Download presentation
Presentation is loading. Please wait.
Published byGeorgiana Griffith Modified over 9 years ago
1
Cyber-Safety How to Keep Your Kids Safe Dacula Middle School September 22, 2015 Officer Petrocy
2
Why is cyber-safety important? Bullying People use the internet as a way of bullying. We call this cyberbullying. Victims of bullying have: Lower self esteem, insecurity Higher rate of depression Higher absenteeism rate Feelings of tension and anxiety Decline in concentration and social interaction
3
Why is cyber safety important? Kids who bully are more likely to: Get into frequent fights Steal or vandalize property Experiment with cigarettes, alcohol or drugs Skip or drop out of school Have negative encounters with law enforcement Carry a weapon
4
Why is cyber-safety important? Sexual Predators Sexual predators use the internet as a doorway to interact with children. Sexual predators like to use chat rooms, instant messages and email. Currently, there are over 644,865 registered sex offenders in the United States; in Gwinnett County we have 461 registered sex offenders.
5
Why is cyber safety important? Access to the internet is access to pornography Pornography at a young age can lead to: Children becoming victims of sexual violence Sexual diseases, unplanned pregnancies, and sexual addiction Children sexually assaulting other children Negative attitudes and values Interference with a child's development and identity
6
What can I do as a parent?
7
GCPS Databases vs. Google Reliable Accurate No ads Virus free Age appropriate Designed for educational use Links have been evaluated for age appropriate content
8
Multiple Access Points Download this app for your device. Get password from Mrs. Greer. Icon on all school Computers. Destiny, the Media Catalog, also is a search engine.
9
Take Control!
10
Remember an electronic device is not a right, it’s a privilege. You own it, they don’t! Set rules about device: Set time limits and place of use Require permission for use of the device Require all passwords and codes/pins for device Set appropriate consequences for misbehavior or misuse of device
11
What Can I Do? Audit the device Inspect the device thoroughly Check messages Look at all photos Check trash Open recent searches Click on apps to test them for authenticity
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.