Online Safety: A Parent’s Guide

58
Online Safety: Online Safety: A Parent’s Guide A Parent’s Guide Version 7.0 – 8/2010 Version 7.0 – 8/2010 2010 - NYS Internet Crimes Against Children Task Force 2010 - NYS Internet Crimes Against Children Task Force 1

description

Online Safety: A Parent’s Guide. Version 7.0 – 8/2010. Predators will use information obtained from children to gain trust and friendship ( her mother’s death ). Unless you know someone in person, you don’t really know who they are on the Internet ( predator portrayed himself as 18 yr old ). - PowerPoint PPT Presentation

Transcript of Online Safety: A Parent’s Guide

Page 1: Online Safety:  A Parent’s Guide

Online Safety: Online Safety:

A Parent’s GuideA Parent’s Guide

Online Safety: Online Safety:

A Parent’s GuideA Parent’s Guide

Version 7.0 – 8/2010Version 7.0 – 8/2010

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force 11

Page 2: Online Safety:  A Parent’s Guide

• Predators will use information obtained from Predators will use information obtained from children to gain trust and friendship (children to gain trust and friendship (her mother’s her mother’s

deathdeath).).

• Unless you know someone in person, you don’t Unless you know someone in person, you don’t really know who they are on the Internet really know who they are on the Internet

((predator portrayed himself as 18 yr oldpredator portrayed himself as 18 yr old). ).

• Anyone is vulnerable (Anyone is vulnerable (father was police officer, father was police officer, lived in small townlived in small town).).

•2

Page 3: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• ““Food for thought” for parents … Food for thought” for parents … You must decide your strategy. You must decide your strategy.

• Some material may be Some material may be “unsettling,” but this is “unsettling,” but this is unavoidable.unavoidable.

• Philosophy: “Instill a sense of Philosophy: “Instill a sense of caution, not a sense of fear.”caution, not a sense of fear.”

• The good does outweigh the bad.The good does outweigh the bad.

• Ask questions … offer thoughts.Ask questions … offer thoughts.

IntroductionIntroduction

33

Page 4: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Targeting Kids OnlineTargeting Kids Online

44

• View Video: Tracking TheresaView Video: Tracking Theresa (00:05:08)(00:05:08)

Page 5: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

The Technologies: How do they get The Technologies: How do they get there?there? • Desktop and laptop computers Desktop and laptop computers

located at home, friend’s located at home, friend’s homes, work, libraries, stores, homes, work, libraries, stores, schools, “Internet cafes”…schools, “Internet cafes”…wireless connections.wireless connections.

• PDA/BlackBerry.PDA/BlackBerry.

• Cell phones.Cell phones.

• Internet capable games (i.e., Internet capable games (i.e., Xbox, Playstation).Xbox, Playstation).

55

Page 6: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Kids in the U.S.Kids in the U.S.

• 94% of teens aged 12 – 17 use the Internet.94% of teens aged 12 – 17 use the Internet.

• 84% of online teens have a social networking 84% of online teens have a social networking profile. 46% have open access to their online profile. 46% have open access to their online profile information.profile information.

• 84% of teens have cell phones and more 84% of teens have cell phones and more than 88% are texting.than 88% are texting.

• 43% of teens have been victims of 43% of teens have been victims of cyberbullying.cyberbullying.

66

Page 7: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• Online enticement.Online enticement.

• Sexting.Sexting.

• Access by children to pornography. Access by children to pornography.

• Distribution of child pornography.Distribution of child pornography.

• Cyberbullying.Cyberbullying.

Risks Involving Children Are RealRisks Involving Children Are Real

77

Page 8: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• 1 in 7 children (13%) received sexual solicitation 1 in 7 children (13%) received sexual solicitation or were approached within the last year.or were approached within the last year.

• 1 in 3 (34%) had an unwanted exposure to 1 in 3 (34%) had an unwanted exposure to pictures of naked people or people having sex.pictures of naked people or people having sex.

• 1 in 11 (9%) was threatened or harassed.1 in 11 (9%) was threatened or harassed.

• 1 in 25 (4%) received an “aggressive” sexual 1 in 25 (4%) received an “aggressive” sexual solicitation - A solicitor who: asked to meet them solicitation - A solicitor who: asked to meet them somewhere; called them on the telephone; or somewhere; called them on the telephone; or sent them regular mail, money or gifts.sent them regular mail, money or gifts.

Online Victimization of Youth: Online Victimization of Youth: Five Years Later (2006)Five Years Later (2006)

88

Page 9: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• Through use of chat rooms, e-mail, instant Through use of chat rooms, e-mail, instant messaging, “blogs” and even on-line games, adult messaging, “blogs” and even on-line games, adult strangers can establish direct one-to-one access to strangers can establish direct one-to-one access to children. children.

– ““Distance” and children’s natural trust can lead Distance” and children’s natural trust can lead them to forget that these people are strangers … them to forget that these people are strangers … and many of them are very good at and many of them are very good at misrepresenting who they are. misrepresenting who they are.

• ““There was one guy who kept telling me I was beautiful, There was one guy who kept telling me I was beautiful, sexy and hot, and that he wanted to meet me. Even sexy and hot, and that he wanted to meet me. Even though I kept saying no, he kept giving me his pager though I kept saying no, he kept giving me his pager number and telling me to call him” (Age 14)number and telling me to call him” (Age 14)

Online EnticementOnline Enticement

99

Page 10: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Missing Child Alerts Resulting Missing Child Alerts Resulting From Online Enticement via From Online Enticement via

MySpace.MySpace.

1010

Page 11: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Who areWho arethese people?these people?

1111

• View Video: "On Line Sexual View Video: "On Line Sexual Predators - Adults Targeting Predators - Adults Targeting

Children" Children"

Page 12: Online Safety:  A Parent’s Guide

Where are children going online?Where are children going online?

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force 1212

• View Video: Future Consequences View Video: Future Consequences (0:30)(0:30)

Page 13: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Chat roomsChat rooms• Chat rooms are places on the Internet where Chat rooms are places on the Internet where

you can have live, real-time conversations with you can have live, real-time conversations with many people at the same time.many people at the same time.

• Everyone in the chat room can see what Everyone in the chat room can see what everyone else writes, but you can still be as everyone else writes, but you can still be as anonymous as you want.anonymous as you want.

1313

Page 14: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• While chat rooms can be dynamic meeting While chat rooms can be dynamic meeting places for people with similar interests:places for people with similar interests:

– Children can be easily mislead to do things Children can be easily mislead to do things that they ordinarily would not do.that they ordinarily would not do.

– It is easy for a child to reveal It is easy for a child to reveal more, sometimes much more, more, sometimes much more, than they should.than they should.

– They are cruising grounds for They are cruising grounds for predators.predators.

• If a person unknown to you was speaking to your child in your If a person unknown to you was speaking to your child in your front yard, what would you do? If your child was communicating front yard, what would you do? If your child was communicating with the same stranger on-line, what would you do?with the same stranger on-line, what would you do?

1414

Page 15: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force 1515

ChatrouletteChatroulette

• View Video: Chat Roulette (5:47)View Video: Chat Roulette (5:47)

Page 16: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Instant Messaging (IM).Instant Messaging (IM).

• IM is a form of Internet communication that IM is a form of Internet communication that combines the live nature of real time chat with combines the live nature of real time chat with the personal contact of email. Benefits include:the personal contact of email. Benefits include:

– A safer environment than chat rooms since A safer environment than chat rooms since contact lists can be contact lists can be better controlled.better controlled.

1616

Page 17: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• IM software allows users to create a detailed IM software allows users to create a detailed personal profile including: name, email address, personal profile including: name, email address, age, home address, phone number, school and age, home address, phone number, school and hobbies.hobbies.

– If children aren't careful during the sign-up process, If children aren't careful during the sign-up process, they can reveal more than they should.they can reveal more than they should.

– Easy accessible profiles can allow anyone to contact Easy accessible profiles can allow anyone to contact them.them.

−Some IM programs offer users the option of joining in Some IM programs offer users the option of joining in chat with strangers.chat with strangers.

−The reach of IM can encourage gossiping and bullying.The reach of IM can encourage gossiping and bullying.

−Children can receive pornographic "spam" through IM. Children can receive pornographic "spam" through IM.

1717

Page 18: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Social Networking Sites.Social Networking Sites.

1818

• ““Kids are becoming stars of their own online television reality Kids are becoming stars of their own online television reality shows” in front of an audience of millions of Internet users.shows” in front of an audience of millions of Internet users.

• View Video “Dateline - View Video “Dateline - MySpace"MySpace"

Page 19: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• A blog is basically a journal that is available on the A blog is basically a journal that is available on the web - the term is a shortened form of web log.web - the term is a shortened form of web log.

– Blogs are typically updated daily using software that Blogs are typically updated daily using software that allows people with little or no allows people with little or no technical background to technical background to maintain the blog. maintain the blog.

– Postings on a blog are almost always arranged in Postings on a blog are almost always arranged in chronological order with the most recent additions chronological order with the most recent additions featured most prominently.featured most prominently.

– Blogs usually include profiles, text, photographs, and Blogs usually include profiles, text, photographs, and links between “friends” and interests - and may include links between “friends” and interests - and may include video or audio files.video or audio files.

1919

Page 20: Online Safety:  A Parent’s Guide

•20

Page 21: Online Safety:  A Parent’s Guide

Message BoardsMessage Boards

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force 2121

Page 22: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Video NetworkingVideo Networking

YouYou TubeTube

2222

Page 23: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Video NetworkingVideo Networking • Registration is almost always free.Registration is almost always free.

• Identity verification is not always required Identity verification is not always required to become a member – children can access to become a member – children can access “adult” material.“adult” material.

• Graphic and explicit videos – pornography, Graphic and explicit videos – pornography, violence, pedophilia.violence, pedophilia.

• Cyberbullying, Internet predators.Cyberbullying, Internet predators.

2323

Page 24: Online Safety:  A Parent’s Guide

Text

Twitter

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force 2424

Page 25: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force 2525

Page 26: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force 2626

Page 27: Online Safety:  A Parent’s Guide

Sextortion,Sextortion,don’t let it happen to your don’t let it happen to your

child.child.

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force 2727

Page 28: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• Pornography which is legally Pornography which is legally restricted to adults can easily be restricted to adults can easily be accessed by children online.accessed by children online.

– A child who can’t browse through a sexually A child who can’t browse through a sexually explicit magazine in a store can easily view explicit magazine in a store can easily view explicit images and video online. explicit images and video online.

– Also, obscene materials which are illegal even Also, obscene materials which are illegal even for adults can easily be accessed online.for adults can easily be accessed online.

Access by Children to Access by Children to PornographyPornography

2828

Page 29: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

www.fun.cowww.fun.comm

www.teens.comwww.teens.com

Even “innocent” website addresses can Even “innocent” website addresses can lead directly to pornography.lead directly to pornography.

• UnintentionUnintentionalal

• ““It is like a car crash. You want to It is like a car crash. You want to look away but can’t.” (Age 14)look away but can’t.” (Age 14)

2929

Page 30: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

URL’s (Uniform Resource Locators) URL’s (Uniform Resource Locators) …The incorrect one can take you to …The incorrect one can take you to a sexually explicit site. Howa sexually explicit site. How??

• AssumptionsAssumptions

– You’re “certain” that You’re “certain” that you know the URLyou know the URL

• MistakenMistaken

– Use of “.com” versus Use of “.com” versus “.org” etc…“.org” etc…

• Spelling errorsSpelling errors

– Transposing charactersTransposing characters

www.nsync.comwww.nsync.com

www.nsync.orwww.nsync.orgg

3030

Page 31: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• Unsolicited “push” pornography Unsolicited “push” pornography and e-mail links are very and e-mail links are very prevalent and are sent to prevalent and are sent to everyone – including children.everyone – including children.

3131

Page 32: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• ““Keyword Searches”Keyword Searches”– Children using search engines to locate Children using search engines to locate

legitimate information can receive links to legitimate information can receive links to pornographic sites. pornographic sites.

3232

Page 33: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Curiosity in children is natural, but learning Curiosity in children is natural, but learning aboutabout

sexuality on-line is not usually the best place.sexuality on-line is not usually the best place.

IntentionalIntentional

3333

Page 34: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force 3434

Page 35: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• The Internet has provided child pornographers with The Internet has provided child pornographers with a powerful and anonymous distribution vehicle. a powerful and anonymous distribution vehicle.

• Possession and distribution of child pornography is Possession and distribution of child pornography is illegal under state and Federal laws.illegal under state and Federal laws.

Distribution of Child Pornography.Distribution of Child Pornography.

• View Video: Dr Sharon (1:47)View Video: Dr Sharon (1:47)

3535

Page 36: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

““Cyberbullying” - Any Device, Cyberbullying” - Any Device, Anytime…Anytime…

3636

Page 37: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• There are several ways that children There are several ways that children threaten and/or harass others online. threaten and/or harass others online. They may:They may:

– Send e-mails or instant messages containing Send e-mails or instant messages containing insults or threats directly to a person. insults or threats directly to a person.

– Spread hurtful comments about a person to Spread hurtful comments about a person to others through e-mail, instant messaging or others through e-mail, instant messaging or postings on web sites and blogs.postings on web sites and blogs.

– Steal passwords and send out threatening e-Steal passwords and send out threatening e-mails or instant messages using an assumed mails or instant messages using an assumed identity.identity.

3737

Page 38: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

– Build web sites, often with password protection, Build web sites, often with password protection, to target people - students or even teachers. to target people - students or even teachers.

– Increasingly, kids are being bullied by text Increasingly, kids are being bullied by text messages sent through their cell phones. messages sent through their cell phones.

– Built-in digital cameras in cell phones have Built-in digital cameras in cell phones have added a new dimension to the problemadded a new dimension to the problem..

““A kid from school sent me a message on the Internet saying, A kid from school sent me a message on the Internet saying, ‘Hey Dave, look at this website’” says David. “I went there ‘Hey Dave, look at this website’” says David. “I went there and sure enough, there’s my photo on this website saying and sure enough, there’s my photo on this website saying ‘Welcome to the website that makes fun of Dave Knight’ and ‘Welcome to the website that makes fun of Dave Knight’ and just pages of hateful comments directed at me and everyone just pages of hateful comments directed at me and everyone in my family.”in my family.”

3838

Page 39: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Consequences of Cyber Bullying!Consequences of Cyber Bullying!

From hurt feelings to…From hurt feelings to…suicide.suicide.

3939

View Videos: Ryan Halligan’s Story and Ryan View Videos: Ryan Halligan’s Story and Ryan Halligan's father speaks with teensHalligan's father speaks with teens

Page 40: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

•Possible warning signs of children being bullied or bullying other children.– Complaining that other children or a group of Complaining that other children or a group of

children do not like them.children do not like them.

– Preoccupation with friendship concerns.Preoccupation with friendship concerns.

– Poor self-esteem. Feeling they are not as good Poor self-esteem. Feeling they are not as good as others.as others.

– Not wanting to go to school or other activities.Not wanting to go to school or other activities.

– Spending a great deal of time on the Spending a great deal of time on the computer.computer.

– Being secretive about online activities.Being secretive about online activities.4040

Page 41: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• Lacking interest and involvement with other kids.Lacking interest and involvement with other kids.

• Acting like their group (clique) is superior.Acting like their group (clique) is superior.

• Bragging that they use the Internet to play Bragging that they use the Internet to play practical jokes or steal other kids’ passwords as a practical jokes or steal other kids’ passwords as a joke.joke.

• Continuing to make fun of other kids.Continuing to make fun of other kids.

• Getting in trouble at school or in the community Getting in trouble at school or in the community for inappropriate computer use.for inappropriate computer use.

Adapted from Powertolearn.com

4141

Page 42: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• Dealing with CyberbullyingDealing with Cyberbullying– Preserve evidence – this is crucial for identifying Preserve evidence – this is crucial for identifying

the bully and making a case. the bully and making a case.

– Attempt to enlist assistance from the service Attempt to enlist assistance from the service provider.provider.

– If able to identify the bully, contact him or her If able to identify the bully, contact him or her and/or parents.and/or parents.

– Use available blocking technology (i.e., block the Use available blocking technology (i.e., block the user on IM, email and chat.)user on IM, email and chat.)

– In serious cases, seek assistance from the police In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or (i.e., threats of physical harm, unrelenting or unable to stop.)unable to stop.)

4242

Page 43: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

So… What Should Parents Do?So… What Should Parents Do?

4343

Page 44: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

1.1. Learn everything you can about computers, Learn everything you can about computers, the Internet and related technologythe Internet and related technology - -

• Develop and maintain proficiency through use. Develop and maintain proficiency through use.

• Ask children to demonstrate.Ask children to demonstrate.

2.2. Communicate with your children. Communicate with your children. • Take time to discuss concerns; agree on ground Take time to discuss concerns; agree on ground

rules.rules.• Understand their needs.Understand their needs.• Set reasonable expectations.Set reasonable expectations.

3.3. Place the computer in a “well-trafficked” Place the computer in a “well-trafficked” area, area, notnot a child’s bedroom or a secluded a child’s bedroom or a secluded area.area.

4444

Page 45: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

4.4. Ensure that they do not divulge detailed Ensure that they do not divulge detailed personal information when completing personal information when completing “profiles” and minimize dissemination.“profiles” and minimize dissemination.

5.5. Keep ALL accounts in your name.Keep ALL accounts in your name.

6.6. Know your child’s password(s) Know your child’s password(s) and screen name(s). and screen name(s).

• Ensure that screen names do not Ensure that screen names do not provide information about his or provide information about his or her identity (e.g., Sarahsweet16.) her identity (e.g., Sarahsweet16.)

4545

Page 46: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

7.7. Consider Use of Computer/Internet Consider Use of Computer/Internet Management Software:Management Software:

• Age-based access levels – Allows for various Age-based access levels – Allows for various levels of access for different family members.levels of access for different family members.

• Filtering and Blocking (incoming and outgoing.) Filtering and Blocking (incoming and outgoing.)

• Time Restrictions.Time Restrictions.

• Activity Logs - Parents can view logs that list Activity Logs - Parents can view logs that list web sites visited, web sites blocked, chat web sites visited, web sites blocked, chat sessions… Software can even capture screen sessions… Software can even capture screen shots and email messages to you if a rule is shots and email messages to you if a rule is violated!violated!• ““Girls are aware of the varied dangers of the Girls are aware of the varied dangers of the

Internet, but want more proactive involvement Internet, but want more proactive involvement rather than prohibitive don’ts from parents.”rather than prohibitive don’ts from parents.”

4646

Page 47: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Monitoring Software InformationMonitoring Software Information

4747

Page 48: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

8.8. Periodically review Internet Periodically review Internet bookmarks, history files, temporary bookmarks, history files, temporary Internet files and keyword searches. Internet files and keyword searches. Also … what can it mean if history, Also … what can it mean if history, keyword or temporary Internet files keyword or temporary Internet files are cleared?are cleared?

4848

Page 49: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Set Parental ControlsSet Parental Controls

4949

Page 50: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

netling.com noslang.com acronymfinder.com

Acronyms, Text Shorthand Acronyms, Text Shorthand and Emoticons and Emoticons

5050

View Video: “My bff jill” View Video: “My bff jill” (0:20)(0:20)

Page 51: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• Under 8Under 8 - Children shouldn’t be using IM, chat - Children shouldn’t be using IM, chat rooms or blogs - period. Email should be rooms or blogs - period. Email should be restricted to only approved senders.restricted to only approved senders.

• 8-108-10 - - If you add IM or chat, make sure only pre-If you add IM or chat, make sure only pre-approved senders can send to your child. No approved senders can send to your child. No blogs!blogs!

• 10-1210-12 - Give them more privacy, as - Give them more privacy, as long as it is with people you trust. long as it is with people you trust. Block all but pre-approved senders. Block all but pre-approved senders. Still no blogs! Still no blogs!

Blogs, IM, Chatrooms, Email: What Blogs, IM, Chatrooms, Email: What is reasonable?is reasonable?

5151

Page 52: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• 13-1513-15 - Respect their privacy even more. Give - Respect their privacy even more. Give them more leeway regarding IM, e-mail, chat and them more leeway regarding IM, e-mail, chat and blogs. But check and account for everyone, in real blogs. But check and account for everyone, in real life, on their buddy lists. No friends of friends!life, on their buddy lists. No friends of friends!

• 16 and over16 and over - Parental involvement becomes - Parental involvement becomes difficult at best – if good judgment and difficult at best – if good judgment and communication have not been firmly established communication have not been firmly established by now … all bets are off. by now … all bets are off.

– If they have earned your trust, give it to them.If they have earned your trust, give it to them.

– If not, unplug the computer and take away their If not, unplug the computer and take away their cell phones and interactive gaming devices. cell phones and interactive gaming devices.

5252

Page 53: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• Warning signs. Elevate concern if your child:Warning signs. Elevate concern if your child:

– Significantly increases on-line time.Significantly increases on-line time.

– Receives phone calls, email, mail or packages Receives phone calls, email, mail or packages from someone you don't know.from someone you don't know.

– Quickly exits IM, chat, email, websites and other Quickly exits IM, chat, email, websites and other activities when you are near.activities when you are near.

– Increases use of new slang words, inappropriate sexual Increases use of new slang words, inappropriate sexual knowledge, withdraws from family and friends.knowledge, withdraws from family and friends.

– Begins using new screen names, an online Begins using new screen names, an online account belonging to someone else, etc.account belonging to someone else, etc.

– Is reluctant to discuss activities or your concerns.Is reluctant to discuss activities or your concerns.

5353

Page 54: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

Always Keep In Mind …Always Keep In Mind … The “Good” Really Does Outweigh The The “Good” Really Does Outweigh The

“Bad!”“Bad!”

5454

Page 55: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

– RecognizeRecognize techniques used by online techniques used by online predators to deceive their victims.predators to deceive their victims.

– RefuseRefuse requests for personal information. requests for personal information.

– RespondRespond assertively if you are ever in an assertively if you are ever in an uncomfortable situation while online. Exit the uncomfortable situation while online. Exit the program, log off or turn off the computer… program, log off or turn off the computer…

– ReportReport, to a parent or other trusted adult, , to a parent or other trusted adult, any suspicious or dangerous contact that any suspicious or dangerous contact that makes you uncomfortable.makes you uncomfortable.

Teach Children to Remember the Teach Children to Remember the 4 4 R’sR’s … …

5555

Page 56: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• Established in 1998 in response to the rapidly Established in 1998 in response to the rapidly escalating problem of Internet crimes involving escalating problem of Internet crimes involving children.children.

• Formally combined efforts of the New York State Formally combined efforts of the New York State Police, NYS Attorney General's Office, NYS Division Police, NYS Attorney General's Office, NYS Division of Criminal Justice Services and regional affiliates.of Criminal Justice Services and regional affiliates.

• It is one of over 50 nationwide, which has It is one of over 50 nationwide, which has strengthened information sharing between police strengthened information sharing between police agencies.agencies.

The New York State Internet The New York State Internet Crimes Against Children (ICAC) Crimes Against Children (ICAC)

Task ForceTask Force

5656

Page 57: Online Safety:  A Parent’s Guide

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• Efforts:Efforts:

– The New York State Police conduct The New York State Police conduct well coordinated investigations and well coordinated investigations and forensic examination of computers forensic examination of computers seized as evidence.seized as evidence.

– The NYS Attorney General The NYS Attorney General prosecutes or assists with the prosecutes or assists with the prosecution of offenders.prosecution of offenders.

– NYS DCJS is responsible for NYS DCJS is responsible for providing training and education to providing training and education to both the public and law both the public and law enforcement.enforcement.

5757

Page 58: Online Safety:  A Parent’s Guide

NYS Internet Crimes Against Children Task ForceNYS Internet Crimes Against Children Task Force

www.nysicac.orgwww.nysicac.org

1-877-474-KIDS (5437)1-877-474-KIDS (5437)

[email protected]@troopers.state.ny.us

NYS Division of Criminal Justice ServicesNYS Division of Criminal Justice ServicesMissing and Exploited Children ClearinghouseMissing and Exploited Children Clearinghouse

www.criminaljustice.state.ny.uswww.criminaljustice.state.ny.us

1-800-FIND-KID (346-3543)1-800-FIND-KID (346-3543)

[email protected]@dcjs.state.ny.us

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force 5858