SlideShare uma empresa Scribd logo
1 de 13
Natalie Wyrick


Internet Safety
       A
Parent’s Guide
E-pal Assignment

We are beginning an assignment that will require
your child to have an e-pal. We will be doing this
with another class at another school over the
internet. Before we start we want parents to be a
little more informed about internet safety. We
designed this powerpoint to give you more
information about internet safety so you can
prepare yourself and your student for the project at
hand. Thanks so much for your cooperation.
Data of teens between
   the ages of 12 and 17.
     use the internet                              87%


use the internet daily                    51%

                                                         Kids in the U.S.
    have cell phones                 45%


              texting               38%


instant message (IM)                             75%


   play online games                              81%


                         0%   23%   45%    68%    90%
Online Victimization of Youth
               (2008):

    1 in 7 children (13%) received sexual
     solicitation or were approached with in
     the last year.
    1 in 3 (34%) had an unwanted exposure to
     pictures of naked people or people having
     sex.
    1 in 11 (9%) was threatened or harassed.
    1 in 25 (4%) received an “aggressive”
     sexual solicitation.
    › A solicitor who: asked to meet them
What should Parents
            do?
1.       Learn everything you can about
         computers, the internet and related
         technology.
     ›     Develop and maintain proficiency through use
     ›     Ask children to demonstrate.
2.       Communicate with your children.
     ›     Take time to discuss concerns; agree on
           ground rules.
     ›     Understand their needs.
     ›     Set reasonable expectations.
3.       Place the computer in a “well-trafficked”
4. Ensure that they do
    not divulge detailed
    personal information
    when completing
    “profiles” and
    minimize
    dissemination.
5. Keep ALL accounts in
    your name.
6. Know your child’s
    password(s) and
    screen name(s).
7. Consider use of computer internet
   management Software:
   › Age-based access levels- allows for carious
     levels of access for different family members
   › Filtering and Blocking (incoming and
     outgoing)
   › Time Restrictions
   › Activity Logs- Parents can view logs that list
     web sites visited, blocked, and chat
     sessions…software can even capture screen
     shots and email messages to you if a rule is
     violated
Blogs, IM, Chat Rooms, Email:
         What is reasonable?

 Under 8: Children should not be
  using IM, chat room, or blogs
  (period). Email should be restricted
  to only approved senders.
 8-10: If you add IM or chat make
  sure only pre-approved senders can
  send to your child. NO blogs!
 10-12: Give them more privacy, as
  long as it is with people you trust.
   13-15: Respect their privacy even more. Give
    them more leeway regarding IM, e-mail, chat, and
    blogs. But check and account for everyone, in real
    life, on their buddy lists. NO friends of friends!
   16 and over: Parental involvement becomes
    difficult at best-if good judgment and
    communication have not been firmly established
    by now… all beats are off!
     › If they have earned your trust, give it to them!
     › If not, unplug the computer and take away
        their cell phone and interactive gaming
QUESTIONS
   If you have Information that the
    Internet or a computer is being used
    to victimized a child, contact the
    NYS ICAC Task Force at:
              1-800-474-KIDS
        nysicac@troopers.state.ny.us
10 Tips to Share with Your
            Teen
Internet Survival Tips for Kids and Teens

Never give any personal information to anyone you meet online. That means first or last names,
phone numbers (they can be used to track down you home), passwords, birth dates or years, or
credit card information.

Never meet up with anyone you don't already know. Don't tell anyone your schedule; don't say
where you'll be hanging out. No party announcements. People are often not who they say they
are. It's true: 1 in 5 kids will be sexually solicited online.

Don't fill out any "fun" questionnaires that are forwarded to you, even if they're from your
friends. Remember, you're in a world where everything can get forwarded. All those personal
things about you could land in the hands of someone who could use them to harm you.

Don't send pictures of other people. Forwarding an embarrassing picture of someone else is a
form of Make sure you know everyone on your buddy list. If you haven't met the people face-to-
face, they may not be who they pretend to be. Also, Instant Messaging strangers is an invasion
of their privacy.

How would you like it if someone did that to you?
You do not have to answer emails or IMs from people you don't know. As a matter of
fact, you shouldn't. Who knows who they are? Even if they say they're "David's friend,"
David could be a lucky guess. "Kids" you meet in chat rooms may actually be creepy
adults.

There's no such thing as "private" on the Internet. You may think so, but it's not true.
People can find anything they want — and keep what you post — forever.

Be careful about posting pictures of yourself (if you must, don't post sexy ones or ones
showing behavior you wouldn't want your mom, teacher, boss, or potential college
advisor to see). Just because an older sibling has posted snaps on a site doesn't make it a
smart or a safe idea. Pictures with identifiers like where you go to school can be
shopping lists for online predators and other creeps.

Don't download content without your parents' permission. Many sites have spyware that
will damage your computer. Other sites have really inappropriate content. Your parents
can check your computer's URL history, so you can't hide where you've been.

Never share your password with anyone but your parents.
Resources
 http://kidshealth.org/parent/
  positive/family/net_safety.html
 http://www.fbi.gov/publications/
  pguide/
 http://www.commonsense.com/
  internet-safety-tips/tips-for-
  kids.php

Mais conteúdo relacionado

Mais procurados

Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for KidsPatrick Laverty
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop wwihead
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for StudentsKelgator
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kidspeterhitch
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 

Mais procurados (20)

Netsafety Parents
Netsafety ParentsNetsafety Parents
Netsafety Parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for Students
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 

Destaque (7)

Tic Y Gestion De La Cultura
Tic Y Gestion De La CulturaTic Y Gestion De La Cultura
Tic Y Gestion De La Cultura
 
Newfoundlandfisheries
NewfoundlandfisheriesNewfoundlandfisheries
Newfoundlandfisheries
 
Romae
RomaeRomae
Romae
 
Duurzame websites
Duurzame websitesDuurzame websites
Duurzame websites
 
Ds017 E Rate1
Ds017 E Rate1Ds017 E Rate1
Ds017 E Rate1
 
Presentatie Dinsdag 10 November
Presentatie Dinsdag 10 NovemberPresentatie Dinsdag 10 November
Presentatie Dinsdag 10 November
 
Oral Presentation
Oral PresentationOral Presentation
Oral Presentation
 

Semelhante a Keeping Kids Safe Online - A Parent's Guide to Internet Safety

Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting InfographicuKnow.com
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramDaniel Hanttula
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kidskwazy
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 

Semelhante a Keeping Kids Safe Online - A Parent's Guide to Internet Safety (20)

Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Gd prnts-en
Gd prnts-enGd prnts-en
Gd prnts-en
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Keeping Kids Safe Online - A Parent's Guide to Internet Safety

  • 1. Natalie Wyrick Internet Safety A Parent’s Guide
  • 2. E-pal Assignment We are beginning an assignment that will require your child to have an e-pal. We will be doing this with another class at another school over the internet. Before we start we want parents to be a little more informed about internet safety. We designed this powerpoint to give you more information about internet safety so you can prepare yourself and your student for the project at hand. Thanks so much for your cooperation.
  • 3. Data of teens between the ages of 12 and 17. use the internet 87% use the internet daily 51% Kids in the U.S. have cell phones 45% texting 38% instant message (IM) 75% play online games 81% 0% 23% 45% 68% 90%
  • 4. Online Victimization of Youth (2008):  1 in 7 children (13%) received sexual solicitation or were approached with in the last year.  1 in 3 (34%) had an unwanted exposure to pictures of naked people or people having sex.  1 in 11 (9%) was threatened or harassed.  1 in 25 (4%) received an “aggressive” sexual solicitation. › A solicitor who: asked to meet them
  • 5. What should Parents do? 1. Learn everything you can about computers, the internet and related technology. › Develop and maintain proficiency through use › Ask children to demonstrate. 2. Communicate with your children. › Take time to discuss concerns; agree on ground rules. › Understand their needs. › Set reasonable expectations. 3. Place the computer in a “well-trafficked”
  • 6. 4. Ensure that they do not divulge detailed personal information when completing “profiles” and minimize dissemination. 5. Keep ALL accounts in your name. 6. Know your child’s password(s) and screen name(s).
  • 7. 7. Consider use of computer internet management Software: › Age-based access levels- allows for carious levels of access for different family members › Filtering and Blocking (incoming and outgoing) › Time Restrictions › Activity Logs- Parents can view logs that list web sites visited, blocked, and chat sessions…software can even capture screen shots and email messages to you if a rule is violated
  • 8. Blogs, IM, Chat Rooms, Email: What is reasonable?  Under 8: Children should not be using IM, chat room, or blogs (period). Email should be restricted to only approved senders.  8-10: If you add IM or chat make sure only pre-approved senders can send to your child. NO blogs!  10-12: Give them more privacy, as long as it is with people you trust.
  • 9. 13-15: Respect their privacy even more. Give them more leeway regarding IM, e-mail, chat, and blogs. But check and account for everyone, in real life, on their buddy lists. NO friends of friends!  16 and over: Parental involvement becomes difficult at best-if good judgment and communication have not been firmly established by now… all beats are off! › If they have earned your trust, give it to them! › If not, unplug the computer and take away their cell phone and interactive gaming
  • 10. QUESTIONS  If you have Information that the Internet or a computer is being used to victimized a child, contact the NYS ICAC Task Force at: 1-800-474-KIDS nysicac@troopers.state.ny.us
  • 11. 10 Tips to Share with Your Teen Internet Survival Tips for Kids and Teens Never give any personal information to anyone you meet online. That means first or last names, phone numbers (they can be used to track down you home), passwords, birth dates or years, or credit card information. Never meet up with anyone you don't already know. Don't tell anyone your schedule; don't say where you'll be hanging out. No party announcements. People are often not who they say they are. It's true: 1 in 5 kids will be sexually solicited online. Don't fill out any "fun" questionnaires that are forwarded to you, even if they're from your friends. Remember, you're in a world where everything can get forwarded. All those personal things about you could land in the hands of someone who could use them to harm you. Don't send pictures of other people. Forwarding an embarrassing picture of someone else is a form of Make sure you know everyone on your buddy list. If you haven't met the people face-to- face, they may not be who they pretend to be. Also, Instant Messaging strangers is an invasion of their privacy. How would you like it if someone did that to you?
  • 12. You do not have to answer emails or IMs from people you don't know. As a matter of fact, you shouldn't. Who knows who they are? Even if they say they're "David's friend," David could be a lucky guess. "Kids" you meet in chat rooms may actually be creepy adults. There's no such thing as "private" on the Internet. You may think so, but it's not true. People can find anything they want — and keep what you post — forever. Be careful about posting pictures of yourself (if you must, don't post sexy ones or ones showing behavior you wouldn't want your mom, teacher, boss, or potential college advisor to see). Just because an older sibling has posted snaps on a site doesn't make it a smart or a safe idea. Pictures with identifiers like where you go to school can be shopping lists for online predators and other creeps. Don't download content without your parents' permission. Many sites have spyware that will damage your computer. Other sites have really inappropriate content. Your parents can check your computer's URL history, so you can't hide where you've been. Never share your password with anyone but your parents.
  • 13. Resources  http://kidshealth.org/parent/ positive/family/net_safety.html  http://www.fbi.gov/publications/ pguide/  http://www.commonsense.com/ internet-safety-tips/tips-for- kids.php