SlideShare a Scribd company logo
Online Privacy & Safety for
         Students
      By: Annabelle Moesch
            9/10/2012
Examples of the dangers

• Possible pornographic sites..
   Absence of just one letter: a child types
  “Lego” but forgets the “O”
• Over sharing of their person and personal
  lives.
• Cyber Bulling
• Identity Theft
• Private Chat Rooms
Warning Signs

•    Your child may be in contact with an online
     predator if he or she:
    a)   Becomes secretive about online activities
    b)   Receives phone calls from people you do not know or makes calls to
         numbers that you do not recognize
    c)   Receives gifts, mail, or packages from someone you do not know
    d)   Withdraws from family and friends
    e)   Changes screens or turns off computer when an adult enters a room
    f)   You find that your child uses a seconddifferent on-line user name andor
         account.

    These are just a few warning signs to look for of
       online predators…
Ways to improve safety!
• Using avatars instead of personal pictures.
• Monitoring a child's online usage.
• Bookmark the child’s favorite site for easy
  access…
• Talking to children about the dangers of the
  internet.
• Online protection tools for blocking sites
• Filtering programs…
• And many more ways for
Examples of Safety Efforts
• There are 19 states with some type of Internet Safety Law
  created to protect their residents against cyber-criminal
  activities.
• Project Our Children Act
   a)   This new Internet Safety Law focused on protecting children from exploitation on the
        Internet. The new law requires the Attorney General to create a national level task force
        focusing on protecting children. This law includes both online child exploitation, and offline
        exploitation.

• Pending Federal Legislation
   a)   Currently a new bill working its way through the Congressional process. This new bill will
        provide full funding to law enforcement at both the state and federal level to fight cyber-
        criminals. This new bill is the section that will provide funding to the victims for top legal
        counsel.
Examples of Safety Efforts Cont..
•    Amazon’s New Kindle Fire Has Innovative Parental
     Control Options.
•    MetaCert Builds Tools to Block Adult sites on
     Networks and Devices.
    a)   The company is about to release its own adult site free browser for the iPad
         called Olly.


This is just a few actions taking place for the public!
Efforts of Safety In Schools
•        Filtering all Internet access. SmartFilter™ blocks:
    a)     sexually explicit sites
    b)     violent sites
    c)     anonymizer sites
    d)     inappropriate sites in languages other than English

•        CyberSmart!
    a)     Common Sense Media has updated lessons and incorporated them into our
           free K-12 Digital Literacy and Citizenship Curriculum.
Efforts for Safety in Schools Cont.
• SafeSurf
   a) SafeSurf founded the Platform for Internet Content Selection (PICS)
      allows adults to set passwords and levels for their children.
• Safeeyes
   a) Safe Eyes is Mac, PC, and iOS compatible software that protects your
      family from harmful content and other dangers on the internet. Filters
      and Reports..


Just a few Programs being used today.
Internet Safety At Home
•    To keep children from accessing sites that the parents find
     inappropriate, they can buy an internet program made by
     McAfee.
    a)   This program allows the parents to note which web pages the child
         should not access and declines any attempt at one of the similar
         pages


•    Stay involved in the child's life
    a)   Always keep your child's computer in an open area.

    b)   Respect your child's privacy.
    c)   Teach your child the responsible use of online resources.

    d)   Educate yourself on the ins and outs of the Internet.
Most of all…. COMMUNICATION!
Beware of what you share..
Citations
Dooly, Troy. "Internet Safety Laws | eHow.com." eHow | How to Videos,
  Articles & More - Discover the expert in you. | eHow.com. N.p.,
  22 Sept. 2011. Web. 11 Sept. 2012.
  <http://www.ehow.com/about_5402717_internet-safety-laws.html>.
Dowshen, Steven. "Internet Safety." KidsHealth - the Web's most visited site
  about children's health. N.p., 2012. Web. 11 Sept. 2012.
  <http://kidshealth.org/parent/positive/family/net_safety.html#>.

Web.
Google images

More Related Content

What's hot

Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual World
InterMediaKT
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
mulingoh
 
DIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenDIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital Citizen
Carla Hayes
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentationSarah Sell
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
Beckusq
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Geoffrey Lowe
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
InterMediaKT
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
Stephen Thomas, CISSP
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
Katie Ward
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
cyb1337
 
Advantages and disadvantages of the internet
Advantages and disadvantages of the internetAdvantages and disadvantages of the internet
Advantages and disadvantages of the internet
pilarace
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correctWaheed Rana
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
Academic Research Paper Writing Services
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
Staci Trekles
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
AM Oh
 

What's hot (20)

Camouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual WorldCamouflage and Safety in the Virtual World
Camouflage and Safety in the Virtual World
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
DIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenDIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital Citizen
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Advantages and disadvantages of the internet
Advantages and disadvantages of the internetAdvantages and disadvantages of the internet
Advantages and disadvantages of the internet
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 

Similar to Presentation1 updates 2

A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
amandaschilling75
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
Cliff Ashcroft
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
Emmanuel Arthur
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
Emmanuel Arthur
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
Ollie Bray
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
Raudhat-Rahma Shittu-Agbetola
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Onlinedgieseler1
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersBarb Jansen
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Stephanie Barnhart
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
kwazy
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the web
jhollatz
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
LightedCandle
 
Apps and Young Users.pptx
Apps and Young Users.pptxApps and Young Users.pptx
Apps and Young Users.pptx
SamanthaAdlerMcGuire
 

Similar to Presentation1 updates 2 (20)

A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth Graders
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the web
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Apps and Young Users.pptx
Apps and Young Users.pptxApps and Young Users.pptx
Apps and Young Users.pptx
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Presentation1 updates 2

  • 1. Online Privacy & Safety for Students By: Annabelle Moesch 9/10/2012
  • 2. Examples of the dangers • Possible pornographic sites.. Absence of just one letter: a child types “Lego” but forgets the “O” • Over sharing of their person and personal lives. • Cyber Bulling • Identity Theft • Private Chat Rooms
  • 3. Warning Signs • Your child may be in contact with an online predator if he or she: a) Becomes secretive about online activities b) Receives phone calls from people you do not know or makes calls to numbers that you do not recognize c) Receives gifts, mail, or packages from someone you do not know d) Withdraws from family and friends e) Changes screens or turns off computer when an adult enters a room f) You find that your child uses a seconddifferent on-line user name andor account. These are just a few warning signs to look for of online predators…
  • 4. Ways to improve safety! • Using avatars instead of personal pictures. • Monitoring a child's online usage. • Bookmark the child’s favorite site for easy access… • Talking to children about the dangers of the internet. • Online protection tools for blocking sites • Filtering programs… • And many more ways for
  • 5. Examples of Safety Efforts • There are 19 states with some type of Internet Safety Law created to protect their residents against cyber-criminal activities. • Project Our Children Act a) This new Internet Safety Law focused on protecting children from exploitation on the Internet. The new law requires the Attorney General to create a national level task force focusing on protecting children. This law includes both online child exploitation, and offline exploitation. • Pending Federal Legislation a) Currently a new bill working its way through the Congressional process. This new bill will provide full funding to law enforcement at both the state and federal level to fight cyber- criminals. This new bill is the section that will provide funding to the victims for top legal counsel.
  • 6. Examples of Safety Efforts Cont.. • Amazon’s New Kindle Fire Has Innovative Parental Control Options. • MetaCert Builds Tools to Block Adult sites on Networks and Devices. a) The company is about to release its own adult site free browser for the iPad called Olly. This is just a few actions taking place for the public!
  • 7. Efforts of Safety In Schools • Filtering all Internet access. SmartFilter™ blocks: a) sexually explicit sites b) violent sites c) anonymizer sites d) inappropriate sites in languages other than English • CyberSmart! a) Common Sense Media has updated lessons and incorporated them into our free K-12 Digital Literacy and Citizenship Curriculum.
  • 8. Efforts for Safety in Schools Cont. • SafeSurf a) SafeSurf founded the Platform for Internet Content Selection (PICS) allows adults to set passwords and levels for their children. • Safeeyes a) Safe Eyes is Mac, PC, and iOS compatible software that protects your family from harmful content and other dangers on the internet. Filters and Reports.. Just a few Programs being used today.
  • 9. Internet Safety At Home • To keep children from accessing sites that the parents find inappropriate, they can buy an internet program made by McAfee. a) This program allows the parents to note which web pages the child should not access and declines any attempt at one of the similar pages • Stay involved in the child's life a) Always keep your child's computer in an open area. b) Respect your child's privacy. c) Teach your child the responsible use of online resources. d) Educate yourself on the ins and outs of the Internet. Most of all…. COMMUNICATION!
  • 10. Beware of what you share..
  • 11. Citations Dooly, Troy. "Internet Safety Laws | eHow.com." eHow | How to Videos, Articles & More - Discover the expert in you. | eHow.com. N.p., 22 Sept. 2011. Web. 11 Sept. 2012. <http://www.ehow.com/about_5402717_internet-safety-laws.html>. Dowshen, Steven. "Internet Safety." KidsHealth - the Web's most visited site about children's health. N.p., 2012. Web. 11 Sept. 2012. <http://kidshealth.org/parent/positive/family/net_safety.html#>. Web. Google images