SlideShare a Scribd company logo
1 of 29
Department of School Safety and Student Discipline 
Forsyth County Schools 
Todd Shirley, Director 
Tim Monroe, Assistant Director 
Steve Honn, School Safety Manager 
Ola Shadburn, General Administrative 
School Safety and Student Discipline 
Dr. Jeff Bearden 
Superintendent of Schools 
Joey Pirkle 
Associate Superintendent 
Educational Leadership 
Session #5
2
 Facebook-87% students use--*Facebook Messenger-72% 
 Twitter 
 Instagram-77% usage--online photo-sharing, video-sharing and social networking 
service that enables its users to take pictures and videos, apply digital filters to them, 
and share them on a variety of social networking services, such as Facebook, Twitter, 
Tumblr and Flickr 
 Vine-Owned by Twitter, enables its users to create and post short video clips 
 Snapchat-65% useAllows users to take photos or short videos, then share them with friends 
for up to 10 seconds before the image self-destructs. If a recipient screenshots the photo, the 
app alerts the original sender, though hacks to interrupt this function do exist. 
 Askfm-social networking website where users can ask other users questions, with the 
option of anonymity used in foreign countries mostly 
 KIK-allows users to send texts via the Internet without having to use a cellular 
telephone 
 Yik Yak-social media site that gives you an anonymous live feed of what people are 
saying and doing. Users create all the content. 
 Youtube-No. 1 site for watching videos 
 (Schoolsafetyandsecurityalert.com August 2014) 
3
 Bullies can use your information 
 Predators can use the information 
 Comments – sued for defamation 
 Info – arrested or school discipline 
 No reasonable expectation of privacy 
 Future employers and schools can use 
information as “instant background checks” 
 Clark Howard Video 
4
5
 Eliminate all identifying information 
◦ Anything that allows you to be located 
◦ Anything that pairs the profile to your name 
 Delete inappropriate information 
 Read your information to determine what 
impression it gives 
◦ Your site may appeal to someone you didn’t intend 
for it to impress 
6
 Choose appropriate photos 
 Setting privacy settings appropriately 
 For privacy: 
◦ Develop your profile to be associated with a 
nickname rather than your official name 
7
8
9 
-Disable Geo-tagging Photos 
iPhone 
Settings>Privacy 
Android 
Camera>Settings>Privacy
 Protect your friends’ info – no name, location, 
birthday wish, phone numbers, etc. 
 Don’t write anything you wouldn’t want your 
parents or principal to read (because they can 
and MIGHT!) 
 Set your profile to private so you control who 
views your profile. 
 Be careful when you post pics 
10
 What sport you play, the movies you like, 
your music…that would be okay 
◦ Remember that these facts can be used to fool you 
 Be smarter than them 
 Always tell a trusted adult if you have 
problems online 
11
 High-tech version of flirting, teens texting 
explicit messages or photos to each other 
◦ Experimental 
◦ Aggravated 
12 
http://www.unh.edu/ccrc/pdf/CV231_Sexting Typology Bulletin_4-6- 
11_revised.pdf
13 
 Obscene 
 Average person would 
find it wrong 
 It depicts sexual 
conduct 
 It has no literary, 
artistic, political or 
scientific value 
 Child Pornography 
 Images of sexual 
conduct 
◦ Under 18 years 
413 US 15, OCGA § 16-12-80 
OCGA § 16-12-100
 If someone sends you something 
◦ Inappropriate – delete 
◦ Obscene and/or makes you uncomfortable – alert your 
parent or authority 
 If you sent something 
◦ Ask recipient to delete it and not to forward it 
◦ Never send inappropriate text or images 
 In 2010, 20 percent of teenagers (22 % of girls and 18 % 
of boys) sent naked/seminude images of themselves or 
posted them online. 
 Nearly 1 in 6 teens between the ages of 12 and 17 have 
received naked or nearly nude pictures via text message 
from someone they know. (FBI Law Enforcement 
Bulletin) 
14
 Cyber bullying: One form of bullying 
 Youth use technology to: 
◦ Send Text Messages 
◦ Make Web Postings 
◦ Stalk Others 
◦ Post Unauthorized Photos 
◦ Online Deception and Violence 
◦ Cyber-ostracism 
15 http://www.smlinks.com/sotw/why/
 One mistreating others – usually someone 
that the target knows 
 Target – can be anyone 
 Bystander 
◦ Harmful-if complacent 
◦ Helpful-if report to adult 
16
 Making threats of violence to people or 
property 
 Engaging in coercion 
 Making obscene or harassing text messages 
 Harassment or stalking 
Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe 
and Responsible Use of the Internet, January 2007 
17
 Hate or bias crime 
 Creating or sending sexually explicit images 
of teens or children 
 Sexual exploitation 
 Taking a photo of someone in a place where 
privacy is expected (Locker room/Restroom) 
Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe 
and Responsible Use of the Internet, January 2007 
18
 10% to 20% of youth have been targets 
and/or aggressors 
 Cyberbullying peaks in the middle school 
years (grades 6-8) 
 Girls are more likely to be the target 
 Looks and body shape are the most 
targeted characteristics 
 While there is an increase in cyberbullying, 
it is likely because there is an increase in 
use of technology 
19 
http://cyberbullying.us/blog 
www.unh.edu/ccrc
20
21 
Since January 23, 2004, criminals have been using the FDIC's name and reputation to 
perpetrate various "phishing" schemes. It is important to note that the FDIC will never ask for 
personal or confidential information in this manner.
22 
WIFI THIEVES-Set up open wifi in public areas posing as a 
legitimate business. Stealing usernames and passwords to log 
into accounts. (WSBTV 2014) 
If you suspect that you have been a victim of identity theft, 
perhaps because you submitted personal information in 
response to a suspicious, unsolicited e-mail or you see 
unauthorized charges on your credit card, immediately contact 
your financial institution and, if necessary, close existing 
accounts and open new ones. Also contact the police and 
request a copy of any police report or case number for later 
reference. 
WEBCam-Hacking into cameras (have to set passwords to 
prevent hacking)
• March 05, 2014 
 Pre-installed malware turns up on new 
Android devices 
 Fake version of Netflix that steals personal 
data and sends it to Russia has been found 
on some smartphones and tablets from 
Samsung, Motorola, and LG 
23
 Child Identity Theft 
 Credit Reports 
◦ www.annualcreditreport.com 
◦ Federal Law allows you to get a free copy of your 
credit report every 12 months from each credit 
reporting company. 
 Credit Reporting Agencies 
◦ Equifax 800-525-6285 
◦ Experian 888-397-3742 
◦ TransUnion 800-680-7289 
24
1. Make sure your child does not spend all of his/her time on the computer. People, 
not computers, should be their best friends and companions. 
2. Keep the computer in an area where it can be monitored, like the family room, 
kitchen or living room, not in your child’s bedroom. 
3. Learn enough about computers so you can enjoy them together with your kids. 
4. Teach them never to meet an online friend offline unless you are with them. 
5. Watch your children when they’re online and see where they go. 
6. Make sure that your children feel comfortable coming to you with questions and 
don’t over react if things go wrong. 
7. Keep kids out of chatrooms unless they are monitored. 
8. Encourage discussions between you and your child about what they enjoy online. 
25 
Next page
9. Teach them what information they can share with others online and what 
they can’t (like telephone numbers, address, their full name and school) 
10. Get to know their “online friends” just as you get to know all of their other 
friends. 
11. Warn them that people may not be what they seem to be and that people 
they chat with are not their friends, they are just people they chat with. 
12. Discuss these rules, get your children to agree to adhere to them, and 
post them near the computer as a reminder. 
www.cyber-safety.com 
26
Four steps you can start taking now to make ID security a priority — and a practice: 
 1. Change weak passwords. Do not use your birth date or part of your address or phone number. Strongest 
passwords combine upper- and lowercase letters, numbers and special characters. 
 2. Make sure your home Wi-Fi network is password-protected. Be careful how you use your devices at public hot 
spots. Most aren't secure — which means any information you send is only protected if you're on an encrypted 
website. To be sure a website is encrypted, look for "https" in the address before you log in or send any personal info. 
 3. Don't click on links in unsolicited emails. Don't give out information over the phone or online unless you've 
verified the source. 
 4. Keep your eye on debit and credit cards when paying for purchases. If anything seems out of the ordinary, be 
cautious using your card. 
www.ftc.gov/idtheft 
27
 ConnectSafely Smart Socializing Starts Here 
◦ http://www.connectsafely.org/safety-tips-advice/ 
 National Center for Missing & Exploited Children 
◦ http://www.netsmartz.org/InternetSafety 
 FBI-Internet Crime Complaints 
◦ www.FBI.GOV 
 Internet Monitoring Software (Free) 
◦ http://www.qustodio.com/internet_monitoring_software/ 
◦ http://www.nchsoftware.com/childmonitoring/index.html 
◦ http://www.monitor.us/en/website-monitoring 
◦ https://onlinefamily.norton.com/familysafety/basicpremium.fs 
 Internet Monitoring Software-All have mixed reviews 
◦ 1. Net Nanny $28.99 
◦ 2. WebWatcher $97.00 
◦ 3. McAfee Safe Eyes $49.95 
◦ 4. Spectorsoft-eblaster $99.95 
28
29

More Related Content

What's hot

E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 

What's hot (20)

E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 

Similar to September 2014 cyber safety presentation

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 

Similar to September 2014 cyber safety presentation (20)

2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 

Recently uploaded

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

Recently uploaded (20)

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

September 2014 cyber safety presentation

  • 1. Department of School Safety and Student Discipline Forsyth County Schools Todd Shirley, Director Tim Monroe, Assistant Director Steve Honn, School Safety Manager Ola Shadburn, General Administrative School Safety and Student Discipline Dr. Jeff Bearden Superintendent of Schools Joey Pirkle Associate Superintendent Educational Leadership Session #5
  • 2. 2
  • 3.  Facebook-87% students use--*Facebook Messenger-72%  Twitter  Instagram-77% usage--online photo-sharing, video-sharing and social networking service that enables its users to take pictures and videos, apply digital filters to them, and share them on a variety of social networking services, such as Facebook, Twitter, Tumblr and Flickr  Vine-Owned by Twitter, enables its users to create and post short video clips  Snapchat-65% useAllows users to take photos or short videos, then share them with friends for up to 10 seconds before the image self-destructs. If a recipient screenshots the photo, the app alerts the original sender, though hacks to interrupt this function do exist.  Askfm-social networking website where users can ask other users questions, with the option of anonymity used in foreign countries mostly  KIK-allows users to send texts via the Internet without having to use a cellular telephone  Yik Yak-social media site that gives you an anonymous live feed of what people are saying and doing. Users create all the content.  Youtube-No. 1 site for watching videos  (Schoolsafetyandsecurityalert.com August 2014) 3
  • 4.  Bullies can use your information  Predators can use the information  Comments – sued for defamation  Info – arrested or school discipline  No reasonable expectation of privacy  Future employers and schools can use information as “instant background checks”  Clark Howard Video 4
  • 5. 5
  • 6.  Eliminate all identifying information ◦ Anything that allows you to be located ◦ Anything that pairs the profile to your name  Delete inappropriate information  Read your information to determine what impression it gives ◦ Your site may appeal to someone you didn’t intend for it to impress 6
  • 7.  Choose appropriate photos  Setting privacy settings appropriately  For privacy: ◦ Develop your profile to be associated with a nickname rather than your official name 7
  • 8. 8
  • 9. 9 -Disable Geo-tagging Photos iPhone Settings>Privacy Android Camera>Settings>Privacy
  • 10.  Protect your friends’ info – no name, location, birthday wish, phone numbers, etc.  Don’t write anything you wouldn’t want your parents or principal to read (because they can and MIGHT!)  Set your profile to private so you control who views your profile.  Be careful when you post pics 10
  • 11.  What sport you play, the movies you like, your music…that would be okay ◦ Remember that these facts can be used to fool you  Be smarter than them  Always tell a trusted adult if you have problems online 11
  • 12.  High-tech version of flirting, teens texting explicit messages or photos to each other ◦ Experimental ◦ Aggravated 12 http://www.unh.edu/ccrc/pdf/CV231_Sexting Typology Bulletin_4-6- 11_revised.pdf
  • 13. 13  Obscene  Average person would find it wrong  It depicts sexual conduct  It has no literary, artistic, political or scientific value  Child Pornography  Images of sexual conduct ◦ Under 18 years 413 US 15, OCGA § 16-12-80 OCGA § 16-12-100
  • 14.  If someone sends you something ◦ Inappropriate – delete ◦ Obscene and/or makes you uncomfortable – alert your parent or authority  If you sent something ◦ Ask recipient to delete it and not to forward it ◦ Never send inappropriate text or images  In 2010, 20 percent of teenagers (22 % of girls and 18 % of boys) sent naked/seminude images of themselves or posted them online.  Nearly 1 in 6 teens between the ages of 12 and 17 have received naked or nearly nude pictures via text message from someone they know. (FBI Law Enforcement Bulletin) 14
  • 15.  Cyber bullying: One form of bullying  Youth use technology to: ◦ Send Text Messages ◦ Make Web Postings ◦ Stalk Others ◦ Post Unauthorized Photos ◦ Online Deception and Violence ◦ Cyber-ostracism 15 http://www.smlinks.com/sotw/why/
  • 16.  One mistreating others – usually someone that the target knows  Target – can be anyone  Bystander ◦ Harmful-if complacent ◦ Helpful-if report to adult 16
  • 17.  Making threats of violence to people or property  Engaging in coercion  Making obscene or harassing text messages  Harassment or stalking Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe and Responsible Use of the Internet, January 2007 17
  • 18.  Hate or bias crime  Creating or sending sexually explicit images of teens or children  Sexual exploitation  Taking a photo of someone in a place where privacy is expected (Locker room/Restroom) Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe and Responsible Use of the Internet, January 2007 18
  • 19.  10% to 20% of youth have been targets and/or aggressors  Cyberbullying peaks in the middle school years (grades 6-8)  Girls are more likely to be the target  Looks and body shape are the most targeted characteristics  While there is an increase in cyberbullying, it is likely because there is an increase in use of technology 19 http://cyberbullying.us/blog www.unh.edu/ccrc
  • 20. 20
  • 21. 21 Since January 23, 2004, criminals have been using the FDIC's name and reputation to perpetrate various "phishing" schemes. It is important to note that the FDIC will never ask for personal or confidential information in this manner.
  • 22. 22 WIFI THIEVES-Set up open wifi in public areas posing as a legitimate business. Stealing usernames and passwords to log into accounts. (WSBTV 2014) If you suspect that you have been a victim of identity theft, perhaps because you submitted personal information in response to a suspicious, unsolicited e-mail or you see unauthorized charges on your credit card, immediately contact your financial institution and, if necessary, close existing accounts and open new ones. Also contact the police and request a copy of any police report or case number for later reference. WEBCam-Hacking into cameras (have to set passwords to prevent hacking)
  • 23. • March 05, 2014  Pre-installed malware turns up on new Android devices  Fake version of Netflix that steals personal data and sends it to Russia has been found on some smartphones and tablets from Samsung, Motorola, and LG 23
  • 24.  Child Identity Theft  Credit Reports ◦ www.annualcreditreport.com ◦ Federal Law allows you to get a free copy of your credit report every 12 months from each credit reporting company.  Credit Reporting Agencies ◦ Equifax 800-525-6285 ◦ Experian 888-397-3742 ◦ TransUnion 800-680-7289 24
  • 25. 1. Make sure your child does not spend all of his/her time on the computer. People, not computers, should be their best friends and companions. 2. Keep the computer in an area where it can be monitored, like the family room, kitchen or living room, not in your child’s bedroom. 3. Learn enough about computers so you can enjoy them together with your kids. 4. Teach them never to meet an online friend offline unless you are with them. 5. Watch your children when they’re online and see where they go. 6. Make sure that your children feel comfortable coming to you with questions and don’t over react if things go wrong. 7. Keep kids out of chatrooms unless they are monitored. 8. Encourage discussions between you and your child about what they enjoy online. 25 Next page
  • 26. 9. Teach them what information they can share with others online and what they can’t (like telephone numbers, address, their full name and school) 10. Get to know their “online friends” just as you get to know all of their other friends. 11. Warn them that people may not be what they seem to be and that people they chat with are not their friends, they are just people they chat with. 12. Discuss these rules, get your children to agree to adhere to them, and post them near the computer as a reminder. www.cyber-safety.com 26
  • 27. Four steps you can start taking now to make ID security a priority — and a practice:  1. Change weak passwords. Do not use your birth date or part of your address or phone number. Strongest passwords combine upper- and lowercase letters, numbers and special characters.  2. Make sure your home Wi-Fi network is password-protected. Be careful how you use your devices at public hot spots. Most aren't secure — which means any information you send is only protected if you're on an encrypted website. To be sure a website is encrypted, look for "https" in the address before you log in or send any personal info.  3. Don't click on links in unsolicited emails. Don't give out information over the phone or online unless you've verified the source.  4. Keep your eye on debit and credit cards when paying for purchases. If anything seems out of the ordinary, be cautious using your card. www.ftc.gov/idtheft 27
  • 28.  ConnectSafely Smart Socializing Starts Here ◦ http://www.connectsafely.org/safety-tips-advice/  National Center for Missing & Exploited Children ◦ http://www.netsmartz.org/InternetSafety  FBI-Internet Crime Complaints ◦ www.FBI.GOV  Internet Monitoring Software (Free) ◦ http://www.qustodio.com/internet_monitoring_software/ ◦ http://www.nchsoftware.com/childmonitoring/index.html ◦ http://www.monitor.us/en/website-monitoring ◦ https://onlinefamily.norton.com/familysafety/basicpremium.fs  Internet Monitoring Software-All have mixed reviews ◦ 1. Net Nanny $28.99 ◦ 2. WebWatcher $97.00 ◦ 3. McAfee Safe Eyes $49.95 ◦ 4. Spectorsoft-eblaster $99.95 28
  • 29. 29