SlideShare a Scribd company logo
Internet Safety
Consumer Action Training
Slides
© Consumer Action 2010
www.consumer-
action.org
Internet Safety: Training Slides
www.consumer-
action.org
Internet Safety: Training Slides
Risks for Internet Users
The three Cs:
 Inappropriate or unwanted contact
 Inappropriate or inaccurate content
 Deceptive or fraudulent commerce
2
www.consumer-
action.org
Internet Safety: Training Slides
www.consumer-
action.org
Internet Safety: Training Slides
How Online Scammers Find
Their Victims
 Phishing
 Spam
 Malware
 Malicious (phony, or “spoofed”) websites
 Unsecure transactions
 Social networking
3
www.consumer-
action.org
Internet Safety: Training Slides
www.consumer-
action.org
Internet Safety: Training Slides
Activity: How to Spot a Phishing
eMail
 Read the email message and the site text below it.
 Circle any “red flags” - things that make you think
the message could be phishing and the website
could be phony.
 Be prepared to explain your choices.
4
www.consumer-
action.org
Internet Safety: Training Slides
www.consumer-
action.org
Internet Safety: Training Slides
Protecting Your Computer &
Data
 Use a firewall
 Install antivirus software
 Install antispyware
 Use a spam filter
 Perform timely updates
 Create strong passwords
 Secure your wireless network
 Stick with trusted sources
 Beware of older computers’ security limitations
5
www.consumer-
action.org
Internet Safety: Training Slides
www.consumer-
action.org
Internet Safety: Training Slides
Avoiding Online Marketing
 Guard your information
 Be wary of contests and “special” offers
 Read site’s privacy policy
 Use an alternate email address
 Manage your cookies
 Don’t engage
 Teach kids to be careful
6
www.consumer-
action.org
Internet Safety: Training Slides
www.consumer-
action.org
Internet Safety: Training Slides
Fast Facts
 Billions of fraudulent emails are sent every
day.
 In some months, there have been close to
50,000 active phishing websites.
 Phishing leads to estimated losses of
several hundred million dollars a year.
 Most phishing sites are active for only about
20 hours.
7
www.consumer-
action.org
Internet Safety: Training Slides
www.consumer-
action.org
Internet Safety: Training Slides
Activity: 12 Tips and Tools for
Online Safety
 Write the letter of the word or phrase from
the list at the bottom of the page that best
completes each sentence.
 Be prepared to explain your choices.
8
www.consumer-
action.org
Internet Safety: Training Slides
www.consumer-
action.org
Internet Safety: Training Slides
Protecting Your Kids Online
 Discuss risks
 Set clear rules
 Monitor online activities
 Read kids’ favorite blogs
 “Friend” your kids on social networking sites
 Discuss what to share, what not to share
 Forbid meeting without a guardian
 Forbid, report bullying or predatory behavior
 Encourage openness
9
www.consumer-
action.org
Internet Safety: Training Slides
www.consumer-
action.org
Internet Safety: Training Slides
Activity: Case Studies
 Break into four smaller groups.
 Read the case study assigned to your group
and write down specific recommendations in
response to the question at the end of the
case study.
 Choose a spokesperson to read the case
study and recommendations aloud. Be
prepared to explain your advice.
10
www.consumer-
action.org
Internet Safety: Training Slides
www.consumer-
action.org
Internet Safety: Training Slides
Resources
 OnGuardOnline.gov
 PrivacyRights.org
 FOSI.org (Family Online Safety Institute)
 CyberTipline.com
 SafeKids.com & SafeTeens.com
 ConnectSafely.org
 www.FEMA.gov/kids/on_safety.htm
 AnnualCreditReport.com
11
www.consumer-
action.org
Internet Safety: Training Slides
www.consumer-
action.org
Internet Safety: Training Slides
Thanks for participating!
You can find more free trainings like this one on Consumer
Action’s website:
www.consumer-action.org/modules
Consumer Action
Web site: www.consumer-action.org
Email: info@consumer-action.org
415-777-9648 English, Chinese and Spanish spoken
The Internet Safety training module was created by Consumer
Action in partnership with Microsoft®
.
12

More Related Content

Similar to Internet Safety

Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
Ben Woelk, CISSP, CPTC
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
Brian Pichman
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Securityguide
SecurityguideSecurityguide
Securityguide
Oleg Kostyukevich
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
Luis R Castellanos
 
Module online investments
Module   online investmentsModule   online investments
Module online investmentsRozell Sneede
 
Protecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineProtecting Your Professional Reputation Online
Protecting Your Professional Reputation Online
Legal Media Matters
 
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaAsset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Helen Levinson
 
Sabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarSabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarDon Grauel
 
Protecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletProtecting yourself online - second edition - booklet
Protecting yourself online - second edition - booklet
prestamonster
 
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing BusinessesEster Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ramon Ray
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
JeffUrgelles
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
Simpliv LLC
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
dinCloud Inc.
 

Similar to Internet Safety (20)

Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
Module online investments
Module   online investmentsModule   online investments
Module online investments
 
Protecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineProtecting Your Professional Reputation Online
Protecting Your Professional Reputation Online
 
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaAsset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
 
Sabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarSabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler Seminar
 
Protecting yourself online - second edition - booklet
Protecting yourself online - second edition - bookletProtecting yourself online - second edition - booklet
Protecting yourself online - second edition - booklet
 
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing BusinessesEster Horowitz - M2Power Inc - Identify Theft and Growing Businesses
Ester Horowitz - M2Power Inc - Identify Theft and Growing Businesses
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 

Recently uploaded

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 

Recently uploaded (20)

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 

Internet Safety

  • 1. Internet Safety Consumer Action Training Slides © Consumer Action 2010
  • 2. www.consumer- action.org Internet Safety: Training Slides www.consumer- action.org Internet Safety: Training Slides Risks for Internet Users The three Cs:  Inappropriate or unwanted contact  Inappropriate or inaccurate content  Deceptive or fraudulent commerce 2
  • 3. www.consumer- action.org Internet Safety: Training Slides www.consumer- action.org Internet Safety: Training Slides How Online Scammers Find Their Victims  Phishing  Spam  Malware  Malicious (phony, or “spoofed”) websites  Unsecure transactions  Social networking 3
  • 4. www.consumer- action.org Internet Safety: Training Slides www.consumer- action.org Internet Safety: Training Slides Activity: How to Spot a Phishing eMail  Read the email message and the site text below it.  Circle any “red flags” - things that make you think the message could be phishing and the website could be phony.  Be prepared to explain your choices. 4
  • 5. www.consumer- action.org Internet Safety: Training Slides www.consumer- action.org Internet Safety: Training Slides Protecting Your Computer & Data  Use a firewall  Install antivirus software  Install antispyware  Use a spam filter  Perform timely updates  Create strong passwords  Secure your wireless network  Stick with trusted sources  Beware of older computers’ security limitations 5
  • 6. www.consumer- action.org Internet Safety: Training Slides www.consumer- action.org Internet Safety: Training Slides Avoiding Online Marketing  Guard your information  Be wary of contests and “special” offers  Read site’s privacy policy  Use an alternate email address  Manage your cookies  Don’t engage  Teach kids to be careful 6
  • 7. www.consumer- action.org Internet Safety: Training Slides www.consumer- action.org Internet Safety: Training Slides Fast Facts  Billions of fraudulent emails are sent every day.  In some months, there have been close to 50,000 active phishing websites.  Phishing leads to estimated losses of several hundred million dollars a year.  Most phishing sites are active for only about 20 hours. 7
  • 8. www.consumer- action.org Internet Safety: Training Slides www.consumer- action.org Internet Safety: Training Slides Activity: 12 Tips and Tools for Online Safety  Write the letter of the word or phrase from the list at the bottom of the page that best completes each sentence.  Be prepared to explain your choices. 8
  • 9. www.consumer- action.org Internet Safety: Training Slides www.consumer- action.org Internet Safety: Training Slides Protecting Your Kids Online  Discuss risks  Set clear rules  Monitor online activities  Read kids’ favorite blogs  “Friend” your kids on social networking sites  Discuss what to share, what not to share  Forbid meeting without a guardian  Forbid, report bullying or predatory behavior  Encourage openness 9
  • 10. www.consumer- action.org Internet Safety: Training Slides www.consumer- action.org Internet Safety: Training Slides Activity: Case Studies  Break into four smaller groups.  Read the case study assigned to your group and write down specific recommendations in response to the question at the end of the case study.  Choose a spokesperson to read the case study and recommendations aloud. Be prepared to explain your advice. 10
  • 11. www.consumer- action.org Internet Safety: Training Slides www.consumer- action.org Internet Safety: Training Slides Resources  OnGuardOnline.gov  PrivacyRights.org  FOSI.org (Family Online Safety Institute)  CyberTipline.com  SafeKids.com & SafeTeens.com  ConnectSafely.org  www.FEMA.gov/kids/on_safety.htm  AnnualCreditReport.com 11
  • 12. www.consumer- action.org Internet Safety: Training Slides www.consumer- action.org Internet Safety: Training Slides Thanks for participating! You can find more free trainings like this one on Consumer Action’s website: www.consumer-action.org/modules Consumer Action Web site: www.consumer-action.org Email: info@consumer-action.org 415-777-9648 English, Chinese and Spanish spoken The Internet Safety training module was created by Consumer Action in partnership with Microsoft® . 12

Editor's Notes

  1. The Internet Safety seminar was created by the national non-profit organization Consumer Action in partnership with Microsoft. See lesson plan for “Welcome.” Tips: Speak with you audience, not at them. Make eye contact. Pause when you ask questions. Don’t single anyone out to answer a question.
  2. Go over each item in the list. Cyberbullying and spamming, for example Pornography and hate sites, for example Counterfeit and malicious sites, for example
  3. Go over each item in the list per notes below: Phishing—an attempt to “hook” you into revealing your personal and confidential information by sending emails that seem to come from a legitimate business or organization; the emails mimic messages that the business would ordinarily send to customers, tricking them into entering sensitive information such as usernames and passwords at fake websites Spam—unwelcome email and instant messages; these messages typically offer questionable goods for sale or a promise of financial rewards if you give the sender money Malware—malicious software (spyware, Trojans, viruses and worms) that can be remotely installed on your computer, making it possible for the person who controls the malicious software to steal, damage or delete your files and other data Malicious websites—harmful sites that lure users by promising content on popular breaking news stories, offers from retailers, or other desired information. Links to such sites can appear in the list of results for an online search, or can be sent to you via social networks or regular email. Unsecure transactions—sites that don’t have secure payment forms or companies that store debit and credit card information without proper safeguards may give crooks the opportunity to intercept your personal information Social networking—users who reveal too much personal information in their online profile or to an online community or who arrange to meet online contacts in person may be at risk; or the sites may compromise your personal information
  4. See lesson plan for activity instructions and answer key.
  5. Go over each item in the list per the notes below: A firewall is a virtual barrier between your computer and the Internet. Everything coming into or leaving your computer must go through the firewall, which blocks anything that doesn’t meet specific security criteria. Before purchasing separate firewall hardware or software, check your operating system (OS) (Mac OS X or Windows Vista, for example) to see if there is a built-in firewall and whether it is turned on. Antivirus software scans everything that goes into your computer, looking for known viruses. Because new viruses are created all the time, you have to update your antivirus software regularly for it to be effective. Spyware is software that tracks your computer activity, gathering information without your knowing it. Antispyware is software that blocks or removes spyware. Some antivirus products include antispyware features. Most Internet service providers (ISPs) and email programs now include an automatic spam filter, which reduces the number of unwelcome email messages that make it to your inbox. Delete, without opening, any spam or “junk mail” that gets through the filter. Computer and software companies frequently update their programs to include protection against the latest security threats. So, simply updating your operating system (OS) and software whenever new versions become available gives you an added measure of security. If available, activate automatic security updates so you will be alerted when updates are issued. A strong password includes a seemingly random string of letters, numbers and symbols. It should never include personal information, such as your birth date, address or pet’s name. The longer your password is (at least eight characters), the harder it is to decipher. Leaving your network “unlocked” means that anyone within range of your wi-fi signal can access it—and possibly capture the data you send and receive. Securing your wireless network can be as simple as creating a strong password for your router and enabling its built-in encryption tool. Don’t click on or copy and paste any link sent to you by someone you don’t know and trust. Instead, if you believe the site is legitimate and you want to visit it, type the homepage portion of the URL directly into your browser address bar. When doing an online search for a hot topic, visit only those results that are trusted sources of information. Older computers may no longer receive updates and security patches that protect against new viruses and other threats. And security features offered with new versions of browsers my not run on older operating systems. Firewalls, too, may not be working on older machines, leaving computers connected to “always on” high-speed Internet at greater risk.
  6. Go over each item in the list per notes below: Reveal as little as possible about yourself at unfamiliar sites until you have decided you want to establish a relationship. Anytime you fill out a form, enter an online contest, or otherwise submit information electronically there is the potential it will be used for marketing purposes---by the company whose site you are visiting, or by a third party that buys the information. Legitimate companies will have a privacy policy that clearly states when and how the company might use your information. Leave the site if you are not satisfied that your privacy will be protected. There should be a link to the privacy policy somewhere on the site’s homepage, or you may be able to reach it through a general information page such as “About Us.” If the site allows searching, enter “privacy policy” in the search box. Look for “trust mark” logos on the site, such as TRUSTe, which certify trustworthy privacy policies. Consider getting an alternate email address that you use for certain online activities. This will help keep your regular email inbox as clear of unwanted messages as possible. There are many free email services to choose from. A cookie is a piece of information stored on an Internet user’s computer by a Web browser. It allows the site being visited to record such things as the visitor’s shopping cart contents and user preferences. Most modern browsers give users the option to accept or reject cookies. Rejecting cookies may seem like a good way to further protect your privacy, but some websites won’t work if cookies are disabled. You can also set your browser preferences so that cookies are deleted whenever you exit the browser. This means the site will not retain any of your information or recognize you as a returning visitor. Don’t respond to pop-up ads and banners, which often use cookies. (To get rid of a pop-up ad, click the X in the upper-right corner of the window or press ALT+F4 on your keyboard.) Always ignore and delete spam completely. Do not respond, even to unsubscribe, because your response confirms that the address is “live.” The Children’s Online Privacy Protection Act [COPPA] requires sites to obtain parental consent for the collection or use of any personal information from children under 13. Still, you should instruct your children not to reveal private information at websites they visit.
  7. Announce a 10-minute break. Leave this slide onscreen during the break.
  8. See lesson plan for activity instructions and answer key.
  9. Go over each item in the list per notes below: Discuss the various risks of Internet use. Make sure your kids understand what could be a danger and why. Set clear rules about what your kids can do and which sites they can visit online. Consider printing out the rules and posting them near the computer. Manage and monitor kids’ online activities—there are tools (listed in the brochure and the Q&A) to help you with this. Read your child’s favorite blogs (short for weblog). If s/he has his/her own blog, read that too. Become a “friend” on your child’s social networking sites. Discuss what information is appropriate to share and what should be kept private. Let your kids know it’s not ok to share their passwords for social networking and other sites with friends---accounts can be compromised and personal information stolen. Explain that it’s not okay to go alone to see someone they “meet” on the Internet. Explain why it’s wrong to bully others, and why it’s important to let you know about any bullying or predatory behavior. Report any harassment or otherwise inappropriate behavior to the proper authorities, which may include school officials or the local police. Keep the lines of communication open. Encourage children to share their questions and online experiences with you. Make sure they understand that you will not punish them or take away Internet access if they let you know about any threatening or inappropriate communication, including bullying.
  10. See lesson plan for activity instructions and answer key.
  11. Point out that the first four resources appear in the Internet Safety brochure. Then go over each item in the list per notes below: OnGuardOnline.gov: The Federal Trade Commission and the tech industry work together to help you avoid fraud, secure your computer and guard your personal information. PrivacyRights.org: The nonprofit Privacy Rights Clearinghouse offers a library of information on privacy, from tips for online job seekers to how to shop safely on the Internet. FOSI.org: The nonprofit Family Online Safety Institute works to make it safer online for children and their families. CyberTipline.com takes reports of child harassment and predatory behavior. SafeKids.com and SafeTeens.com offer lessons, quizzes and more about everything from Internet civility to how to be safe when talking and texting on cell phones. ConnectSafely.org focuses on information related to safe blogging and social networking. FEMA offers a six-point list of online safety rules for kids that you can print out and put by the computer. AnnualCreditReport.com offers free credit reports from the three main credit reporting agencies (Equifax, Experian and TranUnion) every 12 months, at the consumer’s request. Victims of identity theft can order reports free from each of the three agencies (Equifax.com or 800-525-6285; Experian.com or 888-397-3742; TransUnion.com or 800-680-7289). Placing a security freeze on each report means no new credit can be extended without your personal approval.
  12. Thank participants for attending. Tell them you hope to see them at a future Consumer Action seminar. Ask them to take a few minutes to fill out the evaluation form in their folder and leave it in a large envelope you provide or face down on a table at the front or back of the room.