SlideShare a Scribd company logo
By: Shakena
   Reese
   Cyber Bullying
   Credit Card Fraud
   Harrassment
   Sexual Predators
   Scams
 EMOTIONALLY
 FINANCIALLY
 PHYSICALLY
   Cyberbullying can cause great
    emotional harm to the target.
   Online communications can be
    vicious, and cyberbullying can be
    happening24/7.
    Damaging text and images can be
    widely disseminated and impossible
    to fully remove.
   There are emerging reports of youth
    suicide and violence related to
    cyberbullying.
 Many  young people who are victims of online
  danger are harmed physically.
 Many young girls who meet men via internet
  are raped and sometimes killed.
 Those with insecurities are capable of
  harming themselves physically.
 There are many reports of suicides because
  of online dangers.
   Account information is
    stolen through online
    shopping
   Telemarketers commit
    fraud to get personal
    information
   Also they use information
    given through messages to
    wipe bank accounts cleans
    and commit identity theft.
   They are also capable of
    committing credit card
    fraud.
“Rules”
   Establish an ongoing dialogue and keep lines of
communication open.
   Supervise use of all Internet-enabled devices.
   Know your child’s online activities and friends.
   Regularly check the online communities your
children use, such as social networking and
gaming sites, to see what information they are
posting.
   Supervise the photos and videos your kids post
    and send online.
   Discourage the use of webcams and mobile
video devices.
 Learn and teach your children how to protect
    personal information posted online and to follow
    the same rules with respect to the personal
    information of others.
 Be sure to use privacy settings.
 Instruct your children to avoid meeting face-to-
    face with someone they only know online or
    through their mobile device.
 I can learn teach my child how to respond to cyber
    bullies.
 Establish an agreement with your children about
Internet use at home and outside of the home
 “Tools”
 Set age-appropriate filters.
 Consider using monitoring software,
  especially if you sense your child is at risk.
 Periodically check online activity by viewing
  your browser’s history.
 Set time limits and consider using time-
  limiting software.
 Disallow access to chat rooms and only allow
  live audio chat with extreme caution.
 Limit  your instant messaging (IM) contacts
 Use safe search engines.
 Set up the family’s cyber-security
  protections.
 Utilize parental controls they should be
  utilized on all Internet-enabled devices
  (desktops, laptops; and gaming, mobile, and
  music devices).
 Refrain from a lot of online shopping
 Also don’t post anything harmful
 Keep all personal information personal relay
  personal messages via phone or face to face.
My protection plan

More Related Content

What's hot

Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
RAUSHAN KUMAR
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Shruti Bansal
 
Net Cetera | Provided by: FTC
Net Cetera | Provided by: FTCNet Cetera | Provided by: FTC
Net Cetera | Provided by: FTC
GiddingsComputerServices
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
autumnowens25
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Aayushi Singh
 
Internet safety
Internet safetyInternet safety
Internet safety
Aleksandra Brmbota
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullyingparulata
 
Online safety strategy - non technical guide for parents
Online safety strategy - non technical guide for parentsOnline safety strategy - non technical guide for parents
Online safety strategy - non technical guide for parents
indika rathninda
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
21rahul1999
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
alyssacarricato
 
Safety in the Net
Safety in the NetSafety in the Net
Safety in the NetRamilia
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
KanelandSvihlik
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
NMSU - Family Resource Management
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
Ollie Bray
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Cyber Contacts
Cyber ContactsCyber Contacts
Cyber Contacts
MaimoonahKhan
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
KanelandSvihlik
 

What's hot (20)

Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Net Cetera | Provided by: FTC
Net Cetera | Provided by: FTCNet Cetera | Provided by: FTC
Net Cetera | Provided by: FTC
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 
Online safety strategy - non technical guide for parents
Online safety strategy - non technical guide for parentsOnline safety strategy - non technical guide for parents
Online safety strategy - non technical guide for parents
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Safety in the Net
Safety in the NetSafety in the Net
Safety in the Net
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Cyber Contacts
Cyber ContactsCyber Contacts
Cyber Contacts
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 

Viewers also liked

Kampioenen 2014
Kampioenen 2014Kampioenen 2014
Kampioenen 2014
Dustin Schaap
 
Addressing the Sensitive Topic of Sex Workers in the Classroom
Addressing the Sensitive Topic of Sex Workers in the ClassroomAddressing the Sensitive Topic of Sex Workers in the Classroom
Addressing the Sensitive Topic of Sex Workers in the ClassroomSElspethPatterson
 
The Grumpy Tree
The Grumpy TreeThe Grumpy Tree
Introduction to nutrition in schools
Introduction to nutrition in schoolsIntroduction to nutrition in schools
Introduction to nutrition in schoolsQuay Davis
 
12 Days Of Christmas
12 Days Of Christmas12 Days Of Christmas
12 Days Of Christmaskotten751
 
Introduction to nutrition in schools
Introduction to nutrition in schoolsIntroduction to nutrition in schools
Introduction to nutrition in schoolsQuay Davis
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014Leonard Cibelli
 
AD_LABX_BRO_19Nov2014__1_
AD_LABX_BRO_19Nov2014__1_AD_LABX_BRO_19Nov2014__1_
AD_LABX_BRO_19Nov2014__1_Leonard Cibelli
 
Reelgenius deck slideshare
Reelgenius deck slideshareReelgenius deck slideshare
Reelgenius deck slideshare
Dan Goikhman
 
LISA 2011 Keynote: The DevOps Transformation
LISA 2011 Keynote: The DevOps TransformationLISA 2011 Keynote: The DevOps Transformation
LISA 2011 Keynote: The DevOps Transformationbenrockwood
 
Devise and Rails
Devise and RailsDevise and Rails
Devise and Rails
William Leeper
 
12 days of_christmas
12 days of_christmas12 days of_christmas
12 days of_christmas
ACruz99099
 
12 days of_christmas
12 days of_christmas12 days of_christmas
12 days of_christmaskotten751
 

Viewers also liked (15)

Kampioenen 2014
Kampioenen 2014Kampioenen 2014
Kampioenen 2014
 
Addressing the Sensitive Topic of Sex Workers in the Classroom
Addressing the Sensitive Topic of Sex Workers in the ClassroomAddressing the Sensitive Topic of Sex Workers in the Classroom
Addressing the Sensitive Topic of Sex Workers in the Classroom
 
AD-MPEX-BRO-09Dec2014
AD-MPEX-BRO-09Dec2014AD-MPEX-BRO-09Dec2014
AD-MPEX-BRO-09Dec2014
 
The Grumpy Tree
The Grumpy TreeThe Grumpy Tree
The Grumpy Tree
 
BR_Summation_08052014
BR_Summation_08052014BR_Summation_08052014
BR_Summation_08052014
 
Introduction to nutrition in schools
Introduction to nutrition in schoolsIntroduction to nutrition in schools
Introduction to nutrition in schools
 
12 Days Of Christmas
12 Days Of Christmas12 Days Of Christmas
12 Days Of Christmas
 
Introduction to nutrition in schools
Introduction to nutrition in schoolsIntroduction to nutrition in schools
Introduction to nutrition in schools
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014
 
AD_LABX_BRO_19Nov2014__1_
AD_LABX_BRO_19Nov2014__1_AD_LABX_BRO_19Nov2014__1_
AD_LABX_BRO_19Nov2014__1_
 
Reelgenius deck slideshare
Reelgenius deck slideshareReelgenius deck slideshare
Reelgenius deck slideshare
 
LISA 2011 Keynote: The DevOps Transformation
LISA 2011 Keynote: The DevOps TransformationLISA 2011 Keynote: The DevOps Transformation
LISA 2011 Keynote: The DevOps Transformation
 
Devise and Rails
Devise and RailsDevise and Rails
Devise and Rails
 
12 days of_christmas
12 days of_christmas12 days of_christmas
12 days of_christmas
 
12 days of_christmas
12 days of_christmas12 days of_christmas
12 days of_christmas
 

Similar to My protection plan

How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
Arjun Chetry
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
SafeChildUAE1
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
Rahuljain40418
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
KanelandSvihlik
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
Sanil Shrivastava
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
bigmike18
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
Andri Priyatna
 

Similar to My protection plan (20)

How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

My protection plan

  • 1. By: Shakena Reese
  • 2. Cyber Bullying  Credit Card Fraud  Harrassment  Sexual Predators  Scams
  • 4. Cyberbullying can cause great emotional harm to the target.  Online communications can be vicious, and cyberbullying can be happening24/7.  Damaging text and images can be widely disseminated and impossible to fully remove.  There are emerging reports of youth suicide and violence related to cyberbullying.
  • 5.  Many young people who are victims of online danger are harmed physically.  Many young girls who meet men via internet are raped and sometimes killed.  Those with insecurities are capable of harming themselves physically.  There are many reports of suicides because of online dangers.
  • 6. Account information is stolen through online shopping  Telemarketers commit fraud to get personal information  Also they use information given through messages to wipe bank accounts cleans and commit identity theft.  They are also capable of committing credit card fraud.
  • 7. “Rules”  Establish an ongoing dialogue and keep lines of communication open.  Supervise use of all Internet-enabled devices.  Know your child’s online activities and friends.  Regularly check the online communities your children use, such as social networking and gaming sites, to see what information they are posting.  Supervise the photos and videos your kids post and send online.
  • 8. Discourage the use of webcams and mobile video devices.  Learn and teach your children how to protect personal information posted online and to follow the same rules with respect to the personal information of others.  Be sure to use privacy settings.  Instruct your children to avoid meeting face-to- face with someone they only know online or through their mobile device.  I can learn teach my child how to respond to cyber bullies.  Establish an agreement with your children about Internet use at home and outside of the home
  • 9.  “Tools”  Set age-appropriate filters.  Consider using monitoring software, especially if you sense your child is at risk.  Periodically check online activity by viewing your browser’s history.  Set time limits and consider using time- limiting software.  Disallow access to chat rooms and only allow live audio chat with extreme caution.
  • 10.  Limit your instant messaging (IM) contacts  Use safe search engines.  Set up the family’s cyber-security protections.  Utilize parental controls they should be utilized on all Internet-enabled devices (desktops, laptops; and gaming, mobile, and music devices).  Refrain from a lot of online shopping  Also don’t post anything harmful  Keep all personal information personal relay personal messages via phone or face to face.