SlideShare a Scribd company logo
Internet Safety A guide
Internet Safety Content Disclaimer Acceptable Use Policy Julie . . . her story Statistics IM/email/Chat rooms Blogging Inappropriate Content Resources References Think smart, Play smart, Be smart, Play SAFE!
Disclaimer This publications is not intended for professional use in any manner.  The author of this publication attempted to gather information pertaining to the safety of kids and tweens using the internet.  This is not intended for legal or professional consultation. The information in the publication is subject to change by the author of the referenced material.  All attempts were made to assure accuracy of the information in this publication.
Acceptable Use Policy Purpose The purpose of this policy is to ensure appropriate, responsible, ethical and legal access and use of computers, the Internet, and other electronic or communication devices by District students, patrons, and employees. The Technology Acceptable Use Policy addresses two distinct concepts of technology use. The first regards the use of computers and the Internet, and the second addresses interfering and electronic communication devices. Washington County School District, St. George, UT.
Acceptable Use Policy Policy 2.1. Computers and the Internet It is the policy of the Washington County School District to permit students, patrons, and employees to have computer and Internet access under approved regulations and guidelines, to include those listed in the Children's Internet Protection Act, State Law, and policies adopted by Board of Education. In general, the user's responsibilities require responsible, decent, ethical, polite, efficient, and legal use of computer and network resources. Students, patrons, and employees must not access obscene, pornographic, or material that is deemed to be harmful to minors. District and school personnel will instruct students and staff on acceptable use of computers and Internet resources and proper network etiquette.  All students, patrons, and employees are granted access to the Internet, but all access to the Internet through district resources is subject to the terms of the Technology Acceptable Use Agreement and District policy. Washington County School District, St. George, UT.
Acceptable Use Policy Policy 2.2. Interfering and electronic communication devices While in some instances the possession and use of electronic communication devices or other devices or objects by a student at a school may be appropriate, often the possession and use of such devices or objects by students at school can have the effect of distracting, disrupting, and intimidating others in the school setting and leading to opportunities for academic dishonesty and other disruptions of the educational process. The purpose of this component of the policy is to vest with school administrators the authority to enforce reasonable rules relating to student use of such objects or devices in the public schools. Washington County School District, St. George, UT.
Julie . . . Her story of how she got caught up in something she had no control over due to manipulation and anger . . .  Someone could be looking into your daily life without you realizing it. her story
Statistics Consider a recent survey of teenagers that revealed the following: ,[object Object]
60%  have an instant-message screen name
75%  have a cell phone
72%  have profiles on social networking sitesThink before you type All statistics provided by www.aldricchang.com
Statistics And on a more disturbing note ,[object Object]
most share personal info online, though 3 in 5 know it’s dangerous
1 in 4 know someone who experienced something bad, from an inappropriate text forwarded around school to being sexually victimizedAll statistics provided by www.aldricchang.com
Statistics Access ,[object Object]
Of the children (0-5) who use the Internet, 80% use it at least once a week.Cell Phones ,[object Object]
On average, texting teens (12-17) send and receive 1500 text messages a month.Friends Only! All statistics provided by www.netsmartz.com
Be Nice Statistics Cyberbullying ,[object Object]
Girls are more likely to be victims of cyberbullying (38% girls vs. 26% boys).Online Gaming ,[object Object]
27% of teens (12-17) play games with people they don’t know online.All statistics provided by www.netsmartz.com
Statistics Predators ,[object Object]

More Related Content

What's hot

Internet safety
Internet safetyInternet safety
Internet safety
Dan Tomlinson
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
Sarah K Miller
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
Avanzo net
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
 
Internet safety for students
Internet safety for studentsInternet safety for students
Internet safety for studentsMargaret Springer
 
Internet safety
Internet safety Internet safety
Internet safety
bhavya mohindru
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
Moumita Chatterjee
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
KanelandSvihlik
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Andreareyeshdz
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
jaimejoyh
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentationsahrdebeck52
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 

What's hot (20)

Internet safety
Internet safetyInternet safety
Internet safety
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Internet safety for students
Internet safety for studentsInternet safety for students
Internet safety for students
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentation
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 

Viewers also liked

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
jaurisch
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
KanelandSvihlik
 
Multimedia technology
Multimedia technologyMultimedia technology
Multimedia technology
Vishnu Ram
 
multimedia technologies Introduction
multimedia technologies Introductionmultimedia technologies Introduction
multimedia technologies Introduction
Mohammed Fareed
 
Multimedia presentation
  Multimedia presentation   Multimedia presentation
Multimedia presentation
kamalesh2015
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
Suaj
 
multimedia element
multimedia elementmultimedia element
multimedia element
AZMAN KADIR
 
Multimedia
MultimediaMultimedia
Multimedia
Shivam Tuteja
 

Viewers also liked (8)

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
Multimedia technology
Multimedia technologyMultimedia technology
Multimedia technology
 
multimedia technologies Introduction
multimedia technologies Introductionmultimedia technologies Introduction
multimedia technologies Introduction
 
Multimedia presentation
  Multimedia presentation   Multimedia presentation
Multimedia presentation
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
 
multimedia element
multimedia elementmultimedia element
multimedia element
 
Multimedia
MultimediaMultimedia
Multimedia
 

Similar to Internet Safety Presentation

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
SimonBalle
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
Maria Petropulos
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
Andri Priyatna
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
Fred Miller
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet Safety
Erica Roberts
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database Resources
Ms. D
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
Al Rowell
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
Toby Treacher
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Karen Brooks
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
alexfinvle
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
LightedCandle
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 

Similar to Internet Safety Presentation (20)

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Legalissues
LegalissuesLegalissues
Legalissues
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet Safety
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database Resources
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 

More from tdsparks3

Evaluation for Far West Laboratory for Educational Research and Development
Evaluation for Far West Laboratory for Educational Research and DevelopmentEvaluation for Far West Laboratory for Educational Research and Development
Evaluation for Far West Laboratory for Educational Research and Developmenttdsparks3
 
Digital Divide vs Digital Inequality
Digital Divide vs Digital InequalityDigital Divide vs Digital Inequality
Digital Divide vs Digital Inequality
tdsparks3
 
Unit of Instruction
Unit of InstructionUnit of Instruction
Unit of Instructiontdsparks3
 
Stop motion animation psw
Stop motion animation pswStop motion animation psw
Stop motion animation pswtdsparks3
 
541 video enhanced lesson
541 video enhanced lesson541 video enhanced lesson
541 video enhanced lesson
tdsparks3
 
Computer networking
Computer networkingComputer networking
Computer networking
tdsparks3
 
Instructional Software Presentation
Instructional Software PresentationInstructional Software Presentation
Instructional Software Presentationtdsparks3
 
Instructional software presentation
Instructional software presentationInstructional software presentation
Instructional software presentationtdsparks3
 
Relative advantage chart
Relative advantage chartRelative advantage chart
Relative advantage charttdsparks3
 

More from tdsparks3 (9)

Evaluation for Far West Laboratory for Educational Research and Development
Evaluation for Far West Laboratory for Educational Research and DevelopmentEvaluation for Far West Laboratory for Educational Research and Development
Evaluation for Far West Laboratory for Educational Research and Development
 
Digital Divide vs Digital Inequality
Digital Divide vs Digital InequalityDigital Divide vs Digital Inequality
Digital Divide vs Digital Inequality
 
Unit of Instruction
Unit of InstructionUnit of Instruction
Unit of Instruction
 
Stop motion animation psw
Stop motion animation pswStop motion animation psw
Stop motion animation psw
 
541 video enhanced lesson
541 video enhanced lesson541 video enhanced lesson
541 video enhanced lesson
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Instructional Software Presentation
Instructional Software PresentationInstructional Software Presentation
Instructional Software Presentation
 
Instructional software presentation
Instructional software presentationInstructional software presentation
Instructional software presentation
 
Relative advantage chart
Relative advantage chartRelative advantage chart
Relative advantage chart
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 

Internet Safety Presentation

  • 2. Internet Safety Content Disclaimer Acceptable Use Policy Julie . . . her story Statistics IM/email/Chat rooms Blogging Inappropriate Content Resources References Think smart, Play smart, Be smart, Play SAFE!
  • 3. Disclaimer This publications is not intended for professional use in any manner. The author of this publication attempted to gather information pertaining to the safety of kids and tweens using the internet. This is not intended for legal or professional consultation. The information in the publication is subject to change by the author of the referenced material. All attempts were made to assure accuracy of the information in this publication.
  • 4. Acceptable Use Policy Purpose The purpose of this policy is to ensure appropriate, responsible, ethical and legal access and use of computers, the Internet, and other electronic or communication devices by District students, patrons, and employees. The Technology Acceptable Use Policy addresses two distinct concepts of technology use. The first regards the use of computers and the Internet, and the second addresses interfering and electronic communication devices. Washington County School District, St. George, UT.
  • 5. Acceptable Use Policy Policy 2.1. Computers and the Internet It is the policy of the Washington County School District to permit students, patrons, and employees to have computer and Internet access under approved regulations and guidelines, to include those listed in the Children's Internet Protection Act, State Law, and policies adopted by Board of Education. In general, the user's responsibilities require responsible, decent, ethical, polite, efficient, and legal use of computer and network resources. Students, patrons, and employees must not access obscene, pornographic, or material that is deemed to be harmful to minors. District and school personnel will instruct students and staff on acceptable use of computers and Internet resources and proper network etiquette.  All students, patrons, and employees are granted access to the Internet, but all access to the Internet through district resources is subject to the terms of the Technology Acceptable Use Agreement and District policy. Washington County School District, St. George, UT.
  • 6. Acceptable Use Policy Policy 2.2. Interfering and electronic communication devices While in some instances the possession and use of electronic communication devices or other devices or objects by a student at a school may be appropriate, often the possession and use of such devices or objects by students at school can have the effect of distracting, disrupting, and intimidating others in the school setting and leading to opportunities for academic dishonesty and other disruptions of the educational process. The purpose of this component of the policy is to vest with school administrators the authority to enforce reasonable rules relating to student use of such objects or devices in the public schools. Washington County School District, St. George, UT.
  • 7. Julie . . . Her story of how she got caught up in something she had no control over due to manipulation and anger . . . Someone could be looking into your daily life without you realizing it. her story
  • 8.
  • 9. 60% have an instant-message screen name
  • 10. 75% have a cell phone
  • 11. 72% have profiles on social networking sitesThink before you type All statistics provided by www.aldricchang.com
  • 12.
  • 13. most share personal info online, though 3 in 5 know it’s dangerous
  • 14. 1 in 4 know someone who experienced something bad, from an inappropriate text forwarded around school to being sexually victimizedAll statistics provided by www.aldricchang.com
  • 15.
  • 16.
  • 17. On average, texting teens (12-17) send and receive 1500 text messages a month.Friends Only! All statistics provided by www.netsmartz.com
  • 18.
  • 19.
  • 20. 27% of teens (12-17) play games with people they don’t know online.All statistics provided by www.netsmartz.com
  • 21.
  • 22. those with histories of sexual or physical abuse
  • 23. those who post sexually provocative photos/video
  • 24. those who talk about sex with unknown people online.
  • 25. Boys who are gay or questioning their sexuality are particularly at risk. 25% of victims are boys and almost all of their offenders are male.All statistics provided by www.netsmartz.com
  • 26.
  • 27. In more than one-quarter (27%) of incidents, solicitors asked youths for sexual photographs of themselves.All statistics provided by www.netsmartz.com
  • 28.
  • 29. 15% of cell-owning teens (12-17) say they have received sexually suggestive nude/semi-nude images of someone they know via text.A common Sense Approach to Internet Safety video Don’t send pics All statistics provided by www.netsmartz.com
  • 30.
  • 31. 47% of teens (12-17) have uploaded photos; 14 % have posted videos.
  • 32. 20% of teens report that it is safe.All statistics provided by www.netsmartz.com
  • 33.
  • 34. Assist your child in creating screen names and email addresses that do not contain personal information.
  • 35. Explain why emails and IM’s from unknown sources should be deleted and not opened.
  • 36. Use spam blockers.BBC video on chat roomsafety. http://youtu.be/b7aso7BDzEo
  • 37.
  • 38. Know how your child is access the internet and from where.
  • 39. Explain why it is very important to not share passwords with friends or strangers.
  • 40. Become familiar with acronyms to understand what your kids are saying.BBC video on chat roomsafety. http://youtu.be/b7aso7BDzEo
  • 41.
  • 42. Review your child's blog before the new information is posted.
  • 43. Set the privacy settings for your child and remind them of the importance that others do not have access to personal information.
  • 44. Make sure that all images are free of any identifying information like phone numbers, addresses, schools, names, and ages.
  • 45. Explain the importance of not posting misleading, provocative and explicit information or images.
  • 46.
  • 47. Encourage your child to seek an adult if he or she encounters inappropriate material.
  • 48. Discuss the acceptable use policy with your child.
  • 49.
  • 50. References http://www.commonsense.com/internet-safety-tips/tips-for-kids.php http://elementarysafety.com/personal-safety?gclid=CIybzsi43KkCFQZCgwod0FFjZQ http://www.slideshare.net/aldricchang/raising-kids-on-the-internet-2149686 Slide 5 statistics http://www.fbi.gov/fun-games/kids/kids-safety http://www.netsmartz.org/Safety/Statistics Slides 8-10 http://www.safewave.org/index.php?option=com_content&task=view&id=353&Itemid=300 http://securityorb.com/2011/02/teen-internet-safety-statistics-from-netsmartz-org/