SlideShare uma empresa Scribd logo
1 de 32
Using Technology
     Safely

      Paul O’Briant
    paul@obriant.net
www.21stCenturySheep.com
Do you love me? Tend my
        sheep.
           2
               John 21:16
Inappropriate content,
 contact, conduct
• 5 million Americans
  watch Major League
  Baseball




                        • 40 million Americans
                         regularly access internet
                                    porn
In 2009 over half of male college
  students and nearly a third of
  female students report being
 exposed to pornography before
their teenage years (by age 12),
and 35% of all students say their
  first exposure .was Internet or
         computer-based.
         Porn University, Michael Leahy
www.MartinLutherKing.org
Viruses – Malware- Spyware - Scareware
Inappropriate Contact
GeoTags
Inappropriate Conduct
• 33 percent of youth
Cyberbullying          have been victims
                     • 34 percent of youth
                       who are bullied feel
                       frustrated, 30 percent
                       angry and 22 percent
                       feel sad
                     • 41 percent of victims
                       do not tell anyone in
                       their off-screen lives
                       about their abuse
                     •   Cyberbullying.us




                14
2% of teens say they have sent a nude or
partially nude photo or video

 www.athinline.org




 16% of teens says they have received one
• 1/3 teens ages 16-17 say they have
         texted while driving. Pew
• A driver is 23 times more likely to have
  an accident when 16 texting and driving.
Cyber-Crime




      www.ic3.gov
18
Where do you start?
•   Can’t claim ignorance
•   Talk about the issues
•   Cybersafety rules
•   Model good behavior
•   Limit access

       www.onguardonline.gov
www.CovenantEyes.com

    Resources/eBooks
Technical Strategies

          • Parental Controls
            filtering/monitoring
            software
          • Safe search options
          • Check History
Safe Search
• Use antivirus and
  anti-malware software
• Keep operating
  systems up to date
Filtering is not enough
Parental Controls
•   www.ActionAlert.com (free)
•   www.NetNanny.com
•   http://parentalcontrolbar.com/ (free)
•   http://www1.k9webprotection.com/
    (free)
Using Technology
     Safely

      Paul O’Briant
    paul@obriant.net
www.21stCenturySheep.com

Mais conteúdo relacionado

Destaque

Deploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalitiesDeploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalitiesFredrick Ishengoma
 
Chapter 4
Chapter 4Chapter 4
Chapter 4detjen
 
Drucker chapter 3
Drucker chapter 3Drucker chapter 3
Drucker chapter 3detjen
 
Arte a medio dibujar
Arte a medio dibujarArte a medio dibujar
Arte a medio dibujarmaugepe
 
Chapter 13
Chapter 13Chapter 13
Chapter 13detjen
 
Cyber safety, technology and the church
Cyber safety, technology and the churchCyber safety, technology and the church
Cyber safety, technology and the churchPaul OBriant
 
Luxembourg Blockchain Meetup 13 July 2016 - Bertolo
Luxembourg Blockchain Meetup 13 July 2016 - BertoloLuxembourg Blockchain Meetup 13 July 2016 - Bertolo
Luxembourg Blockchain Meetup 13 July 2016 - BertoloStefano Bertolo
 
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma
 
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...Fredrick Ishengoma
 
Staying safe online
Staying safe onlineStaying safe online
Staying safe onlinePaul OBriant
 
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File SystemFredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File SystemFredrick Ishengoma
 

Destaque (12)

Deploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalitiesDeploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalities
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Drucker chapter 3
Drucker chapter 3Drucker chapter 3
Drucker chapter 3
 
Arte a medio dibujar
Arte a medio dibujarArte a medio dibujar
Arte a medio dibujar
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Cyber safety, technology and the church
Cyber safety, technology and the churchCyber safety, technology and the church
Cyber safety, technology and the church
 
Luxembourg Blockchain Meetup 13 July 2016 - Bertolo
Luxembourg Blockchain Meetup 13 July 2016 - BertoloLuxembourg Blockchain Meetup 13 July 2016 - Bertolo
Luxembourg Blockchain Meetup 13 July 2016 - Bertolo
 
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
 
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
 
Using tech safely
Using tech safelyUsing tech safely
Using tech safely
 
Staying safe online
Staying safe onlineStaying safe online
Staying safe online
 
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File SystemFredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File System
 

Semelhante a Dakotas Parent Meeting Presentation

How to stay safe online p2
How to stay safe online p2How to stay safe online p2
How to stay safe online p2Typho8000
 
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...soissues
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartJorge Borges
 
Facebook and your child
Facebook and your childFacebook and your child
Facebook and your childlissecondary
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationspringvillegi
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School
 
Mc afee digital deception study 2013
Mc afee digital deception study 2013Mc afee digital deception study 2013
Mc afee digital deception study 2013PNMI
 
Social media and its effects on youth -sb
Social media and its effects on youth -sbSocial media and its effects on youth -sb
Social media and its effects on youth -sbSachin Dahiya
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet SafetyJVGAJJAR
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupScott Burnett
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07TristanLG
 

Semelhante a Dakotas Parent Meeting Presentation (20)

How to stay safe online p2
How to stay safe online p2How to stay safe online p2
How to stay safe online p2
 
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
 
Facebook and Your Child
Facebook and Your ChildFacebook and Your Child
Facebook and Your Child
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Youth, Sex & the Internet: What practitioners need to know
Youth, Sex & the Internet:  What practitioners need to knowYouth, Sex & the Internet:  What practitioners need to know
Youth, Sex & the Internet: What practitioners need to know
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda Lenhart
 
Facebook and your child
Facebook and your childFacebook and your child
Facebook and your child
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Mc afee digital deception study 2013
Mc afee digital deception study 2013Mc afee digital deception study 2013
Mc afee digital deception study 2013
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Social media and its effects on youth -sb
Social media and its effects on youth -sbSocial media and its effects on youth -sb
Social media and its effects on youth -sb
 
Web safety
Web safetyWeb safety
Web safety
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07
 

Último

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Dakotas Parent Meeting Presentation

  • 1. Using Technology Safely Paul O’Briant paul@obriant.net www.21stCenturySheep.com
  • 2. Do you love me? Tend my sheep. 2 John 21:16
  • 3.
  • 5. • 5 million Americans watch Major League Baseball • 40 million Americans regularly access internet porn
  • 6.
  • 7. In 2009 over half of male college students and nearly a third of female students report being exposed to pornography before their teenage years (by age 12), and 35% of all students say their first exposure .was Internet or computer-based. Porn University, Michael Leahy
  • 9. Viruses – Malware- Spyware - Scareware
  • 11.
  • 14. • 33 percent of youth Cyberbullying have been victims • 34 percent of youth who are bullied feel frustrated, 30 percent angry and 22 percent feel sad • 41 percent of victims do not tell anyone in their off-screen lives about their abuse • Cyberbullying.us 14
  • 15. 2% of teens say they have sent a nude or partially nude photo or video www.athinline.org 16% of teens says they have received one
  • 16. • 1/3 teens ages 16-17 say they have texted while driving. Pew • A driver is 23 times more likely to have an accident when 16 texting and driving.
  • 17. Cyber-Crime www.ic3.gov
  • 18. 18
  • 19. Where do you start? • Can’t claim ignorance • Talk about the issues • Cybersafety rules • Model good behavior • Limit access www.onguardonline.gov
  • 20.
  • 21.
  • 22. www.CovenantEyes.com Resources/eBooks
  • 23.
  • 24.
  • 25. Technical Strategies • Parental Controls filtering/monitoring software • Safe search options • Check History
  • 26.
  • 27.
  • 29. • Use antivirus and anti-malware software • Keep operating systems up to date
  • 31. Parental Controls • www.ActionAlert.com (free) • www.NetNanny.com • http://parentalcontrolbar.com/ (free) • http://www1.k9webprotection.com/ (free)
  • 32. Using Technology Safely Paul O’Briant paul@obriant.net www.21stCenturySheep.com