SlideShare a Scribd company logo
Privacy and Safety

What is it and why is it important
      for internet usage?
Privacy
• The state or condition
  of being free from
  being observed or
  disturbed by others.
Safety


• Freedom from injury,
  danger, or loss.
Traffic Light
•   Green: Safe Sites
         - chat rooms
                   - kidscom
         - search engines
                   - yahooligans
                   - ask jeeves for kids
                   - kids click
                   - DIG
Traffic Light cont.
•   Yellow: Proceed with caution
          - “wear you cyber thinking cap”
          - netiquette

•   Red: Avoid
           - child pornography, child
    molesters, cyber stalking, harassers
           - topics on family to family basis
    (hate, violence, drugs, guns, alcohol,
           tobacco gambling, bomb
    building, cults, satanic materials)
Educational Ramifications/Tips /Ways to Protect

•   Best protection is to avoid which is unrealistic.

•   Set up rules for students to follow (Acceptable Use Policy)

•   Never give out personal info or send pics.

•   Encourage a student to tell a parent, teacher, or another adult if you feel
    uncomfortable.


•   Never plan to meet someone you don’t know that you met online.

•   Filter sites and use filtering software: Software to Monitor (CyberSmart, Cyber Patrol,
    Surf Watch, and Creepsquash)

•   Have an Acceptable Use Policy set up

Online Safety Quiz
Educational Ramifications/Tips/Ways to
                   Protect
•   Teach responsibility and how to search
    safely (key words)

•   Book marking sites for students will
    allow them access to correct sites.

•   Students also need to be taught not all
    information is accurate.
Warning Signs
•   Find porn/ inappropriate materials
    on a computer.
•   Receive private calls, packages,
    letters, messages.
•   Switches the monitor when you
    enter or get near the computer
•   Becomes withdrawn.
•   Uses online account of another
How can parents help?
•   Educators and parents need to help
    educate students about proper online
    etiquette.
•   Parents and teachers should work together
    to help the students.
•   Look for warning signs or changes in
    behavior.
•   Keep an eye on what each student/child is
    doing online.
•   Look at search history/install tracking
    software.
•   Constant remind students of rules 7 traffic
    light rules (netiquette).
How will it develop in
    the future?
Helpful Websites and Resources
•   http://www.safekids.com
•   http://
    www.netsmartz.org/RevealingTooMuch

•   http://www.familyguidebook.com/
•   http://www.fbi.gov/fun-games/kids/kids-safety
•   http://www.ed.uiuc.edu/wp/privacy/kidprivacy.html
•   http://www.c-spanvideo.org/program/293245-1

More Related Content

What's hot

Group1 Ppt
Group1 PptGroup1 Ppt
Group1 Ppt
jessica mellert
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
dgieseler1
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
ConnectSafely
 
Internet safety
Internet safetyInternet safety
Internet safety
martdale
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
emilyensign
 
Common Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent CommunityCommon Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent Community
ellen.adolph
 
Internet security for parents
Internet security for parentsInternet security for parents
Internet security for parents
Shannon Blackerby
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
IT-oLogy
 
Online safety
Online safetyOnline safety
Online safety
elioar8
 
Dr. Mark Crawford Woodward North (Oct 2016)
Dr. Mark Crawford Woodward North (Oct 2016)Dr. Mark Crawford Woodward North (Oct 2016)
Dr. Mark Crawford Woodward North (Oct 2016)
ellen.adolph
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech Safety
TeenSafe
 
When Should I Buy My Child A Smartphone (Or Tablet)?
When Should I Buy My Child A Smartphone (Or Tablet)?When Should I Buy My Child A Smartphone (Or Tablet)?
When Should I Buy My Child A Smartphone (Or Tablet)?
TeenSafe
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
mulingoh
 
Smartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in TeensSmartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in Teens
TeenSafe
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
Louise Jones
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital Playground
Kim Cofino
 
Digital Parenting Presentation
Digital Parenting PresentationDigital Parenting Presentation
Digital Parenting Presentation
Anne Arriaga
 
Net Cetera | Provided by: FTC
Net Cetera | Provided by: FTCNet Cetera | Provided by: FTC
Net Cetera | Provided by: FTC
GiddingsComputerServices
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
ConnectSafely
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from Vodaphone
Katherine Lyddon
 

What's hot (20)

Group1 Ppt
Group1 PptGroup1 Ppt
Group1 Ppt
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
 
Common Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent CommunityCommon Sense Media Presentation to Woodward North Parent Community
Common Sense Media Presentation to Woodward North Parent Community
 
Internet security for parents
Internet security for parentsInternet security for parents
Internet security for parents
 
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
 
Online safety
Online safetyOnline safety
Online safety
 
Dr. Mark Crawford Woodward North (Oct 2016)
Dr. Mark Crawford Woodward North (Oct 2016)Dr. Mark Crawford Woodward North (Oct 2016)
Dr. Mark Crawford Woodward North (Oct 2016)
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech Safety
 
When Should I Buy My Child A Smartphone (Or Tablet)?
When Should I Buy My Child A Smartphone (Or Tablet)?When Should I Buy My Child A Smartphone (Or Tablet)?
When Should I Buy My Child A Smartphone (Or Tablet)?
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Smartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in TeensSmartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in Teens
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital Playground
 
Digital Parenting Presentation
Digital Parenting PresentationDigital Parenting Presentation
Digital Parenting Presentation
 
Net Cetera | Provided by: FTC
Net Cetera | Provided by: FTCNet Cetera | Provided by: FTC
Net Cetera | Provided by: FTC
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from Vodaphone
 

Similar to Privacy and safety

Internet safety presentation 2013
Internet safety presentation   2013Internet safety presentation   2013
Internet safety presentation 2013
Robert Schuetz
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
chellakaruppasamy
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
YadetaHailu
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
lival1
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teens
contactcareergyani
 
Cyber saftey for parents
Cyber saftey for parentsCyber saftey for parents
Cyber saftey for parents
Karishma Samudre
 
Cyber safety & social media deck
Cyber safety & social media deckCyber safety & social media deck
Cyber safety & social media deck
sagedayschool
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
Muhammad Rawaha Saleem
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
Sue Noor
 
E safety for kids: curriculum, lessons, resources
E safety for kids: curriculum, lessons, resourcesE safety for kids: curriculum, lessons, resources
E safety for kids: curriculum, lessons, resources
heila1
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013
Julie Esanu
 
Technology Influence
Technology Influence Technology Influence
Technology Influence
Ilaxi Patel
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
Kathryn White
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
eSafety Presentation
eSafety PresentationeSafety Presentation
eSafety Presentation
Mr_Elliott
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Lori Lee Mickelson
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Lori Lee Mickelson
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
Katie Ward
 

Similar to Privacy and safety (20)

Internet safety presentation 2013
Internet safety presentation   2013Internet safety presentation   2013
Internet safety presentation 2013
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teens
 
Cyber saftey for parents
Cyber saftey for parentsCyber saftey for parents
Cyber saftey for parents
 
Cyber safety & social media deck
Cyber safety & social media deckCyber safety & social media deck
Cyber safety & social media deck
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
E safety for kids: curriculum, lessons, resources
E safety for kids: curriculum, lessons, resourcesE safety for kids: curriculum, lessons, resources
E safety for kids: curriculum, lessons, resources
 
Internet Awareness October 2013
Internet Awareness October 2013Internet Awareness October 2013
Internet Awareness October 2013
 
Technology Influence
Technology Influence Technology Influence
Technology Influence
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Girls Talk August 2016
Girls Talk August 2016Girls Talk August 2016
Girls Talk August 2016
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
eSafety Presentation
eSafety PresentationeSafety Presentation
eSafety Presentation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 

Recently uploaded

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

Privacy and safety

  • 1. Privacy and Safety What is it and why is it important for internet usage?
  • 2. Privacy • The state or condition of being free from being observed or disturbed by others.
  • 3. Safety • Freedom from injury, danger, or loss.
  • 4. Traffic Light • Green: Safe Sites - chat rooms - kidscom - search engines - yahooligans - ask jeeves for kids - kids click - DIG
  • 5. Traffic Light cont. • Yellow: Proceed with caution - “wear you cyber thinking cap” - netiquette • Red: Avoid - child pornography, child molesters, cyber stalking, harassers - topics on family to family basis (hate, violence, drugs, guns, alcohol, tobacco gambling, bomb building, cults, satanic materials)
  • 6. Educational Ramifications/Tips /Ways to Protect • Best protection is to avoid which is unrealistic. • Set up rules for students to follow (Acceptable Use Policy) • Never give out personal info or send pics. • Encourage a student to tell a parent, teacher, or another adult if you feel uncomfortable. • Never plan to meet someone you don’t know that you met online. • Filter sites and use filtering software: Software to Monitor (CyberSmart, Cyber Patrol, Surf Watch, and Creepsquash) • Have an Acceptable Use Policy set up Online Safety Quiz
  • 7. Educational Ramifications/Tips/Ways to Protect • Teach responsibility and how to search safely (key words) • Book marking sites for students will allow them access to correct sites. • Students also need to be taught not all information is accurate.
  • 8. Warning Signs • Find porn/ inappropriate materials on a computer. • Receive private calls, packages, letters, messages. • Switches the monitor when you enter or get near the computer • Becomes withdrawn. • Uses online account of another
  • 9. How can parents help? • Educators and parents need to help educate students about proper online etiquette. • Parents and teachers should work together to help the students. • Look for warning signs or changes in behavior. • Keep an eye on what each student/child is doing online. • Look at search history/install tracking software. • Constant remind students of rules 7 traffic light rules (netiquette).
  • 10. How will it develop in the future?
  • 11. Helpful Websites and Resources • http://www.safekids.com • http:// www.netsmartz.org/RevealingTooMuch • http://www.familyguidebook.com/ • http://www.fbi.gov/fun-games/kids/kids-safety • http://www.ed.uiuc.edu/wp/privacy/kidprivacy.html • http://www.c-spanvideo.org/program/293245-1