today’s agenda · 2017. 11. 15. · 4 we are always leaving digital footprints • everywhere you...

14
1 Internet Safety for Parents Today’s Agenda 1. What does cyber-life today look like? 2. What is the Think B4U Post Program? 3. What are the main online dangers & how can we keep our children safer online? What Does Cyber-Life Today Look Like?

Upload: others

Post on 17-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

1

Internet Safety for Parents

Today’s Agenda

1. What does cyber-life today look like?

2. What is the Think B4U Post Program?

3. What are the main online dangers & how

can we keep our children safer online?

What Does

Cyber-Life

Today Look

Like?

Page 2: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

2

• How do you communicate with your friends?

• How does your child communicate with friends?

• Where do you go when online?

• Where does your child go when online?

• What cyber communities are you part of?

• What cyber communities is your child a part of?

Your vs. Your Child’s Life Online

- Source Digital in 2017 Global Overview report from We Are Social and Hootsuite

What is ?

Page 3: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

3

What Are the Main Online Dangers & How Can We Keep Our Children Safer Online?

Caused by errors in communication, access,

& activity.

There Are 5 Online Dangers Covered in

1. “Your Post Can Haunt Your Future”

2. “If You Don’t Want Everyone To See, Don’t

Let Anyone See It”

3. “Don’t Be Over-Exposed Online”

4. “Your Post May Be Used Against You” and

“What Effects Are Your Posts Having?”

5. “If You Wouldn’t Say It To Someone’s Face,

Don’t Say It Online”

The Permanency of Posts

Page 4: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

4

We Are Always Leaving Digital Footprints

• Everywhere you go, you leave a digital footprint.

• Everything is searchable.

• Anonymity is a myth.

• Therefore, there is a permanent record of all your exploration and interaction online.

Limit CommunicationTeach your children to ask…

How could this impact my future?

Who might I hurt?

Do I like what this says about me?

Could this get me into trouble?

Would the adults in my life think this is appropriate?

- Netsmartz, Center for Missing and Exploited Children

Is it something I really want others to see or know about me?

The Embarrassment

Page 5: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

5

A minor who knowingly possesses/distributes a minor

nude or sexually explicit image (even of themselves):

• 1st Offense - community service/fine/training

• 2nd Offense - 1 yr. jail, 1 yr. probation, and $1,000 fine

• 3rd Offense - 5 yrs. in prison, 5 yrs. probation, and

$5,000 fine

A minor will NOT be found guilty if they did ALL 3:

1. didn't solicit it,

2. didn't transmit it, and

3. tried to report it.

The Legal Cost of Sexting

Safety/Privacy/Predators

Most Common Internet Crimes

• Phishing/Spoofing/

Pharming/Trojans/

Spyware/Viruses

• Extortion

• Hacked Information

• Electronic Harassment

• Child Pornography

• Sexual Exploitation

• Copyright Infringement

• Human Trafficking

Sextortion: The Evolution of Online Predators

Page 6: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

6

Sextortion

To decrease the odds of becoming a crime victim:

• Never send compromising images of yourself to anyone.

• Don’t open attachments from people you don’t know.

• Turn off your electronic devices and cover web cameras while not in use.

If you believe you’re a victim of sextortion or know someone else who is, call your local FBI office or toll-free at 1-800-CALL-FBI.

Our Students Are Protected by Limiting Access in 2 Ways

1) Limiting access to the computer.• Install firewall, anti-spyware, antivirus software, & update often.• Don’t open e-mails/download/enter ‘free’ contests from sources

you don’t know.• Guard your passwords.• Type in the website address instead of clicking on a link.• Look for “https” or a picture of a lock in your browser window

before buying anything or opening an account on a website.• Exit inappropriate websites, click “X”, “Back” button.• Turn off the computer when not in use.

2) Limiting access to personal information.• Passwords, • Home address, • Location, • Home/cell phone number, or• Email address.

- Netsmartz, Center for Missing and Exploited Children, www.Netsmartz.org

Have Your Reviewed Their Social Media?

Page 7: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

7

ALLLL Their Social Media?

FinstagramX

Activity

• Where is your child going?

• What are they doing with what they find?

• How much time are they spending there and how is it effecting other aspects of their life?

Criminal/Piracy/Plagiarism

Page 8: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

8

Piracy, Plagiarism & Copyrights

Does your student even know if they are cheating or stealing? The Internet is one of the main sources of plagiarism now. The forms of plagiarism range from relatively innocent to outright thievery.

• What is Piracy? Stealing copyrighted work by downloading or copying it in order to keep, sell, or give it away without permission and without paying.

• What is Plagiarism? The copying, “lifting,” or making slight changes to some or all of someone else’s work and saying you wrote it.

• Why is it wrong to use someone else’s copyrighted work without permission?

Limit Activity

• ASK: How does the author say I can use the work?

Do I have to get the creator’s permission first?

• ACKNOWLEDGE: Did I give credit to the work I used?

• ADD VALUE: Did I rework the material to make new

meaning and add something original?

- Common Sense Education

Help your child respect creativity

with what they find and do.

Video Voyeurism Law

FL Crimes State Statute 810.145: No installing or using any imaging device to record a person who is dressing or undressing or at a place and time when that person has a reasonable expectation of privacy (locker-rooms, bathrooms, tanning booth, etc.); or record under or through the clothing for the purpose of viewing the body of, or the undergarments worn by that person.

Video Voyeurism is a first degree misdemeanor burglary & trespass.

Page 9: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

9

“What

Effects Are

Your Posts

Having?”

If you posted it and you made it happen at school, you can be held responsible.

Limit Communication

• Who are you online?

• What are you sharing?

– Images of yourself

– Images of others

• How are you treating others?

• How can you respond if you get in an online ‘fight’?

Encourage your child to ask him/herself:

Cyberbullying

Page 10: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

10

Has Your Child or You Ever…• forwarded an unkind email or rumor,

• not deleted a post that is cruel,

• encouraged friends to laugh at someone,

• stayed silent when another was

tormented or threatened,

• voted on whether someone

was “hot or not,”

• let others take or send pics/video of

personal moments or compromising

positions, or

• responded in anger or were hurtful,

but then said “just joking” when

confronted?

Cyberbullying is willful

and repeated harm

inflicted through the

medium of electronic text

or imaging and it may

constitute a

computer crime.

R - Repeated

I - Imbalance of Power

P - Purposeful

Some Do, Most Don’t

12.5

15.5

PERCENTAGE ELECTRONICALLY BULLIED

Broward U.S.

- High School Youth Risk Behavior Survey, 2015

Use Your Communication, Activity & Access for Good

• Keep critical comments to yourself.

• Don’t forward rumors or embarrassing photos.

• Don’t comment on insulting or harassing posts.

• Document what you see and when.

• Don’t encourage cruelty.

• Don’t participate just to fit in.

• Don’t be silent – stand up for the victim.

• Report it.

• Treat others with respect and as you would if you were face to face with them.

- Netsmartz, Center for Missing and Exploited Children, www.Netsmartz.org

Don’t Feed the Cyberbullies

Page 11: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

11

Cyberbullying Intervention

• Safety First!

• Ensure they know it’s NOT their fault.

• Don’t engage or retaliate with the aggressor.

• Block and report offender.

• Change accounts, emails if necessary.

• Identify perpetrators.

• Document evidence & save material.

• Determine Action

– At home (contact Server, develop filters, counseling, etc.)

– Legal Action (inform police when threats, harassment, stalking, hate crime, child exploitation, etc. involved)

– Civil Action (defamation, emotional distress, false light, etc.)

– School Action (tell teachers, Administration)

If You Child Is Being Cyberbullied

Reporting Cyberbullying to School

• WHO? The principal or Investigative Designee.

• WHY? Early intervention is key.

• HOW? In writing, orally, anonymously with

Anonymous Reporting Box, or to SUI via online, phone

to Silence Hurts Hotline, or text.

• WHAT IF? The cyberbullying occurring off school

grounds? Schools will take reports and provide

interventions, but can only provide consequences if

the actions significantly affect a student’s ability

to learn or a teacher’s ability to teach (First

Amendment rights)

• Want more info? Go to browardprevention.org

In ReviewTeach The 3 Key Ingredients to Online Safety

1) Communication,

2) Access, and

3) Activity.

As A Parent

• Embrace their world.

• Encourage balanced use.

• Create rules of the road.

o Where they can go, what can do, & who can speak to?

o Utilize privacy and monitoring settings.

o Enforce limits on how they treat others.

o Follow school policies.

• Explain if something hurtful/scary happens, they are NOT to blame. Report bad behavior and block/unfriend as needed

Page 12: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

12

Communication

#1 – Between you and your child

• Human Connection: Communicate and connect through time and attention. It will build trust and allow you to set limits.

• Limit Setting = Discipline = Love

#2 – Import this relationship to online

experiences by creating and enforcing

rules of the road.

• What are you sharing?

– Images of yourself

– Images of others

• How are you treating others?

Technology is a privilege not a right!

Access

• It is always on.

• They may suffer information overload.

• The pressure to broadcast is real.

• There will be exposure to inappropriate content, people and influences.

• You must embrace their world if you want to effectively protect them.

- Courtesy of Common Sense Education, www.commonsensemedia.org

As a parent, know…

ActivityUse Technology Tools for Safety

• Social Media: Be your child’s “friend” and monitor behavior, but respect their privacy and only confront “safety issues”.

• Do you have their passwords?• Who controls APP downloads? Ghost Apps

Types of Tracking Software Tools:• Blocking Software: bad vs. good sites• Filtering: outgoing & incoming key words• Monitoring & Tracking: at every level

Page 13: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

13

How Much Supervision Is Needed?

Determination is based on:

• Age

• Previous behavior

• Developmental or personal challenges (impulse control, etc.)

Restrictions

Self Control

Responsibility

Why is your ultimate goal is the removal of all monitoring and imposed restrictions?

Report Anyone Who• Sends your child adult images,• Asks your child to send images,• Talks to your child about inappropriate subjects,• Asks to meet your child offline, or• Is abusive.

School reporting:• School administrators• School Investigative Unit (SIU)• Text 'SBBC' [space], plus the text message to CRIMES

(274637)• Email SIU at [email protected] • Call SIU’s Silence Hurts Tip line 754-321-0911

National reporting:• CyberTipline.org 1-800-THE LOST (1-800-843-5678)

Reports can be made directly online by clicking on the Cybertipline at http://www.missingkids.com/

• Contact i-SAFE 760-603-7911 www.isafe.org• Call your local police and ask if they have a dept.

affiliated with "Internet Crimes Against Children (ICAC)

Working Together We Can Create a Positive Online Environment

• Think before you respond.

• Applaud and post positive comments.

• E-mail notification to groups that track cyber crimes.

• Flag offensive content for review or say why you thought something was offensive.

• Speak up through posts videos, counter-points, or with comments opposing offensive/hurtful points of view.

• Talk to friends/teachers/family about what you see.

• Learn about combating online cruelty from groups like NetSmartz, Anti-Defamation League, Common Sense, or Teaching Tolerance.

• Act by combating cruelty both online and off.

• Know your online community’s Terms of Service or Community Guidelines, school policies, as well as what safety and privacy measures you can take.

Page 14: Today’s Agenda · 2017. 11. 15. · 4 We Are Always Leaving Digital Footprints • Everywhere you go, you leave a digital footprint. • Everything is searchable. • Anonymity

14

Questions?

For more information contact us at:

BrowardPrevention.org

Diversity, Cultural Outreach & PreventionLauderdale Manors Early Learning and Resource Center1400 NW 14th CourtFort Lauderdale, FL 33314

754-321-1655

40