Good Evening and Welcome February 26, 2008 Just the Facts- Deb Chestnut Checking the History on the Computer- Agnes Kovacs MySpace and Chatrooms- Matt Schaeffer, Nate Schlegel, CJ Covell Question/Answer- All Parents don’t talk to kids about Internet Safety. Why???? Lack of Knowledge Discomfort Denial Let’s change that starting TONIGHT!!! 1. ______ 55% of 12-17 year olds use social networking sites. 5 US teenagers (who regularly log into the internet) state that they have 2. One in ______ received an unwanted sexual solicitation via the web. 1 in _____ 33 youth received an aggressive sexual solicitation. This means a predator 3. _____ asked a young person to meet somewhere, called on the phone or sent mail, money or gifts through the US Postal Service. 4. Nearly 63% of harassment predators are _______________________. other juveniles 5. 27% _____of teens said they have known a friend to actually meet someone whom they only knew online. 25% of children who encountered a sexual solicitation or approach told 6. Approximately _____ a parent or adult. 14 Another 22% 7. 77% _____ of the targets for online predators were age _____. _____were web users ages _______. 10-13 32% of all teenagers who use the internet say they have been targets of a range of 8. _____ annoying and potentially menacing online activities, including threatening messages, having their private e-mails or texts forwarded without their consent, embarrassing photos posted and rumors spread about them online. 9. 75% _____of children are willing to share personal information online about themselves in exchange for goods or services. AND>>>>>>>> 29,000 10. ______________ registered sex offenders have a page on MySpace. http://www.pameganslaw.state.pa.us/ 1. Get rid of the internet in our homes! 2. Attend a workshop 3. Research 4. Check the history 5. COMMUNICATE with our kids in school and at home Content: • What is the operating system you use, where do you check the Internet history files? • Where are the temp files located? What is a cookie? • What software can do the job for you? • Websites and software list for help. What is the different between OS? • Windows 95- (hopefully not) C:\Windows\temp directory has the temporary files • Windows XP-general user-everybody has the same profile, if users are set, everybody logging on with their own user name (and password) profiles are separated …desktop settings, temp files are generated for that user only….you have to have administrator rights to be able to open other users settings Windows VISTA Websites: • http://www.microsoft.com/windows/products/windowsvis ta/seeit/default.mspx?wt_svl=10191VH_OS_Other2&mg_i d=10191VHb2 Vista help: how to set up the computer to be safer • • • • • www.mykidsbrowser.com www.linkup-parents.com/funsites.htm www.netsmartz.org www.ikeepsafe.org 5 min. video about the safety tools www.kidmail.net/default.asp for younger children to establish basic safety knowledge, linked to regular email service, works inside of the filter, also has a list of software for support • www.braintrustfilms.com/preditors.htm • www.netsmartz.org SIMILAR INTERESTS : They tell you that they like the same things that you like. TRUST: They make you think that you can tell them anything. When you talk about problems they always take your side. SECRECY: You can tell them secrets. And, they may tell you to keep your friendship secret because no one else will understand. http://www.netsmartz.org/resources/reallife.htm Cyber Bullying - A Criminal Offence Schools should educate the school community about the criminal offence of cyber bullying. Students should be informed that if they use technology in an inappropriate fashion then they could be committing a crime. Messages, phone calls, and chat rooms can be traced, even if a false name is used. The numerous state and commonwealth laws which cover cyber crime include: •The Commonwealth’s Criminal Code Act 1995, section 4.7.4.17 notes that it is an offence for a person to use ‘a carriage service to menace, harass or cause offence’. •The Commonwealth’s Criminal Code Act 1995, section 4.7.4.15 notes that it is an offence for a person to use ‘a carriage service to make a threat’. •The Commonwealth’s Crimes Act 1914, part VIIB, section 85ZE notes that it is an offence for ‘a person to knowingly or recklessly use a telecommunications service supplied by a carrier in such a way as would be regarded by reasonable persons being, in all the circumstances, offensive’. •The Victorian Crimes Act 1958 was amended in 1995 to include the offence of ‘stalking’. This includes telephoning and sending electronic messages with the intention of causing physical or mental harm. •The sending of images is also covered by various State and Commonwealth laws that prevent the publication of material that is objectionable, unclassified or unsuitable for minors. www.webwisekids.org/pscpa Password - PSC Nintendo DS and its Wireless Network With Nintendo DS Lite, you can connect with a local wireless network of up to 16 players. The wireless range can be an incredible 30 to 100 feet and for some games, multiplayer requires just one Nintendo DS game card. Note: Nintendo DS Lite wireless communication, including PictoChat, is not private and is not monitored by Nintendo. We recommend that you never reveal any personal information or arrange to meet a stranger. It is not MySpace lite. It is MySpace enhanced, completely customized for the mobile experience." Webcams are a predator’s best friend ! Berks County District Attorney Mark C. Baldwin said, “They have found a way to enter your home, enter your child’s bedroom and gain access to our most precious resource.” For more information, please refer to the Wilson Website www.wilsonsd.org or e-mail – Deb Chestnut: chedeb@wilsonsd.org Agnes Kovacs: kovagn@wilsonsd.org Matt Schaeffer: schmat@wilsonsd.org Myspace Facebook Facebook • As of January ‘08 there are 60 million active members • 85% of college students use this online networking site All Facebook Profiles Consist of • • • • User’s photo Account info (name, school) Personal info (birthday, hometown) Opinionated info (political views, favorite music, interests etc.) Features of Facebook • Post photos • A “wall” where users may post messages about each other • Post videos • Event Organizer • “Facebook Applications” What Facebook looks like Personal Info Wall Myspace •300 million active myspace users •230,000 new registrations each day • *as of February 3rd, 2008 All Myspace Profiles Contain • Blurbs (About me, Who Id like to meet) • Blogs • Multimedia • Comments • Music Features of Myspace • • • • • Bulletins User’s Photo’s Groups Personal Information MyspaceIM what myspace looks like Dangers of Social Networking • Every is public unless you decide to make your profile private • Teens love gossip, racial slurs, bullying and malicious rumors. • Anything posted is for an audience of millions • People are not who they say they are. All it takes to set up and account is a valid e-mail address How can we monitor what our children are doing on the internet • • • • logmein.com Create your own myspace or facebook Ask for their passwords Enforce parental controls on your home computer • Don’t give your children administrative accounts • Talk to your children