Online Safety Threats and Strategies. What are the threats? Most perceived threats are: Most perceived threats are: Predators Predators Inappropriate

  • View
    220

  • Download
    2

Embed Size (px)

Text of Online Safety Threats and Strategies. What are the threats? Most perceived threats are: Most...

  • Slide 1

Online Safety Threats and Strategies Slide 2 What are the threats? Most perceived threats are: Most perceived threats are: Predators Predators Inappropriate content Inappropriate content Actual most common threats are: Actual most common threats are: Cyberbullying Cyberbullying Posting personal information online Posting personal information online Too much information Too much information Unintentional sharing of information Unintentional sharing of information Sending/posting inappropriate images or information on social networking sites or through texts Sending/posting inappropriate images or information on social networking sites or through texts Slide 3 Who is at risk? There is some degree of risk for everyone, but There is some degree of risk for everyone, but Those children most at risk are: Those children most at risk are:USUALS Adolescents more at risk than younger children Adolescents more at risk than younger children nhappy heltered ninvolved, unaware, disinterested parents dventurous onely avvy about technology Slide 4 Internet Safety Education Components Components Staying safe Staying safe Digital Citizenship Digital Citizenship Creating a positive digital footprint Creating a positive digital footprint Cyberbullying Cyberbullying Resources Resources Bank of resources that schools can access/share Bank of resources that schools can access/share Schools determine their own plan for Internet Safety education Schools determine their own plan for Internet Safety education Slide 5 What areas of Internet Safety will we consider? Online Safety Online Safety Cyberbullying Cyberbullying Inappropriate Content Inappropriate Content Digital Citzenship Digital Citzenship The Digital Footprint The Digital Footprint Talking to your kids about all of these Talking to your kids about all of these Slide 6 Striking a Balance Slide 7 Web Filtering Slide 8 Filtering why do we do it? CIPA (Childrens Internet Protection Act) CIPA (Childrens Internet Protection Act) To keep students safe To keep students safe To keep students from accessing inappropriate content To keep students from accessing inappropriate content Hate sites Hate sites Inappropriate images and content Inappropriate images and content Sites that promote inappropriate habits (drinking, smoking, drug use, gambling, etc.) Sites that promote inappropriate habits (drinking, smoking, drug use, gambling, etc.) Sites that might put them in danger Sites that might put them in danger Sites that phish for information Sites that phish for information Slide 9 Filtering how does it work ? Web sites are categorized by our filter company Web sites are categorized by our filter company Sites are blocked by category, such as Sites are blocked by category, such as Drug and alcohol use Drug and alcohol use Adult content Adult content Phishing and malware Phishing and malware Non-safe search engines Non-safe search engines Bombs, guns Bombs, guns Individual sites can be unblocked if they are miscategorized Individual sites can be unblocked if they are miscategorized By district By district By site By site By user By user Process Process Teacher requests that the site be unblocked through their principal Teacher requests that the site be unblocked through their principal Principal requests that the site be unblocked through IT Principal requests that the site be unblocked through IT IT checks for security risks or inappropriate content, as well as educational value IT checks for security risks or inappropriate content, as well as educational value Site is unblocked (usually for that site) Site is unblocked (usually for that site) Teacher-student equivalent accounts Teacher-student equivalent accounts Slide 10 Cyberbullying What can you do? Cyberbullying is the willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices. -Cyberbullying Research Center Slide 11 What are its effects? It makes me hurt both physically and mentally. It scares me and takes away all my confidence. It makes me feel sick and worthless. Can cause: Fear of going to school Fear of going to school Low self-esteem Low self-esteem Family problems Family problems Academic problems Academic problems Potential for school violence Potential for school violence Delinquent behavior Delinquent behavior Slide 12 How common is it? 10% - 40% initial reports 10% - 40% initial reports Probably closer to 20% Probably closer to 20% repeatedly makes fun of another person online or repeatedly picks on another person through email or text message or when someon posts something online about another person the dont like. Slide 13 What are the challenges? People dont see the harm (not usually physically threatening). People dont see the harm (not usually physically threatening). Areas of responsibility arent clear. Areas of responsibility arent clear. Slide 14 Whos responsible? Theres no evidence of a crime or a threat to physical safety. I dont have the skills to keep up with what my child is doing online.. I cant intervene in behaviors that occur away from school. Slide 15 Where does it happen? Slide 16 How do you escape it? Do you ever feel overconnected? Do you ever feel overconnected? Do you ever feel like you cant get away from it? Do you ever feel like you cant get away from it? Think about how much worse that would be if you were being bullied through those devices Think about how much worse that would be if you were being bullied through those devices Slide 17 Why dont kids report it? Embarassed Dont want their devices taken away. Dont think parents can help. Not comfortable sharing it. Slide 18 What can parents do? Communicate Be Aware Dont punish for being a victim. Dont embarrass by flaming out. Slide 19 What can parents do? Dont escalate. Empathize. Document if ongoing. Contact law enforcement.* Be persistent. Block calls or texts. *Threats of violence, child pornography or sexting, photos in places where they would expect privacy (like a locker room), continual harassment or stalking, obscene or harassing phone calls or texts, sexual exploitation, or extortion. Slide 20 What can parents do? Get educated Cyberbullying Fact Sheet Cyberbullying Fact Sheet Family Media Agreements Family Media Agreements Slide 21 How do you block? Call provider: AT&T: 1-800-331-0500 Verizon: 1-800-922-0204 Sprint:1-888-211-4727 T-Mobile:1-877-453-1304 Slide 22 Blocking Online http://mymessages.wireless.att.com Must register can control messages from there Slide 23 Blocking Online http://support.verizonwireless.com/faqs/TXT%20messaging/faq.html To block unwanted text messages from Internet domains and emails: Log into My Verizon.My Verizon Go to My Services and choose Verizon Safeguards. Select Spam Controls and click on Internet Spam Blocking. Enter the offending Internet domain or email address, then click Save. To block unwanted messages from a cell device: Log into My Verizon.My Verizon Go to My Services and choose Verizon Safeguards. Select Spam Controls and click on Internet Spam Blocking. Enter the offending Device Number, then click Save. Slide 24 Blocking Online http://support.sprint.com/support/article/Block_or_allo w_text_messages_from_your_phone http://support.sprint.com/support/article/Block_or_allo w_text_messages_from_your_phone My Sprint (must register your wireless account) 1.My online tools 2.Block text messages (in the Text Messaging Section) 3.Block messages 4.Block messages from all senders in my block list 5.Enter the phone #, e-mail address, domain or short code 6.Add 7.Save changes Slide 25 Blocking Online http://support.t-mobile.com/docs/DOC-1712 Must be registered on the T-Mobile website Slide 26 Apps you can download Privacy Star (for Android and Blackberry) $3 per month Handcent SMS (iPhone and Android) Free Check the Android Market or the App Store for other choices Slide 27 Facebook Slide 28 Slide 29 Slide 30 Slide 31 Slide 32 Slide 33 Merrill Hooney Pablo Picasso Bob Smith Mary Smith If they select you here, you will only be able to see what they make public. Slide 34 Facebook When you first set up the Facebook account, select a username that does not reflect your real name (can be edited later under Account Settings) Its also a good idea to use or create an e-mail address that does not reflect your real name. Slide 35 How do I talk to my kids? Slide 36 Questions? Internet Safety Resources For Parents: http://d20internetsafetyforparents.wikispaces.com/ http://d20internetsafetyforparents.wikispaces.com/ For Teachers: http://d20internetsafety.pbworks.com/w/page/7173096/FrontPage http://d20internetsafety.pbworks.com/w/page/7173096/FrontPage