapping, kicking and pushing can be assault. Sometimes touching can be an assault. Threatening or trying to hurt someone

More information

Facebook Guidelines For Parents

Facebook Guidelines For Parents Facebook Guidelines For Parents By Jayne A. Hitchcock Copyright 2010 As kids go online at younger and younger ages, parents need to be aware of what they are doing on the Internet, most importantly on

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

Related KidsHealth Links

Related KidsHealth Links Grades 6 to 8 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards

More information

Phone Apps for Online Safety Apple and Android

Phone Apps for Online Safety Apple and Android Phone Apps for Online Safety Apple and Android Safe Eyes Mobile (Mobile App) Control your child's Internet usage while she's on the iphone by blocking questionable sites. This app has YouTube filtering

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

Cyber-Safety Keeping Australians Safe Online

Cyber-Safety Keeping Australians Safe Online Cyber-Safety Keeping Australians Safe Online AIMIA Digital Policy Group DIGITAL POLICY GROUP Contents DIGITAL POLICY GROUP Facebook 2 Google 4 Yahoo!7 8 ebay 10 Summary 12 Key Contacts 12 Millions of people

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009

More information

Brownsburg Community School Corporation Acceptable Use Policy 2012-2013

Brownsburg Community School Corporation Acceptable Use Policy 2012-2013 Introduction Brownsburg Community School Corporation Acceptable Use Policy 2012-2013 The Brownsburg Community School Corporation (BCSC) recognizes that access to technology in school gives students greater

More information

9. Children, Technology and Gambling

9. Children, Technology and Gambling 9. Children, Technology and Gambling This document is part of a series of Building a Stronger South Australia policy initiatives from the Government of South Australia. 1. Future Fund 2. Jobs and Skills

More information

Protect Your Privacy Online

Protect Your Privacy Online Protect Your Privacy Online By Kathiann M. Kowalski Keep personal information private for your own good! High school sophomore Karra H. never expected to see herself on a Web site featuring scantily clad

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

Child Safety on the Information Highway. www.missingkids.com

Child Safety on the Information Highway. www.missingkids.com Child Safety on the Information Highway www.missingkids.com Cyberspace, the Web, the Net, the Information whatever it s called, millions of people are now going online to exchange electronic mail, surf

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information