THE INTERNET IS FOREVER Online safety for youth. How do they access the Internet? • Desktop and laptop computers located at home, friend’s houses, work, stores and schools. • Cell phones • Tablet Devices • Video game systems (XBOX, PS3, IPad, ITouch Wii) – All video game systems today have the ability to connect to the internet. THE STATS • 94% of teens use the Internet • 84% of online teens have a social networking profile (MySpace, Facebook). – 46% of those profiles are publicly accessible • 85% have cell phones – 88% know how to send a text message – A cell phone is not necessary anymore to text CYBERBULLYING THE STATS Percent of students who reported being cyber bullied 52% Teens who have experienced cyberthreats online 33% Teens who have been bullied repeatedly through their cell phones or the internet 25% Teens who do not tell their parents when cyber bullying occurs 52% Percent of teens who have had embarrassing or damaging pictures taken of themselves without their permission, often using cell phone cameras 11% Bureau of Justice Statistics, US Department of Health and Human Services, Cyberbylling Research Center CYBERBULLYING Using computers, the internet, text messaging, email, Facebook or Twitter to intimidate, threaten, or hurt others EXAMPLES OF CYBERBULLYING Spreading rumors Posting negative comments Talking smack in video games Posting embarrassing photos Sending negative text messages Recording and posting embarrassing moments Threatening someone with harm WHO IS A CYBERBULLY? Is your child a cyberbully? 1. Lacking interest and involvement with other kids? 2. Acting like his or her group is superior. 3. Bragging that he/she uses the internet to play practical jokes. 4. Making fun of other kids. 5. Getting in trouble at school for inappropriate computer use. WARNING SIGNS Warning signs of children being bullied or bullying other children: 1. Complaining that other children or a group of children do not like them. 2. Preoccupation with friendship concerns. 3. Poor self-esteem: “I’m not as good as others.” 4. Not wanting to take part in school activities. 5. Spending a lot of time on the computer. 6. Sensitivity about online activities. CYBERBULLYING Consider monitoring internet and cell phone use: 1. Periodically review internet bookmarks, history files, temporary Internet files and keyword history. 2. Review phone use – text, photos, etc. 3. If the temporary internet files are cleared, what does that mean? PIRACY IT IS MORE THAN JUST MUSIC BEING PIRATED PIRACY: MORE THAN JUST MUSIC PIRACY: The unauthorized use of another's production, invention, or conception especially in infringement of a copyright PIRACY: MORE THAN JUST MUSIC WHAT ARE YOUR CHILDREN DOWNLOADING? – MUSIC – BOOKS – SOFTWARE – TV SHOWS – APPS (IPHONE, ANDROID) – VIDEO GAMES FOR XBOX, PS3, NINTENDO WII PIRACY: MORE THAN JUST MUSIC HOW ARE THEY DOING IT? PIRACY: MORE THAN JUST MUSIC CONSEQUENCES: • There are significant financial and legal penalties for software piracy. Illegal distribution and use of software can result in prison terms of up to five years and felony charges with fines up to US $250,000. • In civil litigation against those who illegally distribute software, recovery can be made of the higher of a victim’s lost profits, the infringer's profits, or statutory damages of up to $150,000 per product infringed, plus attorney fees. YOU CAN BE FOUND LIABLE FOR YOUR CHILD’S ACTIONS Brianna LaHara’s Story • 12 year old honors student. • Downloaded music from Kazaa. • Her mother paid for Kazaa so she thought it was ok. • She was sued, and her mother settled the case for $2,000 and an apology. Jammie Thomas-Rasset • Mother of four in Minnesota. • She was accused of downloading 24 songs from Kazaa. • Jammie told the Court that she did not download the songs. • At the conclusion of her second trial, she was fined 1.9 million dollars or $62,500 per song. • It would have cost $24 to legally download the 24 songs on iTunes. Fredrik Neij, Gottfrid Svartholm, and Peter Sunde • The Pirate Bay was a website that helped people throughout the world steal copyrighted material. • The website was closed, and the founders of Pirate Bay website were sentenced to jail time and ordered to pay 6.7 million dollars. PIRACY: MORE THAN JUST MUSIC LOOK AT WHAT YOUR CHILD IS DOING AND MONITOR THE SOFTWARE INSTALLED. YOUR KIDS ARE HACKERS • To gain access to a computer illegally • Guessing email and Facebook passwords is a form of hacking • Jailbreaking an IPhone Sarah Palin’s Email Hacked • In 2008, David Kernell, a 24 year old college student guessed the email password of Sarah Palin. • He took her emails and distributed them without her permission. • He was convicted of unauthorized access to a protected computer and destroying records to impede a federal investigation. • He served 11 months in jail. Florida man hacks celebrity emails • Christopher Chaney, 35 year old Florida resident, hacked the email accounts to Scarlett Johansson, Christina Aguilera, and Mila Kunis • In 2012, he plead guilty to nine felony counts including unauthorized access to a computer and wiretapping. • He faces up to 60 years in prison • He guessed the celebrities’ email passwords by studying their life in magazines and twitter Hacking Facebook Accounts • In 2010, a California teen received a text message with a classmate’s email password • He logged into her email and changed her Facebook password • He then changed her profile description, sent messages to male classmates, and posted on her wall in a vulgar manner • He was charged with identity theft • He was found guilty and put in juvenile detention HACKING AND PIRACY Consider monitoring internet and cell phone use: 1. Periodically review internet bookmarks, history files, temporary Internet files and keyword history. 2. Review phone use – text, photos, etc. 3. If the temporary internet files are cleared, what does that mean? 4. Review software installed on your child’s computer, video game system, phone. GOOD TEXTS BAD TEXTS Texting has become the defacto form of communication for children under the age of 16 with access to cell phones. GOOD TEXTS/BAD TEXTS What are inappropriate types of communications? - “Sexting” - Bullying - Harassment GOOD TEXTS/BAD TEXTS VERY REAL LEGAL CONSEQUENCES FOR SEXTING: 1. CRIMINAL PROSECUTION FOR DISTRIBUTION AND POSSESSION OF CHILD PORNOGRAPHY. 2. CRIMINAL PROSECUTIONG FOR ENTICEMENT OF A CHILD IF UNDER 15 YEARS OLD. 3. LIFETIME REGISTRATION AS A SEX OFFENDER. IF CONVICTED GOOD TEXTS/BAD TEXTS • CONSIDER MONITORING YOUR CHILD’S TEXT MESSAGES. • ADD DETAILED BILLING TO YOUR ACCOUNT TO MONITORY WHO THEY ARE TEXTING. • ALLOW PHONE USE DURING SET HOURS IN PUBLIC AREAS. ONLINE PREDATORS 1 IN 6 TEENS, AGES 12 TO 17, HAVE RECEIVED A SEXUAL SUGGESTIVE OR NUDE IMAGE OF SOMEONE THEY KNOW ON THEIR CELL PHONE. ONLINE PREDATORS VICTIMS OF ONLINE PREDATORS ARE ADOLESCENTS BETWEEN 13 AND 17. IMPORTANT TO START SAFE HABITS EARLY. ONLINE PREDATORS LIE ABOUT WHO THEY ARE, WHERE THEY LIVE AND WHAT THE DO. THEY GROOM. ONLINE PREDATORS VICTIMS OF ABUSE OFFLINE ARE MORE LIKLEY TO ENGAGE IN RISKY BEHAVIORS ONLINE. THE NEED FOR ATTENTION AND ACCEPTANCE. ONLINE PREDATORS BOYS WHO QUESTION SEXUALITY ARE MOST VUNERABLE ONLINE. 25% OF ALL INTERNET RELATED SEX CRIME VICTIMS ARE BOYS. ONLINE PREDATORS WHAT DO YOU DO? CALL THE CYBERTIPLINE 1-800-843-5678 ONLINE PREDATORS WHEN DO YOU CALL: 1. ANYTIME ANYONE SENDS YOUR CHILD PHOTOS OR VIDEOS CONTAINING OBSCENE CONTENT. 2. ANYTIME ANYONE SPEAKS TO YOUR CHILD IN A SEXUAL MANNER. 3. ANYTIME A STRANGER ASKS YOUR CHILD TO MEET IN PERSON. ONLINE PREDATORS HOW TO PROTECT YOU CHILD: 1. COMMUNICATION. 2. MONITOR ONLINE ACTIVITIES. 3. SHOW YOUR CHILD HOW TO USE TECHNOLOGY RESPONSIBLY. SUMMARY ESTABLISH INTERNET AND PHONE RULES FOR YOUR CHILDREN: 1. WHAT SITES THEY VISIT. 2. WHO THEY CAN TALK TO. 3. WHO MUCH TIME THEY CAN SPEND ONLINE. LEARN WHAT THEY ARE DOING AND WITH WHAT. SUMMARY CONSIDER COMPUTER USE IN A COMMON AREA OF THE HOUSE NOT SECLUDED IN A BEDROOM OR BASEMENT. SUMMARY LEARN THE CAPABILITIES OF YOUR CHILD’S CELL PHONE TURN OFF WEB ACCESS? CHECK PARENTAL CONTROLS. SUMMARY MOST IMPORTANTLY: COMMUNICATE. FIND OUT WHAT THEY ARE DOING. CALL THE CYBERTIPLINE: 1-800-843-5678