Internet Safety Parent Workshop

Good Evening
February 26, 2008
Just the Facts-
Deb Chestnut
Checking the History on the Computer- Agnes Kovacs
MySpace and Chatrooms- Matt Schaeffer, Nate Schlegel,
CJ Covell
Parents don’t talk to kids about Internet Safety. Why????
Lack of Knowledge
Let’s change that starting TONIGHT!!!
1. ______
55% of 12-17 year olds use social networking sites.
5 US teenagers (who regularly log into the internet) state that they have
2. One in ______
received an unwanted sexual solicitation via the web.
1 in _____
33 youth received an aggressive sexual solicitation. This means a predator
3. _____
asked a young person to meet somewhere, called on the phone or sent mail, money or
gifts through the US Postal Service.
4. Nearly 63% of harassment predators are _______________________.
other juveniles
5. 27%
_____of teens said they have known a friend to actually meet someone whom they only
knew online.
25% of children who encountered a sexual solicitation or approach told
6. Approximately _____
a parent or adult.
14 Another 22%
7. 77%
_____ of the targets for online predators were age _____.
_____were web users
ages _______.
32% of all teenagers who use the internet say they have been targets of a range of
8. _____
annoying and potentially menacing online activities, including threatening messages,
having their private e-mails or texts forwarded without their consent, embarrassing
photos posted and rumors spread about them online.
9. 75%
_____of children are willing to share personal information online about themselves in
exchange for goods or services.
10. ______________
registered sex offenders have a page on MySpace.
1. Get rid of the internet in our homes!
2. Attend a workshop
3. Research
4. Check the history
5. COMMUNICATE with our kids in school
and at home
• What is the operating system you use,
where do you check the Internet history
• Where are the temp files located? What
is a cookie?
• What software can do the job for you?
• Websites and software list for help.
What is the different between OS?
• Windows 95- (hopefully not)
C:\Windows\temp directory has the temporary
• Windows XP-general user-everybody has
the same profile, if users are set, everybody
logging on with their own user name (and
password) profiles are separated …desktop
settings, temp files are generated for that
user only….you have to have administrator
rights to be able to open other users settings
Windows VISTA
d=10191VHb2 Vista help: how to set up the computer to
be safer
• 5 min. video about the safety tools for younger children to
establish basic safety knowledge, linked to regular email
service, works inside of the filter, also has a list of software
for support
SIMILAR INTERESTS : They tell you that they
like the same things that you like.
TRUST: They make you think that you can tell
them anything. When you talk about problems
they always take your side.
SECRECY: You can tell them secrets. And, they
may tell you to keep your friendship secret
because no one else will understand.
Cyber Bullying - A Criminal Offence
Schools should educate the school community about the criminal offence of cyber
bullying. Students should be informed that if they use technology in an inappropriate
fashion then they could be committing a crime. Messages, phone calls, and chat
rooms can be traced, even if a false name is used.
The numerous state and commonwealth laws which cover cyber crime include:
•The Commonwealth’s Criminal Code Act 1995, section notes that it is an
offence for a person to use ‘a carriage service to menace, harass or cause offence’.
•The Commonwealth’s Criminal Code Act 1995, section notes that it is an
offence for a person to use ‘a carriage service to make a threat’.
•The Commonwealth’s Crimes Act 1914, part VIIB, section 85ZE notes that it is an
offence for ‘a person to knowingly or recklessly use a telecommunications service
supplied by a carrier in such a way as would be regarded by reasonable persons
being, in all the circumstances, offensive’.
•The Victorian Crimes Act 1958 was amended in 1995 to include the offence of
‘stalking’. This includes telephoning and sending electronic messages with the
intention of causing physical or mental harm.
•The sending of images is also covered by various State and Commonwealth laws
that prevent the publication of material that is objectionable, unclassified or
unsuitable for minors.
Password - PSC
Nintendo DS and its Wireless Network
With Nintendo DS Lite, you can connect with a local wireless network of up to 16
players. The wireless range can be an incredible 30 to 100 feet and for some
games, multiplayer requires just one Nintendo DS game card.
Note: Nintendo DS Lite wireless communication, including PictoChat, is not private
and is not monitored by Nintendo. We recommend that you never reveal any
personal information or arrange to meet a stranger.
It is not MySpace lite. It is MySpace
enhanced, completely customized for
the mobile experience."
Webcams are a predator’s best friend !
Berks County District Attorney
Mark C. Baldwin said,
“They have found a way
to enter your home, enter
your child’s bedroom
and gain access to our
most precious resource.”
For more information, please refer to the
Wilson Website
or e-mail –
Deb Chestnut: [email protected]
Agnes Kovacs: [email protected]
Matt Schaeffer: [email protected]
• As of January ‘08 there are 60 million
active members
• 85% of college students use this
online networking site
All Facebook Profiles Consist of
User’s photo
Account info (name, school)
Personal info (birthday, hometown)
Opinionated info (political views,
favorite music, interests etc.)
Features of Facebook
• Post photos
• A “wall” where users may post
messages about each other
• Post videos
• Event Organizer
• “Facebook Applications”
What Facebook looks like
Personal Info
•300 million active myspace users
•230,000 new registrations each day
• *as of February 3rd, 2008
All Myspace Profiles Contain
• Blurbs (About me, Who Id like to
• Blogs
• Multimedia
• Comments
• Music
Features of Myspace
User’s Photo’s
Personal Information
what myspace looks like
Dangers of Social Networking
• Every is public unless you decide to make your
profile private
• Teens love gossip, racial slurs, bullying and
malicious rumors.
• Anything posted is for an audience of millions
• People are not who they say they are. All it
takes to set up and account is a valid e-mail
How can we monitor what our children are
doing on the internet
Create your own myspace or facebook
Ask for their passwords
Enforce parental controls on your home
• Don’t give your children administrative accounts
• Talk to your children