SlideShare a Scribd company logo
A Teen Guide to
Social Networking, Cyberbullying
Sexual Predators, and Sexting
2009 Grant County News Special Supplement
Online Safety
Grant County News, June 2009
Sextingthe practice of sharing nude photos via cell-phones or other media-sharing
devices or technology including email and the web.
NEVER TAKE images of yourself that you wouldn’t want
everyone: your classmates, your teachers, your family, or your
employers to see.
BEFORE HITTING SEND, remember you can’t control where
this picture may end up like to other cell-phones or online.
EMOTIONAL AND REPUTATION DAMAGE from having
intimate photos of yourself sent to everyone you know.
REPORT any nude pictures you receive on your cell phone to
an adult you trust.
...it’s illegal
POTENTIAL CHARGES
Federal Felony
if the photos are sent to someone in
another state.
Possession
if you keep the photo on your phone or
computer.
Producing or Distributing Child
Pornography
if you took or sent the photo
IF CONVICTED
Register as a Sex Offender Spend time in jail
Grant County News, June 2009
Cyberbullyingwhen one teen targets another teen using digital technology to
torment, harass, embarass, humiliate, or threaten.
STOP
	 what ever you are doing online
BLOCK
	 the person if they are sending you IMs, emails, notes, etc.
TELL
	 an adult you trust and show them the evidence
Tools Cyberbullies Use:
Tips on Dealing with Cyberbullies:
Block the bully
Be civil
Don’t be a bully yourself
Be a friend
Don’t respond
Don’t get back at a bully
Save the evidence
Talk to an adult you trust
Profiles, Email, Instant Messaging, Blogs,
Uploading Digital Photos or Videos, Text Messaging, Websites
Grant County News, June 2009
Sexual1. Asks for Help
Will you teach me how to play this game?
2. Gives Gifts
I have a limited edition dvd of ‘High School Musical’ I want to send you.
3. Invokes Curiosity
I want to send you an invite to this great new site.
4. Establishes Authority
I work the for Record Industry and I’ve learned you’ve been illegally downloading music.
5. Job Offer
I am looking for students to help me create a new website just for teens.
6. Confidence and Trust
You know Mary too?! Want to be friends?
7. Love and Affection
Sorry to read on your profile that you’re boyfriend just broke up with you. If I were your boyfriend I would
NEVER break up with a beautiful girl like you.
8. Fear
I will hurt your family if you don’t talk to me.
9. Ego
I saw your pic on Myspace. I’m a modeling agent and I think you could be a model.
10. Games and Fun
Want to play checkers against me?
11. Privacy
This chat-room is really crowded, let’s make this private. Which IM do you use?
Examples of Tricks of Their Trade
Grant County News, June 2009
Predators
Who they’re looking for
These types are most likely to open up to a complete stranger online which makes them
easy targets for a Sexual Predator.
* Loners
* Teens with problems
* Teens who post videos or pictures of themselves
What do Sexual Predators really want?
* Pictures of you
* Sexual chats on IM or by texting
* Earn your trust so you want them
Sexual Predator Communication Progression
1. Chat Rooms
2. Private Chat Rooms
3. Instant Messaging
4. Email
5. Phone
Ways to Protect Yourself
* Keep personal information PRIVATE!
* If you wouldn’t walk up to a stranger on the streets and say it...don’t
say it online.
a person seen as obtaining or trying to obtain sexual contact
with another person through real-life or online means.
Grant County News, June 2009
Social
Networkingconnecting with friends, family, and co-workers using online
sites such as Facebook, Myspace, Hi5, Beebo, and Twitter.
1. Not using privacy settings
Make sure your profile is only viewable by your friends.
2. Posting too much private information
Save things like your phone number or birthday for in person.
3. Uploading photos and videos
If you wouldn’t put the photo or video on a job application, don’t post it online.
4. Not having a secure password
Don’t use easily guessable passwords like your pet’s name or favorite color.
5. Accepting friend requests from strangers
You never know what a stranger will do with your information.
	 to YOU from OTHERS
	 *Cyberbullied
	 *Targeted by a Sexual Predator
	 *Someone could steal your ID
	 *Friends share too much info about you
	 to OTHERS from YOU
	 *Cyberbullying
	 *Share too much info about friends
	 to YOUR COMPUTER
	 *Download a Virus or Spyware
Risks
Common Mistakes
Grant County News, June 2009
Parent TipsChat Room/Text Lingo
121............................one to one
A/S/L...............age, sex, location
ASAP..............as soon as possible
BBL.........................be back later
BRB........................be right back
CYA................................see you
CYT.................see you tomorrow
DIKU...................do I know you?
FYI...............for your information
GF/BF.............girlfriend/boyfriend
H&K...........................hug & kiss
HHOK.............ha ha only kidding
IDK.........................I don’t know
IMO.......................in my opinion
IRL........................... ..in real life
KFY...........................kiss for you
LMIRL..........let’s meet in real life
L8R.....................................later
LOL......................laugh out loud
NP.............................no problem
OLL............................online love
OTP........................on the phone
P911.............parents are coming!
PAW............parents are watching
PIR.....................parents in room
POS.............parent over shoulder
RLF........................real life friend
ROFL.......rolling on floor laughing
SMEM..................send me e-mail
THX.................................thanks
TTYL...................talk to you later
WTGP............want to go private?
WYCM................will you call me?
* Place the computer in an open area.
A good place is the family room. This way you can monitor when
your child is online.
* Become a part of your child’s online experience.
Find things to do together like searching for your next vacation
destination.
* Know the sites your child visits.
Make sure you are familiar with them and know what your child is
doing.
* Always maintain access to your child’s on-line accounts.
If something does happen, you can login and check things out.
* Use parental controls.
These are provided by your internet service provider or blocking
software.
* Have your teen sign an Internet Safety Pledge
This gives you a chance to talk so your teen knows what’s expected.
I will talk with my parents or guardian about their expecta-
tions and ground rules for going online
I will keep my identity private
I will never respond to any online communication that
makes me feel uncomfortable
I will neet in person with anyone I have first ‘met’ online
without discussing it with my parents or guardian
I will respect other people’s right while online
Ideas for Internet Safety Pledge
Grant County News, June 2009
Williamstown
Independent
Schools
Since 1890
Dispatch: (859) 824-1111
Office: (859) 824-3333
Fax: (859) 824-3334
www.grantcountysheriff.com
GRANT COUNTY SHERIFF’S OFFICE
101 N. MAIN STREET, WILLIAMSTOWN, KY 41097
Chuck Dills
Sheriff
CPPC GRANT COUNTY
Community Partnership
for Protecting Children
The Grant County News
The Grant County Express
www.grantky.com
Marylee L. Willoby
Grant County Coroner
(859) 823-1881
maryleeandmike@yahoo.com
CYBERTIPLINE
The Congressionally-mandated CyberTipline is a means for reporting
crimes against children.
Reports may be made 24-hours a day, 7 days a week online at
www.cybertipline.com or by calling 1-800-843-5678
KENTUCKY CYBERSAFETY
www.ag.ky.gov/cybersafety
NETSMARTZ
www.netsmartz.org
i-SAFE
www.isafe.org
Community Sponsors
For More Information
Put Together by Ashley Perry, The Grant County News 2009, aperry@grantky.com

More Related Content

What's hot

Keeping our kids e safe parents no animation
Keeping our kids e safe parents no animationKeeping our kids e safe parents no animation
Keeping our kids e safe parents no animation
Cheshire County Council
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
alyssacarricato
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
sharon7111
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Karl Poulin
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mcgeet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Leslie Witten
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5Melissa Halcott
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
Michael Richards
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
Queens Library
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
Kigose
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
Amit Pal Singh
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
KanelandSvihlik
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
Ben Woelk, CISSP, CPTC
 
Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good One
cassielaut
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
Matt Britland
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 

What's hot (20)

Keeping our kids e safe parents no animation
Keeping our kids e safe parents no animationKeeping our kids e safe parents no animation
Keeping our kids e safe parents no animation
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
 
Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good One
 
7th grade digital security
7th grade digital security7th grade digital security
7th grade digital security
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked

Introduction to Linux
Introduction to LinuxIntroduction to Linux
Introduction to Linux
haya_alj
 
Victor Lubbe Resume
Victor Lubbe ResumeVictor Lubbe Resume
Victor Lubbe ResumeVICTOR LUBBE
 
About me
About meAbout me
About me
Scottp9
 
Ruben Muradyan - Cybersecurity - ArmIGF 2015
Ruben Muradyan - Cybersecurity - ArmIGF 2015Ruben Muradyan - Cybersecurity - ArmIGF 2015
Ruben Muradyan - Cybersecurity - ArmIGF 2015
Arm Igf
 
PriyaHarrackisngh_Portfolio_11_15
PriyaHarrackisngh_Portfolio_11_15PriyaHarrackisngh_Portfolio_11_15
PriyaHarrackisngh_Portfolio_11_15Priya Harracksingh
 
Raymond/Parx 2015
Raymond/Parx 2015Raymond/Parx 2015
Raymond/Parx 2015
Anupam Sawan
 
Initial ideas (A2)
Initial ideas (A2)Initial ideas (A2)
Initial ideas (A2)
ir97media
 
Cst sauter verdict
Cst   sauter verdictCst   sauter verdict
Cst sauter verdict
kralovec
 
TalentNomics India Conference PDF MAR 8
TalentNomics India Conference PDF MAR 8TalentNomics India Conference PDF MAR 8
TalentNomics India Conference PDF MAR 8Namrata Narayan
 
Planeación lectores 3 ii corregida última
Planeación lectores 3 ii corregida últimaPlaneación lectores 3 ii corregida última
Planeación lectores 3 ii corregida última
Glorita E. Suárez Lugo
 
Pic analysis 3
Pic analysis 3Pic analysis 3
Pic analysis 3
kddickson17
 
Bagrat yengibaryan
Bagrat yengibaryanBagrat yengibaryan
Bagrat yengibaryan
Arm Igf
 
Matriz
MatrizMatriz

Viewers also liked (19)

Introduction to Linux
Introduction to LinuxIntroduction to Linux
Introduction to Linux
 
FORMAL_CV
FORMAL_CVFORMAL_CV
FORMAL_CV
 
Portfolio_2015
Portfolio_2015Portfolio_2015
Portfolio_2015
 
Victor Lubbe Resume
Victor Lubbe ResumeVictor Lubbe Resume
Victor Lubbe Resume
 
About me
About meAbout me
About me
 
Ruben Muradyan - Cybersecurity - ArmIGF 2015
Ruben Muradyan - Cybersecurity - ArmIGF 2015Ruben Muradyan - Cybersecurity - ArmIGF 2015
Ruben Muradyan - Cybersecurity - ArmIGF 2015
 
PriyaHarrackisngh_Portfolio_11_15
PriyaHarrackisngh_Portfolio_11_15PriyaHarrackisngh_Portfolio_11_15
PriyaHarrackisngh_Portfolio_11_15
 
Raymond/Parx 2015
Raymond/Parx 2015Raymond/Parx 2015
Raymond/Parx 2015
 
Initial ideas (A2)
Initial ideas (A2)Initial ideas (A2)
Initial ideas (A2)
 
Cst sauter verdict
Cst   sauter verdictCst   sauter verdict
Cst sauter verdict
 
TalentNomics India Conference PDF MAR 8
TalentNomics India Conference PDF MAR 8TalentNomics India Conference PDF MAR 8
TalentNomics India Conference PDF MAR 8
 
Anthony Hansungule Jempa ed
Anthony Hansungule Jempa edAnthony Hansungule Jempa ed
Anthony Hansungule Jempa ed
 
Planeación lectores 3 ii corregida última
Planeación lectores 3 ii corregida últimaPlaneación lectores 3 ii corregida última
Planeación lectores 3 ii corregida última
 
Pic analysis 3
Pic analysis 3Pic analysis 3
Pic analysis 3
 
Engineered print 2
Engineered print 2Engineered print 2
Engineered print 2
 
JOHN CV 2015 3
JOHN CV 2015 3JOHN CV 2015 3
JOHN CV 2015 3
 
Bagrat yengibaryan
Bagrat yengibaryanBagrat yengibaryan
Bagrat yengibaryan
 
Matriz
MatrizMatriz
Matriz
 
AGPC(CON)Rev-00 - Copy
AGPC(CON)Rev-00 - CopyAGPC(CON)Rev-00 - Copy
AGPC(CON)Rev-00 - Copy
 

Similar to Test

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
jaurisch
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
Jason Rushing
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
LuciusonSecurity
 
Etech monterey panganiban
Etech monterey panganibanEtech monterey panganiban
Etech monterey panganiban
SherylPanganiban2
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
timryan7
 
102009
102009102009
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
Neville Maluleke
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
jcullishpum
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineHolly Solomon
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
Mark Deming
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
Antglynn
 
Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenship
crosbye
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
janemiller48
 
Shouq jaber 11 a
Shouq jaber   11 aShouq jaber   11 a
Shouq jaber 11 a
Anumod E Nair
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
Al Rowell
 

Similar to Test (20)

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Etech monterey panganiban
Etech monterey panganibanEtech monterey panganiban
Etech monterey panganiban
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
102009
102009102009
102009
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
 
Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenship
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Shouq jaber 11 a
Shouq jaber   11 aShouq jaber   11 a
Shouq jaber 11 a
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 

Test

  • 1. A Teen Guide to Social Networking, Cyberbullying Sexual Predators, and Sexting 2009 Grant County News Special Supplement Online Safety
  • 2. Grant County News, June 2009 Sextingthe practice of sharing nude photos via cell-phones or other media-sharing devices or technology including email and the web. NEVER TAKE images of yourself that you wouldn’t want everyone: your classmates, your teachers, your family, or your employers to see. BEFORE HITTING SEND, remember you can’t control where this picture may end up like to other cell-phones or online. EMOTIONAL AND REPUTATION DAMAGE from having intimate photos of yourself sent to everyone you know. REPORT any nude pictures you receive on your cell phone to an adult you trust. ...it’s illegal POTENTIAL CHARGES Federal Felony if the photos are sent to someone in another state. Possession if you keep the photo on your phone or computer. Producing or Distributing Child Pornography if you took or sent the photo IF CONVICTED Register as a Sex Offender Spend time in jail
  • 3. Grant County News, June 2009 Cyberbullyingwhen one teen targets another teen using digital technology to torment, harass, embarass, humiliate, or threaten. STOP what ever you are doing online BLOCK the person if they are sending you IMs, emails, notes, etc. TELL an adult you trust and show them the evidence Tools Cyberbullies Use: Tips on Dealing with Cyberbullies: Block the bully Be civil Don’t be a bully yourself Be a friend Don’t respond Don’t get back at a bully Save the evidence Talk to an adult you trust Profiles, Email, Instant Messaging, Blogs, Uploading Digital Photos or Videos, Text Messaging, Websites
  • 4. Grant County News, June 2009 Sexual1. Asks for Help Will you teach me how to play this game? 2. Gives Gifts I have a limited edition dvd of ‘High School Musical’ I want to send you. 3. Invokes Curiosity I want to send you an invite to this great new site. 4. Establishes Authority I work the for Record Industry and I’ve learned you’ve been illegally downloading music. 5. Job Offer I am looking for students to help me create a new website just for teens. 6. Confidence and Trust You know Mary too?! Want to be friends? 7. Love and Affection Sorry to read on your profile that you’re boyfriend just broke up with you. If I were your boyfriend I would NEVER break up with a beautiful girl like you. 8. Fear I will hurt your family if you don’t talk to me. 9. Ego I saw your pic on Myspace. I’m a modeling agent and I think you could be a model. 10. Games and Fun Want to play checkers against me? 11. Privacy This chat-room is really crowded, let’s make this private. Which IM do you use? Examples of Tricks of Their Trade
  • 5. Grant County News, June 2009 Predators Who they’re looking for These types are most likely to open up to a complete stranger online which makes them easy targets for a Sexual Predator. * Loners * Teens with problems * Teens who post videos or pictures of themselves What do Sexual Predators really want? * Pictures of you * Sexual chats on IM or by texting * Earn your trust so you want them Sexual Predator Communication Progression 1. Chat Rooms 2. Private Chat Rooms 3. Instant Messaging 4. Email 5. Phone Ways to Protect Yourself * Keep personal information PRIVATE! * If you wouldn’t walk up to a stranger on the streets and say it...don’t say it online. a person seen as obtaining or trying to obtain sexual contact with another person through real-life or online means.
  • 6. Grant County News, June 2009 Social Networkingconnecting with friends, family, and co-workers using online sites such as Facebook, Myspace, Hi5, Beebo, and Twitter. 1. Not using privacy settings Make sure your profile is only viewable by your friends. 2. Posting too much private information Save things like your phone number or birthday for in person. 3. Uploading photos and videos If you wouldn’t put the photo or video on a job application, don’t post it online. 4. Not having a secure password Don’t use easily guessable passwords like your pet’s name or favorite color. 5. Accepting friend requests from strangers You never know what a stranger will do with your information. to YOU from OTHERS *Cyberbullied *Targeted by a Sexual Predator *Someone could steal your ID *Friends share too much info about you to OTHERS from YOU *Cyberbullying *Share too much info about friends to YOUR COMPUTER *Download a Virus or Spyware Risks Common Mistakes
  • 7. Grant County News, June 2009 Parent TipsChat Room/Text Lingo 121............................one to one A/S/L...............age, sex, location ASAP..............as soon as possible BBL.........................be back later BRB........................be right back CYA................................see you CYT.................see you tomorrow DIKU...................do I know you? FYI...............for your information GF/BF.............girlfriend/boyfriend H&K...........................hug & kiss HHOK.............ha ha only kidding IDK.........................I don’t know IMO.......................in my opinion IRL........................... ..in real life KFY...........................kiss for you LMIRL..........let’s meet in real life L8R.....................................later LOL......................laugh out loud NP.............................no problem OLL............................online love OTP........................on the phone P911.............parents are coming! PAW............parents are watching PIR.....................parents in room POS.............parent over shoulder RLF........................real life friend ROFL.......rolling on floor laughing SMEM..................send me e-mail THX.................................thanks TTYL...................talk to you later WTGP............want to go private? WYCM................will you call me? * Place the computer in an open area. A good place is the family room. This way you can monitor when your child is online. * Become a part of your child’s online experience. Find things to do together like searching for your next vacation destination. * Know the sites your child visits. Make sure you are familiar with them and know what your child is doing. * Always maintain access to your child’s on-line accounts. If something does happen, you can login and check things out. * Use parental controls. These are provided by your internet service provider or blocking software. * Have your teen sign an Internet Safety Pledge This gives you a chance to talk so your teen knows what’s expected. I will talk with my parents or guardian about their expecta- tions and ground rules for going online I will keep my identity private I will never respond to any online communication that makes me feel uncomfortable I will neet in person with anyone I have first ‘met’ online without discussing it with my parents or guardian I will respect other people’s right while online Ideas for Internet Safety Pledge
  • 8. Grant County News, June 2009 Williamstown Independent Schools Since 1890 Dispatch: (859) 824-1111 Office: (859) 824-3333 Fax: (859) 824-3334 www.grantcountysheriff.com GRANT COUNTY SHERIFF’S OFFICE 101 N. MAIN STREET, WILLIAMSTOWN, KY 41097 Chuck Dills Sheriff CPPC GRANT COUNTY Community Partnership for Protecting Children The Grant County News The Grant County Express www.grantky.com Marylee L. Willoby Grant County Coroner (859) 823-1881 maryleeandmike@yahoo.com CYBERTIPLINE The Congressionally-mandated CyberTipline is a means for reporting crimes against children. Reports may be made 24-hours a day, 7 days a week online at www.cybertipline.com or by calling 1-800-843-5678 KENTUCKY CYBERSAFETY www.ag.ky.gov/cybersafety NETSMARTZ www.netsmartz.org i-SAFE www.isafe.org Community Sponsors For More Information Put Together by Ashley Perry, The Grant County News 2009, aperry@grantky.com