SlideShare a Scribd company logo
This brochure was created to
inform parents about the
importance of internet safety.
Grace Lotrecchiano
919-389-0351
Gal7484@uncw.edu
The internet is a vast abyss ofinformation
available at the click of a button. Simple and
accessible. Two of the reasons why internet safety
is so important for parents. There are so many
people online, it is important to monitor your
child’s access to inappropriate information and
online strangers.Look inside for more tips.
Internet Safety
ONLINE SAFETY
for parents and students.
INTRODUCTIONDelete text and place photo here.
 Monitor your child’s internet use
consistently. This is not a violation of your
child’s privacy, but a safeguarding measure.
 If your child belongs to a social networking
site, monitor their actions(information
posted, photos, videos) theseare great homes
for predators, bullies, profanity and threats.
 Talk to your child about your Internet safety
concerns. Create ground rules for time spent
on the computer and which sites can be
visited.
 Explain that your child should NEVER give
out any personalinformation of any kind,
meet with a stranger from the internet, or
share photos with strangers online.
 Check your credit card for any unauthorized
online transactions
 Makesure your child understands the
importance of abstaining from online
bullying and the consequences of such
actions
 Be the primary controller of thefamily’s
email accounts. Do not let your child use
his/her email to sign up for websiteaccounts.
INTERNET SAFETY TIPS
Tip for school:
When searching online for
information, it is often hard for
children to distinguish the
validity of websites. Search
enginesprovide easy exposure to
inappropriate sites.
DID YOU KNOW?
Bullies have been around since the beginning of
grade school, but with access to emails, blogs,
social networking and instant messaging kids have
several new channels on which to bully. A bully
has the ability to alter photos, create fake accounts,
and harass via text message. Nearly one in six US
children grades six to ten(that’s 3.2 million
students) are victims of online bullying every year.
Most bullying goes unreported. Encourage your
child to report any online bullying that they may
encounter.
WHAT PARENTS CAN DO
FOR PARENTS (& KIDS)
THE CYBER BULLY
A NEW KIND OF BULLY
 Learn about theInternet:
Understand what your children
could come across, be prepared.
 Get Involved: Spend time online
with your child, wherever.
Involvement in your child’s life is
important, even online.
 Stay informed: Keep yourself
informed about parentalcontrol
tools.
 Become an advocate for kids: If
you see material or practices you
don’t like, tell someone about it,
but the company supplyingthe
information or your internet
provider.

More Related Content

What's hot

How Online Predators Threaten Our Children
How Online Predators Threaten Our ChildrenHow Online Predators Threaten Our Children
How Online Predators Threaten Our Children
TeenSafe
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
sharoncindrich
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital erabns_library
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazardsdgieseler1
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
OCTF Industry Engagement
 
6 Ways To Remain Cybersafe
6 Ways To Remain Cybersafe6 Ways To Remain Cybersafe
6 Ways To Remain Cybersafe
Your eKavach
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Onlinedgieseler1
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
Net Cetera | Provided by: FTC
Net Cetera | Provided by: FTCNet Cetera | Provided by: FTC
Net Cetera | Provided by: FTC
GiddingsComputerServices
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
My protection plan
My protection planMy protection plan
My protection plan
Shakena12
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
alexfinvle
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
Jennifer Holena
 
Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From Cyberbullying
TeenSafe
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
KanelandSvihlik
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
TeenSafe
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
ProjectsByJen.com
 

What's hot (20)

How Online Predators Threaten Our Children
How Online Predators Threaten Our ChildrenHow Online Predators Threaten Our Children
How Online Predators Threaten Our Children
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazards
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
6 Ways To Remain Cybersafe
6 Ways To Remain Cybersafe6 Ways To Remain Cybersafe
6 Ways To Remain Cybersafe
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Net Cetera | Provided by: FTC
Net Cetera | Provided by: FTCNet Cetera | Provided by: FTC
Net Cetera | Provided by: FTC
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
My protection plan
My protection planMy protection plan
My protection plan
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From Cyberbullying
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 

Viewers also liked

Presentation Parma Relationship GIs and Trademarks 15March2013
Presentation Parma Relationship GIs and Trademarks 15March2013Presentation Parma Relationship GIs and Trademarks 15March2013
Presentation Parma Relationship GIs and Trademarks 15March2013Edith Van den Eede
 
Ba na gyzer
Ba na gyzerBa na gyzer
Ba na gyzer
Hita Hamastuti
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationdunaway15
 
IJRET : International Journal of Research in Engineering and TechnologyImprov...
IJRET : International Journal of Research in Engineering and TechnologyImprov...IJRET : International Journal of Research in Engineering and TechnologyImprov...
IJRET : International Journal of Research in Engineering and TechnologyImprov...
eSAT Publishing House
 
Electricidad video
Electricidad videoElectricidad video
Electricidad video
Andrés Alvarez del Castillo
 
Sociala Medier: Revolutionen
Sociala Medier: RevolutionenSociala Medier: Revolutionen
Sociala Medier: Revolutionen
Erik Bernskiöld
 
School nr 5 Martinjuk
School nr 5 Martinjuk School nr 5 Martinjuk
School nr 5 Martinjuk
Mairi
 
E portfolio-kevin lovo
E portfolio-kevin lovoE portfolio-kevin lovo
E portfolio-kevin lovoKevin Løvø
 
Unit 3 constructing figures
Unit 3   constructing figures Unit 3   constructing figures
Unit 3 constructing figures chin1440
 
Comentario de la recolección de datos del experimento
Comentario de la recolección de datos del experimentoComentario de la recolección de datos del experimento
Comentario de la recolección de datos del experimentoKaren M. Guillén
 
20120608 idepoliklinikken.mhr
20120608 idepoliklinikken.mhr20120608 idepoliklinikken.mhr
20120608 idepoliklinikken.mhr
Idépoliklinikken Oslo universitetssykehus HF
 
Elaine Mc Cue Customer Strategy 2
Elaine Mc Cue Customer Strategy 2Elaine Mc Cue Customer Strategy 2
Elaine Mc Cue Customer Strategy 2Socitm
 
Sikupilli talv
Sikupilli talvSikupilli talv
Sikupilli talvMairi
 
Serra da Arrábida
Serra da ArrábidaSerra da Arrábida
Serra da Arrábida
andreabs21
 

Viewers also liked (20)

Presentation Parma Relationship GIs and Trademarks 15March2013
Presentation Parma Relationship GIs and Trademarks 15March2013Presentation Parma Relationship GIs and Trademarks 15March2013
Presentation Parma Relationship GIs and Trademarks 15March2013
 
Quimica
QuimicaQuimica
Quimica
 
Ba na gyzer
Ba na gyzerBa na gyzer
Ba na gyzer
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Project1
Project1Project1
Project1
 
IJRET : International Journal of Research in Engineering and TechnologyImprov...
IJRET : International Journal of Research in Engineering and TechnologyImprov...IJRET : International Journal of Research in Engineering and TechnologyImprov...
IJRET : International Journal of Research in Engineering and TechnologyImprov...
 
Electricidad video
Electricidad videoElectricidad video
Electricidad video
 
Sociala Medier: Revolutionen
Sociala Medier: RevolutionenSociala Medier: Revolutionen
Sociala Medier: Revolutionen
 
School nr 5 Martinjuk
School nr 5 Martinjuk School nr 5 Martinjuk
School nr 5 Martinjuk
 
Manawka
ManawkaManawka
Manawka
 
E portfolio-kevin lovo
E portfolio-kevin lovoE portfolio-kevin lovo
E portfolio-kevin lovo
 
Unit 3 constructing figures
Unit 3   constructing figures Unit 3   constructing figures
Unit 3 constructing figures
 
Cordage
CordageCordage
Cordage
 
Comentario de la recolección de datos del experimento
Comentario de la recolección de datos del experimentoComentario de la recolección de datos del experimento
Comentario de la recolección de datos del experimento
 
Opinión del artículo
Opinión del artículoOpinión del artículo
Opinión del artículo
 
20120608 idepoliklinikken.mhr
20120608 idepoliklinikken.mhr20120608 idepoliklinikken.mhr
20120608 idepoliklinikken.mhr
 
Elaine Mc Cue Customer Strategy 2
Elaine Mc Cue Customer Strategy 2Elaine Mc Cue Customer Strategy 2
Elaine Mc Cue Customer Strategy 2
 
Sikupilli talv
Sikupilli talvSikupilli talv
Sikupilli talv
 
Serra da Arrábida
Serra da ArrábidaSerra da Arrábida
Serra da Arrábida
 
Fotografia
FotografiaFotografia
Fotografia
 

Similar to Lotrecchiano grace

reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
NaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
purush203
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
pardolopez
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
Alexander Berta
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
Andri Priyatna
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
StemGrade
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
tdsparks3
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
- Mark - Fullbright
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
21rahul1999
 
Online safety
Online safetyOnline safety
Online safety
Dr. Pravin Yadav
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2Oliver Mittl
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenJanet Weninger
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 

Similar to Lotrecchiano grace (20)

reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Online safety
Online safetyOnline safety
Online safety
 
Safe kids – connected to web 2
Safe kids – connected to web 2Safe kids – connected to web 2
Safe kids – connected to web 2
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

More from glotrecchiano

More from glotrecchiano (6)

20 Websites
20 Websites20 Websites
20 Websites
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluation
 
Technology brochure
Technology brochureTechnology brochure
Technology brochure
 
Power point
Power pointPower point
Power point
 
Budget
BudgetBudget
Budget
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Lotrecchiano grace

  • 1. This brochure was created to inform parents about the importance of internet safety. Grace Lotrecchiano 919-389-0351 Gal7484@uncw.edu The internet is a vast abyss ofinformation available at the click of a button. Simple and accessible. Two of the reasons why internet safety is so important for parents. There are so many people online, it is important to monitor your child’s access to inappropriate information and online strangers.Look inside for more tips. Internet Safety ONLINE SAFETY for parents and students. INTRODUCTIONDelete text and place photo here.
  • 2.  Monitor your child’s internet use consistently. This is not a violation of your child’s privacy, but a safeguarding measure.  If your child belongs to a social networking site, monitor their actions(information posted, photos, videos) theseare great homes for predators, bullies, profanity and threats.  Talk to your child about your Internet safety concerns. Create ground rules for time spent on the computer and which sites can be visited.  Explain that your child should NEVER give out any personalinformation of any kind, meet with a stranger from the internet, or share photos with strangers online.  Check your credit card for any unauthorized online transactions  Makesure your child understands the importance of abstaining from online bullying and the consequences of such actions  Be the primary controller of thefamily’s email accounts. Do not let your child use his/her email to sign up for websiteaccounts. INTERNET SAFETY TIPS Tip for school: When searching online for information, it is often hard for children to distinguish the validity of websites. Search enginesprovide easy exposure to inappropriate sites. DID YOU KNOW? Bullies have been around since the beginning of grade school, but with access to emails, blogs, social networking and instant messaging kids have several new channels on which to bully. A bully has the ability to alter photos, create fake accounts, and harass via text message. Nearly one in six US children grades six to ten(that’s 3.2 million students) are victims of online bullying every year. Most bullying goes unreported. Encourage your child to report any online bullying that they may encounter. WHAT PARENTS CAN DO FOR PARENTS (& KIDS) THE CYBER BULLY A NEW KIND OF BULLY  Learn about theInternet: Understand what your children could come across, be prepared.  Get Involved: Spend time online with your child, wherever. Involvement in your child’s life is important, even online.  Stay informed: Keep yourself informed about parentalcontrol tools.  Become an advocate for kids: If you see material or practices you don’t like, tell someone about it, but the company supplyingthe information or your internet provider.