SlideShare uma empresa Scribd logo
1 de 21
Internet Safety A guide
Internet Safety Content Disclaimer Acceptable Use Policy Julie . . . her story Statistics IM/email/Chat rooms Blogging Inappropriate Content Resources References Think smart, Play smart, Be smart, Play SAFE!
Disclaimer This publications is not intended for professional use in any manner.  The author of this publication attempted to gather information pertaining to the safety of kids and tweens using the internet.  This is not intended for legal or professional consultation. The information in the publication is subject to change by the author of the referenced material.  All attempts were made to assure accuracy of the information in this publication.
Acceptable Use Policy Purpose The purpose of this policy is to ensure appropriate, responsible, ethical and legal access and use of computers, the Internet, and other electronic or communication devices by District students, patrons, and employees. The Technology Acceptable Use Policy addresses two distinct concepts of technology use. The first regards the use of computers and the Internet, and the second addresses interfering and electronic communication devices. Washington County School District, St. George, UT.
Acceptable Use Policy Policy 2.1. Computers and the Internet It is the policy of the Washington County School District to permit students, patrons, and employees to have computer and Internet access under approved regulations and guidelines, to include those listed in the Children's Internet Protection Act, State Law, and policies adopted by Board of Education. In general, the user's responsibilities require responsible, decent, ethical, polite, efficient, and legal use of computer and network resources. Students, patrons, and employees must not access obscene, pornographic, or material that is deemed to be harmful to minors. District and school personnel will instruct students and staff on acceptable use of computers and Internet resources and proper network etiquette.  All students, patrons, and employees are granted access to the Internet, but all access to the Internet through district resources is subject to the terms of the Technology Acceptable Use Agreement and District policy. Washington County School District, St. George, UT.
Acceptable Use Policy Policy 2.2. Interfering and electronic communication devices While in some instances the possession and use of electronic communication devices or other devices or objects by a student at a school may be appropriate, often the possession and use of such devices or objects by students at school can have the effect of distracting, disrupting, and intimidating others in the school setting and leading to opportunities for academic dishonesty and other disruptions of the educational process. The purpose of this component of the policy is to vest with school administrators the authority to enforce reasonable rules relating to student use of such objects or devices in the public schools. Washington County School District, St. George, UT.
Julie . . . Her story of how she got caught up in something she had no control over due to manipulation and anger . . .  Someone could be looking into your daily life without you realizing it. her story
Statistics Consider a recent survey of teenagers that revealed the following: ,[object Object]
60%  have an instant-message screen name
75%  have a cell phone
72%  have profiles on social networking sitesThink before you type All statistics provided by www.aldricchang.com
Statistics And on a more disturbing note ,[object Object]
most share personal info online, though 3 in 5 know it’s dangerous
1 in 4 know someone who experienced something bad, from an inappropriate text forwarded around school to being sexually victimizedAll statistics provided by www.aldricchang.com
Statistics Access ,[object Object]
Of the children (0-5) who use the Internet, 80% use it at least once a week.Cell Phones ,[object Object]
On average, texting teens (12-17) send and receive 1500 text messages a month.Friends Only! All statistics provided by www.netsmartz.com
Be Nice Statistics Cyberbullying ,[object Object]
Girls are more likely to be victims of cyberbullying (38% girls vs. 26% boys).Online Gaming ,[object Object]
27% of teens (12-17) play games with people they don’t know online.All statistics provided by www.netsmartz.com
Statistics Predators ,[object Object]

Mais conteúdo relacionado

Mais procurados

Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 

Mais procurados (20)

Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Social Media & Teens
Social Media & TeensSocial Media & Teens
Social Media & Teens
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 

Destaque

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
Multimedia technology
Multimedia technologyMultimedia technology
Multimedia technologyVishnu Ram
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
multimedia technologies Introduction
multimedia technologies Introductionmultimedia technologies Introduction
multimedia technologies IntroductionMohammed Fareed
 
Multimedia presentation
  Multimedia presentation   Multimedia presentation
Multimedia presentation kamalesh2015
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system pptSuaj
 
multimedia element
multimedia elementmultimedia element
multimedia elementAZMAN KADIR
 

Destaque (9)

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
Multimedia technology
Multimedia technologyMultimedia technology
Multimedia technology
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
multimedia technologies Introduction
multimedia technologies Introductionmultimedia technologies Introduction
multimedia technologies Introduction
 
Multimedia presentation
  Multimedia presentation   Multimedia presentation
Multimedia presentation
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
 
multimedia element
multimedia elementmultimedia element
multimedia element
 
Multimedia
MultimediaMultimedia
Multimedia
 

Semelhante a Internet Safety Presentation

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet SafetyErica Roberts
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesMs. D
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Karen Brooks
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 

Semelhante a Internet Safety Presentation (20)

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Legalissues
LegalissuesLegalissues
Legalissues
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet Safety
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database Resources
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 

Mais de tdsparks3

Evaluation for Far West Laboratory for Educational Research and Development
Evaluation for Far West Laboratory for Educational Research and DevelopmentEvaluation for Far West Laboratory for Educational Research and Development
Evaluation for Far West Laboratory for Educational Research and Developmenttdsparks3
 
Digital Divide vs Digital Inequality
Digital Divide vs Digital InequalityDigital Divide vs Digital Inequality
Digital Divide vs Digital Inequalitytdsparks3
 
Unit of Instruction
Unit of InstructionUnit of Instruction
Unit of Instructiontdsparks3
 
Stop motion animation psw
Stop motion animation pswStop motion animation psw
Stop motion animation pswtdsparks3
 
541 video enhanced lesson
541 video enhanced lesson541 video enhanced lesson
541 video enhanced lessontdsparks3
 
Computer networking
Computer networkingComputer networking
Computer networkingtdsparks3
 
Instructional Software Presentation
Instructional Software PresentationInstructional Software Presentation
Instructional Software Presentationtdsparks3
 
Instructional software presentation
Instructional software presentationInstructional software presentation
Instructional software presentationtdsparks3
 
Relative advantage chart
Relative advantage chartRelative advantage chart
Relative advantage charttdsparks3
 

Mais de tdsparks3 (9)

Evaluation for Far West Laboratory for Educational Research and Development
Evaluation for Far West Laboratory for Educational Research and DevelopmentEvaluation for Far West Laboratory for Educational Research and Development
Evaluation for Far West Laboratory for Educational Research and Development
 
Digital Divide vs Digital Inequality
Digital Divide vs Digital InequalityDigital Divide vs Digital Inequality
Digital Divide vs Digital Inequality
 
Unit of Instruction
Unit of InstructionUnit of Instruction
Unit of Instruction
 
Stop motion animation psw
Stop motion animation pswStop motion animation psw
Stop motion animation psw
 
541 video enhanced lesson
541 video enhanced lesson541 video enhanced lesson
541 video enhanced lesson
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Instructional Software Presentation
Instructional Software PresentationInstructional Software Presentation
Instructional Software Presentation
 
Instructional software presentation
Instructional software presentationInstructional software presentation
Instructional software presentation
 
Relative advantage chart
Relative advantage chartRelative advantage chart
Relative advantage chart
 

Último

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Último (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Internet Safety Presentation

  • 2. Internet Safety Content Disclaimer Acceptable Use Policy Julie . . . her story Statistics IM/email/Chat rooms Blogging Inappropriate Content Resources References Think smart, Play smart, Be smart, Play SAFE!
  • 3. Disclaimer This publications is not intended for professional use in any manner. The author of this publication attempted to gather information pertaining to the safety of kids and tweens using the internet. This is not intended for legal or professional consultation. The information in the publication is subject to change by the author of the referenced material. All attempts were made to assure accuracy of the information in this publication.
  • 4. Acceptable Use Policy Purpose The purpose of this policy is to ensure appropriate, responsible, ethical and legal access and use of computers, the Internet, and other electronic or communication devices by District students, patrons, and employees. The Technology Acceptable Use Policy addresses two distinct concepts of technology use. The first regards the use of computers and the Internet, and the second addresses interfering and electronic communication devices. Washington County School District, St. George, UT.
  • 5. Acceptable Use Policy Policy 2.1. Computers and the Internet It is the policy of the Washington County School District to permit students, patrons, and employees to have computer and Internet access under approved regulations and guidelines, to include those listed in the Children's Internet Protection Act, State Law, and policies adopted by Board of Education. In general, the user's responsibilities require responsible, decent, ethical, polite, efficient, and legal use of computer and network resources. Students, patrons, and employees must not access obscene, pornographic, or material that is deemed to be harmful to minors. District and school personnel will instruct students and staff on acceptable use of computers and Internet resources and proper network etiquette.  All students, patrons, and employees are granted access to the Internet, but all access to the Internet through district resources is subject to the terms of the Technology Acceptable Use Agreement and District policy. Washington County School District, St. George, UT.
  • 6. Acceptable Use Policy Policy 2.2. Interfering and electronic communication devices While in some instances the possession and use of electronic communication devices or other devices or objects by a student at a school may be appropriate, often the possession and use of such devices or objects by students at school can have the effect of distracting, disrupting, and intimidating others in the school setting and leading to opportunities for academic dishonesty and other disruptions of the educational process. The purpose of this component of the policy is to vest with school administrators the authority to enforce reasonable rules relating to student use of such objects or devices in the public schools. Washington County School District, St. George, UT.
  • 7. Julie . . . Her story of how she got caught up in something she had no control over due to manipulation and anger . . . Someone could be looking into your daily life without you realizing it. her story
  • 8.
  • 9. 60% have an instant-message screen name
  • 10. 75% have a cell phone
  • 11. 72% have profiles on social networking sitesThink before you type All statistics provided by www.aldricchang.com
  • 12.
  • 13. most share personal info online, though 3 in 5 know it’s dangerous
  • 14. 1 in 4 know someone who experienced something bad, from an inappropriate text forwarded around school to being sexually victimizedAll statistics provided by www.aldricchang.com
  • 15.
  • 16.
  • 17. On average, texting teens (12-17) send and receive 1500 text messages a month.Friends Only! All statistics provided by www.netsmartz.com
  • 18.
  • 19.
  • 20. 27% of teens (12-17) play games with people they don’t know online.All statistics provided by www.netsmartz.com
  • 21.
  • 22. those with histories of sexual or physical abuse
  • 23. those who post sexually provocative photos/video
  • 24. those who talk about sex with unknown people online.
  • 25. Boys who are gay or questioning their sexuality are particularly at risk. 25% of victims are boys and almost all of their offenders are male.All statistics provided by www.netsmartz.com
  • 26.
  • 27. In more than one-quarter (27%) of incidents, solicitors asked youths for sexual photographs of themselves.All statistics provided by www.netsmartz.com
  • 28.
  • 29. 15% of cell-owning teens (12-17) say they have received sexually suggestive nude/semi-nude images of someone they know via text.A common Sense Approach to Internet Safety video Don’t send pics All statistics provided by www.netsmartz.com
  • 30.
  • 31. 47% of teens (12-17) have uploaded photos; 14 % have posted videos.
  • 32. 20% of teens report that it is safe.All statistics provided by www.netsmartz.com
  • 33.
  • 34. Assist your child in creating screen names and email addresses that do not contain personal information.
  • 35. Explain why emails and IM’s from unknown sources should be deleted and not opened.
  • 36. Use spam blockers.BBC video on chat roomsafety. http://youtu.be/b7aso7BDzEo
  • 37.
  • 38. Know how your child is access the internet and from where.
  • 39. Explain why it is very important to not share passwords with friends or strangers.
  • 40. Become familiar with acronyms to understand what your kids are saying.BBC video on chat roomsafety. http://youtu.be/b7aso7BDzEo
  • 41.
  • 42. Review your child's blog before the new information is posted.
  • 43. Set the privacy settings for your child and remind them of the importance that others do not have access to personal information.
  • 44. Make sure that all images are free of any identifying information like phone numbers, addresses, schools, names, and ages.
  • 45. Explain the importance of not posting misleading, provocative and explicit information or images.
  • 46.
  • 47. Encourage your child to seek an adult if he or she encounters inappropriate material.
  • 48. Discuss the acceptable use policy with your child.
  • 49.
  • 50. References http://www.commonsense.com/internet-safety-tips/tips-for-kids.php http://elementarysafety.com/personal-safety?gclid=CIybzsi43KkCFQZCgwod0FFjZQ http://www.slideshare.net/aldricchang/raising-kids-on-the-internet-2149686 Slide 5 statistics http://www.fbi.gov/fun-games/kids/kids-safety http://www.netsmartz.org/Safety/Statistics Slides 8-10 http://www.safewave.org/index.php?option=com_content&task=view&id=353&Itemid=300 http://securityorb.com/2011/02/teen-internet-safety-statistics-from-netsmartz-org/