SlideShare a Scribd company logo
1 of 33
Download to read offline
© 2016 Quick Heal Technologies Ltd.
WEBINAR
6 Tips to ProtectYour
Kids from
Cyberbullying
© 2016 Quick Heal Technologies Ltd.
Did You Know?
India ranks 3rd on
Global
Cyberbullying
List.[1]
[1]. http://www.endcyberbullying.org/india-ranks-third-on-global-cyber-bullying-list/
[2] Image credit: dailyparent.com
[2]
© 2016 Quick Heal Technologies Ltd.
Topics of
DISCUSSION
© 2016 Quick Heal Technologies Ltd.
What is
cyberbullying?
#1.
© 2016 Quick Heal Technologies Ltd.
Effects of
cyberbullying
#2.
© 2016 Quick Heal Technologies Ltd.
Tips for parents to
protect their kids
from cyberbullying
#3.
© 2016 Quick Heal Technologies Ltd.
How Quick Heal
helps
#4.
© 2016 Quick Heal Technologies Ltd.
What is
Cyberbullying?
© 2016 Quick Heal Technologies Ltd.
Definition:
Cyberbullying is defined as “the use of
electronic communication to bully a person,
typically by sending messages of an
intimidating or threatening nature.”
© 2016 Quick Heal Technologies Ltd.
In other words,
cyberbullying can be…
© 2016 Quick Heal Technologies Ltd.
Harassment
Image credit: http://cybersafetycampaign2015.blogspot.in/2015/07/5-different-types-of-cyberbullying.html
- involves the bully sending offensive and
malicious messages.
© 2016 Quick Heal Technologies Ltd.
Flaming
Image credit: http://www.lifo.gr/now/society/76070
- bullying the victim in front of others by using
harsh languages.
© 2016 Quick Heal Technologies Ltd.
Exclusion
Image credit: https://annablogia.wordpress.com/2013/03/01/belong-or-perish/
- leaving out someone from a group.
© 2016 Quick Heal Technologies Ltd.
Masquerading
- harassing the victim by using a fake identity.
© 2016 Quick Heal Technologies Ltd.
Effects of
Cyberbullying
© 2016 Quick Heal Technologies Ltd.
Cyberbullying can have many negative implications on
the victim. It not only affects the academic career of
children but also adversely impacts their physical,
social, and mental well-being.
© 2016 Quick Heal Technologies Ltd.
Cyberbullying can cause…
© 2016 Quick Heal Technologies Ltd.
Low self-esteem
Withdrawal from family and
friends
Depression,
Anger,
Feeling of loneliness…
Drop in grades and
performance Use of
drugs
© 2016 Quick Heal Technologies Ltd.
What Can Parents do to protect
their kids from
Cyberbullying?
© 2016 Quick Heal Technologies Ltd.
Get ‘INVOLVED’
TIP #1.
in what your kids do on the Internet.
© 2016 Quick Heal Technologies Ltd.
LISTEN
TIP #2.
to their distress signals.
© 2016 Quick Heal Technologies Ltd.
TIP #3.
Don’t BLAME
them for other’s behavior.
© 2016 Quick Heal Technologies Ltd.
EDUCATE
What is Cyberbullying?
Why is it dangerous?
What can be done?
TIP #4.
them about cyberbullying.
© 2016 Quick Heal Technologies Ltd.
TIP #5.
ENCOURAGE
them to find better and safer things to indulge in.
© 2016 Quick Heal Technologies Ltd.
TIP #6.
Collect EVIDENCE
against the bully.
© 2016 Quick Heal Technologies Ltd.
How Quick Heal
helps
© 2016 Quick Heal Technologies Ltd.
Quick Heal has always taken a strong stance against
cyberbullying. Its Parental Control feature is one of the
simple ways with which parents can ensure that their
kids use the Internet constructively without getting
exposed to any of its dangers like cyberbullying or
getting connected to dangerous people.
© 2016 Quick Heal Technologies Ltd.
With Quick Heal Parental Control, parents can:
Block inappropriate website
categories such as chat, social
media, dating, violence, adult, etc.
© 2016 Quick Heal Technologies Ltd.
With Quick Heal Parental Control, parents can:
Block specific sites which you may
feel are not right for your children.
© 2016 Quick Heal Technologies Ltd.
With Quick Heal Parental Control, parents can:
Schedule fixed days and timings
when your kids can access the
Internet at home.
© 2016 Quick Heal Technologies Ltd.
We also have a Facebook page where we share
useful tips and updates about computer security
and especially Internet Safety for kids and
teenagers. It can be visited at:
http://bit.ly/QHSafe
© 2016 Quick Heal Technologies Ltd.
Write to us at
CorporateCommunications@quickheal.co.in
Follow us on
Facebook: www.facebook.com/quickhealav
Twitter: www.twitter.com/quickheal
Google Plus: bit.ly/QuickHealGooglePlus
YouTube: www.youtube.com/quickheal
SlideShare: http://www.slideshare.net/QuickHealPPTs
Visit us
Website: www.quickheal.com
Official Blog: blogs.quickheal.com
Got any queries regarding this
webinar?
© 2016 Quick Heal Technologies Ltd.
Content sources:
https://www.legalshield.com/blog/8-tips-protect-your-kids-cyberbullying
http://www.crosswalk.com/family/parenting/teens/how-to-protect-your-children-from-cyberbullying.html
http://familyinternet.about.com/od/computingsafetyprivacy/tp/stop_cyberbullies.htm
www.endcyberbullying.org/5-different-types-of-cyberbullying/
Thank You.

More Related Content

Viewers also liked

Viewers also liked (6)

Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 

Similar to 6 Tips to Protect Your Kids from Cyberbullying

54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
blondellchancy
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
BHANU281672
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
briancrawford30935
 

Similar to 6 Tips to Protect Your Kids from Cyberbullying (20)

INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )INTRODUCTION TO ONLINE SAFETY ( MAJORS )
INTRODUCTION TO ONLINE SAFETY ( MAJORS )
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 
5 Essential Security Tips for Startups
5 Essential Security Tips for Startups5 Essential Security Tips for Startups
5 Essential Security Tips for Startups
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 
safeguard children from cyber bullying.pdf
safeguard children from cyber bullying.pdfsafeguard children from cyber bullying.pdf
safeguard children from cyber bullying.pdf
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Eskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ictEskwela module 3_responsible use of ict
Eskwela module 3_responsible use of ict
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 
Connecticut 2017 best practices in social media
Connecticut 2017 best practices in social mediaConnecticut 2017 best practices in social media
Connecticut 2017 best practices in social media
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
1st annual-social-media-risk-index
1st annual-social-media-risk-index1st annual-social-media-risk-index
1st annual-social-media-risk-index
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 
Project Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docxProject Plan CreationInclude the following components in an M.docx
Project Plan CreationInclude the following components in an M.docx
 

More from Quick Heal Technologies Ltd.

More from Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 
Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016Event S-Mart Milan, Italy - May 2016
Event S-Mart Milan, Italy - May 2016
 
Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016Event S-Mart 2016 Florence, Italy - April 2016
Event S-Mart 2016 Florence, Italy - April 2016
 

Recently uploaded

Recently uploaded (20)

WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration ToolingWSO2Con2024 - Low-Code Integration Tooling
WSO2Con2024 - Low-Code Integration Tooling
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Evolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI EraEvolving Data Governance for the Real-time Streaming and AI Era
Evolving Data Governance for the Real-time Streaming and AI Era
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid EnvironmentsWSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid Environments
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
 
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million PeopleWSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdfAzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
 

6 Tips to Protect Your Kids from Cyberbullying

  • 1. © 2016 Quick Heal Technologies Ltd. WEBINAR 6 Tips to ProtectYour Kids from Cyberbullying
  • 2. © 2016 Quick Heal Technologies Ltd. Did You Know? India ranks 3rd on Global Cyberbullying List.[1] [1]. http://www.endcyberbullying.org/india-ranks-third-on-global-cyber-bullying-list/ [2] Image credit: dailyparent.com [2]
  • 3. © 2016 Quick Heal Technologies Ltd. Topics of DISCUSSION
  • 4. © 2016 Quick Heal Technologies Ltd. What is cyberbullying? #1.
  • 5. © 2016 Quick Heal Technologies Ltd. Effects of cyberbullying #2.
  • 6. © 2016 Quick Heal Technologies Ltd. Tips for parents to protect their kids from cyberbullying #3.
  • 7. © 2016 Quick Heal Technologies Ltd. How Quick Heal helps #4.
  • 8. © 2016 Quick Heal Technologies Ltd. What is Cyberbullying?
  • 9. © 2016 Quick Heal Technologies Ltd. Definition: Cyberbullying is defined as “the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.”
  • 10. © 2016 Quick Heal Technologies Ltd. In other words, cyberbullying can be…
  • 11. © 2016 Quick Heal Technologies Ltd. Harassment Image credit: http://cybersafetycampaign2015.blogspot.in/2015/07/5-different-types-of-cyberbullying.html - involves the bully sending offensive and malicious messages.
  • 12. © 2016 Quick Heal Technologies Ltd. Flaming Image credit: http://www.lifo.gr/now/society/76070 - bullying the victim in front of others by using harsh languages.
  • 13. © 2016 Quick Heal Technologies Ltd. Exclusion Image credit: https://annablogia.wordpress.com/2013/03/01/belong-or-perish/ - leaving out someone from a group.
  • 14. © 2016 Quick Heal Technologies Ltd. Masquerading - harassing the victim by using a fake identity.
  • 15. © 2016 Quick Heal Technologies Ltd. Effects of Cyberbullying
  • 16. © 2016 Quick Heal Technologies Ltd. Cyberbullying can have many negative implications on the victim. It not only affects the academic career of children but also adversely impacts their physical, social, and mental well-being.
  • 17. © 2016 Quick Heal Technologies Ltd. Cyberbullying can cause…
  • 18. © 2016 Quick Heal Technologies Ltd. Low self-esteem Withdrawal from family and friends Depression, Anger, Feeling of loneliness… Drop in grades and performance Use of drugs
  • 19. © 2016 Quick Heal Technologies Ltd. What Can Parents do to protect their kids from Cyberbullying?
  • 20. © 2016 Quick Heal Technologies Ltd. Get ‘INVOLVED’ TIP #1. in what your kids do on the Internet.
  • 21. © 2016 Quick Heal Technologies Ltd. LISTEN TIP #2. to their distress signals.
  • 22. © 2016 Quick Heal Technologies Ltd. TIP #3. Don’t BLAME them for other’s behavior.
  • 23. © 2016 Quick Heal Technologies Ltd. EDUCATE What is Cyberbullying? Why is it dangerous? What can be done? TIP #4. them about cyberbullying.
  • 24. © 2016 Quick Heal Technologies Ltd. TIP #5. ENCOURAGE them to find better and safer things to indulge in.
  • 25. © 2016 Quick Heal Technologies Ltd. TIP #6. Collect EVIDENCE against the bully.
  • 26. © 2016 Quick Heal Technologies Ltd. How Quick Heal helps
  • 27. © 2016 Quick Heal Technologies Ltd. Quick Heal has always taken a strong stance against cyberbullying. Its Parental Control feature is one of the simple ways with which parents can ensure that their kids use the Internet constructively without getting exposed to any of its dangers like cyberbullying or getting connected to dangerous people.
  • 28. © 2016 Quick Heal Technologies Ltd. With Quick Heal Parental Control, parents can: Block inappropriate website categories such as chat, social media, dating, violence, adult, etc.
  • 29. © 2016 Quick Heal Technologies Ltd. With Quick Heal Parental Control, parents can: Block specific sites which you may feel are not right for your children.
  • 30. © 2016 Quick Heal Technologies Ltd. With Quick Heal Parental Control, parents can: Schedule fixed days and timings when your kids can access the Internet at home.
  • 31. © 2016 Quick Heal Technologies Ltd. We also have a Facebook page where we share useful tips and updates about computer security and especially Internet Safety for kids and teenagers. It can be visited at: http://bit.ly/QHSafe
  • 32. © 2016 Quick Heal Technologies Ltd. Write to us at CorporateCommunications@quickheal.co.in Follow us on Facebook: www.facebook.com/quickhealav Twitter: www.twitter.com/quickheal Google Plus: bit.ly/QuickHealGooglePlus YouTube: www.youtube.com/quickheal SlideShare: http://www.slideshare.net/QuickHealPPTs Visit us Website: www.quickheal.com Official Blog: blogs.quickheal.com Got any queries regarding this webinar?
  • 33. © 2016 Quick Heal Technologies Ltd. Content sources: https://www.legalshield.com/blog/8-tips-protect-your-kids-cyberbullying http://www.crosswalk.com/family/parenting/teens/how-to-protect-your-children-from-cyberbullying.html http://familyinternet.about.com/od/computingsafetyprivacy/tp/stop_cyberbullies.htm www.endcyberbullying.org/5-different-types-of-cyberbullying/ Thank You.

Editor's Notes

  1. Harassment involves the bully sending offensive and malicious messages to an individual or a group and is often repeated multiple times. Cyberstalking is one form of harassment that involves continual threatening and rude messages, and can lead to physical harassment in the real, offline world.
  2. Flaming is similar to harassment, but it refers to an online fight exchanged via emails, instant messaging or chat rooms. It is a type of public bullying that often directs harsh languages, or images to a specific person.
  3. Exclusion is the act of intentionally singling out and leaving a person out from an online group such as chats and sites. The group then subsequently leave malicious comments and harass the one they singled out.
  4. Masquerading is a situation where a bully creates a fake identity to harass someone anonymously. In addition to creating a fake identity, the bully can impersonate someone else to send malicious messages to the victim.
  5. The effects of cyberbullying may not be noticeable at first, but the stress factor builds up over time. Many students experiencing cyber bullying feel alone and scared. In most instances, cyber bullying doesn’t start online, but in person. The situation then escalates. Some of the signs of cyber bullying could be: Not wanting to go to school A sharp drop in grades and performance Skipping school Sudden self-esteem issues Complaints of illnesses Use of alcohol or drugs Reluctance to let parents or other family members anywhere near their mobiles, laptops etc Friends disappearing or being excluded from social events Losing weight or changing appearance to try and fit in Fresh marks on the skin that could indicate self-harm and dressing differently such as wearing long sleeved clothes in the summer to hide any marks
  6. By Getting involved we mean join your kids in what they do in their world. Become their companion. One of the best ways to understand what your kids are doing online is to do it, too. Create a Facebook page and add your kids as "friends." It's no different than expecting to meet your kids friends and dates. You'll be able to see what your kids are posting and what type of response they may be getting. Besides, you might have fun as well.
  7. Half of any worldly problem can be solved only by listening about it. Children are made to let out signals when they are in distress. They may withdraw from family and friends, become increasingly angry, moody and sullen or start acting out. And, yes, this is normal teen behavior! Even so, these are all cries for help. It is important that parents pay attention to these signals as they arise because they may be signs that something bigger is going on. Speak to them, ask them what’s troubling them.
  8. Wounding a wounded never helps. Never blame your child for other’s behavior, regardless of how the situation originated. It is vital that your child feels safe at home from these attacks. Make it clear to your child that everything that is happening has to do with the bully’s issues, not with theirs. Try to make this attacks a positive experience for your relationship with your children. 
  9. You cannot fight an enemy without learning about them. Make sure your kids understand what cyberbullying is and why it’s dangerous. Ask them what they would do if they found themselves on the receiving end, and encourage them to think about how the victims might feel. Have your kids name some adults they could turn to for help and let them know that it’s OK if they don’t feel comfortable coming directly to you. The important thing is that they find someone who can support them and get any help they may need.
  10. Help your kids find safe things to do online and positive ways to express their identity and creativity. Rather than engaging in social networking sites, some kids might like designing video games, composing music, exploring digital photography or creating digital art. In additional, encourage them to take on activities offline, such as clubs, church groups and sports. Remember that the draw of chats and social networking is the ability to connect with other people, so help them find positive ways to make the same connections.
  11. Unfortunately, many bullying cases start small and then become worse over time. It is important that you keep records of all offending content (messages, videos, images, etc.) in case the abuse becomes worse and you want authorities to get involved. When malicious behavior is demonstrated with evidence, it is easier for authorities to respond.