pd pandora & cyberhood watch internet safety symposium

48
www. TheCyberHoodWatch TheCyberHoodWatch.com PD Pandora Internet Safety 1

Upload: cyberhoodwatch

Post on 07-May-2015

2.474 views

Category:

Technology


0 download

DESCRIPTION

CyberHood Watch, OSAuthority, educators, law enforcement personnel, child welfare organizations, community leaders and PARENTS everywhere know that Internet safety is at the top of today's list of parenting concerns. And why shouldn't it be? We let our children use a machine that connects them to the entire world - but more importantly, connects the entire world to them and your home. The PD Pandora Internet Safety curriculum is an informative and customizable 90-minute safety seminar that analyzes the common threats children and families face online every day. The symposium covers Internet predators, cyberbullying, peer-to-peer file sharing, social networking and more, as well as solutions that will help any 21st century parent. The complete package consists of a full PowerPoint presentation, read-along script, 6-page parent hand-out for distribution and marketing materials.

TRANSCRIPT

Page 1: PD Pandora & CyberHood Watch Internet Safety Symposium

www.TheCyberHoodWatchTheCyberHoodWatch.com

PD Pandora Internet Safety1

Page 2: PD Pandora & CyberHood Watch Internet Safety Symposium

PD PandoraInternet Safety

Symposium:How to Keep Your Family Safe on the

Internet

CyberHood CyberHood WatchWatch

When ordering use special promo code for discount: “cyberhoodcyberhood”

Page 3: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety3

AGENDA

Part I: Internet 101 Intro to the Internet, Web 2.0

Threat Assessment

Part II: Solutions What you can do

Resources

Page 4: PD Pandora & CyberHood Watch Internet Safety Symposium

PART I: INTERNET PART I: INTERNET 101101

Intro to the Internet and Web 2.0Threat Assessment

www.TheCyberHoodWatchTheCyberHoodWatch.com

Page 5: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety5

THE INTERNET

Evolved over decades “inter” “networks” talking to each

other Went public in the ‘80s Popularity in the mid-‘90s Source of information – A place to

search for answers and information Early communication includes:

email, chat rooms, forums

Page 6: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety6

Does not refer to an update to any technical specifications, but rather to changes in the ways software developers and

end-users (you and me) utilize the Web…

Web 2.0 concepts have led to the development and evolution of web communities and hosted services, such as video sharing sites, wikis, blogs, and the most popular of all…

WEB 2.0

o "Network as platform" computing - Allows users to run software-applications entirely through a browser

o Users can own the data on a Web 2.0 site and exercise control over that data

o "Architecture of participation" encourages users to add value to the application as they use it

Page 7: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety7

SOCIAL NETWORKINGGet used to it!

Used regularly by millions of people across the globe… Most popular social networking websites:

MySpace Facebook FriendsterBebo Youtube

TwitterDigg LinkedIn Ning

Online communities of Internet users and people who share interests and/or activities, or who are interested in exploring the interests and activities of others

Can be general in nature, or cater to a specific group or common interest, such as hobbies, religion, or politics; many general sites have specialized groups within

Provide a variety of ways for users to interact Free to use

Page 8: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety8

SOCIAL NETWORKING (II)

Your profile page is the front page of your own newspaper!

Main purpose = communicate with friends

Tell people about:your personality

personal/professional interestshobbies

basic info about yourself

Why?Profile page = “your” customizable space

You can also:customize the background

choose the musicshare photos

show your list of friendsadd “widgets”

share video

Page 9: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety9

SOCIAL NETWORKING (III)

What’s so social about it?

Modes of communication offered by most popular

social networking websites include:

Internal “private mail” or “private message” (called a PM)

Instant messenger (real-time communication) Comments (short messages visible to all) Journal/Blog (thoughts or memos for the day) Bulletins (messages to everyone in your friends list) “Tweeting”

MAKING FRIENDS!COMMUNICATION!

Page 10: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety10

THE GOOD, THE BAD AND THE UGLY (of Social Networks)

Good: Helps people stay in touch

Acceptance Inspire interests and

creativity

Bad:Too much information (“TMI”)

Access to inappropriate material

Loss of privacy/identity theft

Ugly:Bullying

Internet predators“Sexting”

Page 11: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety11

OTHER POPULAR WAYS TO COMMUNICATE

Instant Messenger (IM)Real-time text-based communication

Popular IM programs: AOL Instant Messenger MSN Messenger Yahoo Messenger ICQ Trillian

Chat Rooms: Have dozens, even hundreds, of participants

Chat Rooms are often themed by interest “Moderators” police the conversation (not always)

Chat rooms can be joined through your web browser

Many IM programs also allow:•Offline messages

•Group chatting•Voice and video chatting

•Conversation logging and file sharing•Webcams

Page 12: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety12

Forums:a.k.a. message boards, newsgroups, online discussion sites

o “The modern bulletin board”o Topic central

o Several discussions at the same timeo Make friends, bond with people that share common interest

o Governed and maintained by administrators and moderators

Blogs:Short for “web log”

o Frequently updated online diaries/journalso Personal or professional; ethical, moral, topical

o Example: Pandora’s Blog, the blog for PC Pandora, tackles Internet safety and shares daily news stories on the issue.

o More popular with adults; kids getting into blogging more and more.

OTHER POPULAR WAYS TO COMMUNICATE (II)

Page 13: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety13

They DO exist!Internet Predators

Two types on the Internet

Predators lurk in chat rooms, forums, and social networks to search for targets!!!

THE THREATS

Sexual predators: Search for under-aged boys and girls or vulnerable older girls/young women Lure their target, “grooming” A physical meeting, after a sense of “knowing” and “trust” is established Sexual assault, and sometimes rape, can occur in the real life meetings Child pornographers

Scam artists: Don’t care if they ever meet you; they are after your wallet Take their time to learn real-life facts about you and then use that

information to try and gain access to your credentials, bank accounts, etc. Use sophisticated and professional emails that appear legitimate, but are

nothing more than a ploy to get you to divulge your private information May lead to identity theft

Page 14: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety14

THE THREATS (II) They DO exist!

Internet Predator Statistics: 69% of teens regularly receive personal messages online from people they

don't know and most of them don't tell a trusted adult about it. While 16% of teens in 2007 say they've considered meeting face-to-face with

someone they've talked to only online, that marks a significant drop compared to the 30% of teens who were considering such a meeting in 2006.

In 2007, 8% of teens say they actually have met in person with someone from the Internet, down from 14% in 2006.

When they receive online messages from someone they don't know, almost 60% of teens say they usually respond only to ask who the person is. Nearly a third of teens (31%) say they usually reply and chat with people they don't know, and only 21% tell a trusted adult when they receive such messages.

Approximately 1 in 7 (13%) children were solicited in 2005, compared to approximately 1 in 5 (19%) in 2000; aggressive solicitations did not decline.

4% of all youth Internet users in 2005 said online solicitors asked them for nude or sexually explicit photographs of themselves.

Make no mistake, these guys exist!

Page 15: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety15

THE THREATS (III) Same bully, different technology

Cyberbullying(a.k.a. electronic bullying, online bullying)

Definition: the intentional and repeated harm of others through the use of computers, cell phones, and other electronic devices.

Worst of all: the effects and ordeal of a cyberbully can follow a victim for years…

o THE most predominant threat your kids will face todayo Bullying 2.0: moved from the playground to the Interneto The Internet makes it possible for bullying to continue at

every hour of every day

Bullying Effects:• Mental anguish• Humiliation• Stress• Anxiety• Depression• Suicidal feelings

Page 16: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety16

Same old bully, new technology Cyberbullying is…

Important to remember: though the use of sexual remarks and threats are sometimes present in cyberbullying, it is not the same as sexual harassment and does not necessarily involve sexual predators…

THE THREATS (IV)

As simple as email harassment, but may also include: Threats Sexual remarks and solicitations Compromising photos Hate speech/racist remarks Subject of ridicule in forums Posting false statements gossip as fact

Cyberbullies may: Disclose victims' personal data on websites/forums Pose as victim (ID theft?) Send threatening/harassing emails and IMs Post rumors or gossip Instigate others to gang up on target

Page 17: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety17

Same old bully, new technologyCyberbullying exists where?

Important to remember: cyberbullying is bullying between minors! When an adult (over 18 years of age) is involved, it is considered cyber-stalking and cyber-harassment.

THE THREATS (V)

Electronic bullying takes place: on social networks in chat rooms in forums through Instant Messenger on YouTube

Offline: text messaging on mobile phones

Page 18: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety18

THE THREATS (VI) Same bully, different technology

Cyberbullying Statistics: Nearly 75% of kids have been bullied in the past year Only 1 in 10 reported such cyberbullying to parents/adults 41% of teenagers report between 1 and 3 online bullying

incidents over the course of a year 13% reported 4 to 6 incidents 19% reported 7 or more incidents The most common reason for not telling an adult, cited by half the bullied

participants, was that teens believe they "need to learn to deal with it" 31% reported that they do not tell because they are concerned their parents

might restrict their Internet access 51% report the bullying was done by schoolmates; 43% said by someone they

knew only online; 20% said someone they knew, but who was not from school The most prevalent forms of bullying online and in school involved name-

calling or insults Password theft was the next most common cyberbullying tactic. Also includes:

threats, sending embarrassing pictures, sharing private information, spreading rumors

Page 19: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety19

THE THREATS (VII)

“Sexting”The new dangerous, illegal and foolish phenomenon

Definition: the act of teenagers sending naked photos of themselves to significant others, friends, and sometimes just mere casual acquaintances, via cell phone text messaging. These messages are sent, received and forwarded on a daily basis across the nation.

Dangerous:Once that digital image is created, though it may have been intended to live on only a cell phone and shared with only one person, it is inevitable that image will make its way to a computer, the internet, and then the world.

Bottom line: it’s illegal, it’s dangerous… and it’s foolish!

Illegal:In the eyes of the law, sexting = a form of child pornographySeveral states have brought child porn charges upon teenagers who are taking and distributing such pictures

Reputations destroyed Cyberbullying results Reason for suicide

Page 20: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety20

THE THREATS (VIII)

“Sexting” Statistics:

Statistics from a 2008 survey of 653 teens (age 13-19) commissioned by The National Campaign to Prevent Teen and Unplanned Pregnancy:

20% of teens (1 in 5) have electronically sent/posted nude or seminude pictures or videos of themselves; breakdown: 22-percent of teen girls, 18-percent of teen boys and 11-percent of ‘young teen girls’ (age 13-16).

39% of teens have sent sexually suggestive messages (text, email, IM) to another (37% of teen girls, 40% of teen boys); 48-percent of teens report having received such messages

71% of teen girls and 67% of teen guys who have sent or posted sexually suggestive content have sent/posted this content to a boyfriend/girlfriend; 21% of teen girls and 39% of teen boys say they have sent such content to someone they wanted to date or “hook up” with.

15% of teens who have sent or posted nude/seminude images of themselves say they have done so to someone they only knew online.

75% of teens and 71% of young adults say sending sexually suggestive content “can have serious negative consequences.” Yet, 39% of teens and 59% of young adults have sent or posted sexually suggestive emails or text messages–and 20% of teens and 33% of young adults have sent/posted nude or semi-nude images of themselves.

38% of teen girls and 39% of teen boys have had sexually suggestive text messages or emails– originally meant for someone else–shared with them; 25% of teen girls and 33% of teen boys say they have had nude or semi-nude images–originally meant for someone else–shared with them.

Page 21: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety21

THE THREATS (IX)

P2P - a.k.a. peer-to-peer file sharing:Utilizes a dedicated program that shares files between personal computers over the Internet. This is accomplished through permitted access to each individual computer, usually limited to specified folders. Examples:

BitTorrent Limewire BearShare

Other Internet Activities and Their Associated Threats To Know About

While P2P can be fun, there are many dangers and risks associated:

Viruses, keyloggers and other threats that compromise your PCCopyright infringement for music and movies Files laced with pornography, child pornographyHackers can retrieve personal information

Page 22: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety22

THE THREATS (X)

Online Gaming: Huge with teen boys

Portal for bullying and predators Addiction to video games

Gambling: Very easy for a minor to get involved

Serious addiction Occasional cyber-predator

Parental exposure through credit card usage on non-secure, un-trusted sites can lead to ID theft!!!

Other Internet Activities and Their Associated Threats To Know About

Page 23: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety23

THE THREATS (XI)

Trust & Misinformation:“You can’t trust everything you read online”

Misinformation can appear in many ways and pose threats on many levels:

Personal opinion can be presented as fact Scam websites sell bogus products Commercial websites use every trick in the

book to get you to buy their product Spoof sites can mislead consumers Hate sites spread malicious information Email hoaxes Phishing scams

Other Internet Activities and Their Associated Threats To Know About

While many of these may not be a threat to your personal safety, intellectual safety and the development of a young mind can be harmed if too much misinformation makes its way through…

Page 24: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety24

THE THREATS (XII)

Masquerading as: Social Networking websites (YouTube, Facebook, MySpace)

Auction sites (eBay) Banks (Bank of America, Chase)

Online payment processors (PayPal) IT Administrators (Yahoo, ISPs, corporate)

More on Phishing: Carried out via email and Instant Messenger

Hard to detect Effects range from denial of access to email to substantial financial loss

Usually leads to forms of ID theft ranging from being locked out of your own accounts to fake accounts and ruined credit.

Other Internet Activities and Their Associated Threats To Know About

Phishing & Identity TheftThe criminally fraudulent process of attempting to acquire sensitive information by

masquerading as a trustworthy entity in an electronic communication

Page 25: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety25

THE THREATS (XIII)

Plagiarism:Using someone’s work and passing it off as your own

Only takes a few simple clicks Consequences of suspension and expulsion BIG difference between “doing research” and “cutting &

pasting” Teachers and schools need to be more vigilant

in catching and punishing “Paper mills” – Papers written by students

being sold to other students Software available to help detect plagiarism “Google” is a teacher’s best weapon

Other Internet Activities and Their Associated Threats To Know About

Page 26: PD Pandora & CyberHood Watch Internet Safety Symposium

PART II: SOLUTIONSPART II: SOLUTIONSWHAT CAN YOU DO?

Educate. Discuss. Protect.

Page 27: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety27

EDUCATE

143: _____AISI: _____ASL: _____BF: _____BRB: _____BTW: _____F2F: _____GF: _____IDK: _____IMO: _____INDB: _____IRL: _____ISS: _____JK: _____

K: _____KIT: _____LDR: _____LMIRL: _____LOL: _____M/F: _____N/P: _____NTK: _____OMFG: _____OMG: _____OTP: _____P911: parent alert!PAL: _____PAW: _____

PDA: _____PIR: _____POS: parent over shoulderPPL: _____S2R: _____STFU: _____ROFL: _____THX: _____TTYL: _____TY: _____WT? _____WTG: _____WTGP: _____

Learn about the web and web culture…

95% of parents do not recognize common chat room lingo!

Common Net Language:

Page 28: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety28

EDUCATE

143: I love youAISI: as I see itASL: age/sex/locationBF: boyfriendBRB: be right backBTW: by the wayF2F: face to faceGF: girlfriendIDK: I don’t knowIMO: in my opinionINDB: it's no big dealIRL: in real lifeISS: I said soJK: just kidding

K: okayKIT: keep in touchLDR: long distance relationshipLMIRL: let’s meet in real lifeLOL: laughing out loudM/F: male or femaleN/P: no problemNTK: nice to knowOMFG: oh my f***** godOMG: oh my godOTP: on the phoneP911: parent alertPAL: parents are listeningPAW: parents are watching

PDA: public display of affectionPIR: parent(s) in roomPOS: parent(s) over shoulderPPL: peopleS2R: send to receiveSTFU: shut the f*** upROFL: rolling on floor laughingTHX: thanks TTYL: talk to you laterTY: thank youWT? what timeWTG: way to goWTGP: want to go private?

Learn about the web and web culture…

95% of parents do not recognize common chat room lingo!

Common Net Language:

Page 29: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety29

EDUCATE (II)

Visit websites and join communities!

Good websites to visit: http://www.cyberbullying.us

http://www.BulliesBeGone.com http://www.StopInternetPredators.org http://www.ProtectChildrenOnline.org http://www.TheCyberHoodWatch.com http://ResponsibleCyberCitizen.com http://www.PluggedInParents.com http://theAlertParent.blogspot.com

http://TeenCheckup.com http://www.WebSafeKid.com

http://www.NetSmartz.org http://www.InternetSafeChildren.com

Learn about the web and web culture…

Page 30: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety30

EDUCATE (III)

Learn the LAW!

In [YOUR STATE]:[In this area, please highlight local and state laws and statues for cyberbullying and Internet predator convictions. Keep the information here short and bulleted. You can expand on the information in the script and in your dialogue. We are available to help you with the research if given at least 2 weeks notice from presentation date.]

Cyber Tipline: 1-800-843-5678 (THE LOST) OR www.cybertipline.com

Learn about the web and web culture…

Page 31: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety31

EDUCATE (IV)

“I never saw it coming…”

Warning Signs

Your child may be a victim of cyberbullying if he or she… Unexpectedly stops using the computer all together Appears nervous or jumpy when an instant message, text message,

or email appears Appears uneasy about going to school or outside in general Appears to be angry, depressed, or frustrated after using the

computer Avoids discussions about the computer Becomes abnormally withdrawn Exhibits symptoms of depression, insomnia, and lack of appetite Develops unexplained headaches, stomach aches Starts giving excuses to not go to school/increase in absenteeism Has an unexplained drop in grades/sudden lack of interest in school Shows increased avoidance of social events/isolation from peers

Learn about the web and web culture…

Page 32: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety32

EDUCATE (V) Learn about the web and web culture…

“I never saw it coming…” (part II)

Warning Signs

What you may notice if your child is in contact with

or a victim of an Internet predator… Spending a large amount of time on-line, especially

late at night, in a secretive manner Pornography on your child's computer Phone calls to/from people (particularly men) you don't

know Mail, gifts, or packages from someone you don't know Turns computer monitor off/ quickly changes screen Frequent deletion of computer “histories” Many new, different “buddies”

Page 33: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety33

EDUCATE (VI)

If your child is on MySpace and/or Facebook…

YOU SHOULD BE ON MYSPACE and/or FACEBOOK!!

o 93% of all Americans between 12 and 17 use the Internet o As of 2007, 71% of teenagers had established online

profiles; this number is probably closer to 85%-90% today

Be on the lookout for multiple profiles!

Learn about the web and web culture…

Page 34: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety34

Stranger Danger

The Golden Rule: DON’T TALK TO STRANGERS (online)!

Every day is Halloween Never meet online friends in person Ignore harassing or rude comments on

social network profiles; delete any unwanted messages or friends who leave inappropriate comments

Go to mom and dad if uncomfortable or harassment continues

Anonymity

DISCUSS Talk to your kids!!

Page 35: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety35

DISCUSS (II)

DON’T REVEAL PERSONAL INFORMATION TO ANYONE

From the mind of a Teenager: A majority of teens (58%) don't think posting photos or

other personal info on social networking sites is unsafe. About half (49%) are not concerned that posting

personal info online might negatively affect their future. Teens readily post personal info online. 64% post photos

or videos of themselves, while more than half (58%) post info about where they live.

Females are far more likely than male teens to post personal photos or videos of themselves (70% vs. 58%).

Talk to your kids!!

Page 36: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety36

DISCUSS (III)

Safe Posting TipsThe golden rule: Never post personal information!

Smart and unidentifiable online profilescreen nameGood: firefleye; Bad: LadyBobcat34

Never share passwords with anyone! Only add real-life friends to “friends”

and “buddies” lists Think before posting photos “Good Friend” posting Not your bulletin board Remember: for all the world to see!

Essential Step: Set social network profiles to private!Check the privacy settings of the social networking sites that your children use1. Set the profile so that people can only be added as a friend if you approve

it.2. Set it so that people can only view your child’s profile if you have

approved them as a friend.

Talk to your kids!!

Page 37: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety37

DISCUSS (IV)

NO BULLIES!

“play nice on the web” Treat thy neighbor/“friend”/”buddy” as

thyself Explain consequences of bullying

Anonymity = cowardly

Empower your children to stop bullying!www.BeenBulliedOnlineBeenBulliedOnline.com

Talk to your kids!!

Page 38: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety38

DISCUSS (V)

Parental Help

Remind your kids: It’s okay to talk to you Reassurance of help and protection, not

punishment Offer comfort and warmth Keep your cool/be the cool-but-firm parent

Talk to your kids!!

Page 39: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety39

PROTECT

Two arenas: Physical The PC

www.TheCyberHoodWatchTheCyberHoodWatch

.com

Safeguard your PC and monitor your child’s Internet activity

Page 40: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety40

PROTECT (II)

Things you can physically do to safeguard your children:

Get the computer out of the kids’ rooms! Walk/peer in frequently

SET RULES! (Only 23% of parents have computer usage rules!)

Safe computing contract

www.TheCyberHoodWatchTheCyberHoodWatch.com

Safeguard your PC and monitor your child’s Internet activity

Page 41: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety41

PROTECT (III)

Titles to consider:

McAfee Trend Micro Kaspersky Webroot BitDefender Spyware Nuker

Key ingredients:• Antivirus• Anti-Spyware• Firewall• Good tech support• Frequent automatic

updates• Email protection• Wireless security• Filtering and parental

controls

Safeguard your PC and monitor your child’s Internet activity

Antivirus and Internet protectionRobust, up-to-date Antivirus and Internet Security

Page 42: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety42

PROTECT (IV)

Filters and Parental Controls 53% of parents say they have filtering software on the

computer their child uses at home Windows and Internet Explorer have built in controls

and privacy settings

Set limits on game playing, web browsing, and overall computer use.1. Windows Vista: Control Panel “Parental Controls”

(keep family member accounts separate!)OR

2. Internet Explorer: Tools Menu “Options” Content” tab “Parental Controls”

Remember: Internet Security programs have basic filters and controls

Safeguard your PC and monitor your child’s Internet activity

Page 43: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety43

PROTECT (V)

Know where your child goes online and what they do: Only 65% of parents report checking up on their teens after they go online 65% of high school students admit to unsafe, inappropriate, or illegal

activities online 38% of high school students admit to hiding their online activities from their

parents

Reasons to Monitor:In contact with a predator

Victim of a cyberbullyMight be a cyberbully

Addicted to pornography, gamblingIllegal downloading of copyrighted material

Too much time aimlessly browsing, playing gamesSexting

MONITOR YOUR CHILD’S INTERNET ACTIVITY

Page 44: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety44

PROTECT (VI)

Consider this: 83% of parents say there is no excuse for

not knowing enough about the Internet to protect your kids or teens.

88% of parents think it's more important to know what their kids are doing online than to respect their kids' privacy.

Yet only 45% of parents have monitoring software that records what users do online.

MONITOR YOUR CHILD’S INTERNET ACTIVITY

You can’t be over their shoulder and with them 100% of the time

“Trust but verify”

Page 45: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety45

PROTECT (VII)

Monitoring Software: Gives the extra parental edge Verifies activity No reason for you to not know 21st century parenting Tell your kids you are monitoring Your house, your computer, your rules! BIG difference between “spying” and being a responsible parent Look for threats, not for gossip

PC Pandora monitoring softwarePC Pandora monitoring software can and does: Record snapshots of screen content

Logs: IM chats, emails, files traded, websites visited, programs used, webcam activity, Internet search queries

Feature parental controls (web filters and program blocks) Email updates of activity

MONITOR YOUR CHILD’S INTERNET ACTIVITY

Page 46: PD Pandora & CyberHood Watch Internet Safety Symposium

PD Pandora Internet Safety46

A SHORT SUMMARY& REVIEWStep 1: Educate

Know the web Know the hang-outs Understand the

lingo Learn about social

networking Recognize threats Know the law

Step 3: Protect Powerful Internet security and protection

Computer in an open area Frequent check-ups

Activate parental controls and filters Monitoring software (PC PandoraPC Pandora)

Step 2: Discuss “Stranger danger” Don’t share personal info Safe screen names and

secure passwords Be a responsible “cyber

citizen” Problem? See: Mom and

Dad

Page 47: PD Pandora & CyberHood Watch Internet Safety Symposium

Closing Remarks & Questions

THANK YOU FOR COMING!

www.TheCyberHoodWatchTheCyberHoodWatch.comSpecial discount code: “cyberhoodcyberhood”

Don’t forget to take home your ParentPacket!

Page 48: PD Pandora & CyberHood Watch Internet Safety Symposium

www.TheCyberHoodWatchTheCyberHoodWatch.com

special discount code: “cyberhoodcyberhood”

PD Pandora Internet Safety48