logging in or signing up Technology and our Children dakota83 Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 573 Category: Education License: All Rights Reserved Like it (0) Dislike it (0) Added: February 18, 2009 This Presentation is Public Favorites: 0 Presentation Description internet and phone safety tips Comments Posting comment... Premium member Presentation Transcript Technology and Our Children : Technology and Our Children Slide 2: Every second - $3,075.64 is being spent on pornography Every second - 28,258 Internet users are viewing pornography Every second - 372 Internet users are typing adult search terms into search engines Every 39 minutes: a new pornographic video is being created in the United States Slide 3: The pornography industry is larger than the revenues of the top technology companies combined: Microsoft, Google, Amazon, eBay, Yahoo!, Apple, Netflix and EarthLink Slide 5: Internet safety tips : Internet safety tips The internet is one of the most widely used information and entertainment mediums in existence today. Much of the information online is legitimate, trustworthy and helpful. Unfortunately, the Internet also contains websites that are offensive, misleading and even dangerous to children. By taking safety precautions, you can maximize the good qualities of the Internet while reducing the potential risks. Monitor your child’s Internet use: : Monitor your child’s Internet use: Keep the computer in a visible public area (this is not a violation of your child’s privacy, it is part of your responsibility as a parent. You child’s personal websites/blogs is public domain Decide on a reasonable amount of time that your child can spend online each day and be prepared to enforce it. If your child belongs to a social networking site (MySpace, Facebook, Tagged, Xanga, MyChurch, etc), look closely at what information they have in their member profiles and blogs, including photos and videos. Find out what other websites your child’s social networking site is linked to. Sometimes your child’s web pages may be safe but they may be linked to a site which could endanger them (a pornographic site, a site in which a friend mentions your child’s phone number, an adult site). Slide 8: Talk to your child about your Internet safety concerns in a positive way and give them the opportunity to make safety resolutions that you can both live with (example, how much time can be spent online? Are chat rooms permitted?). Explain that your kids should: Never give out personal information (name, address, phone, school name), NEVER meet anyone from online without your permission, NEVER open emails from unknown senders and NEVER share their photo with strangers over the Internet. Shared photos are an easy way for a predator to find a child or modify your child’s image for pornographic use. Encourage your children to bring anything strange or upsetting to your attention and don’t overreact when they do (fear of losing Internet privileges is why kids don’t tell parents about problemsand why they may start surfing the web somewhere else). Slide 9: Stay in touch with your kid’s online activities. Know who their online friends are (and who is on their buddy list), just as you would their other friends. Discuss what constitutes an inappropriate use of the Internet (harassing others, bullying, using profanity, looking at pornography, making purchases without your permission, etc) and what the consequences will be. Learn how filtering and monitoring software can assist you in protecting your children (check with your Internet service provider to find out if filtering or monitoring is available for free with your provider). However, don’t rely completely on software to protect your children. Education and parental involvement are the primary methods of prevention. Internet accounts should always be in the parent’s name. The parent should maintain the primary email account and be in charge of all passwords and parental controls. Kids should never share their passwords with anyone other than their parents. In summary: : In summary: Do speak with your child about their Internet habits and your safety concerns Do set a limit for how much time your child can spend online Do keep the computer in a public place Do install safety software and monitoring software and keep it updated Do NOT overreact or threaten to take away the Internet if your child tells you about something bad that they experienced online Do encourage your child to teach you what they know about the Internet Do NOT hesitate to get help if you think a predator may be targeting your child Do get to know your Child’s online friends as you would their real-life friends Cell phones : Cell phones 4 out of 5 teen have cell phone (17 million) What this means A majority (57%) of teens view their cell phone as the key to their social life. Second only to clothing, teens say, a person’s cell phone tells the most about their social status or popularity, outranking jewelry, watches and shoes. More than half of the respondents (52%) agree that the cell phone has become a new form of entertainment. One-third of teens play games on their phone. 80% say their cell phone provides a sense of security while on the go, confirming that the cell phone has become their mobile safety net when needing a ride (79%), getting important information (51%), or just helping out someone in trouble (35%). Teens carry cell phones to have access to friends, family and current events. Phones have GPS capability and internet access so be careful Though only one in five (18%) teens care to pinpoint the location of their family and friends via their cell phone, 36% hate the idea of a cell phone feature that allows others to know their exact location. Over 1 billion text message sent each day How do we monitor cell phones? : How do we monitor cell phones? Set Boundaries- time limits, content limits Phone Contract – allows teens ownership in rules Check phone regularly Check phone bill usage Parental controls are available from most wireless carriers to monitor content and amount of usage, block numbers, features (internet) etc. Phone Contract : Phone Contract 20 MINUTES TALK TIME PER DAY 50 IN TEXT MESSAGES, 50 OUT TEXT MESSAGES NO PHONE IN OR OUT AFTER 10 PM EVERYDAY OF THE WEEK NO PHONE IN OR OUT BEFORE 8 AM EVERYDAY OF THE WEEK NO ERASING OF TEXT MESSAGES AT ALL BEFORE THEY ARE LOOKED AT BY CHRIS OR SCOTT NO CURSE WORDS IN TEXT MESSAGES OR PHONE TAKEN FOR 1 DAY NO USING OF MINUTES DURING THE DAY TO CALL NON-VERIZON PEOPLE – NON-VERIZON PHONE CALLS CAN BE MADE BETWEEN 9 & 10 PM VIOLATION OF ANY OF THESE RULES WILL HAVE PUNISHMENT. 1ST OFFENSE – 1 WEEK NO PHONE TIME 2ND OFFENSE – 2 WEEK NO PHONE TIME 3RD OFFENSE – 1 MONTH NO PHONE TIME *NO PHONE TIME MEANING – NO CELL PHONES, NO HOUSE PHONES. *FURTHER VIOLATIONS WILL BE GROUNDS FOR PHONES TAKEN FOR GOOD. *IF YOU BREAK MORE THAN ONE RULE AT A TIME CONSEQUENCES COULD BE ADDED UP TO MORE OFFENSES. POSITIVES TO PHONE CONTRACT IF FOLLOW ALL RULES FOR 5 CONSECUTIVE DAYS ONE (1) HOUR EXTRA WEEKEND TIME, EXTRA TEXT MESSAGES OR COMPUTER TIME IF FOLLOW ALL RULES FOR 4 CONSECUTIVE WEEKS DAILY LIMIT WILL BE DOUBLED **IF RULES BROKEN BACK TO ORIGINAL CONTRACT AND START FROM NEW** SCOTT CONNELL CHRIS FIELD DAKOTA CONNELL SHAYNA CONNELL JESSICA FIELD Contact info : Contact info Scott Connell Home 540.972.5680 Cell 540.940.9406 Email: firstname.lastname@example.org You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.