SlideShare una empresa de Scribd logo
1 de 21
Internet Safety A guide
Internet Safety Content Disclaimer Acceptable Use Policy Julie . . . her story Statistics IM/email/Chat rooms Blogging Inappropriate Content Resources References Think smart, Play smart, Be smart, Play SAFE!
Disclaimer This publications is not intended for professional use in any manner.  The author of this publication attempted to gather information pertaining to the safety of kids and tweens using the internet.  This is not intended for legal or professional consultation. The information in the publication is subject to change by the author of the referenced material.  All attempts were made to assure accuracy of the information in this publication.
Acceptable Use Policy Purpose The purpose of this policy is to ensure appropriate, responsible, ethical and legal access and use of computers, the Internet, and other electronic or communication devices by District students, patrons, and employees. The Technology Acceptable Use Policy addresses two distinct concepts of technology use. The first regards the use of computers and the Internet, and the second addresses interfering and electronic communication devices. Washington County School District, St. George, UT.
Acceptable Use Policy Policy 2.1. Computers and the Internet It is the policy of the Washington County School District to permit students, patrons, and employees to have computer and Internet access under approved regulations and guidelines, to include those listed in the Children's Internet Protection Act, State Law, and policies adopted by Board of Education. In general, the user's responsibilities require responsible, decent, ethical, polite, efficient, and legal use of computer and network resources. Students, patrons, and employees must not access obscene, pornographic, or material that is deemed to be harmful to minors. District and school personnel will instruct students and staff on acceptable use of computers and Internet resources and proper network etiquette.  All students, patrons, and employees are granted access to the Internet, but all access to the Internet through district resources is subject to the terms of the Technology Acceptable Use Agreement and District policy. Washington County School District, St. George, UT.
Acceptable Use Policy Policy 2.2. Interfering and electronic communication devices While in some instances the possession and use of electronic communication devices or other devices or objects by a student at a school may be appropriate, often the possession and use of such devices or objects by students at school can have the effect of distracting, disrupting, and intimidating others in the school setting and leading to opportunities for academic dishonesty and other disruptions of the educational process. The purpose of this component of the policy is to vest with school administrators the authority to enforce reasonable rules relating to student use of such objects or devices in the public schools. Washington County School District, St. George, UT.
Julie . . . Her story of how she got caught up in something she had no control over due to manipulation and anger . . .  Someone could be looking into your daily life without you realizing it. her story
Statistics Consider a recent survey of teenagers that revealed the following: ,[object Object]
60%  have an instant-message screen name
75%  have a cell phone
72%  have profiles on social networking sitesThink before you type All statistics provided by www.aldricchang.com
Statistics And on a more disturbing note ,[object Object]
most share personal info online, though 3 in 5 know it’s dangerous
1 in 4 know someone who experienced something bad, from an inappropriate text forwarded around school to being sexually victimizedAll statistics provided by www.aldricchang.com
Statistics Access ,[object Object]
Of the children (0-5) who use the Internet, 80% use it at least once a week.Cell Phones ,[object Object]
On average, texting teens (12-17) send and receive 1500 text messages a month.Friends Only! All statistics provided by www.netsmartz.com
Be Nice Statistics Cyberbullying ,[object Object]
Girls are more likely to be victims of cyberbullying (38% girls vs. 26% boys).Online Gaming ,[object Object]
27% of teens (12-17) play games with people they don’t know online.All statistics provided by www.netsmartz.com
Statistics Predators ,[object Object]

Más contenido relacionado

La actualidad más candente

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingMarc Kuhn
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and TeenagersJennifer Holena
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS
 
Negative effects of social media
Negative effects of social mediaNegative effects of social media
Negative effects of social mediaNida Rabbani
 

La actualidad más candente (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 
Negative effects of social media
Negative effects of social mediaNegative effects of social media
Negative effects of social media
 

Destacado

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
Multimedia technology
Multimedia technologyMultimedia technology
Multimedia technologyVishnu Ram
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
multimedia technologies Introduction
multimedia technologies Introductionmultimedia technologies Introduction
multimedia technologies IntroductionMohammed Fareed
 
Multimedia presentation
  Multimedia presentation   Multimedia presentation
Multimedia presentation kamalesh2015
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system pptSuaj
 
multimedia element
multimedia elementmultimedia element
multimedia elementAZMAN KADIR
 

Destacado (9)

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
Multimedia technology
Multimedia technologyMultimedia technology
Multimedia technology
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
multimedia technologies Introduction
multimedia technologies Introductionmultimedia technologies Introduction
multimedia technologies Introduction
 
Multimedia presentation
  Multimedia presentation   Multimedia presentation
Multimedia presentation
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
 
multimedia element
multimedia elementmultimedia element
multimedia element
 
Multimedia
MultimediaMultimedia
Multimedia
 

Similar a Internet Safety Presentation

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet SafetyErica Roberts
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesMs. D
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Karen Brooks
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 

Similar a Internet Safety Presentation (20)

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Legalissues
LegalissuesLegalissues
Legalissues
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Being SMART about Internet Safety
Being SMART about Internet SafetyBeing SMART about Internet Safety
Being SMART about Internet Safety
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database Resources
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 

Más de tdsparks3

Evaluation for Far West Laboratory for Educational Research and Development
Evaluation for Far West Laboratory for Educational Research and DevelopmentEvaluation for Far West Laboratory for Educational Research and Development
Evaluation for Far West Laboratory for Educational Research and Developmenttdsparks3
 
Digital Divide vs Digital Inequality
Digital Divide vs Digital InequalityDigital Divide vs Digital Inequality
Digital Divide vs Digital Inequalitytdsparks3
 
Unit of Instruction
Unit of InstructionUnit of Instruction
Unit of Instructiontdsparks3
 
Stop motion animation psw
Stop motion animation pswStop motion animation psw
Stop motion animation pswtdsparks3
 
541 video enhanced lesson
541 video enhanced lesson541 video enhanced lesson
541 video enhanced lessontdsparks3
 
Computer networking
Computer networkingComputer networking
Computer networkingtdsparks3
 
Instructional Software Presentation
Instructional Software PresentationInstructional Software Presentation
Instructional Software Presentationtdsparks3
 
Instructional software presentation
Instructional software presentationInstructional software presentation
Instructional software presentationtdsparks3
 
Relative advantage chart
Relative advantage chartRelative advantage chart
Relative advantage charttdsparks3
 

Más de tdsparks3 (9)

Evaluation for Far West Laboratory for Educational Research and Development
Evaluation for Far West Laboratory for Educational Research and DevelopmentEvaluation for Far West Laboratory for Educational Research and Development
Evaluation for Far West Laboratory for Educational Research and Development
 
Digital Divide vs Digital Inequality
Digital Divide vs Digital InequalityDigital Divide vs Digital Inequality
Digital Divide vs Digital Inequality
 
Unit of Instruction
Unit of InstructionUnit of Instruction
Unit of Instruction
 
Stop motion animation psw
Stop motion animation pswStop motion animation psw
Stop motion animation psw
 
541 video enhanced lesson
541 video enhanced lesson541 video enhanced lesson
541 video enhanced lesson
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Instructional Software Presentation
Instructional Software PresentationInstructional Software Presentation
Instructional Software Presentation
 
Instructional software presentation
Instructional software presentationInstructional software presentation
Instructional software presentation
 
Relative advantage chart
Relative advantage chartRelative advantage chart
Relative advantage chart
 

Último

Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 

Último (20)

Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 

Internet Safety Presentation

  • 2. Internet Safety Content Disclaimer Acceptable Use Policy Julie . . . her story Statistics IM/email/Chat rooms Blogging Inappropriate Content Resources References Think smart, Play smart, Be smart, Play SAFE!
  • 3. Disclaimer This publications is not intended for professional use in any manner. The author of this publication attempted to gather information pertaining to the safety of kids and tweens using the internet. This is not intended for legal or professional consultation. The information in the publication is subject to change by the author of the referenced material. All attempts were made to assure accuracy of the information in this publication.
  • 4. Acceptable Use Policy Purpose The purpose of this policy is to ensure appropriate, responsible, ethical and legal access and use of computers, the Internet, and other electronic or communication devices by District students, patrons, and employees. The Technology Acceptable Use Policy addresses two distinct concepts of technology use. The first regards the use of computers and the Internet, and the second addresses interfering and electronic communication devices. Washington County School District, St. George, UT.
  • 5. Acceptable Use Policy Policy 2.1. Computers and the Internet It is the policy of the Washington County School District to permit students, patrons, and employees to have computer and Internet access under approved regulations and guidelines, to include those listed in the Children's Internet Protection Act, State Law, and policies adopted by Board of Education. In general, the user's responsibilities require responsible, decent, ethical, polite, efficient, and legal use of computer and network resources. Students, patrons, and employees must not access obscene, pornographic, or material that is deemed to be harmful to minors. District and school personnel will instruct students and staff on acceptable use of computers and Internet resources and proper network etiquette.  All students, patrons, and employees are granted access to the Internet, but all access to the Internet through district resources is subject to the terms of the Technology Acceptable Use Agreement and District policy. Washington County School District, St. George, UT.
  • 6. Acceptable Use Policy Policy 2.2. Interfering and electronic communication devices While in some instances the possession and use of electronic communication devices or other devices or objects by a student at a school may be appropriate, often the possession and use of such devices or objects by students at school can have the effect of distracting, disrupting, and intimidating others in the school setting and leading to opportunities for academic dishonesty and other disruptions of the educational process. The purpose of this component of the policy is to vest with school administrators the authority to enforce reasonable rules relating to student use of such objects or devices in the public schools. Washington County School District, St. George, UT.
  • 7. Julie . . . Her story of how she got caught up in something she had no control over due to manipulation and anger . . . Someone could be looking into your daily life without you realizing it. her story
  • 8.
  • 9. 60% have an instant-message screen name
  • 10. 75% have a cell phone
  • 11. 72% have profiles on social networking sitesThink before you type All statistics provided by www.aldricchang.com
  • 12.
  • 13. most share personal info online, though 3 in 5 know it’s dangerous
  • 14. 1 in 4 know someone who experienced something bad, from an inappropriate text forwarded around school to being sexually victimizedAll statistics provided by www.aldricchang.com
  • 15.
  • 16.
  • 17. On average, texting teens (12-17) send and receive 1500 text messages a month.Friends Only! All statistics provided by www.netsmartz.com
  • 18.
  • 19.
  • 20. 27% of teens (12-17) play games with people they don’t know online.All statistics provided by www.netsmartz.com
  • 21.
  • 22. those with histories of sexual or physical abuse
  • 23. those who post sexually provocative photos/video
  • 24. those who talk about sex with unknown people online.
  • 25. Boys who are gay or questioning their sexuality are particularly at risk. 25% of victims are boys and almost all of their offenders are male.All statistics provided by www.netsmartz.com
  • 26.
  • 27. In more than one-quarter (27%) of incidents, solicitors asked youths for sexual photographs of themselves.All statistics provided by www.netsmartz.com
  • 28.
  • 29. 15% of cell-owning teens (12-17) say they have received sexually suggestive nude/semi-nude images of someone they know via text.A common Sense Approach to Internet Safety video Don’t send pics All statistics provided by www.netsmartz.com
  • 30.
  • 31. 47% of teens (12-17) have uploaded photos; 14 % have posted videos.
  • 32. 20% of teens report that it is safe.All statistics provided by www.netsmartz.com
  • 33.
  • 34. Assist your child in creating screen names and email addresses that do not contain personal information.
  • 35. Explain why emails and IM’s from unknown sources should be deleted and not opened.
  • 36. Use spam blockers.BBC video on chat roomsafety. http://youtu.be/b7aso7BDzEo
  • 37.
  • 38. Know how your child is access the internet and from where.
  • 39. Explain why it is very important to not share passwords with friends or strangers.
  • 40. Become familiar with acronyms to understand what your kids are saying.BBC video on chat roomsafety. http://youtu.be/b7aso7BDzEo
  • 41.
  • 42. Review your child's blog before the new information is posted.
  • 43. Set the privacy settings for your child and remind them of the importance that others do not have access to personal information.
  • 44. Make sure that all images are free of any identifying information like phone numbers, addresses, schools, names, and ages.
  • 45. Explain the importance of not posting misleading, provocative and explicit information or images.
  • 46.
  • 47. Encourage your child to seek an adult if he or she encounters inappropriate material.
  • 48. Discuss the acceptable use policy with your child.
  • 49.
  • 50. References http://www.commonsense.com/internet-safety-tips/tips-for-kids.php http://elementarysafety.com/personal-safety?gclid=CIybzsi43KkCFQZCgwod0FFjZQ http://www.slideshare.net/aldricchang/raising-kids-on-the-internet-2149686 Slide 5 statistics http://www.fbi.gov/fun-games/kids/kids-safety http://www.netsmartz.org/Safety/Statistics Slides 8-10 http://www.safewave.org/index.php?option=com_content&task=view&id=353&Itemid=300 http://securityorb.com/2011/02/teen-internet-safety-statistics-from-netsmartz-org/