February 26, 2008 Good Evening andWelcome. Just the Facts- Deb Chestnut Checking the History on the Computer- Agnes Kovacs MySpace and Chatrooms- Matt.

Slides:



Advertisements
Similar presentations
Your Online Footprint. What is Facebook? Facebook is an online social networking site in which young adults can have discussions, connect with friends,
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Internet Safety and Cyber Bullying All info came from
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Developed by Technology Services 1:1 Laptop Initiative
Keeping Your Child Safe on the Internet
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
 NYS Internet Crimes Against Children Task Force E-Safety Mr Trofimczuk E-Safety 1.
Forms of Cyberbullying
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Cyberbullying.
INTERNET SAFETY.
INTERNET SAFETY and Social Networking
Cyber bullying and internet safety Parents meeting: staying safe online.
Internet Safety Cyber Bullying. Berks County District Attorney Mark C. Baldwin said, “They have found a way to enter your home, enter your child’s bedroom.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
e-safety and cyber bullying
Concept: Internet Safety Who You Are ~ Learning About Yourself ~ Unit Essential Questions How can my principles, skills, and interests help me be successful.
An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.
 Grades 5-8 – 56 out of 66 – 85%  Grades 9-12 – 79 out of 85 – 93%  Grades 5-12 – 135 out of 151 – 89%  100% of the Juniors and Seniors use a social.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Smart and Safe in Cyberspace Social Networking 101 National Crime Prevention Council 2006.
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
CyberSafety A Lesson in CYBERWORLD Culture, Customs, Culture, Customs, Language, and Safety.
Mueller Elementary Keeping your child safe online--- Things parents should know Created by Gold Hill Elementary Tega Cay, SC Adapted with permission by.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
What is Social Networking? Social networking sites provide teens and young adults with a virtual environment where they share stories, pictures, videos,
Zahid Kinnare Cyberspace Social Media and Networking.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Lovejoy Preschool PTA Association January 20, 2011 Terri Harkey Puster Elementary Library Media Specialist.
Video: SNL Clip Quick Facts Online teens admit that they frequently communicate with people they have never met. – 54% have Instant Messaged a stranger.
Internet Safety How to keep your children safe as they use the web.
E.H.M.S. Parent/Guardian Workshop Internet Safety (In conjunction with E.H.M.S. Open House) When: Wednesday, September 19 th 8:00-8:30 pm Where: E.H.M.S.
Cyber Bullying A guide for parents understanding the “hidden” bully.
Fil Santiago Director of Staff Development and Technology West Orange Public Schools.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
INTERNET SAFETY Tips for becoming a “surfer” dude!
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Internet Safety Social Networking & Cyber Bullying.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Cyber Bullying By Sarah Chaouk and Astede Woldegebriel.
Thursday 19 th November What is Fronter? How do we use it at West Pennard? Every child from Y2-6 has their own web space in Fronter. They can customise.
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Internet Safety How To Keep Your Children Safe As They Use The Web.
Being Good Digital Citizens with Today’s Technologies.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
T HINK ! Before You Post A lesson on Internet Safety Source:
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
Staying Safe in Cyberspace Tregolls School-An Academy.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Patti Fowler Internet Safety Education Coordinator SC ICAC Task Force Office of the Attorney General Internet Safety.
Basically; teaching your children how to stay safe when using the internet.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
A Parent’s Guide to Child Safety on the Internet.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Judith Davis – Community Safety Officer Northumberland County Council.
Presentation transcript:

February 26, 2008 Good Evening andWelcome

Just the Facts- Deb Chestnut Checking the History on the Computer- Agnes Kovacs MySpace and Chatrooms- Matt Schaeffer, Nate Schlegel, CJ Covell Question/Answer- All Parents don’t talk to kids about Internet Safety. Why???? Lack of Knowledge Denial Discomfort Let’s change that starting TONIGHT!!!

1.______ of year olds use social networking sites. 2.One in ______ US teenagers (who regularly log into the internet) state that they have received an unwanted sexual solicitation via the web. 3._____ in _____ youth received an aggressive sexual solicitation. This means a predator asked a young person to meet somewhere, called on the phone or sent mail, money or gifts through the US Postal Service. 4.Nearly 63% of harassment predators are _______________________. 5._____of teens said they have known a friend to actually meet someone whom they only knew online. 6.Approximately _____ of children who encountered a sexual solicitation or approach told a parent or adult. 7._____ of the targets for online predators were age _____. Another _____were web users ages _______. 8._____ of all teenagers who use the internet say they have been targets of a range of annoying and potentially menacing online activities, including threatening messages, having their private s or texts forwarded without their consent, embarrassing photos posted and rumors spread about them online. 9._____of children are willing to share personal information online about themselves in exchange for goods or services. AND>>>>>>>> 55% other juveniles 27% 25% 77%1422% % 75%

10. ______________ registered registered sex offenders have a page on MySpace. 29,000

1. Get rid of the internet in our homes! 2. Attend a workshop 3. Research 4. Check the history 5. COMMUNICATE with our kids in school and at home

Content: What is the operating system you use, where do you check the Internet history files? Where are the temp files located? What is a cookie? What software can do the job for you? Websites and software list for help.

What is the different between OS? Windows 95- (hopefully not) C:\Windows\temp directory has the temporary files Windows XP-general user-everybody has the same profile, if users are set, everybody logging on with their own user name (and password) profiles are separated …desktop settings, temp files are generated for that user only….you have to have administrator rights to be able to open other users settings

Windows VISTA

Websites: ta/seeit/default.mspx?wt_svl=10191VH_OS_Other2&mg_i d=10191VHb2 Vista help: how to set up the computer to be saferhttp:// ta/seeit/default.mspx?wt_svl=10191VH_OS_Other2&mg_i d=10191VHb min. video about the safety toolswww.ikeepsafe.org for younger children to establish basic safety knowledge, linked to regular service, works inside of the filter, also has a list of software for supportwww.kidmail.net/default.asp

SIMILAR INTERESTS : They tell you that they like the same things that you like SIMILAR INTERESTS : They tell you that they like the same things that you like. TRUST: They make you think that you can tell them anything. When you talk about problems they always take your side TRUST: They make you think that you can tell them anything. When you talk about problems they always take your side. SECRECY: You can tell them secrets. And, they may tell you to keep your friendship secret because no one else will understand.

Cyber Bullying - A Criminal Offence Schools should educate the school community about the criminal offence of cyber bullying. Students should be informed that if they use technology in an inappropriate fashion then they could be committing a crime. Messages, phone calls, and chat rooms can be traced, even if a false name is used. The numerous state and commonwealth laws which cover cyber crime include: The Commonwealth’s Criminal Code Act 1995, section notes that it is an offence for a person to use ‘a carriage service to menace, harass or cause offence’. The Commonwealth’s Criminal Code Act 1995, section notes that it is an offence for a person to use ‘a carriage service to make a threat’. The Commonwealth’s Crimes Act 1914, part VIIB, section 85ZE notes that it is an offence for ‘a person to knowingly or recklessly use a telecommunications service supplied by a carrier in such a way as would be regarded by reasonable persons being, in all the circumstances, offensive’. The Victorian Crimes Act 1958 was amended in 1995 to include the offence of ‘stalking’. This includes telephoning and sending electronic messages with the intention of causing physical or mental harm. The sending of images is also covered by various State and Commonwealth laws that prevent the publication of material that is objectionable, unclassified or unsuitable for minors.

Password - PSC

Nintendo DS and its Wireless Network With Nintendo DS Lite, you can connect with a local wireless network of up to 16 players. The wireless range can be an incredible 30 to 100 feet and for some games, multiplayer requires just one Nintendo DS game card. Note: Nintendo DS Lite wireless communication, including PictoChat, is not private and is not monitored by Nintendo. We recommend that you never reveal any personal information or arrange to meet a stranger.

It is not MySpace lite. It is MySpace enhanced, completely customized for the mobile experience."

Webcams are a predator’s best friend !

Berks County District Attorney Mark C. Baldwin said, “They have found a way to enter your home, enter your child’s bedroom and gain access to our most precious resource.”

For more information, please refer to the Wilson Website or – Deb Chestnut: Agnes Kovacs: Matt Schaeffer:

Myspace Facebook

As of January ‘08 there are 60 million active members 85% of college students use this online networking site

All Facebook Profiles Consist of User’s photo Account info (name, school) Personal info (birthday, hometown) Opinionated info (political views, favorite music, interests etc.)

Features of Facebook Post photos A “wall” where users may post messages about each other Post videos Event Organizer “Facebook Applications”

What Facebook looks like

Personal InfoWall

Myspace 300 million active myspace users 230,000 new registrations each day *as of February 3rd, 2008

All Myspace Profiles Contain Blurbs (About me, Who Id like to meet) Blogs Multimedia Comments Music

Features of Myspace Bulletins User’s Photo’s Groups Personal Information MyspaceIM

what myspace looks like

Dangers of Social Networking Every is public unless you decide to make your profile private Teens love gossip, racial slurs, bullying and malicious rumors. Anything posted is for an audience of millions People are not who they say they are. All it takes to set up and account is a valid address

How can we monitor what our children are doing on the internet logmein.com Create your own myspace or facebook Ask for their passwords Enforce parental controls on your home computer Don’t give your children administrative accounts Talk to your children