logging in or signing up Internet Safety Hour j3pr0x Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 120 Category: Education License: Some Rights Reserved Like it (0) Dislike it (0) Added: May 24, 2012 This Presentation is Public Favorites: 0 Presentation Description A primer on online safety for parents Comments Posting comment... Premium member Presentation Transcript Internet safety hour: Internet safety hour Keeping Your Child Safe on the InternetWelcome, parents!: Welcome, parents! We are first- generation Internet parents.Objectives: Objectives To understand what our children are doing online To keep our children safe when they’re online To teach our children to make smart choices when they’re online To start a discussion about Internet safety that we continue with our families and others beyond todayOnline Safety: Four Freedoms: Online Safety: Four Freedoms Physical safety – freedom from physical harm Psychological safety – freedom from cruelty, harassment, and exposure to potentially disturbing material Reputational and legal safety – freedom from unwanted social, academic, professional, and legal consequences that could affect you for a lifetime Identity, property, and community safety – freedom from theft of identity & propertyHow Children Get Online: How Children Get OnlineHow Children Get Online: How Children Get OnlineHow Children Get Online: How Children Get OnlineWhat Children Do Online: What Children Do Online Visit virtual worlds Play multiplayer games Send messages (SMS, Chat, Instant Messaging) Interact with others (i.e., on social networking sites) View and post videos Download music, movies, and other media Create and upload art Do research (school-related or personal interest)Social Networking Sites: Social Networking SitesEquip yourself!: Equip yourself! Read: “A Parents’ Guide to Facebook” a 32-page PDF for reading (and/or printing) Interactive chart with recommendations for teens. *Go to http:// fbparents.orgTexting and Instant Messaging: Texting and Instant Messaging These allow children to “talk” with friends at any time on the computer or a cell phone. Texting and instant messaging has replaced email as a preferred method of communication.Video Sharing Sites: Video Sharing Sites Popular video-sharing sites: YouTube Vimeo Justin.tv Users view and post videos (live or archived) Post and read comments about the video content.Online Games: Online GamesSo what now? : So what now? Predators Inappropriate content Cyberbullying & harassment Privacy and reputation “Internet addiction” Destructive, illegal or inappropriate behavior Device security & social engineering Intellectual theft : ability to copy and paste somebody else’s work and claim it as your own.Cyberbullying: CyberbullyingProtecting Against Cyberbullying: Protecting Against Cyberbullying Never respond to unkind remarks. Don’t participate in cyberbullying . Block the cyberbully . Tell a trusted adult. Save the posts. Notify law enforcement, if appropriate. Notify your child’s school, if appropriate.Inappropriate Content: Inappropriate ContentMalware: MalwareSexual Predators: Sexual PredatorsIdentity Theft: Identity TheftKeep Private Information Private: Keep Private Information Private Never reveal: Name Address Phone number School name Don’t post or send photographs of yourself. Choose nondescript usernames, passwords, and forgotten password reminders NOT: jeffliwag NOT: Password, 123456, 12345678, qwerty, abc123, monkey, 1234567, letmein , trustno1, dragon (most common last year) NOT: name of pet, mother’s maiden name, etc.Teaching Security Awareness: Teaching Security Awareness What to watch out for: Viruses, Spyware, and other malware How kids are tricked: High-interest content Free offers Significant current events How kids may be causing it: Proxy avoidance: kids know how to and do get around web filters…Learn How To Use Privacy Settings: Learn How To Use Privacy Settings Learn your browser’s privacy settings.Learn How To Use Privacy Settings: Learn How To Use Privacy SettingsLearn How To Use Privacy Settings: Learn How To Use Privacy SettingsIf a Stranger Contacts Your Child: If a Stranger Contacts Your Child Make sure your child knows: Don’t respond Contact an adult right away Block the offender Notify your internet service provider, if warranted. Notify CyberTipline Go to www.cybertipline.comBasic Ways To Keep Your Child Safe: Basic Ways To Keep Your Child Safe Sign an “Internet Safety Contract.” Keep the computer in a visible, or high-traffic area of your home. Set a time limit for computer use. Become familiar with the sites your child visits. Know your child’s online “friends.” Know your child’s usernames & passwords. Keep your computer & security software up to date.Best Practices: Best Practices Administration, teachers, & parents working together Take Children’s Internet Protection Act (CIPA) compliance to the next level Evolve the Acceptable Use Policy to include Internet safety education at our school Engage Your Children Mentorship/role modeling Monitor what your child is doing on-line…all the time!Resources: Resources A Parent’s Guide to Facebook www.fbparents.org Common Sense Media – FREE resources for educators www.commonsense.org/educators Videos: www.commonsensemedia.org/digital-citizenship/6-8#privacy Free resources to host Internet Safety Night for parents (PTO/PTA) www.internetsafetynight.com Information on Children’s Internet Protection Act (CIPA) www.fcc.gov/cgb/consumerfacts/cipa.html NetSmartz , a project of the National Center for Missing and Exploited Children www.netsmartz.org AllSafeSites.com , a child-safe search engine Our site, www.gisd.org (go to Edtech Express and Online Safety under Parent Resources)Now, go talk to your kids!: Now, go talk to your kids! You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.