SlideShare a Scribd company logo
1 of 26
The effects  of New Technology
Video Cameras Video – cassette recorders Making and Storing images and sounds Computers Different sorts of communication devices Scanners Digital cameras
 Morphing  and  Pseudo Pornography
The Impact of Internet
World Wide Web Japan73% USA 14% U.K. 3%
Country			Percentages United States		62.7 Russian Federation	10.3 Cyrus			3.9 Canada			3.6 Korea (South)		2.6 United Kingdom	2.5 Belgium			1.6 Taiwan			1.5 Others			11.3 Newsgroups and Communities
Chat Room Titles Baby sex Preteen sex Chat Room Toddler Spanking Chicken hawking A term coined by sex abuses for  their search for children in chat room
Law Enforcement Operations 1. No uniform system for recording offenses The three key Federal Agencies involved are the: FBI US Customs US Postal Inspection Service
Law Enforcement Operations 2.FBI’s Innocent Images Campaign Began in 1995 3.US Postal Inspection Service started since 1977 3,300 child molesters and pornographers  were arrested
Law Enforcement Operations 4.Conclusions from US data 5.Operation Cathedral and the     Wonder Land Club 6.Conclusions from Wonder Land 7.Special Police Units
Other Responses  to  Child Pornography
Other Responses to Child Pornography “Hotlines” or “Tiplines” are Mechanisms which allow people who have found what they think is illegal material on the internet to report it. Community Responses –Hotline INHOPE Internet Hotlines for EuropeAssociation of the Hotlines and Tip Lines across the world
Other Responses to Child Pornography Other Community Responses ASACP Adult Sites Against Child Pornography
Other Responses to Child Pornography Internet Industry Responses Governmental andInter-Governmental  approaches Recommendation
Other Responses to Child Pornography Internet Hotline Provides in Europe Association Members Internet Hotline Provides  in  Europe Association Members
Other Responses to Child Pornography Netsmart Rules to Help Parents  teach  their Children ,[object Object]
Never send anyone your picture, credit card or bank details, or anything else, without first checking with your parent or carer.
Never give your password to anyone, even a best friend.
Never arrange to meet anyone in person without first agreeing it with your parent or carer, and get them to come along to the first meeting, which should always be in a public place and you should always tell someone else where you are going and why.,[object Object]
Never respond to nasty, suggestive or rude emails or postings in Usenet Groups
Never open attachments to emails that come from people or sources you do not already know and trust
Delete the attachments immediately. They could contain viruses or other programmes which could completely destroy all the information and software on your computer.,[object Object]
Always be yourself and do not pretend to be anyone or anything you are not.
Always remember that if a site is described as being for adults only, or as being only for people of a certain age, you should respect that and stay out if you do not meet their criteria.
Always remember, if someone makes you an offer that seems too good to be true, it probably is.

More Related Content

What's hot

For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1Vinay Kumar
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingMatt Britland
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingst josephs
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5Melissa Halcott
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting InfographicuKnow.com
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 

What's hot (15)

For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5
 
Internet Safty
Internet SaftyInternet Safty
Internet Safty
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
 
10things
10things10things
10things
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Safety
Online SafetyOnline Safety
Online Safety
 

Viewers also liked

Pauline De Guzman
Pauline De GuzmanPauline De Guzman
Pauline De Guzmaneyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Content for Small Business
Content for Small BusinessContent for Small Business
Content for Small BusinessBetsy Decillis
 
Creating Content for Meetings
Creating Content for MeetingsCreating Content for Meetings
Creating Content for MeetingsBetsy Decillis
 

Viewers also liked (8)

Pauline De Guzman
Pauline De GuzmanPauline De Guzman
Pauline De Guzman
 
Jezell
JezellJezell
Jezell
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Content for Small Business
Content for Small BusinessContent for Small Business
Content for Small Business
 
Creating Content for Meetings
Creating Content for MeetingsCreating Content for Meetings
Creating Content for Meetings
 

Similar to Second Speaker

Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital worldDan Bowen
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kidspeterhitch
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital CitizensJason Rushing
 
Internet safety
Internet safetyInternet safety
Internet safetymbend360
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetyt2839ms18
 

Similar to Second Speaker (20)

Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
102009
102009102009
102009
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 

Second Speaker

  • 1.
  • 2. The effects of New Technology
  • 3. Video Cameras Video – cassette recorders Making and Storing images and sounds Computers Different sorts of communication devices Scanners Digital cameras
  • 4. Morphing and Pseudo Pornography
  • 5. The Impact of Internet
  • 6. World Wide Web Japan73% USA 14% U.K. 3%
  • 7. Country Percentages United States 62.7 Russian Federation 10.3 Cyrus 3.9 Canada 3.6 Korea (South) 2.6 United Kingdom 2.5 Belgium 1.6 Taiwan 1.5 Others 11.3 Newsgroups and Communities
  • 8. Chat Room Titles Baby sex Preteen sex Chat Room Toddler Spanking Chicken hawking A term coined by sex abuses for their search for children in chat room
  • 9. Law Enforcement Operations 1. No uniform system for recording offenses The three key Federal Agencies involved are the: FBI US Customs US Postal Inspection Service
  • 10. Law Enforcement Operations 2.FBI’s Innocent Images Campaign Began in 1995 3.US Postal Inspection Service started since 1977 3,300 child molesters and pornographers were arrested
  • 11. Law Enforcement Operations 4.Conclusions from US data 5.Operation Cathedral and the Wonder Land Club 6.Conclusions from Wonder Land 7.Special Police Units
  • 12. Other Responses to Child Pornography
  • 13. Other Responses to Child Pornography “Hotlines” or “Tiplines” are Mechanisms which allow people who have found what they think is illegal material on the internet to report it. Community Responses –Hotline INHOPE Internet Hotlines for EuropeAssociation of the Hotlines and Tip Lines across the world
  • 14. Other Responses to Child Pornography Other Community Responses ASACP Adult Sites Against Child Pornography
  • 15. Other Responses to Child Pornography Internet Industry Responses Governmental andInter-Governmental approaches Recommendation
  • 16. Other Responses to Child Pornography Internet Hotline Provides in Europe Association Members Internet Hotline Provides in Europe Association Members
  • 17.
  • 18. Never send anyone your picture, credit card or bank details, or anything else, without first checking with your parent or carer.
  • 19. Never give your password to anyone, even a best friend.
  • 20.
  • 21. Never respond to nasty, suggestive or rude emails or postings in Usenet Groups
  • 22. Never open attachments to emails that come from people or sources you do not already know and trust
  • 23.
  • 24. Always be yourself and do not pretend to be anyone or anything you are not.
  • 25. Always remember that if a site is described as being for adults only, or as being only for people of a certain age, you should respect that and stay out if you do not meet their criteria.
  • 26. Always remember, if someone makes you an offer that seems too good to be true, it probably is.
  • 27.
  • 28. Some Very Useful Websites Educational http://www.freecampus.co.uk http://safety.ngfl.gov.uk http://www.bbc.co.uk/education/home http://www.yahooligans.com http://www.becta.org.uk http://www.24hourmuseum.org.uk http://www.worldwildlife.org/fun Kids. sites http://www.kidsdomain.co.uk http://www.bbc.co.uk/cbbc http://www.beritsbest.com http://www.ala.org
  • 29. Some Very Useful Websites Internet safety generally http://www.nch.org.uk http://www.getnetwise.org http://www.bbc.co.uk/webwise/basics http://www.disney.co.uk/DisneyOnline/Safesurfing/index.html Information for Parents http://www.nch.org.uk http://www.pin.org.uk http://www.netparents.org Consumer advice and information http://www.net-consumers.org http://www.tradingstandards.gov.uk http://www.which.net http://www.oft.gov.uk
  • 30. Some Very Useful Websites Search engines http://www.searchenginewatch.com/links/Major_Search_Engines Search engines especially for children http://www.searchenginewatch.com/links/Kids_Search_Engines http://www.yahooligans.com http://sunsite.berkeley.edu/kidsclick Chat http://www.chatdanger.com Reporting bad stuff http://www.iwf.org.uk Filtering and blocking and parental control software http://www.getnetwise.org
  • 31. The 49 countries with identified members of the Wonderland Club
  • 32. The 49 countries with identified members of the Wonderland Club
  • 33. Countries identified as having members of Wonderland but who were not involved inOperation Cathedral: