SlideShare a Scribd company logo
Internet Safety: What
Parents and Students
should know
JUDI L. CALHOUN
CHIEF DEPUTY PROSECUTOR
My the times they are a
changing…
 Just think 15-20 years ago, we were not
saying these words on a regular basis
 I need to update my status on Facebook
 Sending a tweet on Twitter
 Now it seems everyone uses the internet
 Just recently received a Facebook request from my 87 year old
great uncle and MY MOM!!!
Access has increased
 In a 2004 survey by Pew Research Center, 18% of teens
age 12 owned a cell phone
 In 2009 survey, 58% of 12 year olds own a cell phone
 Most recently – 28% of K-2nd graders have cell phones
 12% have mobile internet
 43% of 3rd – 5th graders have cell phones
 15% with mobile internet
Access increases with age
 83% of middle school students have cell
phones
 Now, 98% of high school students own a
cell phone
How kids receive messages
 Do you call your kids?
Do they answer the phone??
Most respond by text
Even grandparents are texting now
 Schools are using text messages to send
information
Snow days
Reminders
 Guarantee the kids will read the message
Cell phones are not the
only access
 Facebook
 Instagram
 Twitter
 Emails
 Blogging
 Instant
Messaging
 iPods and iPads
 Online Gaming
 How much is your
child exposed to
daily?
Scary Social Networking
Sites
Every Parent Should Know
Instagram
 Most popular social media network
Creepy
 It allows anyone with access to another
person’s online photos to pull sensitive
geotag data, allowing them to pinpoint
where the photo was taken
Scary Sites
Craigslist
 Can post ads for items to sell
 Can also post to meet people
Backpages.com
 Muncie has it own page
Jack’d
 Website typically for homosexual
encounters
Scary Sites
Ask.fm
 Allows users to ask other users questions, with
the option of being anonymous
Example – “why are you a loser?”
Vine
 Can be used to post short videos
 Can also be used to videotape other w/o their
knowledge – used to harass or mock others
Scary Sites – SnapChat
SnapChat
 Widely known as the “sexting app”
 Allows users to take photos, record videos,
add text and drawings and send them to
a controlled list of followers
 Followers can only view photos for short
time after which SnapChat destroys them
 Screen shots can be taken to preserve
photos
Scary Sites
KiK
 An instant messenger service designed for use
on smartphones – use of fake usernames
 Main users are aged 11-15
Pheed
 Allows teens to livestream what they are doing
at any given moment
8 Scary Sites
Qooh.me
 Allows teens to ask other users anonymous
questions
 No online moderator to check for content
Oovoo
 A startup video chat and instant messaging app
 Have to be 13 yrs old but users can lie about age
Scary Sites - Tinder
Tinder
 A dating app or a “hook-up” site
 Locates “singles” near your location
 An image of a single person is shown – if you find
them attractive, you swipe right and then you can
message them
Emphasis that you have to be physically attractive
to be desired
Dangers of meeting someone online or in person
Scary Sites – Yik Yak
Yik Yak
 Free app with no registration – total anonymity
 Connects up to 500 nearby users to an
anonymous chat room
 Used in cyberbullying
Impossible to trace the writer of the offensive
content
Can be distributed to a wide array of viewers
Scary Sites
Chatroulette
 Dubbed a “predator’s paradise”
 Can randomly chat with individuals as they
appear on the screen thru text, audio or
video
4chan
 Anonymous message board
 Contains posts described as vulgar, stupid
and occasionally dangerous
Scary Sites
Omegle
 A chatting site – “you” talking to a “stranger”
 Anonymous chat – either text or video
Tumblr
 Photo/video sharing app
 Users can easily access pornographic, violent
and inappropriate content
The list goes on and on…
Voxer
 A push to talk/walkie-talkie app for short voice
messages
Poke
 Sent photos will “self-destruct” within seconds
Whisper
 Allows anonymous accounts to make their
messages or confessions overlap an image
Photos are also
being shared
250 million photos are
uploaded per day
About 7.5 million per month
Where else can kids be
exposed to predators?
— Various Online Gaming sites
— Xbox Live
— PS3
— Real-Time Chat with web cams
— Blu-Ray Players – internet access
— School issued iPads
It all adds up…
 Exposure by the age of 21
 Playing video games – 5000 hours
 Talking on the cell phone – 10,000
hours
 Exchange of emails, text messages
and instant message – 250,000
hours
With Exposure Comes Risk
What are you and your kids
putting on the internet?
 How much personal information is being used
Who can find this
information?
Risk on the Internet
Theft of Personal Information
Exposure to Inappropriate Material
Sexual Solicitation – Sextortion
Sex Trafficking
Sexting
Harassment
Cyberbullying
What are you saying
about you?
When others read your profile
online, what conclusions can be
drawn about you?
Are you giving away
information that can put you in
jeopardy?
What about your child?
What is he/she posting on the
internet?
Who is looking at his/her profile?
What conclusions can be drawn
about your child just from
his/her online presence?
Even bad guys use the
internet
 Offenders read posts and search for
photos all day long and then they draw
conclusions and decide whether or not a
particular victim is a viable target
 Offenders think about whether or not you
are “worth the risk” if they get caught
We may be our own worst
enemy
 We provide the information directly to
the thieves
 How much information do you have
on your Facebook Page
 Where you live
 Date of Birth
 Where you work
 Kids – names and ages
 When you are on vacation (and away from home)
 Events you are attending
Sextortion
 Most likely way for teen to be exploited
 Combines Sexting and Cyberbullying
 Unfortunately, the information is out there
 Who we are, what we like, where we live, our
friends…
 84% of teens have at least 1 social networking
profile and 46% of teens have open access to
their profiles online
How does Sextortion work?
Offender
 gets one of the “Sexting” photos which catches the
teenager in a compromising position
 contacts the teen online
 demands more photos
 threatens to disclose photo to teen’s family & friends
unless teen sends more photos
 teen is too scared to tell and sends more photos
Is this easy to do?
Think about your child’s online
presence
 Facebook, School iPads, iPods, Tablets,
YouTube, webcams, sharing photos
Everything a predator needs
to know to get close to you
child is already on the internet
 Where she goes to school, vacation photos,
favorite color, best friend, likes/dislikes….
3 Types of Sextortion
Power & Control
I’ll ruin your reputation
Offender keeps upping the “ante” for
more salacious photos
Can last for hours, days or even months
1st photo may have been innocent but
multiplies with each additional photo
the offender extorts from teen
Anonymous
 “Drive-By” Sextortion
 No account or screen name required
 Offender flatters teen to get him/her to
“flash” the webcam
 Offender sends image back to teen and
says you have 2 minutes to _________.
 Teen gets scared and complies
More photos out there for the next
offender…
Wolf in Sheep’s Clothing
 Offender befriends the victim thru
common sites
 Talks about mutual interest, etc…
Which he learned from the internet
about child
 Asks teen to voluntarily produce images
 Unfortunately, many teens comply
 Threats to send to friends and family may
come later if victim stops sending photos
What to do about
Sextortion?
Educate kids not to take that
1st photo
 Almost every child porn collector has a collection of
self-produced images of kids that were placed on
internet voluntarily
Talk to your kids
 Let them know they can tell you anything even if they
made a mistake by taking the 1st photo
 Whether your child will tell you depends on how the
child perceives the parent will react
Save Everything
 If your child comes to you with this
issue, make sure to save everything
for the police
 Unfortunately, teens tends to delete everything so no
one will find out
 Problem – our laws of jurisdiction
(where a case can be filed) are
antiquated for online crimes
So what do you do???
 Have I scared you enough that you will
move to the mountains and cut off all
communication with the outside world??
 Probably not, but the first reaction is to
take away your child’s computer, cell
phone
 Will that work?
No – that will not work…
When you cut your child off from
the Internet or cell phone, where
do they go?
 Friend’s House
 Relative’s House
 School
 Library
 iPod or School iPad
Internet Safety Tips
Prepare yourself beforehand
 Talk and be open with your kids and teens
Keep your cool and be cool
Encourage them to confide
in you.
Internet Safety Tips
Establish rules for Internet use
 Keep rules posted near computer
What sites can your child visit?
How long will they be online?
Where can they use a
computer?
Internet Safety Tips
 Be Informed
 Learn everything you can about the
Internet
 Ask your kids to show you places they
go online or learn online gaming
 Know what other access your child
may have including text messaging
Become Educated
 Learn chat-room lingo by going
to WWW.CyberTipline.com for a
list of acronyms like POS = Parent
Over Shoulder
 Follow the “cookies” – recent
searches
 Try out their online games –
become a part of their world
Internet Safety Tips
Consider safeguarding options
Check out blocking, filtering, and
rating applications
Learn about filtering and
monitoring software and WHEN TO
USE THEM
Internet Safety Tips
CyberTipline
Report incidents of child
sexual exploitation to the
CyberTipline by calling 1-800-
843-5678 or at
www.cybertipline.com
Cybertipline.com
netsmartz.org
insor.org
Familywatchdog.us
Wiredsafety.org
GetNetWise.org
Safeteens.org
BlogSafety.Com
Integrityonline.com
Helpful web sites:

More Related Content

What's hot

E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
Franklin Matters
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
jaimejoyh
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Cathleen Richardson
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Heads up!
Heads up!Heads up!
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
Michael Richards
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
tdsparks3
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Parenting & Education
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
SearchLock
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
ProjectsByJen.com
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineHolly Solomon
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetykirshee
 

What's hot (20)

E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Heads up!
Heads up!Heads up!
Heads up!
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
 
Hot topic
Hot topicHot topic
Hot topic
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked

Technology4learning
Technology4learningTechnology4learning
British Military Presence in the Midwest, 1760-1786
British Military Presence in the Midwest, 1760-1786British Military Presence in the Midwest, 1760-1786
British Military Presence in the Midwest, 1760-1786
University of Wisconsin - Superior
 
Successful Teaching Interviews
Successful Teaching InterviewsSuccessful Teaching Interviews
Successful Teaching Interviews
University of Wisconsin - Superior
 
20131114 developingsmp ietc
20131114 developingsmp ietc20131114 developingsmp ietc
20131114 developingsmp ietc
University of Wisconsin - Superior
 
Researching the British Army during the American Revolution
Researching the British Army during the American RevolutionResearching the British Army during the American Revolution
Researching the British Army during the American Revolution
University of Wisconsin - Superior
 
The Ins and Outs of Building a Digital Curriculum with Free and Open Resources
The Ins and Outs of Building a Digital Curriculum with Free and Open ResourcesThe Ins and Outs of Building a Digital Curriculum with Free and Open Resources
The Ins and Outs of Building a Digital Curriculum with Free and Open Resources
University of Wisconsin - Superior
 
Advocating for School Library Programs
Advocating for School Library ProgramsAdvocating for School Library Programs
Advocating for School Library Programs
University of Wisconsin - Superior
 
Collaboration for Successful Staff Development
Collaboration for Successful Staff DevelopmentCollaboration for Successful Staff Development
Collaboration for Successful Staff Development
University of Wisconsin - Superior
 
Constructing a Staff Development Plan
Constructing a Staff Development PlanConstructing a Staff Development Plan
Constructing a Staff Development Plan
University of Wisconsin - Superior
 
Muncie Community Schools State of the Schools 10/2015
Muncie Community Schools State of the Schools 10/2015Muncie Community Schools State of the Schools 10/2015
Muncie Community Schools State of the Schools 10/2015
University of Wisconsin - Superior
 
Evaluating 1 to 1 Workshop
Evaluating 1 to 1 WorkshopEvaluating 1 to 1 Workshop
Evaluating 1 to 1 Workshop
University of Wisconsin - Superior
 
How & Why to Communicate your Library’s Value
How & Why  to Communicate your Library’s Value How & Why  to Communicate your Library’s Value
How & Why to Communicate your Library’s Value
University of Wisconsin - Superior
 
Collaboration for Successful Staff Development
Collaboration for Successful Staff DevelopmentCollaboration for Successful Staff Development
Collaboration for Successful Staff Development
University of Wisconsin - Superior
 
Hardware Basics for Educational Administrators in 2002
Hardware Basics for Educational Administrators in 2002Hardware Basics for Educational Administrators in 2002
Hardware Basics for Educational Administrators in 2002
University of Wisconsin - Superior
 
Sex Trafficking - Judge K. Dowling
Sex Trafficking - Judge K. DowlingSex Trafficking - Judge K. Dowling
Sex Trafficking - Judge K. Dowling
University of Wisconsin - Superior
 
Rubric Development for Teachers
Rubric Development for TeachersRubric Development for Teachers
Rubric Development for Teachers
University of Wisconsin - Superior
 
Evaluating Instructional Technology Program
Evaluating Instructional Technology ProgramEvaluating Instructional Technology Program
Evaluating Instructional Technology Program
University of Wisconsin - Superior
 
Facets of Educational Technology
Facets of Educational TechnologyFacets of Educational Technology
Facets of Educational Technology
University of Wisconsin - Superior
 

Viewers also liked (18)

Technology4learning
Technology4learningTechnology4learning
Technology4learning
 
British Military Presence in the Midwest, 1760-1786
British Military Presence in the Midwest, 1760-1786British Military Presence in the Midwest, 1760-1786
British Military Presence in the Midwest, 1760-1786
 
Successful Teaching Interviews
Successful Teaching InterviewsSuccessful Teaching Interviews
Successful Teaching Interviews
 
20131114 developingsmp ietc
20131114 developingsmp ietc20131114 developingsmp ietc
20131114 developingsmp ietc
 
Researching the British Army during the American Revolution
Researching the British Army during the American RevolutionResearching the British Army during the American Revolution
Researching the British Army during the American Revolution
 
The Ins and Outs of Building a Digital Curriculum with Free and Open Resources
The Ins and Outs of Building a Digital Curriculum with Free and Open ResourcesThe Ins and Outs of Building a Digital Curriculum with Free and Open Resources
The Ins and Outs of Building a Digital Curriculum with Free and Open Resources
 
Advocating for School Library Programs
Advocating for School Library ProgramsAdvocating for School Library Programs
Advocating for School Library Programs
 
Collaboration for Successful Staff Development
Collaboration for Successful Staff DevelopmentCollaboration for Successful Staff Development
Collaboration for Successful Staff Development
 
Constructing a Staff Development Plan
Constructing a Staff Development PlanConstructing a Staff Development Plan
Constructing a Staff Development Plan
 
Muncie Community Schools State of the Schools 10/2015
Muncie Community Schools State of the Schools 10/2015Muncie Community Schools State of the Schools 10/2015
Muncie Community Schools State of the Schools 10/2015
 
Evaluating 1 to 1 Workshop
Evaluating 1 to 1 WorkshopEvaluating 1 to 1 Workshop
Evaluating 1 to 1 Workshop
 
How & Why to Communicate your Library’s Value
How & Why  to Communicate your Library’s Value How & Why  to Communicate your Library’s Value
How & Why to Communicate your Library’s Value
 
Collaboration for Successful Staff Development
Collaboration for Successful Staff DevelopmentCollaboration for Successful Staff Development
Collaboration for Successful Staff Development
 
Hardware Basics for Educational Administrators in 2002
Hardware Basics for Educational Administrators in 2002Hardware Basics for Educational Administrators in 2002
Hardware Basics for Educational Administrators in 2002
 
Sex Trafficking - Judge K. Dowling
Sex Trafficking - Judge K. DowlingSex Trafficking - Judge K. Dowling
Sex Trafficking - Judge K. Dowling
 
Rubric Development for Teachers
Rubric Development for TeachersRubric Development for Teachers
Rubric Development for Teachers
 
Evaluating Instructional Technology Program
Evaluating Instructional Technology ProgramEvaluating Instructional Technology Program
Evaluating Instructional Technology Program
 
Facets of Educational Technology
Facets of Educational TechnologyFacets of Educational Technology
Facets of Educational Technology
 

Similar to Internet Safety - Judi Calhoun

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
KanelandSvihlik
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
Dan Bowen
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
Rahuljain40418
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
Mark Deming
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
Barry Caplin
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011DHE2008
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
Eric Cedo
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
Rodolfo Salazar
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Jeff Dungan
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
sharon7111
 
London Borough of Ealing Online Safety for parents
London Borough of Ealing Online Safety for parentsLondon Borough of Ealing Online Safety for parents
London Borough of Ealing Online Safety for parents
Dai Barnes
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
columbiahighschoollibrary
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
columbiahighschoollibrary
 
102009
102009102009

Similar to Internet Safety - Judi Calhoun (20)

Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
London Borough of Ealing Online Safety for parents
London Borough of Ealing Online Safety for parentsLondon Borough of Ealing Online Safety for parents
London Borough of Ealing Online Safety for parents
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
102009
102009102009
102009
 

More from University of Wisconsin - Superior

OED Content
OED Content OED Content
Perspectives on Public - School Library Partnerships
Perspectives on Public - School Library PartnershipsPerspectives on Public - School Library Partnerships
Perspectives on Public - School Library Partnerships
University of Wisconsin - Superior
 
2017 Muncie State of the Schools Address
2017 Muncie State of the Schools Address2017 Muncie State of the Schools Address
2017 Muncie State of the Schools Address
University of Wisconsin - Superior
 
Muncie Community Schools Business Partnership Presentation
Muncie Community Schools Business Partnership PresentationMuncie Community Schools Business Partnership Presentation
Muncie Community Schools Business Partnership Presentation
University of Wisconsin - Superior
 
Muncie Last Best Offer Presentation
Muncie Last Best Offer PresentationMuncie Last Best Offer Presentation
Muncie Last Best Offer Presentation
University of Wisconsin - Superior
 
Muncie Fiscal Situation
Muncie Fiscal SituationMuncie Fiscal Situation
Muncie Fiscal Situation
University of Wisconsin - Superior
 
2016 Muncie State of the Schools Address
2016 Muncie State of the Schools Address2016 Muncie State of the Schools Address
2016 Muncie State of the Schools Address
University of Wisconsin - Superior
 
Address to the Muncie Noon Rotary
Address to the Muncie Noon RotaryAddress to the Muncie Noon Rotary
Address to the Muncie Noon Rotary
University of Wisconsin - Superior
 
High School Online Credit Recovery
High School Online Credit RecoveryHigh School Online Credit Recovery
High School Online Credit Recovery
University of Wisconsin - Superior
 
Delaware County LWV Standardized testing Forum
Delaware County LWV Standardized testing ForumDelaware County LWV Standardized testing Forum
Delaware County LWV Standardized testing Forum
University of Wisconsin - Superior
 
Soldiers of the 18th foot
Soldiers of the 18th footSoldiers of the 18th foot
Soldiers of the 18th foot
University of Wisconsin - Superior
 
Evaluating 1 to 1 Learning Programs
Evaluating 1 to 1 Learning ProgramsEvaluating 1 to 1 Learning Programs
Evaluating 1 to 1 Learning Programs
University of Wisconsin - Superior
 
Teen Internet Safety
Teen Internet SafetyTeen Internet Safety
MCS Opening Day Presentation
MCS Opening Day PresentationMCS Opening Day Presentation
MCS Opening Day Presentation
University of Wisconsin - Superior
 
Alternatives to Suspension & Explusion
Alternatives to Suspension & ExplusionAlternatives to Suspension & Explusion
Alternatives to Suspension & Explusion
University of Wisconsin - Superior
 
Assessing the Whole School
Assessing the Whole SchoolAssessing the Whole School
Assessing the Whole School
University of Wisconsin - Superior
 
Preparing School Leaders
Preparing School LeadersPreparing School Leaders
Preparing School Leaders
University of Wisconsin - Superior
 
State of 1:1 Programs from Mobile Explosion
State of 1:1 Programs from Mobile ExplosionState of 1:1 Programs from Mobile Explosion
State of 1:1 Programs from Mobile Explosion
University of Wisconsin - Superior
 
Budgeting for Technology
Budgeting for TechnologyBudgeting for Technology
Budgeting for Technology
University of Wisconsin - Superior
 
Future Ready Presentation for Kishwaukee IPA
Future Ready Presentation for Kishwaukee IPAFuture Ready Presentation for Kishwaukee IPA
Future Ready Presentation for Kishwaukee IPA
University of Wisconsin - Superior
 

More from University of Wisconsin - Superior (20)

OED Content
OED Content OED Content
OED Content
 
Perspectives on Public - School Library Partnerships
Perspectives on Public - School Library PartnershipsPerspectives on Public - School Library Partnerships
Perspectives on Public - School Library Partnerships
 
2017 Muncie State of the Schools Address
2017 Muncie State of the Schools Address2017 Muncie State of the Schools Address
2017 Muncie State of the Schools Address
 
Muncie Community Schools Business Partnership Presentation
Muncie Community Schools Business Partnership PresentationMuncie Community Schools Business Partnership Presentation
Muncie Community Schools Business Partnership Presentation
 
Muncie Last Best Offer Presentation
Muncie Last Best Offer PresentationMuncie Last Best Offer Presentation
Muncie Last Best Offer Presentation
 
Muncie Fiscal Situation
Muncie Fiscal SituationMuncie Fiscal Situation
Muncie Fiscal Situation
 
2016 Muncie State of the Schools Address
2016 Muncie State of the Schools Address2016 Muncie State of the Schools Address
2016 Muncie State of the Schools Address
 
Address to the Muncie Noon Rotary
Address to the Muncie Noon RotaryAddress to the Muncie Noon Rotary
Address to the Muncie Noon Rotary
 
High School Online Credit Recovery
High School Online Credit RecoveryHigh School Online Credit Recovery
High School Online Credit Recovery
 
Delaware County LWV Standardized testing Forum
Delaware County LWV Standardized testing ForumDelaware County LWV Standardized testing Forum
Delaware County LWV Standardized testing Forum
 
Soldiers of the 18th foot
Soldiers of the 18th footSoldiers of the 18th foot
Soldiers of the 18th foot
 
Evaluating 1 to 1 Learning Programs
Evaluating 1 to 1 Learning ProgramsEvaluating 1 to 1 Learning Programs
Evaluating 1 to 1 Learning Programs
 
Teen Internet Safety
Teen Internet SafetyTeen Internet Safety
Teen Internet Safety
 
MCS Opening Day Presentation
MCS Opening Day PresentationMCS Opening Day Presentation
MCS Opening Day Presentation
 
Alternatives to Suspension & Explusion
Alternatives to Suspension & ExplusionAlternatives to Suspension & Explusion
Alternatives to Suspension & Explusion
 
Assessing the Whole School
Assessing the Whole SchoolAssessing the Whole School
Assessing the Whole School
 
Preparing School Leaders
Preparing School LeadersPreparing School Leaders
Preparing School Leaders
 
State of 1:1 Programs from Mobile Explosion
State of 1:1 Programs from Mobile ExplosionState of 1:1 Programs from Mobile Explosion
State of 1:1 Programs from Mobile Explosion
 
Budgeting for Technology
Budgeting for TechnologyBudgeting for Technology
Budgeting for Technology
 
Future Ready Presentation for Kishwaukee IPA
Future Ready Presentation for Kishwaukee IPAFuture Ready Presentation for Kishwaukee IPA
Future Ready Presentation for Kishwaukee IPA
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 

Internet Safety - Judi Calhoun

  • 1. Internet Safety: What Parents and Students should know JUDI L. CALHOUN CHIEF DEPUTY PROSECUTOR
  • 2. My the times they are a changing…  Just think 15-20 years ago, we were not saying these words on a regular basis  I need to update my status on Facebook  Sending a tweet on Twitter  Now it seems everyone uses the internet  Just recently received a Facebook request from my 87 year old great uncle and MY MOM!!!
  • 3. Access has increased  In a 2004 survey by Pew Research Center, 18% of teens age 12 owned a cell phone  In 2009 survey, 58% of 12 year olds own a cell phone  Most recently – 28% of K-2nd graders have cell phones  12% have mobile internet  43% of 3rd – 5th graders have cell phones  15% with mobile internet
  • 4. Access increases with age  83% of middle school students have cell phones  Now, 98% of high school students own a cell phone
  • 5. How kids receive messages  Do you call your kids? Do they answer the phone?? Most respond by text Even grandparents are texting now  Schools are using text messages to send information Snow days Reminders  Guarantee the kids will read the message
  • 6. Cell phones are not the only access  Facebook  Instagram  Twitter  Emails  Blogging  Instant Messaging  iPods and iPads  Online Gaming  How much is your child exposed to daily?
  • 7. Scary Social Networking Sites Every Parent Should Know Instagram  Most popular social media network Creepy  It allows anyone with access to another person’s online photos to pull sensitive geotag data, allowing them to pinpoint where the photo was taken
  • 8. Scary Sites Craigslist  Can post ads for items to sell  Can also post to meet people Backpages.com  Muncie has it own page Jack’d  Website typically for homosexual encounters
  • 9. Scary Sites Ask.fm  Allows users to ask other users questions, with the option of being anonymous Example – “why are you a loser?” Vine  Can be used to post short videos  Can also be used to videotape other w/o their knowledge – used to harass or mock others
  • 10. Scary Sites – SnapChat SnapChat  Widely known as the “sexting app”  Allows users to take photos, record videos, add text and drawings and send them to a controlled list of followers  Followers can only view photos for short time after which SnapChat destroys them  Screen shots can be taken to preserve photos
  • 11. Scary Sites KiK  An instant messenger service designed for use on smartphones – use of fake usernames  Main users are aged 11-15 Pheed  Allows teens to livestream what they are doing at any given moment
  • 12. 8 Scary Sites Qooh.me  Allows teens to ask other users anonymous questions  No online moderator to check for content Oovoo  A startup video chat and instant messaging app  Have to be 13 yrs old but users can lie about age
  • 13. Scary Sites - Tinder Tinder  A dating app or a “hook-up” site  Locates “singles” near your location  An image of a single person is shown – if you find them attractive, you swipe right and then you can message them Emphasis that you have to be physically attractive to be desired Dangers of meeting someone online or in person
  • 14. Scary Sites – Yik Yak Yik Yak  Free app with no registration – total anonymity  Connects up to 500 nearby users to an anonymous chat room  Used in cyberbullying Impossible to trace the writer of the offensive content Can be distributed to a wide array of viewers
  • 15. Scary Sites Chatroulette  Dubbed a “predator’s paradise”  Can randomly chat with individuals as they appear on the screen thru text, audio or video 4chan  Anonymous message board  Contains posts described as vulgar, stupid and occasionally dangerous
  • 16. Scary Sites Omegle  A chatting site – “you” talking to a “stranger”  Anonymous chat – either text or video Tumblr  Photo/video sharing app  Users can easily access pornographic, violent and inappropriate content
  • 17. The list goes on and on… Voxer  A push to talk/walkie-talkie app for short voice messages Poke  Sent photos will “self-destruct” within seconds Whisper  Allows anonymous accounts to make their messages or confessions overlap an image
  • 18.
  • 19.
  • 20.
  • 21. Photos are also being shared 250 million photos are uploaded per day About 7.5 million per month
  • 22. Where else can kids be exposed to predators? — Various Online Gaming sites — Xbox Live — PS3 — Real-Time Chat with web cams — Blu-Ray Players – internet access — School issued iPads
  • 23. It all adds up…  Exposure by the age of 21  Playing video games – 5000 hours  Talking on the cell phone – 10,000 hours  Exchange of emails, text messages and instant message – 250,000 hours
  • 24. With Exposure Comes Risk What are you and your kids putting on the internet?  How much personal information is being used Who can find this information?
  • 25. Risk on the Internet Theft of Personal Information Exposure to Inappropriate Material Sexual Solicitation – Sextortion Sex Trafficking Sexting Harassment Cyberbullying
  • 26. What are you saying about you? When others read your profile online, what conclusions can be drawn about you? Are you giving away information that can put you in jeopardy?
  • 27. What about your child? What is he/she posting on the internet? Who is looking at his/her profile? What conclusions can be drawn about your child just from his/her online presence?
  • 28. Even bad guys use the internet  Offenders read posts and search for photos all day long and then they draw conclusions and decide whether or not a particular victim is a viable target  Offenders think about whether or not you are “worth the risk” if they get caught
  • 29. We may be our own worst enemy  We provide the information directly to the thieves  How much information do you have on your Facebook Page  Where you live  Date of Birth  Where you work  Kids – names and ages  When you are on vacation (and away from home)  Events you are attending
  • 30. Sextortion  Most likely way for teen to be exploited  Combines Sexting and Cyberbullying  Unfortunately, the information is out there  Who we are, what we like, where we live, our friends…  84% of teens have at least 1 social networking profile and 46% of teens have open access to their profiles online
  • 31. How does Sextortion work? Offender  gets one of the “Sexting” photos which catches the teenager in a compromising position  contacts the teen online  demands more photos  threatens to disclose photo to teen’s family & friends unless teen sends more photos  teen is too scared to tell and sends more photos
  • 32. Is this easy to do? Think about your child’s online presence  Facebook, School iPads, iPods, Tablets, YouTube, webcams, sharing photos Everything a predator needs to know to get close to you child is already on the internet  Where she goes to school, vacation photos, favorite color, best friend, likes/dislikes….
  • 33. 3 Types of Sextortion Power & Control I’ll ruin your reputation Offender keeps upping the “ante” for more salacious photos Can last for hours, days or even months 1st photo may have been innocent but multiplies with each additional photo the offender extorts from teen
  • 34. Anonymous  “Drive-By” Sextortion  No account or screen name required  Offender flatters teen to get him/her to “flash” the webcam  Offender sends image back to teen and says you have 2 minutes to _________.  Teen gets scared and complies More photos out there for the next offender…
  • 35. Wolf in Sheep’s Clothing  Offender befriends the victim thru common sites  Talks about mutual interest, etc… Which he learned from the internet about child  Asks teen to voluntarily produce images  Unfortunately, many teens comply  Threats to send to friends and family may come later if victim stops sending photos
  • 36. What to do about Sextortion? Educate kids not to take that 1st photo  Almost every child porn collector has a collection of self-produced images of kids that were placed on internet voluntarily Talk to your kids  Let them know they can tell you anything even if they made a mistake by taking the 1st photo  Whether your child will tell you depends on how the child perceives the parent will react
  • 37. Save Everything  If your child comes to you with this issue, make sure to save everything for the police  Unfortunately, teens tends to delete everything so no one will find out  Problem – our laws of jurisdiction (where a case can be filed) are antiquated for online crimes
  • 38. So what do you do???  Have I scared you enough that you will move to the mountains and cut off all communication with the outside world??  Probably not, but the first reaction is to take away your child’s computer, cell phone  Will that work?
  • 39. No – that will not work… When you cut your child off from the Internet or cell phone, where do they go?  Friend’s House  Relative’s House  School  Library  iPod or School iPad
  • 40. Internet Safety Tips Prepare yourself beforehand  Talk and be open with your kids and teens Keep your cool and be cool Encourage them to confide in you.
  • 41. Internet Safety Tips Establish rules for Internet use  Keep rules posted near computer What sites can your child visit? How long will they be online? Where can they use a computer?
  • 42. Internet Safety Tips  Be Informed  Learn everything you can about the Internet  Ask your kids to show you places they go online or learn online gaming  Know what other access your child may have including text messaging
  • 43. Become Educated  Learn chat-room lingo by going to WWW.CyberTipline.com for a list of acronyms like POS = Parent Over Shoulder  Follow the “cookies” – recent searches  Try out their online games – become a part of their world
  • 44. Internet Safety Tips Consider safeguarding options Check out blocking, filtering, and rating applications Learn about filtering and monitoring software and WHEN TO USE THEM
  • 45. Internet Safety Tips CyberTipline Report incidents of child sexual exploitation to the CyberTipline by calling 1-800- 843-5678 or at www.cybertipline.com