PD Pandora & CyberHood Watch Internet Safety Symposium


Published on

CyberHood Watch, OSAuthority, educators, law enforcement personnel, child welfare organizations, community leaders and PARENTS everywhere know that Internet safety is at the top of today's list of parenting concerns. And why shouldn't it be? We let our children use a machine that connects them to the entire world - but more importantly, connects the entire world to them and your home.

The PD Pandora Internet Safety curriculum is an informative and customizable 90-minute safety seminar that analyzes the common threats children and families face online every day. The symposium covers Internet predators, cyberbullying, peer-to-peer file sharing, social networking and more, as well as solutions that will help any 21st century parent. The complete package consists of a full PowerPoint presentation, read-along script, 6-page parent hand-out for distribution and marketing materials.

Published in: Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

PD Pandora & CyberHood Watch Internet Safety Symposium

  1. 1. www. TheCyberHoodWatch .com PD Pandora Internet Safety
  2. 2. PD Pandora Internet Safety Symposium : How to Keep Your Family Safe on the Internet CyberHood Watch When ordering use special promo code for discount: “ cyberhood ”
  3. 3. AGENDA <ul><li>Part I: Internet 101 </li></ul><ul><li>Intro to the Internet, Web 2.0 </li></ul><ul><li>Threat Assessment </li></ul><ul><li>Part II: Solutions </li></ul><ul><li>What you can do </li></ul><ul><li>Resources </li></ul>PD Pandora Internet Safety
  4. 4. PART I: INTERNET 101 Intro to the Internet and Web 2.0 Threat Assessment www. TheCyberHoodWatch .com
  5. 5. THE INTERNET <ul><li>Evolved over decades </li></ul><ul><li>“ inter” “networks” talking to each other </li></ul><ul><li>Went public in the ‘80s </li></ul><ul><li>Popularity in the mid-‘90s </li></ul><ul><li>Source of information – A place to search for answers and information </li></ul><ul><li>Early communication includes: email, chat rooms, forums </li></ul>PD Pandora Internet Safety
  6. 6. WEB 2.0 <ul><li>&quot;Network as platform&quot; computing - Allows users to run software-applications entirely through a browser </li></ul><ul><li>Users can own the data on a Web 2.0 site and exercise control over that data </li></ul><ul><li>&quot;Architecture of participation&quot; encourages users to add value to the application as they use it </li></ul>PD Pandora Internet Safety <ul><li>Does not refer to an update to any technical specifications, but rather to changes in the ways software developers and end-users (you and me) utilize the Web… </li></ul><ul><ul><ul><li>Web 2.0 concepts have led to the development and evolution of web communities and hosted services, such as video sharing sites, wikis, blogs, and the most popular of all… </li></ul></ul></ul>
  7. 7. SOCIAL NETWORKING <ul><li>Get used to it! </li></ul><ul><li>Used regularly by millions of people across the globe… </li></ul><ul><li> Most popular social networking websites: </li></ul><ul><ul><ul><li>MySpace Facebook Friendster </li></ul></ul></ul><ul><ul><ul><li>Bebo Youtube Twitter </li></ul></ul></ul><ul><ul><ul><li>Digg LinkedIn Ning </li></ul></ul></ul><ul><li>Online communities of Internet users and people who share interests and/or activities, or who are interested in exploring the interests and activities of others </li></ul><ul><li>Can be general in nature, or cater to a specific group or common interest, such as hobbies, religion, or politics; many general sites have specialized groups within </li></ul><ul><li>Provide a variety of ways for users to interact </li></ul><ul><li>Free to use </li></ul>PD Pandora Internet Safety
  8. 8. SOCIAL NETWORKING (II) <ul><li>Your profile page is the front page of your own newspaper! </li></ul><ul><li>Main purpose = communicate with friends </li></ul><ul><li>Tell people about: </li></ul><ul><li>your personality </li></ul><ul><li>personal/professional interests </li></ul><ul><li>hobbies </li></ul><ul><li>basic info about yourself </li></ul>PD Pandora Internet Safety Why? Profile page = “your” customizable space You can also: customize the background choose the music share photos show your list of friends add “widgets” share video
  9. 9. SOCIAL NETWORKING (III) <ul><li>What’s so social about it? </li></ul><ul><li>Modes of communication offered by most popular social networking websites include: </li></ul><ul><li>Internal “private mail” or “private message” (called a PM) </li></ul><ul><li>Instant messenger (real-time communication) </li></ul><ul><li>Comments (short messages visible to all) </li></ul><ul><li>Journal/Blog (thoughts or memos for the day) </li></ul><ul><li>Bulletins (messages to everyone in your friends list) </li></ul><ul><li>“ Tweeting” </li></ul><ul><li>MAKING FRIENDS! </li></ul><ul><li>COMMUNICATION! </li></ul>PD Pandora Internet Safety
  10. 10. THE GOOD, THE BAD AND THE UGLY (of Social Networks) <ul><li>Good: </li></ul><ul><li>Helps people stay in touch </li></ul><ul><li>Acceptance </li></ul><ul><li>Inspire interests and creativity </li></ul><ul><li>Bad: </li></ul><ul><li>Too much information (“TMI”) </li></ul><ul><li>Access to inappropriate material </li></ul><ul><li>Loss of privacy/identity theft </li></ul>PD Pandora Internet Safety <ul><li>Ugly: </li></ul><ul><li>Bullying </li></ul><ul><li>Internet predators </li></ul><ul><li>“ Sexting” </li></ul>
  11. 11. OTHER POPULAR WAYS TO COMMUNICATE <ul><li>Instant Messenger (IM) </li></ul><ul><li>Real-time text-based communication </li></ul><ul><li>Popular IM programs: </li></ul><ul><li>AOL Instant Messenger </li></ul><ul><li>MSN Messenger </li></ul><ul><li>Yahoo Messenger </li></ul><ul><li>ICQ </li></ul><ul><li>Trillian </li></ul><ul><li>Chat Rooms: </li></ul><ul><li>Have dozens, even hundreds, of participants </li></ul><ul><li>Chat Rooms are often themed by interest </li></ul><ul><li>“ Moderators” police the conversation (not always) </li></ul><ul><li>Chat rooms can be joined through your web browser </li></ul>PD Pandora Internet Safety <ul><li>Many IM programs also allow: </li></ul><ul><li>Offline messages </li></ul><ul><li>Group chatting </li></ul><ul><li>Voice and video chatting </li></ul><ul><li>Conversation logging and file sharing </li></ul><ul><li>Webcams </li></ul>
  12. 12. <ul><li>Forums: </li></ul><ul><li>a.k.a. message boards, newsgroups, online discussion sites </li></ul><ul><li>“ The modern bulletin board” </li></ul><ul><li>Topic central </li></ul><ul><li>Several discussions at the same time </li></ul><ul><li>Make friends, bond with people that share common interest </li></ul><ul><li>Governed and maintained by administrators and moderators </li></ul><ul><li>Blogs: </li></ul><ul><li>Short for “web log” </li></ul><ul><li>Frequently updated online diaries/journals </li></ul><ul><li>Personal or professional; ethical, moral, topical </li></ul><ul><li>Example: Pandora’s Blog, the blog for PC Pandora , tackles Internet safety and shares daily news stories on the issue. </li></ul><ul><li>More popular with adults; kids getting into blogging more and more. </li></ul>OTHER POPULAR WAYS TO COMMUNICATE (II) PD Pandora Internet Safety
  13. 13. THE THREATS <ul><li>Sexual predators: </li></ul><ul><li>Search for under-aged boys and girls or vulnerable older girls/young women </li></ul><ul><li>Lure their target, “grooming” </li></ul><ul><li>A physical meeting, after a sense of “knowing” and “trust” is established </li></ul><ul><li>Sexual assault, and sometimes rape, can occur in the real life meetings </li></ul><ul><li>Child pornographers </li></ul><ul><li>Scam artists: </li></ul><ul><li>Don’t care if they ever meet you; they are after your wallet </li></ul><ul><li>Take their time to learn real-life facts about you and then use that information to try and gain access to your credentials, bank accounts, etc. </li></ul><ul><li>Use sophisticated and professional emails that appear legitimate, but are nothing more than a ploy to get you to divulge your private information </li></ul><ul><li>May lead to identity theft </li></ul>PD Pandora Internet Safety They DO exist! Internet Predators Two types on the Internet Predators lurk in chat rooms, forums, and social networks to search for targets!!!
  14. 14. THE THREATS (II) <ul><li> They DO exist! </li></ul><ul><li>Internet Predator Statistics: </li></ul><ul><li>69% of teens regularly receive personal messages online from people they don't know and most of them don't tell a trusted adult about it. </li></ul><ul><li>While 16% of teens in 2007 say they've considered meeting face-to-face with someone they've talked to only online, that marks a significant drop compared to the 30% of teens who were considering such a meeting in 2006. </li></ul><ul><li>In 2007, 8% of teens say they actually have met in person with someone from the Internet, down from 14% in 2006. </li></ul><ul><li>When they receive online messages from someone they don't know, almost 60% of teens say they usually respond only to ask who the person is. Nearly a third of teens (31%) say they usually reply and chat with people they don't know, and only 21% tell a trusted adult when they receive such messages. </li></ul><ul><li>Approximately 1 in 7 (13%) children were solicited in 2005, compared to approximately 1 in 5 (19%) in 2000; aggressive solicitations did not decline. </li></ul><ul><li>4% of all youth Internet users in 2005 said online solicitors asked them for nude or sexually explicit photographs of themselves. </li></ul><ul><li>Make no mistake, these guys exist! </li></ul>PD Pandora Internet Safety
  15. 15. THE THREATS (III) <ul><li>Same bully, different technology </li></ul><ul><li>Cyberbullying </li></ul><ul><li>( a.k.a. electronic bullying, online bullying ) </li></ul><ul><li>Definition: the intentional and repeated harm of others through the use of computers, cell phones, and other electronic devices. </li></ul><ul><li>Worst of all: the effects and ordeal of a cyberbully can follow a victim for years… </li></ul>PD Pandora Internet Safety <ul><li>THE most predominant threat your kids will face today </li></ul><ul><li>Bullying 2.0: moved from the playground to the Internet </li></ul><ul><li>The Internet makes it possible for bullying to continue at every hour of every day </li></ul><ul><li>Bullying Effects: </li></ul><ul><li>Mental anguish </li></ul><ul><li>Humiliation </li></ul><ul><li>Stress </li></ul><ul><li>Anxiety </li></ul><ul><li>Depression </li></ul><ul><li>Suicidal feelings </li></ul>
  16. 16. THE THREATS (IV) <ul><li>As simple as email harassment, but may also include: </li></ul><ul><li>Threats </li></ul><ul><li>Sexual remarks and solicitations </li></ul><ul><li>Compromising photos </li></ul><ul><li>Hate speech/racist remarks </li></ul><ul><li>Subject of ridicule in forums </li></ul><ul><li>Posting false statements gossip as fact </li></ul><ul><li>Cyberbullies may: </li></ul><ul><li>Disclose victims' personal data on websites/forums </li></ul><ul><li>Pose as victim (ID theft?) </li></ul><ul><li>Send threatening/harassing emails and IMs </li></ul><ul><li>Post rumors or gossip </li></ul><ul><li>Instigate others to gang up on target </li></ul>PD Pandora Internet Safety <ul><li>Same old bully, new technology </li></ul><ul><li>Cyberbullying is… </li></ul><ul><li>Important to remember: though the use of sexual remarks and threats are sometimes present in cyberbullying, it is not the same as sexual harassment and does not necessarily involve sexual predators… </li></ul>
  17. 17. THE THREATS (V) <ul><li>Electronic bullying takes place: </li></ul><ul><li>on social networks </li></ul><ul><li>in chat rooms </li></ul><ul><li>in forums </li></ul><ul><li>through Instant Messenger </li></ul><ul><li>on YouTube </li></ul><ul><li>Offline: text messaging on mobile phones </li></ul>PD Pandora Internet Safety <ul><li>Same old bully, new technology </li></ul><ul><li>Cyberbullying exists where? </li></ul><ul><ul><li>Important to remember: cyberbullying is bullying between minors! When an adult (over 18 years of age) is involved, it is considered cyber-stalking and cyber-harassment. </li></ul></ul>
  18. 18. THE THREATS (VI) <ul><li> Same bully, different technology </li></ul><ul><li>Cyberbullying Statistics: </li></ul><ul><li>Nearly 75% of kids have been bullied in the past year </li></ul><ul><li>Only 1 in 10 reported such cyberbullying to parents/adults </li></ul><ul><li>41% of teenagers report between 1 and 3 online bullying incidents over the course of a year </li></ul><ul><li>13% reported 4 to 6 incidents </li></ul><ul><li>19% reported 7 or more incidents </li></ul><ul><li>The most common reason for not telling an adult, cited by half the bullied participants, was that teens believe they &quot;need to learn to deal with it&quot; </li></ul><ul><li>31% reported that they do not tell because they are concerned their parents might restrict their Internet access </li></ul><ul><li>51% report the bullying was done by schoolmates; 43% said by someone they knew only online; 20% said someone they knew, but who was not from school </li></ul><ul><li>The most prevalent forms of bullying online and in school involved name-calling or insults </li></ul><ul><li>Password theft was the next most common cyberbullying tactic. Also includes: threats, sending embarrassing pictures, sharing private information, spreading rumors </li></ul>PD Pandora Internet Safety
  19. 19. THE THREATS (VII) <ul><li>“ Sexting ” </li></ul><ul><li>The new dangerous, illegal and foolish phenomenon </li></ul><ul><li>Definition: the act of teenagers sending naked photos of themselves to significant others, friends, and sometimes just mere casual acquaintances, via cell phone text messaging. These messages are sent, received and forwarded on a daily basis across the nation. </li></ul><ul><li>Dangerous: </li></ul><ul><li>Once that digital image is created, though it may have been intended to live on only a cell phone and shared with only one person, it is inevitable that image will make its way to a computer, the internet, and then the world. </li></ul><ul><li>Bottom line: it’s illegal, it’s dangerous… and it’s foolish! </li></ul>PD Pandora Internet Safety <ul><li>Illegal: </li></ul><ul><li>In the eyes of the law, sexting = a form of child pornography </li></ul><ul><li>Several states have brought child porn charges upon teenagers who are taking and distributing such pictures </li></ul><ul><li> Reputations destroyed  Cyberbullying results  Reason for suicide </li></ul>
  20. 20. THE THREATS (VIII) <ul><li>“ Sexting” Statistics: </li></ul><ul><li>Statistics from a 2008 survey of 653 teens (age 13-19) commissioned by The National Campaign to Prevent Teen and Unplanned Pregnancy: </li></ul><ul><li>20% of teens (1 in 5) have electronically sent/posted nude or seminude pictures or videos of themselves; breakdown: 22-percent of teen girls, 18-percent of teen boys and 11-percent of ‘young teen girls’ (age 13-16). </li></ul><ul><li>39% of teens have sent sexually suggestive messages (text, email, IM) to another (37% of teen girls, 40% of teen boys); 48-percent of teens report having received such messages </li></ul><ul><li>71% of teen girls and 67% of teen guys who have sent or posted sexually suggestive content have sent/posted this content to a boyfriend/girlfriend; 21% of teen girls and 39% of teen boys say they have sent such content to someone they wanted to date or “hook up” with. </li></ul><ul><li>15% of teens who have sent or posted nude/seminude images of themselves say they have done so to someone they only knew online. </li></ul><ul><li>75% of teens and 71% of young adults say sending sexually suggestive content “can have serious negative consequences.” Yet, 39% of teens and 59% of young adults have sent or posted sexually suggestive emails or text messages–and 20% of teens and 33% of young adults have sent/posted nude or semi-nude images of themselves. </li></ul><ul><li>38% of teen girls and 39% of teen boys have had sexually suggestive text messages or emails– originally meant for someone else–shared with them; 25% of teen girls and 33% of teen boys say they have had nude or semi-nude images–originally meant for someone else–shared with them. </li></ul>PD Pandora Internet Safety
  21. 21. THE THREATS (IX) <ul><li>P2P - a.k.a. peer-to-peer file sharing: </li></ul><ul><li>Utilizes a dedicated program that shares files between personal computers over the Internet. This is accomplished through permitted access to each individual computer, usually limited to specified folders. Examples: </li></ul><ul><li> BitTorrent  Limewire  BearShare </li></ul>PD Pandora Internet Safety Other Internet Activities and Their Associated Threats To Know About <ul><li>While P2P can be fun, there are many dangers and risks associated: </li></ul><ul><li>Viruses, keyloggers and other threats that compromise your PC </li></ul><ul><li>Copyright infringement for music and movies </li></ul><ul><li>Files laced with pornography, child pornography </li></ul><ul><li>Hackers can retrieve personal information </li></ul>
  22. 22. THE THREATS (X) <ul><li>Online Gaming: </li></ul><ul><li>Huge with teen boys </li></ul><ul><li>Portal for bullying and predators </li></ul><ul><li>Addiction to video games </li></ul><ul><li>Gambling: </li></ul><ul><li>Very easy for a minor to get involved </li></ul><ul><li>Serious addiction </li></ul><ul><li>Occasional cyber-predator </li></ul><ul><li>Parental exposure through credit card usage on non-secure, un-trusted sites can lead to ID theft!!! </li></ul>PD Pandora Internet Safety Other Internet Activities and Their Associated Threats To Know About
  23. 23. THE THREATS (XI) <ul><li>Trust & Misinformation: </li></ul><ul><li>“ You can’t trust everything you read online” </li></ul><ul><li>Misinformation can appear in many ways and pose threats on many levels: </li></ul><ul><li>Personal opinion can be presented as fact </li></ul><ul><li>Scam websites sell bogus products </li></ul><ul><li>Commercial websites use every trick in the book to get you to buy their product </li></ul><ul><li>Spoof sites can mislead consumers </li></ul><ul><li>Hate sites spread malicious information </li></ul><ul><li>Email hoaxes </li></ul><ul><li>Phishing scams </li></ul>PD Pandora Internet Safety Other Internet Activities and Their Associated Threats To Know About <ul><li>While many of these may not be a threat to your personal safety, intellectual safety and the development of a young mind can be harmed if too much misinformation makes its way through… </li></ul>
  24. 24. THE THREATS (XII) <ul><li>Masquerading as: </li></ul><ul><li>Social Networking websites (YouTube, Facebook, MySpace) </li></ul><ul><li>Auction sites (eBay) </li></ul><ul><li>Banks (Bank of America, Chase) </li></ul><ul><li>Online payment processors (PayPal) </li></ul><ul><li>IT Administrators (Yahoo, ISPs, corporate) </li></ul><ul><li>More on Phishing: </li></ul><ul><li>Carried out via email and Instant Messenger </li></ul><ul><li>Hard to detect </li></ul><ul><li>Effects range from denial of access to email to substantial financial loss </li></ul><ul><li>Usually leads to forms of ID theft ranging from being locked out of your own accounts to fake accounts and ruined credit. </li></ul>PD Pandora Internet Safety Other Internet Activities and Their Associated Threats To Know About Phishing & Identity Theft The criminally fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication
  25. 25. THE THREATS (XIII) <ul><li>Plagiarism: </li></ul><ul><li>Using someone’s work and passing it off as your own </li></ul><ul><li>Only takes a few simple clicks </li></ul><ul><li>Consequences of suspension and expulsion </li></ul><ul><li>BIG difference between “doing research” and “cutting & pasting” </li></ul><ul><li>Teachers and schools need to be more vigilant in catching and punishing </li></ul><ul><li>“ Paper mills” – Papers written by students being sold to other students </li></ul><ul><li>Software available to help detect plagiarism </li></ul><ul><li>“ Google” is a teacher’s best weapon </li></ul>PD Pandora Internet Safety Other Internet Activities and Their Associated Threats To Know About
  26. 26. PART II: SOLUTIONS WHAT CAN YOU DO? Educate. Discuss. Protect.
  27. 27. EDUCATE PD Pandora Internet Safety 143: _____ AISI: _____ ASL: _____ BF: _____ BRB: _____ BTW: _____ F2F: _____ GF: _____ IDK: _____ IMO: _____ INDB: _____ IRL: _____ ISS: _____ JK: _____ K: _____ KIT: _____ LDR: _____ LMIRL: _____ LOL: _____ M/F: _____ N/P: _____ NTK: _____ OMFG: _____ OMG: _____ OTP: _____ P911: parent alert! PAL: _____ PAW: _____ PDA: _____ PIR: _____ POS: parent over shoulder PPL: _____ S2R: _____ STFU: _____ ROFL: _____ THX: _____ TTYL: _____ TY: _____ WT? _____ WTG: _____ WTGP: _____ Learn about the web and web culture… 95% of parents do not recognize common chat room lingo! Common Net Language:
  28. 28. EDUCATE PD Pandora Internet Safety 143: I love you AISI: as I see it ASL: age/sex/location BF: boyfriend BRB: be right back BTW: by the way F2F: face to face GF: girlfriend IDK: I don’t know IMO: in my opinion INDB: it's no big deal IRL: in real life ISS: I said so JK: just kidding K: okay KIT: keep in touch LDR: long distance relationship LMIRL: let’s meet in real life LOL: laughing out loud M/F: male or female N/P: no problem NTK: nice to know OMFG: oh my f***** god OMG: oh my god OTP: on the phone P911: parent alert PAL: parents are listening PAW: parents are watching PDA: public display of affection PIR: parent(s) in room POS: parent(s) over shoulder PPL: people S2R: send to receive STFU: shut the f*** up ROFL: rolling on floor laughing THX: thanks TTYL: talk to you later TY: thank you WT? what time WTG: way to go WTGP: want to go private? Learn about the web and web culture… 95% of parents do not recognize common chat room lingo! Common Net Language:
  29. 29. EDUCATE (II) <ul><li>Visit websites and join communities! </li></ul><ul><li>Good websites to visit: </li></ul><ul><li>http://www.cyberbullying.us </li></ul><ul><li>http://www.BulliesBeGone.com </li></ul><ul><li>http://www.StopInternetPredators.org </li></ul><ul><li>http://www.ProtectChildrenOnline.org </li></ul><ul><li>http://www.TheCyberHoodWatch.com </li></ul><ul><li>http://ResponsibleCyberCitizen.com </li></ul><ul><li>http://www.PluggedInParents.com </li></ul><ul><li>http://theAlertParent.blogspot.com </li></ul><ul><li>http://TeenCheckup.com </li></ul><ul><li>http://www.WebSafeKid.com </li></ul><ul><li>http://www.NetSmartz.org </li></ul><ul><li>http://www.InternetSafeChildren.com </li></ul>PD Pandora Internet Safety Learn about the web and web culture…
  30. 30. EDUCATE (III) <ul><li>Learn the LAW! </li></ul><ul><li>In [ YOUR STATE ]: </li></ul><ul><ul><ul><li>[ In this area, please highlight local and state laws and statues for cyberbullying and Internet predator convictions. Keep the information here short and bulleted. You can expand on the information in the script and in your dialogue. We are available to help you with the research if given at least 2 weeks notice from presentation date. ] </li></ul></ul></ul><ul><li>Cyber Tipline: 1-800-843-5678 (THE LOST) </li></ul><ul><li>OR www.cybertipline.com </li></ul>PD Pandora Internet Safety Learn about the web and web culture…
  31. 31. EDUCATE (IV) <ul><li>“ I never saw it coming…” </li></ul><ul><li>Warning Signs </li></ul><ul><li>Your child may be a victim of cyberbullying if he or she… </li></ul><ul><li>Unexpectedly stops using the computer all together </li></ul><ul><li>Appears nervous or jumpy when an instant message, text message, or email appears </li></ul><ul><li>Appears uneasy about going to school or outside in general </li></ul><ul><li>Appears to be angry, depressed, or frustrated after using the computer </li></ul><ul><li>Avoids discussions about the computer </li></ul><ul><li>Becomes abnormally withdrawn </li></ul><ul><li>Exhibits symptoms of depression, insomnia, and lack of appetite </li></ul><ul><li>Develops unexplained headaches, stomach aches </li></ul><ul><li>Starts giving excuses to not go to school/increase in absenteeism </li></ul><ul><li>Has an unexplained drop in grades/sudden lack of interest in school </li></ul><ul><li>Shows increased avoidance of social events/isolation from peers </li></ul>PD Pandora Internet Safety Learn about the web and web culture…
  32. 32. EDUCATE (V) PD Pandora Internet Safety Learn about the web and web culture… <ul><li>“ I never saw it coming…” (part II) </li></ul><ul><li>Warning Signs </li></ul><ul><li>What you may notice if your child is in contact with or a victim of an Internet predator… </li></ul><ul><li>Spending a large amount of time on-line, especially late at night, in a secretive manner </li></ul><ul><li>Pornography on your child's computer </li></ul><ul><li>Phone calls to/from people (particularly men) you don't know </li></ul><ul><li>Mail, gifts, or packages from someone you don't know </li></ul><ul><li>Turns computer monitor off/ quickly changes screen </li></ul><ul><li>Frequent deletion of computer “histories” </li></ul><ul><li>Many new, different “buddies” </li></ul>
  33. 33. EDUCATE (VI) <ul><li>If your child is on MySpace and/or Facebook… </li></ul><ul><li>YOU SHOULD BE ON MYSPACE and/or FACEBOOK!! </li></ul><ul><li>93% of all Americans between 12 and 17 use the Internet </li></ul><ul><li>As of 2007, 71% of teenagers had established online profiles; this number is probably closer to 85%-90% today </li></ul><ul><li>Be on the lookout for multiple profiles! </li></ul>PD Pandora Internet Safety Learn about the web and web culture…
  34. 34. <ul><li>Stranger Danger </li></ul><ul><li>The Golden Rule: DON’T TALK TO STRANGERS (online)! </li></ul><ul><li>Every day is Halloween </li></ul><ul><li>Never meet online friends in person </li></ul><ul><li>Ignore harassing or rude comments on social network profiles; delete any unwanted messages or friends who leave inappropriate comments </li></ul><ul><li>Go to mom and dad if uncomfortable or harassment continues </li></ul><ul><li>Anonymity </li></ul>DISCUSS PD Pandora Internet Safety Talk to your kids!!
  35. 35. DISCUSS (II) <ul><li>DON’T REVEAL PERSONAL INFORMATION TO ANYONE </li></ul><ul><li>From the mind of a Teenager: </li></ul><ul><ul><li>A majority of teens (58%) don't think posting photos or other personal info on social networking sites is unsafe. </li></ul></ul><ul><ul><li>About half (49%) are not concerned that posting personal info online might negatively affect their future. </li></ul></ul><ul><ul><li>Teens readily post personal info online. 64% post photos or videos of themselves, while more than half (58%) post info about where they live. </li></ul></ul><ul><ul><li>Females are far more likely than male teens to post personal photos or videos of themselves (70% vs. 58%). </li></ul></ul>PD Pandora Internet Safety Talk to your kids!!
  36. 36. DISCUSS (III) <ul><li>Safe Posting Tips </li></ul><ul><li>The golden rule: Never post personal information! </li></ul><ul><li>Smart and unidentifiable online profilescreen name Good: firefleye; Bad: LadyBobcat34 </li></ul><ul><li>Never share passwords with anyone! </li></ul><ul><li>Only add real-life friends to “friends” and “buddies” lists </li></ul><ul><li>Think before posting photos </li></ul><ul><li>“ Good Friend” posting </li></ul><ul><li>Not your bulletin board </li></ul><ul><li>Remember: for all the world to see! </li></ul><ul><li>Essential Step: Set social network profiles to private! </li></ul><ul><li>Check the privacy settings of the social networking sites that your children use </li></ul><ul><li>Set the profile so that people can only be added as a friend if you approve it. </li></ul><ul><li>Set it so that people can only view your child’s profile if you have approved them as a friend. </li></ul>PD Pandora Internet Safety Talk to your kids!!
  37. 37. DISCUSS (IV) <ul><li>NO BULLIES! </li></ul><ul><li>“ play nice on the web” </li></ul><ul><li>Treat thy neighbor/“friend”/”buddy” as thyself </li></ul><ul><li>Explain consequences of bullying </li></ul><ul><li>Anonymity = cowardly </li></ul><ul><li>Empower your children to stop bullying! </li></ul><ul><li>www. BeenBulliedOnline .com </li></ul>PD Pandora Internet Safety Talk to your kids!!
  38. 38. DISCUSS (V) <ul><li>Parental Help </li></ul><ul><li>Remind your kids: </li></ul><ul><li>It’s okay to talk to you </li></ul><ul><li>Reassurance of help and protection, not punishment </li></ul><ul><li>Offer comfort and warmth </li></ul><ul><li>Keep your cool/be the cool-but-firm parent </li></ul>PD Pandora Internet Safety Talk to your kids!!
  39. 39. PROTECT <ul><li>Two arenas: </li></ul><ul><li>Physical </li></ul><ul><li>The PC </li></ul><ul><li>www. TheCyberHoodWatch .com </li></ul>PD Pandora Internet Safety Safeguard your PC and monitor your child’s Internet activity
  40. 40. PROTECT (II) <ul><li>Things you can physically do to safeguard your children: </li></ul><ul><li>Get the computer out of the kids’ rooms! </li></ul><ul><li>Walk/peer in frequently </li></ul><ul><li>SET RULES! ( Only 23% of parents have computer usage rules! ) </li></ul><ul><li>Safe computing contract </li></ul><ul><ul><ul><li>www. TheCyberHoodWatch .com </li></ul></ul></ul>PD Pandora Internet Safety Safeguard your PC and monitor your child’s Internet activity
  41. 41. PROTECT (III) <ul><li>Titles to consider: </li></ul><ul><li>McAfee </li></ul><ul><li>Trend Micro </li></ul><ul><li>Kaspersky </li></ul><ul><li>Webroot </li></ul><ul><li>BitDefender </li></ul><ul><li>Spyware Nuker </li></ul><ul><li>Key ingredients: </li></ul><ul><li>Antivirus </li></ul><ul><li>Anti-Spyware </li></ul><ul><li>Firewall </li></ul><ul><li>Good tech support </li></ul><ul><li>Frequent automatic updates </li></ul><ul><li>Email protection </li></ul><ul><li>Wireless security </li></ul><ul><li>Filtering and parental controls </li></ul>PD Pandora Internet Safety Safeguard your PC and monitor your child’s Internet activity Antivirus and Internet protection Robust, up-to-date Antivirus and Internet Security
  42. 42. PROTECT (IV) <ul><li>Filters and Parental Controls </li></ul><ul><li>53% of parents say they have filtering software on the computer their child uses at home </li></ul><ul><li>Windows and Internet Explorer have built in controls and privacy settings </li></ul><ul><li>Set limits on game playing, web browsing, and overall computer use. </li></ul><ul><li>Windows Vista: Control Panel  “Parental Controls” (keep family member accounts separate!) OR </li></ul><ul><li>Internet Explorer: Tools Menu  “Options”  Content” tab  “Parental Controls” </li></ul><ul><li>Remember: Internet Security programs have basic filters and controls </li></ul>PD Pandora Internet Safety Safeguard your PC and monitor your child’s Internet activity
  43. 43. PROTECT (V) <ul><li>Know where your child goes online and what they do: </li></ul><ul><li>Only 65% of parents report checking up on their teens after they go online </li></ul><ul><li>65% of high school students admit to unsafe, inappropriate, or illegal activities online </li></ul><ul><li>38% of high school students admit to hiding their online activities from their parents </li></ul><ul><li>Reasons to Monitor: </li></ul><ul><li>In contact with a predator </li></ul><ul><li>Victim of a cyberbully </li></ul><ul><li>Might be a cyberbully </li></ul><ul><li>Addicted to pornography, gambling </li></ul><ul><li>Illegal downloading of copyrighted material </li></ul><ul><li>Too much time aimlessly browsing, playing games </li></ul><ul><li>Sexting </li></ul>PD Pandora Internet Safety MONITOR YOUR CHILD’S INTERNET ACTIVITY
  44. 44. PROTECT (VI) <ul><li>Consider this: </li></ul><ul><li>83% of parents say there is no excuse for not knowing enough about the Internet to protect your kids or teens. </li></ul><ul><li>88% of parents think it's more important to know what their kids are doing online than to respect their kids' privacy. </li></ul><ul><li>Yet only 45% of parents have monitoring software that records what users do online. </li></ul>PD Pandora Internet Safety MONITOR YOUR CHILD’S INTERNET ACTIVITY You can’t be over their shoulder and with them 100% of the time “ Trust but verify”
  45. 45. PROTECT (VII) <ul><li>Monitoring Software: </li></ul><ul><li>Gives the extra parental edge </li></ul><ul><li>Verifies activity </li></ul><ul><li>No reason for you to not know </li></ul><ul><li>21st century parenting </li></ul><ul><li>Tell your kids you are monitoring </li></ul><ul><li>Your house, your computer, your rules! </li></ul><ul><li>BIG difference between “spying” and being a responsible parent </li></ul><ul><li>Look for threats, not for gossip </li></ul><ul><li>PC Pandora monitoring software can and does: </li></ul><ul><li>Record snapshots of screen content </li></ul><ul><li>Logs: IM chats, emails, files traded, websites visited, programs used, webcam activity, Internet search queries </li></ul><ul><li>Feature parental controls (web filters and program blocks) </li></ul><ul><li>Email updates of activity </li></ul>PD Pandora Internet Safety MONITOR YOUR CHILD’S INTERNET ACTIVITY
  46. 46. A SHORT SUMMARY & REVIEW <ul><li>Step 1: Educate </li></ul><ul><li>Know the web </li></ul><ul><li>Know the hang-outs </li></ul><ul><li>Understand the lingo </li></ul><ul><li>Learn about social networking </li></ul><ul><li>Recognize threats </li></ul><ul><li>Know the law </li></ul><ul><li>Step 3: Protect </li></ul><ul><li>Powerful Internet security and protection </li></ul><ul><li>Computer in an open area </li></ul><ul><li>Frequent check-ups </li></ul><ul><li>Activate parental controls and filters </li></ul><ul><li>Monitoring software ( PC Pandora ) </li></ul>PD Pandora Internet Safety <ul><li>Step 2: Discuss </li></ul><ul><li>“ Stranger danger” </li></ul><ul><li>Don’t share personal info </li></ul><ul><li>Safe screen names and secure passwords </li></ul><ul><li>Be a responsible “cyber citizen” </li></ul><ul><li>Problem? See: Mom and Dad </li></ul>
  47. 47. Closing Remarks & Questions THANK YOU FOR COMING! www. TheCyberHoodWatch .com Special discount code: “ cyberhood ” Don’t forget to take home your ParentPacket!
  48. 48. www. TheCyberHoodWatch .com special discount code: “ cyberhood ” PD Pandora Internet Safety