By: Shakena
   Reese
   Cyber Bullying
   Credit Card Fraud
   Harrassment
   Sexual Predators
   Scams
 EMOTIONALLY
 FINANCIALLY
 PHYSICALLY
   Cyberbullying can cause great
    emotional harm to the target.
   Online communications can be
    vicious, and cyberbullying can be
    happening24/7.
    Damaging text and images can be
    widely disseminated and impossible
    to fully remove.
   There are emerging reports of youth
    suicide and violence related to
    cyberbullying.
 Many  young people who are victims of online
  danger are harmed physically.
 Many young girls who meet men via internet
  are raped and sometimes killed.
 Those with insecurities are capable of
  harming themselves physically.
 There are many reports of suicides because
  of online dangers.
   Account information is
    stolen through online
    shopping
   Telemarketers commit
    fraud to get personal
    information
   Also they use information
    given through messages to
    wipe bank accounts cleans
    and commit identity theft.
   They are also capable of
    committing credit card
    fraud.
“Rules”
   Establish an ongoing dialogue and keep lines of
communication open.
   Supervise use of all Internet-enabled devices.
   Know your child’s online activities and friends.
   Regularly check the online communities your
children use, such as social networking and
gaming sites, to see what information they are
posting.
   Supervise the photos and videos your kids post
    and send online.
   Discourage the use of webcams and mobile
video devices.
 Learn and teach your children how to protect
    personal information posted online and to follow
    the same rules with respect to the personal
    information of others.
 Be sure to use privacy settings.
 Instruct your children to avoid meeting face-to-
    face with someone they only know online or
    through their mobile device.
 I can learn teach my child how to respond to cyber
    bullies.
 Establish an agreement with your children about
Internet use at home and outside of the home
 “Tools”
 Set age-appropriate filters.
 Consider using monitoring software,
  especially if you sense your child is at risk.
 Periodically check online activity by viewing
  your browser’s history.
 Set time limits and consider using time-
  limiting software.
 Disallow access to chat rooms and only allow
  live audio chat with extreme caution.
 Limit  your instant messaging (IM) contacts
 Use safe search engines.
 Set up the family’s cyber-security
  protections.
 Utilize parental controls they should be
  utilized on all Internet-enabled devices
  (desktops, laptops; and gaming, mobile, and
  music devices).
 Refrain from a lot of online shopping
 Also don’t post anything harmful
 Keep all personal information personal relay
  personal messages via phone or face to face.
My protection plan

My protection plan

  • 1.
  • 2.
    Cyber Bullying  Credit Card Fraud  Harrassment  Sexual Predators  Scams
  • 3.
  • 4.
    Cyberbullying can cause great emotional harm to the target.  Online communications can be vicious, and cyberbullying can be happening24/7.  Damaging text and images can be widely disseminated and impossible to fully remove.  There are emerging reports of youth suicide and violence related to cyberbullying.
  • 5.
     Many young people who are victims of online danger are harmed physically.  Many young girls who meet men via internet are raped and sometimes killed.  Those with insecurities are capable of harming themselves physically.  There are many reports of suicides because of online dangers.
  • 6.
    Account information is stolen through online shopping  Telemarketers commit fraud to get personal information  Also they use information given through messages to wipe bank accounts cleans and commit identity theft.  They are also capable of committing credit card fraud.
  • 7.
    “Rules”  Establish an ongoing dialogue and keep lines of communication open.  Supervise use of all Internet-enabled devices.  Know your child’s online activities and friends.  Regularly check the online communities your children use, such as social networking and gaming sites, to see what information they are posting.  Supervise the photos and videos your kids post and send online.
  • 8.
    Discourage the use of webcams and mobile video devices.  Learn and teach your children how to protect personal information posted online and to follow the same rules with respect to the personal information of others.  Be sure to use privacy settings.  Instruct your children to avoid meeting face-to- face with someone they only know online or through their mobile device.  I can learn teach my child how to respond to cyber bullies.  Establish an agreement with your children about Internet use at home and outside of the home
  • 9.
     “Tools”  Setage-appropriate filters.  Consider using monitoring software, especially if you sense your child is at risk.  Periodically check online activity by viewing your browser’s history.  Set time limits and consider using time- limiting software.  Disallow access to chat rooms and only allow live audio chat with extreme caution.
  • 10.
     Limit your instant messaging (IM) contacts  Use safe search engines.  Set up the family’s cyber-security protections.  Utilize parental controls they should be utilized on all Internet-enabled devices (desktops, laptops; and gaming, mobile, and music devices).  Refrain from a lot of online shopping  Also don’t post anything harmful  Keep all personal information personal relay personal messages via phone or face to face.