SlideShare a Scribd company logo
1 of 4
Download to read offline
Computers and the Internet have revolutionized the way we
live. But along with this great progress, comes new dangers
and responsibilities. One in five children will be solicited
online this year. As parents, we must do everything we can
to prevent our children from being victimized by this new
breed of child predator.
Thank you for your commitment to your children and to the
future of Texas.
				
			 Greg Abbott
			 Texas Attorney General
cyber
safety
Internet Safety Tips for Parents
Keep the computer in a common room of the house.
Speak openly about safety issues. Children will be less likely to come
to you if the issue is enshrouded in secrecy. If they feel that
you are comfortable discussing the subject matter, they may be more
forthcoming to you.
Get involved. Tell your children to show you the sites they like to visit
online. Keep their passwords readily accessible and access your
child’s account regularly.
Set clear rules restricting children from displaying their
name, address, telephone number, pictures and other personal
information online.
Tell your children they are never to agree to get together with some-
one they “meet” online. Warn them of the dangers of such
meetings and tell them to alert you if someone approaches them
about setting up a face-to-face meeting.
•
•
•
•
•
Internet Safety Tips for Teens
Don’t give out personal information about yourself, including where you
go to school, your address, or your telephone number.
Report unwanted solicitations to your parents or a trusted adult.
If you become aware of the sharing, use, or viewing of child pornography
online, immediately report this to the National Center for Missing &
Exploited Children at 1-800-843-5678 or online at www.cybertipline.com.
Don’t believe everything you read in chatrooms. Remember, a
person who says they’re a 14-year-old girl from Texas may really be a
42-year-old man from your hometown.
If someone harasses you online, says anything inappropriate, or does
anything that makes you feel uncomfortable, tell a trusted adult and
contact your Internet service provider.
A “friend” you meet online may not be the best person to talk to if you
are having problems at home, with your friends, or at school.
•
•
•
•
•
•
121 one to one
A/S/L? age, sex, location
BBL be back later
BF boyfriend
BRB be right back
CUL or CUL8ER see you later
CYO see you online
F2F face to face
GF girlfriend
H&K hug and kiss
ILU I love you
IM instant message
IPN I’m posting naked
IRL in real life
IWALU I will always love you
KOL kiss on lips
LDR long distance relationship
LMIRL let’s meet in real life
LOL laughing out loud
LTNS long time, no see
LUWAMH love you with all
	 my heart
M/F male or female
MOSS member of same sex
MOTOS member of the
opposite sex
MSG message
NIFOC naked in front
of computer
NP nosy parents
OLL online love
P2P peer to peer
P911 my parents are coming!
PA parent alert
PAL parents are listening
PANB parents are nearby
PDA public display of affection
PM private message
POS parent over shoulder
RL real life
ROTFL rolling on the
floor laughing
RPG role playing games
SO significant other
TAW teachers are watching
TMI too much information
TOY thinking of you
W/E whatever
WTGP want to go private?
WUF where are you from?
Teen Chat Lingo
Internet Definitions
Blog A frequent Web listing of personal thoughts and Web links. A blog is much like
an online diary which includes what is happening in a person’s life. Blogs are also
called web logs or weblogs.
Chat Real-time communication over the Internet. You type and send messages that
appear almost instantly on the computer monitors of the other people who are
participating in the chat.
Chatroom An interactive forum where you can talk in real-time. The chatroom is
the place or location online where the chat is taking place.
Cyberspace Refers to all the computer networks on the Internet. The term
distinguishes the physical world from the virtual or computer-based world.
Cyberstalking/Harassment Terms that can refer to the online enticement of
children; rude or threatening messages; slanderous information; or repeated,
unwanted messages.
Download Putting information on your computer. You can download information
from the Internet, discs or CDs, and other computers.
E-Mail (electronic mail) A service that allows people to send messages with
pictures and sounds from their computer to any other computer in the world.
Emoticons Animated faces that express different emotions you can send in
E-mails, chat, and Instant Messaging. Emoticons are a way to show someone online
how you are feeling.
History A list of web sites the people using a particular computer have visited.
Viewing the history can be used to monitor what sites your children have visited.
Instant Messaging (IM) A service that allows people to send and receive
messages almost instantly.
Internet A network of millions of computers from all over the world. The Internet
allows computers to trade information using telephone lines, fiber-optic cables, and
satellite links. It is also referred to as the “Net.”
Leet Speak The corruption or modification of written text. This form of
communication uses inverted numbers and letters. For more about leet speak visit:
http://en.wikipedia.org/wiki/Leet
Monitoring Software Software products that allow parents to monitor or track
the web sites or E-mail messages that a child visits or reads.
Online Solicitation Receiving unwanted sexual advances from someone
communicating with you over the Internet.
Podcast An audio show that is broadcast over the web. Users can listen to these
shows on a digital music player or a computer. Podcasts can include talk shows,
music, or other types of audio.
Post To leave a message on a newsgroup or bulletin board.
Trusted Adult Someone who will help protect you and make you safer. Trusted
adults can be people like family members, caregivers, family friends, teachers,
counselors, coaches, clergy members, youth leaders, and law-enforcement officers.
To report unwanted online solicitations,
contact the National Cyber Tipline at 1 (800) 843-5678.
from NetSmartz Internet Workshop, National
Center for Missing and Exploited Children

More Related Content

What's hot

Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kidskwazy
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDebra Hargrove
 
Digital etiquette 2[1]
Digital etiquette 2[1]Digital etiquette 2[1]
Digital etiquette 2[1]putnamca
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipKati W
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Studentskgilliard13
 

What's hot (20)

Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Netsafety Parents
Netsafety ParentsNetsafety Parents
Netsafety Parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital World
 
Digital etiquette 2[1]
Digital etiquette 2[1]Digital etiquette 2[1]
Digital etiquette 2[1]
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Final Project
Final ProjectFinal Project
Final Project
 
Final Project
Final ProjectFinal Project
Final Project
 
Final Project
Final ProjectFinal Project
Final Project
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 

Viewers also liked

Mobile learning services in the palestinian higher education
Mobile learning services in the palestinian higher educationMobile learning services in the palestinian higher education
Mobile learning services in the palestinian higher educationf3tm3
 
Cost effctivness
Cost effctivnessCost effctivness
Cost effctivnessf3tm3
 
How to create_a_wikispace
How to create_a_wikispaceHow to create_a_wikispace
How to create_a_wikispacef3tm3
 
Cost effectivness
Cost effectivnessCost effectivness
Cost effectivnessf3tm3
 
Technology’s role in 21st century learning
Technology’s role in 21st century learningTechnology’s role in 21st century learning
Technology’s role in 21st century learningf3tm3
 
Tech4101 1
Tech4101 1Tech4101 1
Tech4101 1f3tm3
 
Our project, (2)
Our project, (2)Our project, (2)
Our project, (2)f3tm3
 

Viewers also liked (7)

Mobile learning services in the palestinian higher education
Mobile learning services in the palestinian higher educationMobile learning services in the palestinian higher education
Mobile learning services in the palestinian higher education
 
Cost effctivness
Cost effctivnessCost effctivness
Cost effctivness
 
How to create_a_wikispace
How to create_a_wikispaceHow to create_a_wikispace
How to create_a_wikispace
 
Cost effectivness
Cost effectivnessCost effectivness
Cost effectivness
 
Technology’s role in 21st century learning
Technology’s role in 21st century learningTechnology’s role in 21st century learning
Technology’s role in 21st century learning
 
Tech4101 1
Tech4101 1Tech4101 1
Tech4101 1
 
Our project, (2)
Our project, (2)Our project, (2)
Our project, (2)
 

Similar to Cybersafety

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5000f0a
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Presentación kefalonia[1]
Presentación kefalonia[1]Presentación kefalonia[1]
Presentación kefalonia[1]Miriam Ortega
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop wwihead
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
London Borough of Ealing Online Safety for parents
London Borough of Ealing Online Safety for parentsLondon Borough of Ealing Online Safety for parents
London Borough of Ealing Online Safety for parentsDai Barnes
 
Parent Internet Safety Night
Parent Internet Safety NightParent Internet Safety Night
Parent Internet Safety NightMary Beth Hertz
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 

Similar to Cybersafety (20)

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Presentación kefalonia[1]
Presentación kefalonia[1]Presentación kefalonia[1]
Presentación kefalonia[1]
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
London Borough of Ealing Online Safety for parents
London Borough of Ealing Online Safety for parentsLondon Borough of Ealing Online Safety for parents
London Borough of Ealing Online Safety for parents
 
102010a
102010a102010a
102010a
 
Parent Internet Safety Night
Parent Internet Safety NightParent Internet Safety Night
Parent Internet Safety Night
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

Cybersafety

  • 1. Computers and the Internet have revolutionized the way we live. But along with this great progress, comes new dangers and responsibilities. One in five children will be solicited online this year. As parents, we must do everything we can to prevent our children from being victimized by this new breed of child predator. Thank you for your commitment to your children and to the future of Texas. Greg Abbott Texas Attorney General cyber safety
  • 2. Internet Safety Tips for Parents Keep the computer in a common room of the house. Speak openly about safety issues. Children will be less likely to come to you if the issue is enshrouded in secrecy. If they feel that you are comfortable discussing the subject matter, they may be more forthcoming to you. Get involved. Tell your children to show you the sites they like to visit online. Keep their passwords readily accessible and access your child’s account regularly. Set clear rules restricting children from displaying their name, address, telephone number, pictures and other personal information online. Tell your children they are never to agree to get together with some- one they “meet” online. Warn them of the dangers of such meetings and tell them to alert you if someone approaches them about setting up a face-to-face meeting. • • • • • Internet Safety Tips for Teens Don’t give out personal information about yourself, including where you go to school, your address, or your telephone number. Report unwanted solicitations to your parents or a trusted adult. If you become aware of the sharing, use, or viewing of child pornography online, immediately report this to the National Center for Missing & Exploited Children at 1-800-843-5678 or online at www.cybertipline.com. Don’t believe everything you read in chatrooms. Remember, a person who says they’re a 14-year-old girl from Texas may really be a 42-year-old man from your hometown. If someone harasses you online, says anything inappropriate, or does anything that makes you feel uncomfortable, tell a trusted adult and contact your Internet service provider. A “friend” you meet online may not be the best person to talk to if you are having problems at home, with your friends, or at school. • • • • • •
  • 3. 121 one to one A/S/L? age, sex, location BBL be back later BF boyfriend BRB be right back CUL or CUL8ER see you later CYO see you online F2F face to face GF girlfriend H&K hug and kiss ILU I love you IM instant message IPN I’m posting naked IRL in real life IWALU I will always love you KOL kiss on lips LDR long distance relationship LMIRL let’s meet in real life LOL laughing out loud LTNS long time, no see LUWAMH love you with all my heart M/F male or female MOSS member of same sex MOTOS member of the opposite sex MSG message NIFOC naked in front of computer NP nosy parents OLL online love P2P peer to peer P911 my parents are coming! PA parent alert PAL parents are listening PANB parents are nearby PDA public display of affection PM private message POS parent over shoulder RL real life ROTFL rolling on the floor laughing RPG role playing games SO significant other TAW teachers are watching TMI too much information TOY thinking of you W/E whatever WTGP want to go private? WUF where are you from? Teen Chat Lingo
  • 4. Internet Definitions Blog A frequent Web listing of personal thoughts and Web links. A blog is much like an online diary which includes what is happening in a person’s life. Blogs are also called web logs or weblogs. Chat Real-time communication over the Internet. You type and send messages that appear almost instantly on the computer monitors of the other people who are participating in the chat. Chatroom An interactive forum where you can talk in real-time. The chatroom is the place or location online where the chat is taking place. Cyberspace Refers to all the computer networks on the Internet. The term distinguishes the physical world from the virtual or computer-based world. Cyberstalking/Harassment Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated, unwanted messages. Download Putting information on your computer. You can download information from the Internet, discs or CDs, and other computers. E-Mail (electronic mail) A service that allows people to send messages with pictures and sounds from their computer to any other computer in the world. Emoticons Animated faces that express different emotions you can send in E-mails, chat, and Instant Messaging. Emoticons are a way to show someone online how you are feeling. History A list of web sites the people using a particular computer have visited. Viewing the history can be used to monitor what sites your children have visited. Instant Messaging (IM) A service that allows people to send and receive messages almost instantly. Internet A network of millions of computers from all over the world. The Internet allows computers to trade information using telephone lines, fiber-optic cables, and satellite links. It is also referred to as the “Net.” Leet Speak The corruption or modification of written text. This form of communication uses inverted numbers and letters. For more about leet speak visit: http://en.wikipedia.org/wiki/Leet Monitoring Software Software products that allow parents to monitor or track the web sites or E-mail messages that a child visits or reads. Online Solicitation Receiving unwanted sexual advances from someone communicating with you over the Internet. Podcast An audio show that is broadcast over the web. Users can listen to these shows on a digital music player or a computer. Podcasts can include talk shows, music, or other types of audio. Post To leave a message on a newsgroup or bulletin board. Trusted Adult Someone who will help protect you and make you safer. Trusted adults can be people like family members, caregivers, family friends, teachers, counselors, coaches, clergy members, youth leaders, and law-enforcement officers. To report unwanted online solicitations, contact the National Cyber Tipline at 1 (800) 843-5678. from NetSmartz Internet Workshop, National Center for Missing and Exploited Children