SlideShare a Scribd company logo
CYBERCRIMES
(Against Children)
PREPARED FOR THE
ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
By Razık Can Pahalı
r.canpahali.com.tr
Jan 6, 2016
1
What is Cybercrime ?
Cybercrime is a term for any illegal
activity that uses a computer as its
primary means of commission.
Types of Cybercrimes: Hacking,
Theft, Cyber Stalking, Identity Theft,
Malicious Software, Child soliciting and
Abuse…
2
Cyberbullying: Examples of cyberbullying
include mean text messages or emails,
rumors sent by email or posted on social
networking sites, and embarrassing pictures,
videos, websites, or fake profiles.
Types of Cybercrimes:
1. Hacking: This is a type of crime wherein a person’s computer is broken
into so that his personal or sensitive information can be accessed.
2. Theft: This crime occurs when a person violates copyrights and
downloads music, movies, games and software.
3. Cyber Stalking: This is a kind of online harassment wherein the victim is
subjected to a barrage of online messages and emails.
4. Identity Theft: This has become a major problem with people using the
Internet for cash transactions and banking services.
5. Malicious Software: These are Internet-based software or programs
that are used to disrupt a network.
6. Child soliciting and Abuse: This is also a type of cyber crime wherein
criminals solicit minors include via chat rooms for the purpose of child
pornography. The FBI has been spending a lot of time monitoring chat
rooms frequented by children with the hopes of reducing and
preventing child abuse and soliciting.
3
Online child sexual abuse material…
Material that shows or describes child
sexual abuse or other offences
against children is illegal under cyber
laws.
It is an offence to:
access, possess, distribute, produce,
advertise or make available child
pornography or child abuse material
procure, groom or engage in sexual
activity with a person under 16 years
of age, or send indecent
communication to a person under 16
years of age.
4
Facts and statistics…
 1 in 3 children have been a
victim of cyberbullying.
 1 in 4 children have
experienced something
upsetting on a social
networking site.
 Almost 1 in 4 young people
have come across racist or
hate messages online.
5
Protect your child ! (pt.1)
1. Use parental control software; At its most basic level, parental control software records
your child’s Internet activity and blocks inappropriate material. However there are a
number of parental control software choices and they offer a wide range of features,
including the ability to restrict access to certain keywords, games, and websites.
2. Place the computer in a highly trafficked area; Placing it in a high traffic area where
parents and older siblings can see what’s going on helps minimize the chance your young
one will end up somewhere they shouldn’t be.
3. Bookmark for safety; The more time children spend “surfing” the web, the greater the
chance they’ll come across inappropriate images or other unsuitable material.
4. Avoid downloads; Teach your children to always ask permission before clicking an ad or
downloading. In addition to the fact that your child could be exposed to sexually explicit
films or images, your personal information could be exposed.
5. Set limits on late-night use; As children gain independence it’s harder and harder to do,
but setting limits on late-night Internet use at an early age can help minimize the chance
your child will be contacted by a pedophile. That’s because sexual predators often work
during the day and spend evening hours targeting children.
6
Protect your child ! (pt.2)
6. Establish rules and take control; The
Internet has become such an intricate part of
our children’s lives, we sometimes forget that
using it is a privilege, not a right. Establish rules
for Internet use, and post them in an area
where children congregate, like in the
kitchen. Establish rules about use of
computers, cell phones, and other
technology.
7. Stay in the loop; Today’s children are born
into a technology-based society and learn
how to access the Internet at an
astonishingly early age. As parents, it’s our
responsibility to talk to them about the
dangerous of the Internet, teach them safe
Internet habits, and use strategies like these
to help them do so safely.
7
And protect your computers !
 Don't share access to your computers with
strangers
 If you have a wi-fi network, password
protect it
 Disconnect from the Internet when not in use
 Reevaluate your security on a regular basis
 Make sure your employees and family
members know this info too!
 Use anti-virus software and firewalls - keep
them up to date
 Keep your operating system up to date
with critical security updates and patches
 Don't open emails or attachments from
unknown sources
 Use hard-to-guess passwords. Don’t use
words found in a dictionary. Remember
that password cracking tools exist
 Back-up your computer data on disks or
CDs often
8
Norse Live Attack Map 10

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
griehl
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
dixitas
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
Nilendra Kumar
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Sibesh Singh
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Cyber crime
Cyber crimeCyber crime
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
mahrukh rafique
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mahabubur Rahman
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Similar to Cybercrimes (Against Children)

East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
Amit Pal Singh
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Stephanie Barnhart
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
OCTF Industry Engagement
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
Shreedeep Rayamajhi
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
John Woodring
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
Rahuljain40418
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
Toby Treacher
 
Moral presentation
Moral presentationMoral presentation
Moral presentationKhailingWong
 
Moral presentation
Moral presentationMoral presentation
Moral presentationKhailingWong
 
Moral presentation
Moral presentationMoral presentation
Moral presentationKhailingWong
 
Moral presentation
Moral presentationMoral presentation
Moral presentationKhailingWong
 
Moral presentation
Moral presentationMoral presentation
Moral presentationKhailingWong
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 

Similar to Cybercrimes (Against Children) (20)

East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
 
Moral presentation
Moral presentationMoral presentation
Moral presentation
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 

Recently uploaded

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 

Recently uploaded (16)

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 

Cybercrimes (Against Children)

  • 1. CYBERCRIMES (Against Children) PREPARED FOR THE ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS By Razık Can Pahalı r.canpahali.com.tr Jan 6, 2016 1
  • 2. What is Cybercrime ? Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. Types of Cybercrimes: Hacking, Theft, Cyber Stalking, Identity Theft, Malicious Software, Child soliciting and Abuse… 2 Cyberbullying: Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.
  • 3. Types of Cybercrimes: 1. Hacking: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. 2. Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and software. 3. Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. 4. Identity Theft: This has become a major problem with people using the Internet for cash transactions and banking services. 5. Malicious Software: These are Internet-based software or programs that are used to disrupt a network. 6. Child soliciting and Abuse: This is also a type of cyber crime wherein criminals solicit minors include via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting. 3
  • 4. Online child sexual abuse material… Material that shows or describes child sexual abuse or other offences against children is illegal under cyber laws. It is an offence to: access, possess, distribute, produce, advertise or make available child pornography or child abuse material procure, groom or engage in sexual activity with a person under 16 years of age, or send indecent communication to a person under 16 years of age. 4
  • 5. Facts and statistics…  1 in 3 children have been a victim of cyberbullying.  1 in 4 children have experienced something upsetting on a social networking site.  Almost 1 in 4 young people have come across racist or hate messages online. 5
  • 6. Protect your child ! (pt.1) 1. Use parental control software; At its most basic level, parental control software records your child’s Internet activity and blocks inappropriate material. However there are a number of parental control software choices and they offer a wide range of features, including the ability to restrict access to certain keywords, games, and websites. 2. Place the computer in a highly trafficked area; Placing it in a high traffic area where parents and older siblings can see what’s going on helps minimize the chance your young one will end up somewhere they shouldn’t be. 3. Bookmark for safety; The more time children spend “surfing” the web, the greater the chance they’ll come across inappropriate images or other unsuitable material. 4. Avoid downloads; Teach your children to always ask permission before clicking an ad or downloading. In addition to the fact that your child could be exposed to sexually explicit films or images, your personal information could be exposed. 5. Set limits on late-night use; As children gain independence it’s harder and harder to do, but setting limits on late-night Internet use at an early age can help minimize the chance your child will be contacted by a pedophile. That’s because sexual predators often work during the day and spend evening hours targeting children. 6
  • 7. Protect your child ! (pt.2) 6. Establish rules and take control; The Internet has become such an intricate part of our children’s lives, we sometimes forget that using it is a privilege, not a right. Establish rules for Internet use, and post them in an area where children congregate, like in the kitchen. Establish rules about use of computers, cell phones, and other technology. 7. Stay in the loop; Today’s children are born into a technology-based society and learn how to access the Internet at an astonishingly early age. As parents, it’s our responsibility to talk to them about the dangerous of the Internet, teach them safe Internet habits, and use strategies like these to help them do so safely. 7
  • 8. And protect your computers !  Don't share access to your computers with strangers  If you have a wi-fi network, password protect it  Disconnect from the Internet when not in use  Reevaluate your security on a regular basis  Make sure your employees and family members know this info too!  Use anti-virus software and firewalls - keep them up to date  Keep your operating system up to date with critical security updates and patches  Don't open emails or attachments from unknown sources  Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist  Back-up your computer data on disks or CDs often 8
  • 9.