SlideShare a Scribd company logo
Tech- Smart Parents
   and Preschoolers
Barry Caplin                                    Prior Lake - Savage
Chief Information Security Officer                Early Childhood
Minnesota Department of Human Services            Family Education
barry.caplin@state.mn.us, bc@bjb.org              Feb. 2, 2013
@bcaplin, +barrycaplin, *bcaplin
http://about.me/barrycaplin
http://securityandcoffee.blogspot.com

            Slides at http://www.slideshare.net/bcaplin
            Handouts at http://www.bjb.org/stuff/talks/
Interactive
• Please… ask questions!


• Please… answer questions!
Disclaimer

   I’m still figuring out this

Parenting thing also…
So
  much
   has
change
     d
Digital Natives will soon
              be parents
Stuf f
“saf ety”   newborns
Privacy     toddlers
technolog preschool
y            ers
“saf ety” – many preschoolers don’t
 interact with others online
Privacy – parents must know what
 info they give away
Dangers
Stranger/Non-stranger danger
Privacy/identity issues
Health/lack of exercise
              perhaps the biggest issue!
“Digital Birth”
Online sonograms, pregnancy tweets
Birth photos
6% of newborns have an email address;
 6% social network profile
>90% have online presence by age 2 in US
Ave. “digital birth” age 6 mos.; 1/3 at birth
Newborns and
                             screens
Screens distract parents!
Screens distract babies!
Your voice is interactive – online/TV voice
 is less so
Online/TV sound can cause stress
TV commercials are often loud

 from The Mediatrician http://cmch.typepad.com/mediatrician/
Awesome free infant and toddler games and activities
 at babygamer.com
Tips f or Internet Use
From mumsnet.com
Keep devices centralized and supervise use
Talk about games and sites
Use parental control software
Screens are not a babysitter – play together

    http://www.mumsnet.com/internet-safety/preschool-children
P School Saf ety
 re-
Tips f or Internet Use
Talk about keeping personal info private –
 what goes on the web, stays on the web
Don’t use real names, other info, on sites
Talk about online strangers like real world
Limit screen use
Monitor screen use
Spend time online together
Tech – P saf ety
                   C
Krebs 3 Rules for Safety:
1.If you didn’t go looking for it, don’t install
it;
2.If you installed, update it;
3.If you no longer need it, get rid of it!

      Go to this web page and do what they say!
   http://krebsonsecurity.com/tools-for-a-safer-pc/
Geolocation

The world knows
• Where you are
• Where you are not
The ‘Net Never
                              Forgets
• Anything posted remains for a long time
• Caching/Archiving
• Who else might view your info?:
  – Neighbors
  – Acquaintances
  – Future: school officials, job interviews,
    college admissions officials
Reputation
                  Management
• Remove or untag pictures
• Ask friends/others to do the same
• Limit info on public profiles
For Parents and older kids:
• LinkedIn.com
• ClaimId.com/Naymz.com
• Blog
Reputation
                  Management
For Parents and older kids:
•Get involved - generate good publicity
•Don’t get into online arguments (and
if you do… drop it!)
•You may need professional help
(technical… not the other kind)
What to Do?
Handouts
• Resources for Parents of
  Pre-schoolers
• Parental Tools
Bullying – Old School
• Physical – schoolyard, hallway,
  locker room, bathroom
• Verbal – rumors, taunting
• Written – notes, walls

Don’t share your locker combo!
Online Bullying – New
                 School
• Supplements the “old fashioned” kind
• Available 24x7
• Victims won’t tell – don’t want access
  cut off
Don’t share your password!
www.stopcyberbullying.org
What to do…
Educate your kids
  – To respect others
  – To take a stand
  – To not respond to cyberbullies
Communicate
  – Be the trusted resource
No “catch-all” fix – but many resources
Cell Phones
• They’re everywhere!
• Special phones/plans for younger
  kids
• Calls, texting, pictures, video,
  games, apps, music, Internet…
• Internet access is truly mobile!
• Harder to know what they’re
  doing
• Cell data services $$$
Cell Phones
Other
                                     good
                                    ideas
Cell phone as a baby monitor – 2 phones and
                                            …
 free m2m minutes
Alarm for transition times
Maintain up-t0-date photos – daily when
 away from home
Teach phone etiquette – it could save your
 life!
What to Do?
Handouts
• Top 12 Tips for Cell
  Phones and Kids
• PC protection tools
• Safe Web Surfing tips
Discussion?
Slides at http://www.slideshare.net/bcaplin
Handouts at http://www.bjb.org/stuff/talks/

  barry.caplin@state.mn.us, bc@bjb.org
    @bcaplin, +barrycaplin, *bcaplin
about.me/barrycaplin, delicious.com/bcaplin
      Securityandcoffee.blogspot.com

More Related Content

What's hot

Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
Kristi Richburg
 
Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)
Alyanna Marie
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
lisluandaprimary
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
ConnectSafely
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
Marian Merritt
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
curlistl
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
Donald E. Hester
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
John Woodring
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
KR_Barker
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
Elizabeth T. "Eli" Edwards
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
sharoncindrich
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
CreepSquash
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
ConnectSafely
 
Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)
Pod Legal
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
ConnectSafely
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
Donald E. Hester
 

What's hot (20)

Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)Social Media - the legal risks (AIM)
Social Media - the legal risks (AIM)
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 

Viewers also liked

Growing the Future: Using Technology to Connect Kids to Nature
Growing the Future: Using Technology to Connect Kids to NatureGrowing the Future: Using Technology to Connect Kids to Nature
Growing the Future: Using Technology to Connect Kids to Nature
saritastowers
 
An investigation of supervision of television viewing as a factor
An investigation of supervision of television viewing as a factorAn investigation of supervision of television viewing as a factor
An investigation of supervision of television viewing as a factor
Alexander Decker
 
Technology Influence
Technology Influence Technology Influence
Technology Influence
Ilaxi Patel
 
Implicit Consumer Animosity
Implicit Consumer AnimosityImplicit Consumer Animosity
Implicit Consumer Animosity
Stevesilde
 
The Next Generation of Digital Consumers
The Next Generation of Digital ConsumersThe Next Generation of Digital Consumers
The Next Generation of Digital Consumers
Ipsos in North America
 
Technology in the classroom: we use or they loose
Technology in the classroom: we use or they looseTechnology in the classroom: we use or they loose
Technology in the classroom: we use or they loose
Kt8675309
 
Children and future internet
Children and future internetChildren and future internet
Children and future internet
University of Potsdam
 
STEM Storytime: Preschool Fun with Science, Technology, Engineering, and Math
STEM Storytime: Preschool Fun with Science, Technology, Engineering, and MathSTEM Storytime: Preschool Fun with Science, Technology, Engineering, and Math
STEM Storytime: Preschool Fun with Science, Technology, Engineering, and Math
Westerville Library
 
Negative Effects Of Technology On Children
Negative Effects Of Technology On ChildrenNegative Effects Of Technology On Children
Negative Effects Of Technology On Children
guest2630606
 
Negative Effects of Technology on Young Children
Negative Effects of Technology on Young ChildrenNegative Effects of Technology on Young Children
Negative Effects of Technology on Young Children
ascarcello
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
Aditya
 
Technology and Communications for Kids
Technology and Communications for KidsTechnology and Communications for Kids
Technology and Communications for Kids
Raj Badarinath
 
Advantages and Disadvantages of Technology
Advantages and Disadvantages of TechnologyAdvantages and Disadvantages of Technology
Advantages and Disadvantages of Technology
Pave Maris Cortez
 
ppt on harmful effects of technology
ppt on harmful effects of technologyppt on harmful effects of technology
ppt on harmful effects of technology
technovigilants
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentations
ismailraesha
 

Viewers also liked (15)

Growing the Future: Using Technology to Connect Kids to Nature
Growing the Future: Using Technology to Connect Kids to NatureGrowing the Future: Using Technology to Connect Kids to Nature
Growing the Future: Using Technology to Connect Kids to Nature
 
An investigation of supervision of television viewing as a factor
An investigation of supervision of television viewing as a factorAn investigation of supervision of television viewing as a factor
An investigation of supervision of television viewing as a factor
 
Technology Influence
Technology Influence Technology Influence
Technology Influence
 
Implicit Consumer Animosity
Implicit Consumer AnimosityImplicit Consumer Animosity
Implicit Consumer Animosity
 
The Next Generation of Digital Consumers
The Next Generation of Digital ConsumersThe Next Generation of Digital Consumers
The Next Generation of Digital Consumers
 
Technology in the classroom: we use or they loose
Technology in the classroom: we use or they looseTechnology in the classroom: we use or they loose
Technology in the classroom: we use or they loose
 
Children and future internet
Children and future internetChildren and future internet
Children and future internet
 
STEM Storytime: Preschool Fun with Science, Technology, Engineering, and Math
STEM Storytime: Preschool Fun with Science, Technology, Engineering, and MathSTEM Storytime: Preschool Fun with Science, Technology, Engineering, and Math
STEM Storytime: Preschool Fun with Science, Technology, Engineering, and Math
 
Negative Effects Of Technology On Children
Negative Effects Of Technology On ChildrenNegative Effects Of Technology On Children
Negative Effects Of Technology On Children
 
Negative Effects of Technology on Young Children
Negative Effects of Technology on Young ChildrenNegative Effects of Technology on Young Children
Negative Effects of Technology on Young Children
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
Technology and Communications for Kids
Technology and Communications for KidsTechnology and Communications for Kids
Technology and Communications for Kids
 
Advantages and Disadvantages of Technology
Advantages and Disadvantages of TechnologyAdvantages and Disadvantages of Technology
Advantages and Disadvantages of Technology
 
ppt on harmful effects of technology
ppt on harmful effects of technologyppt on harmful effects of technology
ppt on harmful effects of technology
 
Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentations
 

Similar to Tech smart preschool parent 2 13

Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
- Mark - Fullbright
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentation
fkompar
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
Barry Caplin
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
Barry Caplin
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
Candice Wimbles
 
Safe Internet Use
Safe Internet UseSafe Internet Use
Safe Internet Use
schalman
 
Parenting And The Internet Ppt
Parenting And The Internet PptParenting And The Internet Ppt
Parenting And The Internet Ppt
Mary Danko
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
chellakaruppasamy
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
YadetaHailu
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
lival1
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teens
contactcareergyani
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Lori Lee Mickelson
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Lori Lee Mickelson
 
Media & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s ViewMedia & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s View
Hans Rasmussen
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Kermit Agbas
 
Parent Info Night: Technology
Parent Info Night: TechnologyParent Info Night: Technology
Parent Info Night: Technology
HRS
 
Riverview
RiverviewRiverview
Riverview
Kathy Schrock
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
ProjectsByJen.com
 

Similar to Tech smart preschool parent 2 13 (20)

Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentation
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Safe Internet Use
Safe Internet UseSafe Internet Use
Safe Internet Use
 
Parenting And The Internet Ppt
Parenting And The Internet PptParenting And The Internet Ppt
Parenting And The Internet Ppt
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teens
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Media & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s ViewMedia & Technology; The Christian Parents’s View
Media & Technology; The Christian Parents’s View
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Parent Info Night: Technology
Parent Info Night: TechnologyParent Info Night: Technology
Parent Info Night: Technology
 
Riverview
RiverviewRiverview
Riverview
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 

More from Barry Caplin

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
Barry Caplin
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
Barry Caplin
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
Barry Caplin
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
Barry Caplin
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
Barry Caplin
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
Barry Caplin
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
Barry Caplin
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
Barry Caplin
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
Barry Caplin
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
Barry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
Barry Caplin
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Barry Caplin
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
Barry Caplin
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
Barry Caplin
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
Barry Caplin
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Barry Caplin
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
Barry Caplin
 
Elements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramElements of an Information Security Awareness Program
Elements of an Information Security Awareness Program
Barry Caplin
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
Barry Caplin
 

More from Barry Caplin (20)

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
 
Elements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramElements of an Information Security Awareness Program
Elements of an Information Security Awareness Program
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 

Recently uploaded

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 

Recently uploaded (20)

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 

Tech smart preschool parent 2 13

  • 1. Tech- Smart Parents and Preschoolers Barry Caplin Prior Lake - Savage Chief Information Security Officer Early Childhood Minnesota Department of Human Services Family Education barry.caplin@state.mn.us, bc@bjb.org Feb. 2, 2013 @bcaplin, +barrycaplin, *bcaplin http://about.me/barrycaplin http://securityandcoffee.blogspot.com Slides at http://www.slideshare.net/bcaplin Handouts at http://www.bjb.org/stuff/talks/
  • 2.
  • 3. Interactive • Please… ask questions! • Please… answer questions!
  • 4. Disclaimer I’m still figuring out this Parenting thing also…
  • 5. So much has change d
  • 6.
  • 7. Digital Natives will soon be parents
  • 8. Stuf f “saf ety” newborns Privacy toddlers technolog preschool y ers
  • 9. “saf ety” – many preschoolers don’t interact with others online Privacy – parents must know what info they give away
  • 11. “Digital Birth” Online sonograms, pregnancy tweets Birth photos 6% of newborns have an email address; 6% social network profile >90% have online presence by age 2 in US Ave. “digital birth” age 6 mos.; 1/3 at birth
  • 12. Newborns and screens Screens distract parents! Screens distract babies! Your voice is interactive – online/TV voice is less so Online/TV sound can cause stress TV commercials are often loud from The Mediatrician http://cmch.typepad.com/mediatrician/
  • 13. Awesome free infant and toddler games and activities at babygamer.com
  • 14.
  • 15. Tips f or Internet Use From mumsnet.com Keep devices centralized and supervise use Talk about games and sites Use parental control software Screens are not a babysitter – play together http://www.mumsnet.com/internet-safety/preschool-children
  • 16. P School Saf ety re-
  • 17. Tips f or Internet Use Talk about keeping personal info private – what goes on the web, stays on the web Don’t use real names, other info, on sites Talk about online strangers like real world Limit screen use Monitor screen use Spend time online together
  • 18.
  • 19. Tech – P saf ety C Krebs 3 Rules for Safety: 1.If you didn’t go looking for it, don’t install it; 2.If you installed, update it; 3.If you no longer need it, get rid of it! Go to this web page and do what they say! http://krebsonsecurity.com/tools-for-a-safer-pc/
  • 20. Geolocation The world knows • Where you are • Where you are not
  • 21. The ‘Net Never Forgets • Anything posted remains for a long time • Caching/Archiving • Who else might view your info?: – Neighbors – Acquaintances – Future: school officials, job interviews, college admissions officials
  • 22. Reputation Management • Remove or untag pictures • Ask friends/others to do the same • Limit info on public profiles For Parents and older kids: • LinkedIn.com • ClaimId.com/Naymz.com • Blog
  • 23. Reputation Management For Parents and older kids: •Get involved - generate good publicity •Don’t get into online arguments (and if you do… drop it!) •You may need professional help (technical… not the other kind)
  • 24. What to Do? Handouts • Resources for Parents of Pre-schoolers • Parental Tools
  • 25. Bullying – Old School • Physical – schoolyard, hallway, locker room, bathroom • Verbal – rumors, taunting • Written – notes, walls Don’t share your locker combo!
  • 26. Online Bullying – New School • Supplements the “old fashioned” kind • Available 24x7 • Victims won’t tell – don’t want access cut off Don’t share your password! www.stopcyberbullying.org
  • 27. What to do… Educate your kids – To respect others – To take a stand – To not respond to cyberbullies Communicate – Be the trusted resource No “catch-all” fix – but many resources
  • 28. Cell Phones • They’re everywhere! • Special phones/plans for younger kids • Calls, texting, pictures, video, games, apps, music, Internet… • Internet access is truly mobile! • Harder to know what they’re doing • Cell data services $$$
  • 29.
  • 30.
  • 32. Other good ideas Cell phone as a baby monitor – 2 phones and … free m2m minutes Alarm for transition times Maintain up-t0-date photos – daily when away from home Teach phone etiquette – it could save your life!
  • 33. What to Do? Handouts • Top 12 Tips for Cell Phones and Kids • PC protection tools • Safe Web Surfing tips
  • 34. Discussion? Slides at http://www.slideshare.net/bcaplin Handouts at http://www.bjb.org/stuff/talks/ barry.caplin@state.mn.us, bc@bjb.org @bcaplin, +barrycaplin, *bcaplin about.me/barrycaplin, delicious.com/bcaplin Securityandcoffee.blogspot.com

Editor's Notes

  1. Slides at http://www.slideshare.net/bcaplin Handouts at http://www.bjb.org/stuff/talks/
  2. B early 1990
  3. Digital Natives have different views on privacy
  4. differences and similarities with older kids what they do and when they do it gets "younger" all the time - cell phones at school example there's a bunch of "older" stuff to discuss but that's for another time
  5. 2 biggest dangers: parents posting too much; screen time instead of active time!
  6. Could this lead to younger identity theft?
  7. Maryland - http://withoutmedia.wordpress.com/
  8. Foursquare, google latitude, pleaserobme
  9. Not anti-bullying, but pro-hero
  10. April 2012 - http://news.cnet.com/8301-1023_3-57411576-93/one-fifth-of-third-graders-own-cell-phones/
  11. Kids have also made fake or accidental calls to 911
  12. Slides at http://www.slideshare.net/bcaplin Handouts at http://www.bjb.org/stuff/talks/