SlideShare a Scribd company logo
1 of 11
By: Shakena
   Reese
   Cyber Bullying
   Credit Card Fraud
   Harrassment
   Sexual Predators
   Scams
 EMOTIONALLY
 FINANCIALLY
 PHYSICALLY
   Cyberbullying can cause great
    emotional harm to the target.
   Online communications can be
    vicious, and cyberbullying can be
    happening24/7.
    Damaging text and images can be
    widely disseminated and impossible
    to fully remove.
   There are emerging reports of youth
    suicide and violence related to
    cyberbullying.
 Many  young people who are victims of online
  danger are harmed physically.
 Many young girls who meet men via internet
  are raped and sometimes killed.
 Those with insecurities are capable of
  harming themselves physically.
 There are many reports of suicides because
  of online dangers.
   Account information is
    stolen through online
    shopping
   Telemarketers commit
    fraud to get personal
    information
   Also they use information
    given through messages to
    wipe bank accounts cleans
    and commit identity theft.
   They are also capable of
    committing credit card
    fraud.
“Rules”
   Establish an ongoing dialogue and keep lines of
communication open.
   Supervise use of all Internet-enabled devices.
   Know your child’s online activities and friends.
   Regularly check the online communities your
children use, such as social networking and
gaming sites, to see what information they are
posting.
   Supervise the photos and videos your kids post
    and send online.
   Discourage the use of webcams and mobile
video devices.
 Learn and teach your children how to protect
    personal information posted online and to follow
    the same rules with respect to the personal
    information of others.
 Be sure to use privacy settings.
 Instruct your children to avoid meeting face-to-
    face with someone they only know online or
    through their mobile device.
 I can learn teach my child how to respond to cyber
    bullies.
 Establish an agreement with your children about
Internet use at home and outside of the home
 “Tools”
 Set age-appropriate filters.
 Consider using monitoring software,
  especially if you sense your child is at risk.
 Periodically check online activity by viewing
  your browser’s history.
 Set time limits and consider using time-
  limiting software.
 Disallow access to chat rooms and only allow
  live audio chat with extreme caution.
 Limit  your instant messaging (IM) contacts
 Use safe search engines.
 Set up the family’s cyber-security
  protections.
 Utilize parental controls they should be
  utilized on all Internet-enabled devices
  (desktops, laptops; and gaming, mobile, and
  music devices).
 Refrain from a lot of online shopping
 Also don’t post anything harmful
 Keep all personal information personal relay
  personal messages via phone or face to face.
My protection plan

More Related Content

What's hot

Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullyingparulata
 
Online safety strategy - non technical guide for parents
Online safety strategy - non technical guide for parentsOnline safety strategy - non technical guide for parents
Online safety strategy - non technical guide for parentsindika rathninda
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
Safety in the Net
Safety in the NetSafety in the Net
Safety in the NetRamilia
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints HandoutOllie Bray
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 

What's hot (20)

Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Net Cetera | Provided by: FTC
Net Cetera | Provided by: FTCNet Cetera | Provided by: FTC
Net Cetera | Provided by: FTC
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 
Online safety strategy - non technical guide for parents
Online safety strategy - non technical guide for parentsOnline safety strategy - non technical guide for parents
Online safety strategy - non technical guide for parents
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Safety in the Net
Safety in the NetSafety in the Net
Safety in the Net
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Cyber Contacts
Cyber ContactsCyber Contacts
Cyber Contacts
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 

Viewers also liked

Addressing the Sensitive Topic of Sex Workers in the Classroom
Addressing the Sensitive Topic of Sex Workers in the ClassroomAddressing the Sensitive Topic of Sex Workers in the Classroom
Addressing the Sensitive Topic of Sex Workers in the ClassroomSElspethPatterson
 
Introduction to nutrition in schools
Introduction to nutrition in schoolsIntroduction to nutrition in schools
Introduction to nutrition in schoolsQuay Davis
 
12 Days Of Christmas
12 Days Of Christmas12 Days Of Christmas
12 Days Of Christmaskotten751
 
Introduction to nutrition in schools
Introduction to nutrition in schoolsIntroduction to nutrition in schools
Introduction to nutrition in schoolsQuay Davis
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014Leonard Cibelli
 
AD_LABX_BRO_19Nov2014__1_
AD_LABX_BRO_19Nov2014__1_AD_LABX_BRO_19Nov2014__1_
AD_LABX_BRO_19Nov2014__1_Leonard Cibelli
 
Reelgenius deck slideshare
Reelgenius deck slideshareReelgenius deck slideshare
Reelgenius deck slideshareDan Goikhman
 
LISA 2011 Keynote: The DevOps Transformation
LISA 2011 Keynote: The DevOps TransformationLISA 2011 Keynote: The DevOps Transformation
LISA 2011 Keynote: The DevOps Transformationbenrockwood
 
12 days of_christmas
12 days of_christmas12 days of_christmas
12 days of_christmasACruz99099
 
12 days of_christmas
12 days of_christmas12 days of_christmas
12 days of_christmaskotten751
 

Viewers also liked (15)

Kampioenen 2014
Kampioenen 2014Kampioenen 2014
Kampioenen 2014
 
Addressing the Sensitive Topic of Sex Workers in the Classroom
Addressing the Sensitive Topic of Sex Workers in the ClassroomAddressing the Sensitive Topic of Sex Workers in the Classroom
Addressing the Sensitive Topic of Sex Workers in the Classroom
 
AD-MPEX-BRO-09Dec2014
AD-MPEX-BRO-09Dec2014AD-MPEX-BRO-09Dec2014
AD-MPEX-BRO-09Dec2014
 
The Grumpy Tree
The Grumpy TreeThe Grumpy Tree
The Grumpy Tree
 
BR_Summation_08052014
BR_Summation_08052014BR_Summation_08052014
BR_Summation_08052014
 
Introduction to nutrition in schools
Introduction to nutrition in schoolsIntroduction to nutrition in schools
Introduction to nutrition in schools
 
12 Days Of Christmas
12 Days Of Christmas12 Days Of Christmas
12 Days Of Christmas
 
Introduction to nutrition in schools
Introduction to nutrition in schoolsIntroduction to nutrition in schools
Introduction to nutrition in schools
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014
 
AD_LABX_BRO_19Nov2014__1_
AD_LABX_BRO_19Nov2014__1_AD_LABX_BRO_19Nov2014__1_
AD_LABX_BRO_19Nov2014__1_
 
Reelgenius deck slideshare
Reelgenius deck slideshareReelgenius deck slideshare
Reelgenius deck slideshare
 
LISA 2011 Keynote: The DevOps Transformation
LISA 2011 Keynote: The DevOps TransformationLISA 2011 Keynote: The DevOps Transformation
LISA 2011 Keynote: The DevOps Transformation
 
Devise and Rails
Devise and RailsDevise and Rails
Devise and Rails
 
12 days of_christmas
12 days of_christmas12 days of_christmas
12 days of_christmas
 
12 days of_christmas
12 days of_christmas12 days of_christmas
12 days of_christmas
 

Similar to My protection plan

How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sbSafeChildUAE1
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2bigmike18
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 

Similar to My protection plan (20)

How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

My protection plan

  • 1. By: Shakena Reese
  • 2. Cyber Bullying  Credit Card Fraud  Harrassment  Sexual Predators  Scams
  • 4. Cyberbullying can cause great emotional harm to the target.  Online communications can be vicious, and cyberbullying can be happening24/7.  Damaging text and images can be widely disseminated and impossible to fully remove.  There are emerging reports of youth suicide and violence related to cyberbullying.
  • 5.  Many young people who are victims of online danger are harmed physically.  Many young girls who meet men via internet are raped and sometimes killed.  Those with insecurities are capable of harming themselves physically.  There are many reports of suicides because of online dangers.
  • 6. Account information is stolen through online shopping  Telemarketers commit fraud to get personal information  Also they use information given through messages to wipe bank accounts cleans and commit identity theft.  They are also capable of committing credit card fraud.
  • 7. “Rules”  Establish an ongoing dialogue and keep lines of communication open.  Supervise use of all Internet-enabled devices.  Know your child’s online activities and friends.  Regularly check the online communities your children use, such as social networking and gaming sites, to see what information they are posting.  Supervise the photos and videos your kids post and send online.
  • 8. Discourage the use of webcams and mobile video devices.  Learn and teach your children how to protect personal information posted online and to follow the same rules with respect to the personal information of others.  Be sure to use privacy settings.  Instruct your children to avoid meeting face-to- face with someone they only know online or through their mobile device.  I can learn teach my child how to respond to cyber bullies.  Establish an agreement with your children about Internet use at home and outside of the home
  • 9.  “Tools”  Set age-appropriate filters.  Consider using monitoring software, especially if you sense your child is at risk.  Periodically check online activity by viewing your browser’s history.  Set time limits and consider using time- limiting software.  Disallow access to chat rooms and only allow live audio chat with extreme caution.
  • 10.  Limit your instant messaging (IM) contacts  Use safe search engines.  Set up the family’s cyber-security protections.  Utilize parental controls they should be utilized on all Internet-enabled devices (desktops, laptops; and gaming, mobile, and music devices).  Refrain from a lot of online shopping  Also don’t post anything harmful  Keep all personal information personal relay personal messages via phone or face to face.