Presentation is loading. Please wait.

Presentation is loading. Please wait.

Your Child’s Digital Footprint

Similar presentations


Presentation on theme: "Your Child’s Digital Footprint"— Presentation transcript:

1 Your Child’s Digital Footprint
Social Media & Phone Apps Your Child’s Digital Footprint Welcome! Introduce yourself – Why info is important – each child different!

2

3

4 What is a Digital Footprint
On the Internet a digital footprint is the word used to describe the trail, traces or "footprints" that people leave online. This is information transmitted online, such as forum registration, s and attachments, uploading videos or digital images and any other form of transmission of information — all of which leaves traces of personal information about yourself available to others online.

5 Dangerous Apps used by Kids Today
Kids are APP HAPPY – they have to have the latest, greatest, newest APP!

6

7 Frequently used apps…

8 Kik - A free app-based alternative texting service that allows texts/
pictures to be sent without being logged in the phone history. (Similar apps: Viber, WhatsApp, TextNow) Kik uses usernames - not phone numbers - as the basis for Kik accounts Why It’s Dangerous – Makes it easier for your child to talk to strangers without your knowledge since it bypasses the wireless providers’ short message services (SMS). KiK does NOT verify user information – must be 13 or older to register.

9

10 Snapchat – Allows you to capture an image or video and make it available to a
recipient for a specific time. After that time limit is up, the picture/video automatically disappears forever…or so Snapchat claims. (Similar apps: Poke, Wire, and Wickr) Why It’s Dangerous – Kids can receive (or send ) sexually inappropriate photos. This app also makes kids feel like they can “sext” or send inappropriate pictures without consequences because the image will self-destruct automatically. The truth is that nothing sent over the internet disappears. There are always ways to retrieve and capture those images.

11 Tinder – Users post pictures and scroll through the images of other
users. When they think someone is attractive they can “flag” the image. If that person has also “flagged” them in return, the app allows you to contact them. Why It’s Dangerous – This app, and similar apps such as Down, Skout, Pure, and Blendr, are primarily used for hooking up.

12 ChatRoulette and Omegle– These apps allow you to video chat with
strangers. Why It’s Dangerous – Not only are users chatting with strangers, they could be chatting with a fake stranger. “Chat sites like Chatroulette and Omegle have done their best to produce systems that warns users when the people they are chatting to are potentially using fake webcam software, however developers still manage to slip under their radars with frequent updates.” So a fifty-year-old man could set up a fake webcam and use images from a 15-year-old boy that looks like a teen celebrity to convince your child to send inappropriate pictures or get information about your child’s location

13 Be vigilant, be aware, and be on guard
New Apps appear daily! Be vigilant, be aware, and be on guard Whisper Burn Note

14 Poof – Hides other apps on your phone. You select which apps you
would like to hide and their icons will no longer show up on your smartphone screen. Why It’s Dangerous – If children have apps that they want to keep hidden from their parents, all they have to do is download this app and “poof,” their screen is clear of any questionable apps. So, if you see the poof app on their phone, you may want to ask them what they are hiding. Other ways to hide apps. Actual wording from the App Store

15 Do you worry about the visibility of your private data, or secrets on your smart phone? Vault helps you control your privacy, keeping your pictures, videos, SMS, and contacts private, and hiding them from prying eyes. Contacts/SMS/Call logs protection: Allows users to create “private contacts”, whose messages and call logs will be hidden from the phone screen - Vault also hides all incoming message alerts and texts from those contacts. Real App add…

16 ►FAKE VAULT Create a decoy to protect the real one
►FAKE VAULT Create a decoy to protect the real one. If someone insists on seeing the secrets stored in your Vault, just show them the “fake” one. ►STEALTH MODE Hide Vault icon on the phone’s Home screen. When stealth mode is activated, the icon will disappear and can be opened again by entering your password via the phone dial pad. ►BREAK-IN ALERTS Snaps a picture of anyone who enters the wrong password in an attempt to access your Vault, without letting the intruder know. ►CLOUD BACKUP Back up your files to NQ’s cloud space.

17

18 Tools/Apps for Parents

19 SEXTING…

20 What Is Sexting? Sexting is sending sexually explicit messages via a mobile electronic device such as a tablet, cell phone or instant messenger.

21

22 Things to think about… A picture can be saved, stored, and shared many times over. (digital footprint) Pictures travels fast…especially over social media. Images can be considered child pornography if the child is a minor Sending explicit photos to a child is a crime.

23 Tips for safe use of social media by youth
Monitor use. Keep computers in a common family space (not a bedroom) and keep track of mobile device use. Know what type of social media your youth uses. Consider asking youth for passwords and permission to let a trusted adult “friend” them. However, try to balance monitoring with privacy. Conduct searches. Every so often, search on a youth’s name and address and see what information or tagged photos are publicly available (see photos-gone-wild-how-combat-unwanted-photos-facebook).


Download ppt "Your Child’s Digital Footprint"

Similar presentations


Ads by Google