SlideShare una empresa de Scribd logo
1 de 17
PARENTS SOCIAL MEDIA
TRAINING
KEEPING YOUR KIDS SAFE ONLINE
By Holly Solomon, Expand Socially, LLC
WHO IS HOLLY?
• 12+ years in IT, Recruiting, Sales
& Marketing
• My business- Expand Socially
• My kids
Agenda
•Sites kids are using today
•Statistics
•Safety tips
•Using a safety contract
•Settings
•Monitoring
•Resources
SOCIAL MEDIA TRAINING FOR PARENTS
Tweet comments today to:@expandsocially#socialmediawithholly
SITES KIDS ARE USING TODAY
Twitter: Information network that brings people closer to what’s important to
them. Used to collect interests, share info, and find out what’s happening in the
world. Write and share messages up to 140 characters for anyone to read
whether they are logged in or not.
Facebook: Social networking site launched in 2004 with one billion users.
After creating a profile you can add users as friends and exchange messages and
post updates that can be seen by your circle of friends or by anyone on
Facebook. Users can create profiles, add photos, list personal interests, and
contact information. Facebook users can “like” pages, places and groups to
follow updates from them.
Instagram: Free photo-sharing program and social network launched in 2010.
Service enables users to take photos, apply digital filters and then share it with
other Instagram users as well as a variety of social media networks. Currently
has 100 million registered users. Facebook owned.
STATISTICS
• 96% of teens use social networking applications such as Facebook, MySpace, Chat rooms, and blogs
• Only 15% of parents are “in the know” about their kids’ social networking habits, and how these
behaviors can lead to cyberbullying
• 69% of teens regularly receive online communications from strangers and don’t tell a parent or
caretaker
• The largest group of Internet porn consumers is children ages 12-17; Law enforcement officials
estimate that more than 50,000 sexual predators are online at any given moment
• 44% of tweens admitted they’ve watched something online they shouldn’t have
• Female teens are far more likely than male teens to post personal photos or videos of themselves
online
• 69% of social media-using teens think that peers are mostly kind to each other on social networking
sites, however, 88% of teens have seen someone be mean or cruel to another person on a social
networking site
• 41% of social media-using teens have experienced at least one negative outcome as a result of using
a social networking site
• More than 25% of Facebook users last year were under the age of 10 and 38% under 13.
• Only 18% of parents with children under 10 on Facebook are actually "friends" with their child on
the site
• 22% of teenagers log on to their favorite social media site more than 10 times a day
• 72% of teens have a social networking profile and nearly half (47%) have a public profile viewable by
anyone
SAFETY TIPS
• Even if it’s not your kid being inappropriate online, you should contact their parents to
alert them.
• Check if GPS Location data is being stored when you put in info (mobile mostly)
• If your kid has a smart phone, turn off GPS on Photos or people can see where they are
when they post the photo online
• Use privacy settings to restrict who can access and post on your child’s profile.
• Tell your kids to never impersonate someone else.
• Only add friends you know in real life.
• Use a nickname that doesn‘t identify your location, gender, or age.
• Never meet in person with anyone you first met online.
• Profile and photo share only with people on your friends list.
• Don’t post your plans or whereabouts.
• Never post sexually provocative photos.
• Have your kid’s passwords so you can check on them when you want to- and do it
often- Tell them you will too!
• Have your kids use strong email passwords.
• Don’t click on links from people you do not know (email or online).
• Tell your kids not to download any “free” stuff unless they ask for permission (free
games, ring tones or other downloads)
WHAT TO TELL YOUR KIDS….
• Never arrange a face-to-face meeting with someone they met
on-line
• Never upload (post) pictures of themselves onto the Internet
or on-line service to people they do not personally know
• Never give out identifying information such as their name,
home address, school name, or telephone number
• Never download pictures from an unknown source, as there is
a good chance there could be sexually explicit images
• Never respond to messages or bulletin board postings that are
suggestive, obscene, belligerent, or harassing
• That whatever they are told on-line may or may not be true
• Tell them if they ever get in a weird situation to let you know
so you can help- not get mad at them.
USING A SAFETY CONTRACT
•I will not give out personal information such as my address, telephone number (cell or home), parent’s
phone numbers, or the name and location of my school without my parents’ permission.
•I will not post information or updates about where I am when not with the family or an adult.
•I will tell my parents right away if I come across any information that makes me feel uncomfortable.
•I will never agree to get together with someone I "meet" online.
•I will never send a stranger my picture or details about my family or me.
•I will not respond to any messages that are mean or in any way make me feel uncomfortable.
•I will talk with my parents so that we can set up rules for going online. We will decide upon the time of
the day that I can be online, the length of time I can be online and appropriate access for me to visit. I
will not access other areas or break these rules without their permission.
•I will not give out my Internet password to anyone (not even my best friends) other than my parents.
•I will not stay logged in when I leave my computer.
•I will not video chat or message chat with anyone I don’t know.
•I will check with my parents before downloading or installing software or doing anything that could
possibly hurt our computer or jeopardize my family's privacy.
•I will be a good online citizen and not do anything that hurts other people or is against the law.
•I will help show my parents the great things online I learn and share with them updates regularly about
my online activities.
I Promise to...
FACEBOOK SETTINGS
General Settings: Change password once a month
Security: 1) Enable Secure browsing, 2) Consider enabling login
notifications, login approvals, app passwords and
3) Delete old sessions under “Active Sessions”
*Privacy, Timeline & Tagging and Blocking- we’ll talk about in next slides
Notifications: Update your notifications appropriately
Mobile: If you list your kid’s cell phone it will be here- they can have it registered for text
messaging for updates. You can make mobile number hidden on profile later.
Followers: Do not check this box or the public (not friends) can have access to posts
Apps: Kids use a lot of apps- so you can clean this up regularly and delete things not
being used. Edit apps they use a lot to protect them from giving away other people’s
info.
Facebook Ads: Under “Third Party Sites” & “Ads & Friends”, choose “Only my friends”
Payments: Under “Payment Method”, make sure you do not have a payment method
stored. Consider browsing “Purchase History” to know what your kids have been doing.
Dropdown
FACEBOOK SETTINGS 2: PRIVACY SETTINGS & TOOLS
Disable InstantPersonalization
FACEBOOK SETTINGS 3: TIMELINE & TAGGING
FACEBOOK SETTINGS 4: BLOCKING
Use a restricted List: When you add friends to your Restricted list they can only
see the information and posts that you make public.
Block Users: Once you block someone, that person can no longer see things you
post on your timeline, tag you, invite you to events or groups, start a
conversation with you, or add you as a friend.
Block App Invites: Once you block app invites from someone, you'll automatically
ignore future app requests from that friend.
Block Event Invites: Once you block event invites from someone, you'll
automatically ignore future event requests from that friend.
Block Apps: Once you block an app, it can no longer contact you or get non-
public information about you through Facebook.
TWITTER SETTINGS
• Account:
• Username: You can choose to uncheck the box “let others find me by my email address” as this will allow
friends to find your username and request to follow you if they have your email address.
• Tweet Location: I do not suggest you check the box “Add a location to my tweets” as this will show where
your kids are located.
• Tweet Media: Make sure both boxes are not checked
• Tweet Privacy: Click this box to protect tweets and you will have to accept someone before they can see
your tweets.
• Personalization: I suggest you check this box as it requires personal information to reset your password.
Since there are a lot of people hacking Twitter accounts, this will protect you further.
• Password Reset: Check this box to require personal information to reset password. Since there are a lot of
• Email notifications: These are optional for your kid to see updates about activity related to their network.
• Profile:
• Photo: Do not use a photo of yourself if you are a child. Also make sure they are not using an inappropriate
image.
• Location: List city reside in- not more than that
• Website: nothing needs to be in here
• Bio: This is a place to add 160 characters about yourself. Make sure what they write is appropriate.
• Facebook: If you allow this option, Facebook can post on your behalf your tweets to your Facebook profile.
• Apps: Review apps and make sure they are needed or “revoke access”
INSTAGRAM SETTINGS
• The only information required when signing up for Instagram is an email address and desired
username.
• Phone is not required, so make sure your kids are not entering it.
• Anyone can view the photos (unless you tell it otherwise).
• Instagram is not for children under the age of 13.
Settings:
• Go to your profile from your mobile device (signed in)
• Click Edit Profile and scroll down to the bottom to: “Photos are private”
switch
• Toggle the “Photos are private” switch to ON to turn on privacy.
Geotagging:
• When uploading a photo, the geo-location data of the photo can easily be
shared with your followers if you are not careful. Fortunately, Instagram turns
geotagging off by default, but it’s easy to accidently turn it on.
• When uploading a photo, be sure to avoid tapping the button shown in this screenshot. If you do,
you can always tap it again to turn it off.
MONITORING
• Check your Antivirus software you use/purchased:
http://www.usatoday.com/story/tech/personal/2012/09/29/techlicious-internet-security-pare
• Free resources
• http://www1.k9webprotection.com
• http://www.kidzui.com
• http://www.visikid.com
• http://www.pikluk.com
• Safeeyes by McAfee: $49.99/1 yr subscription and can be used on up to 3 computers
• http://www.internetsafety.com/safe-eyes-parental-control-software-affiliate.php
• You can also get an extension of it for your iphone, ipad or ipod for $14.99 through the
app store (https://itunes.apple.com/app/safe-eyes-mobile/id298505665?mt=8)
RESOURCES
• Great Websites for Kids: http://gws.ala.org
• NET CETERA: Chatting with Kids About Being Online, bulkorder.ftc.gov
• OnGuardOnline.gov
• GetNetWise.org
• CyberBully411.org
• ConnectSafely.org
• iKeepSafe.org
• NetFamiyNews.org
• StaySafeOnline.org
Holly Solomon
Expand Socially
(614)440-7988
holly@expandsocially.com
www.expandsocially.com
Do you have questions?
QUESTIONS?

Más contenido relacionado

Más de Expand Socially, LLC

Más de Expand Socially, LLC (7)

Branding Your Company Socially
Branding Your Company SociallyBranding Your Company Socially
Branding Your Company Socially
 
LinkedIn: How to Use to Find Great Candidates
LinkedIn: How to Use to Find Great CandidatesLinkedIn: How to Use to Find Great Candidates
LinkedIn: How to Use to Find Great Candidates
 
Twitter 101
Twitter 101Twitter 101
Twitter 101
 
Facebook 101
Facebook 101Facebook 101
Facebook 101
 
Keeping You Safe Online
Keeping You Safe OnlineKeeping You Safe Online
Keeping You Safe Online
 
2013 Social Media In Enterprises
2013 Social Media In Enterprises2013 Social Media In Enterprises
2013 Social Media In Enterprises
 
Using Social Media During an Emergency
Using Social Media During an EmergencyUsing Social Media During an Emergency
Using Social Media During an Emergency
 

Último

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 

Último (20)

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 

Social Media Training for Parents: Keep Your Kids Safe Online

  • 1. PARENTS SOCIAL MEDIA TRAINING KEEPING YOUR KIDS SAFE ONLINE By Holly Solomon, Expand Socially, LLC
  • 2. WHO IS HOLLY? • 12+ years in IT, Recruiting, Sales & Marketing • My business- Expand Socially • My kids
  • 3. Agenda •Sites kids are using today •Statistics •Safety tips •Using a safety contract •Settings •Monitoring •Resources SOCIAL MEDIA TRAINING FOR PARENTS Tweet comments today to:@expandsocially#socialmediawithholly
  • 4. SITES KIDS ARE USING TODAY Twitter: Information network that brings people closer to what’s important to them. Used to collect interests, share info, and find out what’s happening in the world. Write and share messages up to 140 characters for anyone to read whether they are logged in or not. Facebook: Social networking site launched in 2004 with one billion users. After creating a profile you can add users as friends and exchange messages and post updates that can be seen by your circle of friends or by anyone on Facebook. Users can create profiles, add photos, list personal interests, and contact information. Facebook users can “like” pages, places and groups to follow updates from them. Instagram: Free photo-sharing program and social network launched in 2010. Service enables users to take photos, apply digital filters and then share it with other Instagram users as well as a variety of social media networks. Currently has 100 million registered users. Facebook owned.
  • 5. STATISTICS • 96% of teens use social networking applications such as Facebook, MySpace, Chat rooms, and blogs • Only 15% of parents are “in the know” about their kids’ social networking habits, and how these behaviors can lead to cyberbullying • 69% of teens regularly receive online communications from strangers and don’t tell a parent or caretaker • The largest group of Internet porn consumers is children ages 12-17; Law enforcement officials estimate that more than 50,000 sexual predators are online at any given moment • 44% of tweens admitted they’ve watched something online they shouldn’t have • Female teens are far more likely than male teens to post personal photos or videos of themselves online • 69% of social media-using teens think that peers are mostly kind to each other on social networking sites, however, 88% of teens have seen someone be mean or cruel to another person on a social networking site • 41% of social media-using teens have experienced at least one negative outcome as a result of using a social networking site • More than 25% of Facebook users last year were under the age of 10 and 38% under 13. • Only 18% of parents with children under 10 on Facebook are actually "friends" with their child on the site • 22% of teenagers log on to their favorite social media site more than 10 times a day • 72% of teens have a social networking profile and nearly half (47%) have a public profile viewable by anyone
  • 6. SAFETY TIPS • Even if it’s not your kid being inappropriate online, you should contact their parents to alert them. • Check if GPS Location data is being stored when you put in info (mobile mostly) • If your kid has a smart phone, turn off GPS on Photos or people can see where they are when they post the photo online • Use privacy settings to restrict who can access and post on your child’s profile. • Tell your kids to never impersonate someone else. • Only add friends you know in real life. • Use a nickname that doesn‘t identify your location, gender, or age. • Never meet in person with anyone you first met online. • Profile and photo share only with people on your friends list. • Don’t post your plans or whereabouts. • Never post sexually provocative photos. • Have your kid’s passwords so you can check on them when you want to- and do it often- Tell them you will too! • Have your kids use strong email passwords. • Don’t click on links from people you do not know (email or online). • Tell your kids not to download any “free” stuff unless they ask for permission (free games, ring tones or other downloads)
  • 7. WHAT TO TELL YOUR KIDS…. • Never arrange a face-to-face meeting with someone they met on-line • Never upload (post) pictures of themselves onto the Internet or on-line service to people they do not personally know • Never give out identifying information such as their name, home address, school name, or telephone number • Never download pictures from an unknown source, as there is a good chance there could be sexually explicit images • Never respond to messages or bulletin board postings that are suggestive, obscene, belligerent, or harassing • That whatever they are told on-line may or may not be true • Tell them if they ever get in a weird situation to let you know so you can help- not get mad at them.
  • 8. USING A SAFETY CONTRACT •I will not give out personal information such as my address, telephone number (cell or home), parent’s phone numbers, or the name and location of my school without my parents’ permission. •I will not post information or updates about where I am when not with the family or an adult. •I will tell my parents right away if I come across any information that makes me feel uncomfortable. •I will never agree to get together with someone I "meet" online. •I will never send a stranger my picture or details about my family or me. •I will not respond to any messages that are mean or in any way make me feel uncomfortable. •I will talk with my parents so that we can set up rules for going online. We will decide upon the time of the day that I can be online, the length of time I can be online and appropriate access for me to visit. I will not access other areas or break these rules without their permission. •I will not give out my Internet password to anyone (not even my best friends) other than my parents. •I will not stay logged in when I leave my computer. •I will not video chat or message chat with anyone I don’t know. •I will check with my parents before downloading or installing software or doing anything that could possibly hurt our computer or jeopardize my family's privacy. •I will be a good online citizen and not do anything that hurts other people or is against the law. •I will help show my parents the great things online I learn and share with them updates regularly about my online activities. I Promise to...
  • 9. FACEBOOK SETTINGS General Settings: Change password once a month Security: 1) Enable Secure browsing, 2) Consider enabling login notifications, login approvals, app passwords and 3) Delete old sessions under “Active Sessions” *Privacy, Timeline & Tagging and Blocking- we’ll talk about in next slides Notifications: Update your notifications appropriately Mobile: If you list your kid’s cell phone it will be here- they can have it registered for text messaging for updates. You can make mobile number hidden on profile later. Followers: Do not check this box or the public (not friends) can have access to posts Apps: Kids use a lot of apps- so you can clean this up regularly and delete things not being used. Edit apps they use a lot to protect them from giving away other people’s info. Facebook Ads: Under “Third Party Sites” & “Ads & Friends”, choose “Only my friends” Payments: Under “Payment Method”, make sure you do not have a payment method stored. Consider browsing “Purchase History” to know what your kids have been doing. Dropdown
  • 10. FACEBOOK SETTINGS 2: PRIVACY SETTINGS & TOOLS Disable InstantPersonalization
  • 11. FACEBOOK SETTINGS 3: TIMELINE & TAGGING
  • 12. FACEBOOK SETTINGS 4: BLOCKING Use a restricted List: When you add friends to your Restricted list they can only see the information and posts that you make public. Block Users: Once you block someone, that person can no longer see things you post on your timeline, tag you, invite you to events or groups, start a conversation with you, or add you as a friend. Block App Invites: Once you block app invites from someone, you'll automatically ignore future app requests from that friend. Block Event Invites: Once you block event invites from someone, you'll automatically ignore future event requests from that friend. Block Apps: Once you block an app, it can no longer contact you or get non- public information about you through Facebook.
  • 13. TWITTER SETTINGS • Account: • Username: You can choose to uncheck the box “let others find me by my email address” as this will allow friends to find your username and request to follow you if they have your email address. • Tweet Location: I do not suggest you check the box “Add a location to my tweets” as this will show where your kids are located. • Tweet Media: Make sure both boxes are not checked • Tweet Privacy: Click this box to protect tweets and you will have to accept someone before they can see your tweets. • Personalization: I suggest you check this box as it requires personal information to reset your password. Since there are a lot of people hacking Twitter accounts, this will protect you further. • Password Reset: Check this box to require personal information to reset password. Since there are a lot of • Email notifications: These are optional for your kid to see updates about activity related to their network. • Profile: • Photo: Do not use a photo of yourself if you are a child. Also make sure they are not using an inappropriate image. • Location: List city reside in- not more than that • Website: nothing needs to be in here • Bio: This is a place to add 160 characters about yourself. Make sure what they write is appropriate. • Facebook: If you allow this option, Facebook can post on your behalf your tweets to your Facebook profile. • Apps: Review apps and make sure they are needed or “revoke access”
  • 14. INSTAGRAM SETTINGS • The only information required when signing up for Instagram is an email address and desired username. • Phone is not required, so make sure your kids are not entering it. • Anyone can view the photos (unless you tell it otherwise). • Instagram is not for children under the age of 13. Settings: • Go to your profile from your mobile device (signed in) • Click Edit Profile and scroll down to the bottom to: “Photos are private” switch • Toggle the “Photos are private” switch to ON to turn on privacy. Geotagging: • When uploading a photo, the geo-location data of the photo can easily be shared with your followers if you are not careful. Fortunately, Instagram turns geotagging off by default, but it’s easy to accidently turn it on. • When uploading a photo, be sure to avoid tapping the button shown in this screenshot. If you do, you can always tap it again to turn it off.
  • 15. MONITORING • Check your Antivirus software you use/purchased: http://www.usatoday.com/story/tech/personal/2012/09/29/techlicious-internet-security-pare • Free resources • http://www1.k9webprotection.com • http://www.kidzui.com • http://www.visikid.com • http://www.pikluk.com • Safeeyes by McAfee: $49.99/1 yr subscription and can be used on up to 3 computers • http://www.internetsafety.com/safe-eyes-parental-control-software-affiliate.php • You can also get an extension of it for your iphone, ipad or ipod for $14.99 through the app store (https://itunes.apple.com/app/safe-eyes-mobile/id298505665?mt=8)
  • 16. RESOURCES • Great Websites for Kids: http://gws.ala.org • NET CETERA: Chatting with Kids About Being Online, bulkorder.ftc.gov • OnGuardOnline.gov • GetNetWise.org • CyberBully411.org • ConnectSafely.org • iKeepSafe.org • NetFamiyNews.org • StaySafeOnline.org

Notas del editor

  1. ----- Meeting Notes (6/18/13 23:00) -----