An Internet Safety Presentation for Grade Six Students @ Shanghai American School  Adapted from NetSmartz.org with video from netsmartz.org, center for missing & exploited children, and Saturday Night Live and http://www.fmschools.org/eagle-hill.cfm?subpage=4712 Be Safe Online
Online Risks Predators Your Online Life Cyber Bullying Revealing  Too Much
Predators
Video: SNL Clip
Quick Facts Online teens admit that they frequently communicate with people they have never met.  54% have Instant Messaged a stranger 50% have emailed a stranger 45% have participated in a chat room discussion with a stranger 27% of teens said that they have known a friend to actually meet someone whom they only knew online.  47% of children have received e-mails or IMs with attachments or links to pornography.
Quick Facts In 2007, more than 30,000 known registered sex offenders had active  myspace  accounts. According to the  Center for Missing and Exploited Children , each week an average of 50 children fall prey to online predators (through social networking sites, chats, online gaming, and other web tools.)  Most predators will spends months forming a friendship with the child to gain their trust. Who Are Your Online Friends?
Who Are Your Online Friends? Video: Everyone Knows Your Name
Predators Entice If Anyone: Talks about inappropriate things Sends you sexually explicit material Asks for your personal information Talks about or wants you to do something that makes you uncomfortable Wants to meet you in person Talk to a trusted adult!
Julie’s Journey Video: Julie’s Journey Activity: Julie’s Journey
Assault Disease Pregnancy Abduction Exploitation
Warning Signs If someone tries to: Isolate you from family and friends Turn you against your parents or guardians Make you keep things secret Send inappropriate material or talk about explicit topics Threatens you! Tell a trusted adult! This applies online and in real life!
Revealing too much
Never Meet Off-Line Video: Promises
You Can’t Take It Back Words and photos published online are there for the world to see - once out there, they can’t be taken back. Any photo or video posted online can be saved, accessed and altered by anyone. This applies even if your page is private. Private conversations can be saved.
You Can’t Take It Back Video: Bulletin Board
Why Should You Care? Family, friends, parents, teachers, and others will likely check your online life.  College admissions officials often check to see what online information they can find on candidates. The same applies to employers you might want to work for in the future. Interested in a career with a public life? Beware what you post! Profiles & blogs may be viewed by online predators.
How Much is Too Much? Information that could lead a predator to your door: Photos or video should never be posted online if they show: Backgrounds that reveal identifying information Sexually provocative poses Too much skin Name  Age  Birthday  Phone number School  Schedule  Location
Tracking Teresa Video: Tracking Teresa Activity: Tracking Teresa
Cyber-Bullying
Cyber-bullying What is it? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening with mean or bad language
Cyber-bullying Video:Can’t take it back  Activity:Can’t take it back
Cyber-bullying Video: Broken Friendship  Activity: Broken friendship
Cyber-bullying Consequences Broken friendships Hurting people School Consequences Prosecution by police Harassment Posting sexually explicit photos of people under 18 is illegal (even if it is your  friend )
What to do? If you are ever cyber-bullied: Do not respond Save the evidence Tell an adult you trust Report it to your ISP (Internet Service Provider) or  your school’s tech department, or advisor If someone threatens you, or you feel in immediate danger: Contact the local police! Tell a trusted adult!
 
Your   Online   Life social networking sites webcams & video blogging online gaming cell phones IM, E-Mail, Chat File Sharing
Anything Wrong Here?
Cell phone numbers Location / gathering details Last names IM screen names Descriptions Identifying information
 
 
If it's on the Internet,  it's not PRIVATE. Parents  Colleges  Employers  Principals  Predators  Relatives  Friends Teachers
Webcams & Video Videos can be used against you for exploitation Check your surroundings for information that could reveal your location Remember any video can be accessed and altered by anyone Webcams left turned on, may be accessed at the server level making it possible for others (predators) to watch you without your knowledge
Cell Phones Never post your cell phone number online Don’t respond to harassing text messages Never take or send provocative photos or video of yourself Having a cell phone is a privilege, not a right!
Online Gaming Use safety features to hide your age and gender Don’t get angry!  Walk away if things become too “heated” Have a life outside of gaming!!
E-Mail, IM, Chatrooms Communicate with people you know in person Keep your personal information private No meeting off-line Don’t respond to offensive messages Choose gender-neutral, non-revealing, non-suggestive screen names and e-mail addresses
File Sharing It is illegal to share copyrighted material without permission such as music, movies, etc. File sharing settings can slow your computer Downloading from unknown sources is the easiest way to get a computer virus
Spyware, spam & scams Only download from trustworthy sources to prevent spy-ware and viruses. Protect your privacy and don’t give out information to soliciting sites and e-mail. If an offer seems too good to be true, it usually is!
Make Safer Choices YOU  control your online image and how much information is revealed Be a good friend and sibling, and encourage others to be safer online Talk to an adult you trust if anything makes you feel scared or uncomfortable Be Safe!
Resources http://www.cybertipline.org If you or someone you know has been victimized, tell a trusted adult and report it to the Cyber Tipline. http://www.netsmartz.org Watch the video from this presentation again, access online safety activities, get more  information. Pictures http://www.techdigest.tv/apple-iphone-in-hand-thumb.jpg http://thecontentwrangler.com/images/uploads/email_laptop.jpg   http://www.techglow.com/wp-content/uploads/2008/07/instant-messaging-tips-im-clients.jpg

Internet Safety

  • 1.
    An Internet SafetyPresentation for Grade Six Students @ Shanghai American School Adapted from NetSmartz.org with video from netsmartz.org, center for missing & exploited children, and Saturday Night Live and http://www.fmschools.org/eagle-hill.cfm?subpage=4712 Be Safe Online
  • 2.
    Online Risks PredatorsYour Online Life Cyber Bullying Revealing Too Much
  • 3.
  • 4.
  • 5.
    Quick Facts Onlineteens admit that they frequently communicate with people they have never met. 54% have Instant Messaged a stranger 50% have emailed a stranger 45% have participated in a chat room discussion with a stranger 27% of teens said that they have known a friend to actually meet someone whom they only knew online. 47% of children have received e-mails or IMs with attachments or links to pornography.
  • 6.
    Quick Facts In2007, more than 30,000 known registered sex offenders had active myspace accounts. According to the Center for Missing and Exploited Children , each week an average of 50 children fall prey to online predators (through social networking sites, chats, online gaming, and other web tools.) Most predators will spends months forming a friendship with the child to gain their trust. Who Are Your Online Friends?
  • 7.
    Who Are YourOnline Friends? Video: Everyone Knows Your Name
  • 8.
    Predators Entice IfAnyone: Talks about inappropriate things Sends you sexually explicit material Asks for your personal information Talks about or wants you to do something that makes you uncomfortable Wants to meet you in person Talk to a trusted adult!
  • 9.
    Julie’s Journey Video:Julie’s Journey Activity: Julie’s Journey
  • 10.
    Assault Disease PregnancyAbduction Exploitation
  • 11.
    Warning Signs Ifsomeone tries to: Isolate you from family and friends Turn you against your parents or guardians Make you keep things secret Send inappropriate material or talk about explicit topics Threatens you! Tell a trusted adult! This applies online and in real life!
  • 12.
  • 13.
    Never Meet Off-LineVideo: Promises
  • 14.
    You Can’t TakeIt Back Words and photos published online are there for the world to see - once out there, they can’t be taken back. Any photo or video posted online can be saved, accessed and altered by anyone. This applies even if your page is private. Private conversations can be saved.
  • 15.
    You Can’t TakeIt Back Video: Bulletin Board
  • 16.
    Why Should YouCare? Family, friends, parents, teachers, and others will likely check your online life. College admissions officials often check to see what online information they can find on candidates. The same applies to employers you might want to work for in the future. Interested in a career with a public life? Beware what you post! Profiles & blogs may be viewed by online predators.
  • 17.
    How Much isToo Much? Information that could lead a predator to your door: Photos or video should never be posted online if they show: Backgrounds that reveal identifying information Sexually provocative poses Too much skin Name Age Birthday Phone number School Schedule Location
  • 18.
    Tracking Teresa Video:Tracking Teresa Activity: Tracking Teresa
  • 19.
  • 20.
    Cyber-bullying What isit? Spreading rumors and gossip Posting pictures without consent Obtaining a password to assume a person’s identity Harassing or threatening with mean or bad language
  • 21.
    Cyber-bullying Video:Can’t takeit back Activity:Can’t take it back
  • 22.
    Cyber-bullying Video: BrokenFriendship Activity: Broken friendship
  • 23.
    Cyber-bullying Consequences Brokenfriendships Hurting people School Consequences Prosecution by police Harassment Posting sexually explicit photos of people under 18 is illegal (even if it is your friend )
  • 24.
    What to do?If you are ever cyber-bullied: Do not respond Save the evidence Tell an adult you trust Report it to your ISP (Internet Service Provider) or your school’s tech department, or advisor If someone threatens you, or you feel in immediate danger: Contact the local police! Tell a trusted adult!
  • 25.
  • 26.
    Your Online Life social networking sites webcams & video blogging online gaming cell phones IM, E-Mail, Chat File Sharing
  • 27.
  • 28.
    Cell phone numbersLocation / gathering details Last names IM screen names Descriptions Identifying information
  • 29.
  • 30.
  • 31.
    If it's onthe Internet, it's not PRIVATE. Parents Colleges Employers Principals Predators Relatives Friends Teachers
  • 32.
    Webcams & VideoVideos can be used against you for exploitation Check your surroundings for information that could reveal your location Remember any video can be accessed and altered by anyone Webcams left turned on, may be accessed at the server level making it possible for others (predators) to watch you without your knowledge
  • 33.
    Cell Phones Neverpost your cell phone number online Don’t respond to harassing text messages Never take or send provocative photos or video of yourself Having a cell phone is a privilege, not a right!
  • 34.
    Online Gaming Usesafety features to hide your age and gender Don’t get angry! Walk away if things become too “heated” Have a life outside of gaming!!
  • 35.
    E-Mail, IM, ChatroomsCommunicate with people you know in person Keep your personal information private No meeting off-line Don’t respond to offensive messages Choose gender-neutral, non-revealing, non-suggestive screen names and e-mail addresses
  • 36.
    File Sharing Itis illegal to share copyrighted material without permission such as music, movies, etc. File sharing settings can slow your computer Downloading from unknown sources is the easiest way to get a computer virus
  • 37.
    Spyware, spam &scams Only download from trustworthy sources to prevent spy-ware and viruses. Protect your privacy and don’t give out information to soliciting sites and e-mail. If an offer seems too good to be true, it usually is!
  • 38.
    Make Safer ChoicesYOU control your online image and how much information is revealed Be a good friend and sibling, and encourage others to be safer online Talk to an adult you trust if anything makes you feel scared or uncomfortable Be Safe!
  • 39.
    Resources http://www.cybertipline.org Ifyou or someone you know has been victimized, tell a trusted adult and report it to the Cyber Tipline. http://www.netsmartz.org Watch the video from this presentation again, access online safety activities, get more information. Pictures http://www.techdigest.tv/apple-iphone-in-hand-thumb.jpg http://thecontentwrangler.com/images/uploads/email_laptop.jpg http://www.techglow.com/wp-content/uploads/2008/07/instant-messaging-tips-im-clients.jpg