thank you for your cooperation. we will begin shortly
TRANSCRIPT
![Page 1: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/1.jpg)
WELCOME! As you come in and receive a folder, please complete the Pre-Test found in the
left pocket.
Names are optional. Please flip tests over when you are finished.
Thank you for your cooperation.We will begin shortly.
![Page 2: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/2.jpg)
TechnicoolA Technology Safety Program
© 2011 PCAV
![Page 3: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/3.jpg)
1. Welcome and Introduction
2. Warm-up Exercise and Pre-test
3. Part1: Benefits, Risks, and Concerns
4. Part 2: Becoming Tech-Savvy
5. Part 3: Prevention, Intervention, and Responding
6. Part 4: A Few Tech-Safety Tips
7. Closing Remarks, Evaluation and Post-Test
Presentation Agenda
![Page 4: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/4.jpg)
What is TECHNICOOL?
Technology safety program:Children and teens (4-8 grade)Parents/guardiansEducatorsTrainers
Encourages safe online behaviorAddresses benefits and risks of technology useProvides adult participants with resources and concrete toolsPresentation covers topics in manner that is age appropriate for group in attendanceFunded by grants
Internet Crimes Against Children Task Force (ICAC)Comcast Foundation
www.technicoolvt.org
![Page 5: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/5.jpg)
PART 1:Benefits, Risks and Concerns of Technology
![Page 6: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/6.jpg)
BENEFITS OF TECHNOLOGY
Communication
Learning
Being informed
Networking
Entertainment
Employment
IT Skills
![Page 7: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/7.jpg)
POTENTIAL RISKS Cyberbullying “Sexting” Meeting online predators/talking to strangers Unsafe communities Sharing personal info Inappropriately sharing pictures and video Finding/searching inappropriate material Scams Violent Online Gaming
www.cybersafefamily.com
![Page 8: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/8.jpg)
PART 2:Becoming Tech-Savvy
![Page 9: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/9.jpg)
Anatomy of Instant Messenger
Type of Instant Message Program
Users availability status
User’s contacts (often called a ‘Buddy List’ or ‘Friends List’)
Chat/dialogue screen
![Page 10: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/10.jpg)
Anatomy of a Chat Room
Type of Instant Message Program
Room ‘Subject’
Message bar
Chat screen
Contacts/others available for chat
Users availability status
![Page 11: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/11.jpg)
Anatomy of a Facebook Profile User name &
status
Personal informationPhotos & video of the user
Comments by user and user friendsFriends list, Friends photos, # of friends
*Most other social networking sites user profiles include the same types of information
User photo
![Page 12: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/12.jpg)
Anatomy of a Twitter ProfileUser
photo
Name & Personal information
Comments by user and user friends
“Followers”
Status bar
![Page 13: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/13.jpg)
PART 3:Prevention, Intervention, and Responding
![Page 14: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/14.jpg)
*This is the MOST IMPORTANT part Listen Open dialogue Keep your cool Educate them on safe-internet and technology
practices based on resources provided or on your own personal research
Explain to them that something you put on the internet or send through technology can never be erased
Discuss media messages and technology Encourage them to confide in you Have conversations frequently
Communicate
![Page 15: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/15.jpg)
Monitor your child’s activities Ask your kids to show you where they go onlineHave discussions with them about what they do onlineAsk about who they are talking to onlineWatch how long they spend onlineLet them know you would like to see their user profile(s)Set ground rules for technology and internet
Know what access your child has to technology and internet
Google them to see what information is online about them
Supervise
![Page 16: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/16.jpg)
Learn everything you can about technology and the internetLook for community classes on computers and software Attend presentations or webinars on tech safety (like
this one!) Enlist your child as your teacher
Great for conversation starting and dialogueAlso lets you see what they already know
Research technology safety
Be Informed
![Page 17: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/17.jpg)
Check your browser’s history and cookie files Help create safe passwords and collect them Ask about unfamiliar email addresses Invest in monitoring and/or filtering software Use safe web browsers/kid-friendly search engines for
kids*Remember, software programs are not substitutes
for adult supervision
Safety-Check
Visit www.getparentalcontrols.org and www.internetsafety101.org for reviews of parental controls and for a list of internet service providers with parental control features, safe web searches and kid-friendly search engines
![Page 18: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/18.jpg)
Keep technology in a common room With cell phones, laptops and gaming devices: have
children shut down the device and store them outside of their bedrooms in a common room before bed or at other times you’ve indicated in your technology-use rules
Be aware of wireless networks in and around the home
Safe-Space
![Page 19: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/19.jpg)
Limit access time and establish curfew Create a safe space/common room Identify what programs or websites can be used and visited Define what they can use technology for (i.e. homework) Require permission and discussion of particular
tech/internet use (i.e. social networking sites or “friending”) Agree to talk to children about concerns before
automatically saying “no” Set up consequences for not following the set rules*Before creating rules, communicate with your children
about what types of activities they like to do online, where they go, who they talk to, etc.
*Make rules and agreements age-appropriate
Create Technology-Use Rules
See “Family Internet Agreement” in folder for examples of internet rules you can set with your child/dren.
![Page 20: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/20.jpg)
PART 4:A Few Specific Tech-Safety Tips
![Page 21: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/21.jpg)
Go to www.netsmarz.org to watch a kid-friendly video,
Password Rap, that details how to make safe passwords.
Different passwords for different accounts Difficult for others to guess At least 8 characters with a mix of capitals, lower
case, numbers, and special characters Give only to parents / guardians
Making Safe Passwords
![Page 22: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/22.jpg)
See “Family Cell Phone Use Contract” in folder for example of cell phone rules you can set
with your child/dren.
Only give their number to people they trust Respond to calls and texts only if they know the
number Inform your child that any pictures / videos taken
with their cell phone are saved (even if they have deleted them)
Educate them about “sexting” Teach them how to block numbers from their cell Create a “Family Cell Phone Use Contract”
Rules for Cell Phones
![Page 23: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/23.jpg)
In Event of Cyberbullying
What to do if your child is being cyber-bullied
What to do if you suspect your child is cyber-bullying
Be approachable and supportive
Collect evidence Contact the school Contact the parents of
the offender Contact the service
provider Teach them to not
retaliate
Teach them empathy Explain the hurtful
nature of cyber-bullying Apply reasonable
consequences Set firm limits and follow
through Closely monitor
computer, cell phone and gaming usage
![Page 24: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/24.jpg)
Contact the PoliceIf your child is at risk of: Threats of violence Extortion Obscene or sexually explicit phone calls or text
messages Stalking or hate crimes Child pornography
![Page 25: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/25.jpg)
Closing RemarksEvaluation & Post Test
![Page 26: Thank you for your cooperation. We will begin shortly](https://reader035.vdocuments.us/reader035/viewer/2022070307/551a4d63550346cb358b5ad8/html5/thumbnails/26.jpg)
Please visit us at www.technicoolvt.org or email us at [email protected] for
more information and resources.
For information on PCAV please call 1-802-229-5274 or visit us at www.pcavt.org.
Thank you for your attention and participation.