Download presentation
Presentation is loading. Please wait.
Published byIrma Simpson Modified over 9 years ago
2
STAYING SAFE ON THE INTERNET Common Sense Information
3
The First Question When I’m on line I should never give out: A. My last name, address, phone number, the name of my school, or teams I play for B. The names of my pets C. The names of my favorite book or TV shows The Correct Answer is A
4
Never Give Out : Your name Your name Your address Your address Your phone number Your phone number Your birthday Your birthday Your school name Your school name Any other personal information Any other personal information EVERY TIME YOU ENTER INFORMATION YOU GIVE UP PRIVACY EVERY TIME YOU ENTER INFORMATION YOU GIVE UP PRIVACY
5
Question 2 Before I buy something online or access a site requiring payment I should: Before I buy something online or access a site requiring payment I should: A. First make sure I really want it B. Check with my parents C. Check out store prices first. The Correct Answer is B
6
Question 3 It’s OK to give someone by password. It’s OK to give someone by password. TrueFalse The correct answer is of course False.
7
Passwords are: Valuable pieces of information Valuable pieces of information Can allow someone to access your Email Can allow someone to access your Email Allow access to you AOL account to charge products sold on the Internet Allow access to you AOL account to charge products sold on the Internet No legitimate website or person would ever quest them.
8
Question Four I can send a photo of myself online when: I can send a photo of myself online when: A. It’s to a friend or family member B. I’ve told my parents and they’ve given me permission to do so C. It’s to my cyber friend The right answer is B
9
Question #5 If someone I meet online gives me his phone number I should: If someone I meet online gives me his phone number I should: A. Call him right away. B. Give him my phone number also C. Ask my parents permission before I call The answer is C
10
Question #6 I should never respond to Email messages from people or organizations I’m not familiar with. I should never respond to Email messages from people or organizations I’m not familiar with. True True False False Obviously the correct answer is true
11
Dangers are: The Email may be a scam to sell you something If you respond you are confirming a valid Email address You can encourage the sender to forward inappropriate Emails or add you to other lists
12
Question #7 Photos can be downloaded from the internet when: Photos can be downloaded from the internet when: A. They’re from a cyber friend B. It’s in your Email C. My parents give me permission to do so The correct answer is C
13
Question #8 If someone send me an inappropriate message or materials I should immediately: If someone send me an inappropriate message or materials I should immediately: A. Not reply to it and save it B. Tell my parents C. Contact my service provider D. All of the above The right answer is D
14
Question #9 If someone I’ve met online wants to meet in person I should: If someone I’ve met online wants to meet in person I should: A. Never consider doing so before talking to my parents about it B. Tell my best friend and take her with C. Keep it a secret Of course the right answer is A
15
Question #10 Who Developed the Internet? Who Developed the Internet? A. Bill Gates from Microsoft B. The U. S. Government C. A man from the Netherlands named LINUX The answer is B
16
The Final ?? Any information you get on the internet is trustworthy. Any information you get on the internet is trustworthy. TrueFalse The answer is definitely False.
17
Family Contract For Online Safety Kids Pledge 1. I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parent’s permission. 2. I will tell my parents right away if I come across any information that makes me feel uncomfortable. 3. I will never agree to get together with someone I “meet” online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along. 4. I will never send a person my picture or anything else without first checking with my parents. 5. I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I tell my parents right away so that they can contact the service provider. 6. I will talk with my parents so that we can set up rules for going online. We will decide upon the time of day that I can be online, the length of time I can be online, and appropriate areas for me to visit. I will not access other areas or break these rules without their permission. 7. I will not give out my Internet password to anyone (even my best friends) other than my parents. 8. I will be a good online citizen and not do anything that hurts other people or is against the law. I AGREE TO THE ABOVE: ___________________________________ Child Sign Here I will help my child follow this agreement and will allow reasonable use of the Internet as long as these rules and other family rules are followed. ________________________________________ _________________________________________ Parent(s) Sign Here
18
Contract Time A contract is used when you suspect your teen is being inappropriate online or violating your home rules. A contract is used when you suspect your teen is being inappropriate online or violating your home rules. If your teen violates your contract it is automatic revocation of privileges for your determined period of time. Have them sign it. If your teen violates your contract it is automatic revocation of privileges for your determined period of time. Have them sign it. Hang this on the refrigerator. Hang this on the refrigerator. Some Examples of violations: Some Examples of violations: If your teen does not know full information of his buddy. If your teen does not know full information of his buddy. If they X out when you come into the room. If they X out when you come into the room. If they tell you “you can’t see this it’s private.” If they tell you “you can’t see this it’s private.” If your teen is up late at night past bed time. If your teen is up late at night past bed time. If they receive money, gift certificates, cameras or scanners that they can’t explain. If they receive money, gift certificates, cameras or scanners that they can’t explain.
19
What is a Buddy List? When looking at your child’s Buddy List your child should be able to tell you who each person is by the screen name. When looking at your child’s Buddy List your child should be able to tell you who each person is by the screen name. A Buddy List is a list in AIM, AOL, and Yahoo of the common or frequent contacts your child has. A Buddy List is a list in AIM, AOL, and Yahoo of the common or frequent contacts your child has. If they don’t know them by first, last name and phone number, they should not be on the buddy list. If you don’t know that person neither should they. If they don’t know them by first, last name and phone number, they should not be on the buddy list. If you don’t know that person neither should they. Some kids lie about who that person actually is and they make it up. Check the Screen names yourself to call their bluff. Some kids lie about who that person actually is and they make it up. Check the Screen names yourself to call their bluff.
20
Why is my teen’s cell phone bill so high? When teens are banned or away from the computer, they use text messaging to IM friends who are on the computer. When teens are banned or away from the computer, they use text messaging to IM friends who are on the computer. This is when they could speak to someone you do not want them to talk to. This is when they could speak to someone you do not want them to talk to. You can check the cell phone account on line and see who they are talking to. Just sign into the cell phone provider online and check the in box and out box. You can check the cell phone account on line and see who they are talking to. Just sign into the cell phone provider online and check the in box and out box.
21
Electronic Harassment Disorderly Conduct
22
Electronic Harassment Disorderly Conduct Includes the use of electronic communication for any of the following purposes: Includes the use of electronic communication for any of the following purposes: 1. Making any comment, request, suggestion or proposal which is obscene with the intent to offend 2. Interrupting phone service with the intent to harass 3. Transmitting any file, document, or other communication which prevents a person from using their telephone or e-comm device.
23
Harassment… continued 4. Threatening injury to person or property of the person receiving the e-comm or family or household members Examples: Enlisting the operator to break into a phone conversation. Examples: Enlisting the operator to break into a phone conversation. Any form of electronic communication that alarms and/or disturbs the receiver (like disorderly conduct) Any form of electronic communication that alarms and/or disturbs the receiver (like disorderly conduct) Email bombs or sending consecutive messages that cause denial of service (DNS) Email bombs or sending consecutive messages that cause denial of service (DNS) Any forms of threats toward a user or those related to them Any forms of threats toward a user or those related to them
24
Cyber-Stalking A person commits cyber-stalking when he/she knowingly and without lawful justification on at least 2 separate occasions, harasses another person through the use of electronic communication and: A person commits cyber-stalking when he/she knowingly and without lawful justification on at least 2 separate occasions, harasses another person through the use of electronic communication and: At any time transmits a threat of immediate or future bodily harm, sexual assault, confinement or restraint and the threat is directed towards that person or a family member of that person. At any time transmits a threat of immediate or future bodily harm, sexual assault, confinement or restraint and the threat is directed towards that person or a family member of that person. Places that person or a family member of that person in reasonable apprehension of immediate or future bodily harm, sexual assault, confinement or restraint. (Class 4 Felony) Places that person or a family member of that person in reasonable apprehension of immediate or future bodily harm, sexual assault, confinement or restraint. (Class 4 Felony)
25
Empower Yourself and The Parents Lets work together to keep our kids safe. Lets work together to keep our kids safe. This is not a matter of violating their privacy. This is not a matter of violating their privacy. The parents are responsible for their children. The parents are responsible for their children. We need to guide them in good times and in bad. We need to guide them in good times and in bad. It is not that they are doing bad things. They do not have enough experience to handle adult type situation. It is not that they are doing bad things. They do not have enough experience to handle adult type situation. They really have not been here as long as we have! They really have not been here as long as we have!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.