SlideShare a Scribd company logo
1 of 2
FACTS:
                                           Works Cited
                                 Dowshen, Steven. "Kids Health."
                                        Internet Safety. Nemours, Jun
•   1 in 7 children have                2011. Web. 24 May 2012.
    received indecent            Leavitt, Jacalyn. "Statistics: Kids
    propositions while online.          Online are in Danger."
                                        Internet Keep Safe Coalition.
•   51% of parents don’t have
                                        N.p., 2012. Web. 24 May
    or don’t know if they have
                                        2012.
    programs to track where
                                 "Parental Controls." Windows. Microsoft
    their teens go online.
                                        Corp., 2012. Web. 24 May
                                        2012.
•   70% of children have
    encountered pornography
                                                                            Cyber Safety:
    on the Web accidentally.
                                                                           Information You
                                         Phone: 910.755.1234                Should Know
                                          Fax: 910.755.5555
                                                                               Jessica McCall
                                          51 Benton Road SE
                                           Supply, NC 28462                    EDN 303-800
INTERNET SAFETY LAWS                        VIRUS PROTECTION                          PARENTAL CONTROLS

                                          A virus is a computer program, usually
                                          hidden, that performs malicious tasks.
                                          Some common viruses are:
                                              •    Trojan Horse
                                              •    Worms
                                              •    Rootkit
                                              •    Macro


                                          Although there are many types of
The Children's Online Privacy             viruses, there are antivirus programs       As a parent, it is your responsibility to
Protection Act (COPPA) was designed       designed to keep your computer              keep your child protected. Not only do
to prevent children's personal            running. Some programs are:                 parental controls prevent your child
information from being retrieved              •    McAfee VirusScan                   from viewing obscene material, they can
without parental consent. The COPPA                                                   also limit the time your child has on the
                                              •    avast!
prohibits websites, such as games, from                                               computer. These controls provide
                                              •    Norton AntiVirus
requiring too much personal                                                           reports of online activity and help
information.                                                                          parents to know who their children talk
                                          These programs are not guaranteed to
                                                                                      to.
                                          keep your computer safe. Therefore, it is
                                          important to monitor your child's
                                          internet activities at all times.

More Related Content

What's hot

Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
Joe Drumgoole
 
Bct 2 01 Terms
Bct 2 01 TermsBct 2 01 Terms
Bct 2 01 Terms
02jgodsey
 
Digital Parenting Presentation
Digital Parenting PresentationDigital Parenting Presentation
Digital Parenting Presentation
Anne Arriaga
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
Vinayak Hegde
 

What's hot (20)

HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Abso lutely!
Abso lutely!Abso lutely!
Abso lutely!
 
Signs your PC has a Virus
Signs your PC has a VirusSigns your PC has a Virus
Signs your PC has a Virus
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
500
500500
500
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Bct 2 01 Terms
Bct 2 01 TermsBct 2 01 Terms
Bct 2 01 Terms
 
Protect
ProtectProtect
Protect
 
Digital Parenting Presentation
Digital Parenting PresentationDigital Parenting Presentation
Digital Parenting Presentation
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Security Awareness - Defined, Managed and Measured
Security Awareness - Defined, Managed and MeasuredSecurity Awareness - Defined, Managed and Measured
Security Awareness - Defined, Managed and Measured
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber Threats
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 

Similar to Brochure

Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
Jason Weaver
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Think like a hacker for better security awareness
Think like a hacker for better security awarenessThink like a hacker for better security awareness
Think like a hacker for better security awareness
COMSATS
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
Saskia1234
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
emilyensign
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 

Similar to Brochure (20)

Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Think like a hacker for better security awareness
Think like a hacker for better security awarenessThink like a hacker for better security awareness
Think like a hacker for better security awareness
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe Online
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
RATs
RATsRATs
RATs
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 

Brochure

  • 1. FACTS: Works Cited Dowshen, Steven. "Kids Health." Internet Safety. Nemours, Jun • 1 in 7 children have 2011. Web. 24 May 2012. received indecent Leavitt, Jacalyn. "Statistics: Kids propositions while online. Online are in Danger." Internet Keep Safe Coalition. • 51% of parents don’t have N.p., 2012. Web. 24 May or don’t know if they have 2012. programs to track where "Parental Controls." Windows. Microsoft their teens go online. Corp., 2012. Web. 24 May 2012. • 70% of children have encountered pornography Cyber Safety: on the Web accidentally. Information You Phone: 910.755.1234 Should Know Fax: 910.755.5555 Jessica McCall 51 Benton Road SE Supply, NC 28462 EDN 303-800
  • 2. INTERNET SAFETY LAWS VIRUS PROTECTION PARENTAL CONTROLS A virus is a computer program, usually hidden, that performs malicious tasks. Some common viruses are: • Trojan Horse • Worms • Rootkit • Macro Although there are many types of The Children's Online Privacy viruses, there are antivirus programs As a parent, it is your responsibility to Protection Act (COPPA) was designed designed to keep your computer keep your child protected. Not only do to prevent children's personal running. Some programs are: parental controls prevent your child information from being retrieved • McAfee VirusScan from viewing obscene material, they can without parental consent. The COPPA also limit the time your child has on the • avast! prohibits websites, such as games, from computer. These controls provide • Norton AntiVirus requiring too much personal reports of online activity and help information. parents to know who their children talk These programs are not guaranteed to to. keep your computer safe. Therefore, it is important to monitor your child's internet activities at all times.