What does your Digital Identity You? - Edl€¦ · What does your Digital Identity say about ......
Transcript of What does your Digital Identity You? - Edl€¦ · What does your Digital Identity say about ......
! Type to enter text
© Cyber Education Consulting 2012-2014
What does your
Digital Identity
say about You?
2
Child Tech Contract Tips
! I am required to contribute to the cost of my devices. ! It is my responsibility to be sure the devices are being recharged each night in the _____________. ! My devices must be turned off at ___ pm each school night and ____ pm in the summer and weekend nights. ! I agree that if I am unable to keep up with my responsibilities, the use of my devices can be taken away from me. ! I will not use my devices to take pictures of nudity, violence or other inappropriate content. ! I will not take a picture or video of anyone without that person’s permission. ! I will not use my devices for malicious purposes. (Cyber Harassment, Crank calling, etc.) ! Do not ever ignore a phone call if the screen reads “Mom/Dad” or “Guardian”. ! Your devices does not go to school with you. *Half days, field trips and after school activities will require special consideration. ! If your phone is lost, stolen or damaged you are responsible for the replacement costs or repairs.
! Child must go over any new apps/social network accounts/video games with parent/guardian prior to use© Cyber Education Consulting 2012-2014
3
Child Tech Contract Tips
! I am required to contribute to the cost of my devices. ! It is my responsibility to be sure the devices are being recharged each night in the _____________. ! My devices must be turned off at ___ pm each school night and ____ pm in the summer and weekend nights. ! I agree that if I am unable to keep up with my responsibilities, the use of my devices can be taken away from me. ! I will not use my devices to take pictures of nudity, violence or other inappropriate content. ! I will not take a picture or video of anyone without that person’s permission. ! I will not use my devices for malicious purposes. (Cyber Harassment, Crank calling, etc.) ! Do not ever ignore a phone call if the screen reads “Mom/Dad” or “Guardian”. ! Your devices does not go to school with you. *Half days, field trips and after school activities will require special consideration. ! If your phone is lost, stolen or damaged you are responsible for the replacement costs or repairs.
! Child must go over any new apps/social network accounts/video games with parent/guardian prior to use
© Cyber Education Consulting 2012-2014
4
Child Tech Contract Tips! Do not use this technology to cheat (gain a advantage over other person). ! Do not involve yourself in the digital drama. Anything you do through technology leaves a trail. ! I will limit the number of people I give my phone number and screen names. ! Mom and Dad or guardian will meet all of your followers/digital friends in the real world, no exceptions. ! I will limit the amount of time I am on the devices. ! I will maintain grades/chores/behavior as follows:__________________________________________________
! I will not share any personal info while online, this includes but is not limited to: family members birthdays, vacation plans, photos, or video without prior approval.
! Mom and Dad or Guardian will have access to all phone passwords and voice mail, social networking, video game passwords. NO HIDDEN ACCOUNTS! ! Parents or Guardian the right to go through any devices/accounts with probable cause. Assume everything you do online is being monitored and act accordingly. Let your friends know that you are being monitored as well.
© Cyber Education Consulting 2012-2014
5
Child Tech Contract Tips! Do not use this technology to cheat (gain a advantage over other person). ! Do not involve yourself in the digital drama. Anything you do through technology leaves a trail. ! I will limit the number of people I give my phone number and screen names. ! Mom and Dad or guardian will meet all of your followers/digital friends in the real world, no exceptions. ! I will limit the amount of time I am on the devices. ! I will maintain grades/chores/behavior as follows:__________________________________________________
! I will not share any personal info while online, this includes but is not limited to: family members birthdays, vacation plans, photos, or video without prior approval.
! Mom and Dad or Guardian will have access to all phone passwords and voice mail, social networking, video game passwords. NO HIDDEN ACCOUNTS! ! Parents or Guardian the right to go through any devices/accounts with probable cause. Assume everything you do online is being monitored and act accordingly. Let your friends know that you are being monitored as well.
© Cyber Education Consulting 2012-2014
6
A Digital Life! Social Networking
! Blogging ! Vlogging ! Phlogging
! Webcams & Videos
! Cell Phones
! Apps
! File-sharing
! Personal Finance
! Video Games
9
Screen Name Search Screen Name
Screen Name
Screen Name
Screen Name
Screen NameScreen Name
Screen Name
Screen Name
Screen Name
Screen Name
Screen Name
Screen Name
Screen Name
Screen Name
Name
Screen Name
Screen Name and Full Name
Screen Name
Screen Name
Screen Name
Screen Name
Screen Name and Full Name Screen Name
Screen Name
The Google screen name search lead to:•NAME
•AGE
•RELATIONSHIP STATUS
•FAMILY ISSUES
© Cyber Education Consulting 2012-2014
Blogging !Click the location
on the Google Map to find out who is tweeting around that area.
! It took only seconds to find students profiles from this area.
© Cyber Education Consulting 2012-2014
Links to Local Twitter Accounts
Facial Recognition App
• Nametag app (Beta) uses facial recognition technology to match passersby to their online profiles.
• The group is also developing a app to compare photos to child predator database
© Cyber Education Consulting 2012-2014
Facebook Facial Recognition Feature
• "Tag Suggest" feature uses facial recognition technology to speed up the process of labeling or "tagging"
• Facebook’s program is 97% accurate
• You can opt out of it
© Cyber Education Consulting 2012-2014
Unsafe websites and apps
PARENTAL GUIDANCE SITES/APPSPlaystation Live
Xbox LiveWattpad
Creepypasta
OFF LIMIT SITES/APPSKik
Tinder Omegle ask.fm
www.commonsensemedia.org© Cyber Education Consulting 2012-2014
Vine • Create short, looping videos• Instantly post videos on Vine, then share to Twitter and Facebook• Find, follow, and interact with people close to you• Explore trending posts, featured hashtags and editor's picks.
© Cyber Education Consulting 2012-2014
Vine
© Cyber Education Consulting 2012-2014
Where you liveLicense Plates can be
searched
Do not add Free Follower Profiles
The website link is NOT
! Webcam is extremely popular.
! Chats like “omegle” stickcam, ustream, are live but are not as anonymous as they claim.
! Remember that any communication done one these sites can be recorded and posted elsewhere on the Internet.
! Nothing done on these sites should considered private!!!
Webcams & Videos
© Cyber Education Consulting 2012-2014
27
Pariscope
Here’s how the app work:
• Broadcast live video of yourself and the app notifies your friends and followers that you are streaming live video.
• Then they watch your personal broadcast live
• Pariscope is Twitters live video streamer app
© Cyber Education Consulting 2012-2014
28
• You must approve all uploads• Must give a reason for posting
(Example: to educate, to promote a skill, talent)
• Have them identify their audience before posting (Example: for kids, for adults)
• Make sure there’s no personal info is included in the video or profile
• Decide you will be able to view it (public, private, etc.)
• No live streaming without you present
© Cyber Education Consulting 2012-2014
Tips for online video posting
• You control how long your friends can view your message (Video or Photo)
• They will have that long to view your message and then it disappears “forever”.
• The app will let you know if they take a screenshot
Snapchat
© Cyber Education Consulting 2012-2014
! Kik is a messaging app that allows users to share text, pictures, sketches, videos.
! It uses screen names to identify users. (Instead of a phone number)
! Do not need a cellphone to use it. (Available for iPod touch)
© Cyber Education Consulting 2012-2014
Step 1:Click “Privacy”
Step 2:Click “Block
List”
Step 3:Click “Add
button”
Step 4:Select the person to
block
Step 5:Confirm by
clicking “Block”
© Cyber Education Consulting 2012-2014
Instamap
© Cyber Education Consulting 2012-2014
• Instamap places GPS
tagged Instagram
public photos on a map
• Users can click on
photos to view the profiles
“Private” Profiles & Ask.fm
© Cyber Education Consulting 2012-2014
!Ask.fm is an online social network that enables people to send questions to each other and answer them.
! When you ask a question you can choose whether to ask it anonymously or you can reveal your name.
! You can choose not to receive anonymous questions.
Deleting Instagram Account
Screen Name
Step Two Click Here
YOU CANNOT DELETE THE ACCOUNT FROM THE MOBILE APP!
Step One Click Here
To delete a Instagram account the user must first
go to www.instagram.co
m
© Cyber Education Consulting 2012-2014
© Cyber Education Consulting 2012-2014
• Bring Your Own Device (BYOD)
• Using your own network to violate school policy on or off campus school still required to get involved (AB256)
Acceptable Use v. Responsible Use
Screen Capture the following:
• First the offensive content
• Second the people who have “liked” it
• Third the people who commented on it
• Share images with an School Administrator
Reporting Instagram Profiles
© Cyber Education Consulting 2012-2014
When would you give them the car keys?
Just as much freedom
You must be able to talk to them about anything they see
without blaming the tech
When is the right age to get my child a phone?
Privacy in the Digital Age
© Cyber Education Consulting 2012-2014
There is none, anything can be shared:! Screenshots ! Hacks (Friends/Others)
Parents/Guardians are responsible for anything their child does online! Anything posted! Any sites visited! Anything downloaded
Monitoring the Digital Age
© Cyber Education Consulting 2012-2014
I can be hard as a parent to keep up:! Go through devices, understand all apps they download, make them the experts and teach you! Parents must have all passwords to all accounts
There are apps to monitor, but the best is device in hand! Netnanny (www.netnanny.com)! My Mobile Watchdog (www.mymobilewatchdog.com)
• Can track where your kids go on the Net,
• Block sites you don’t want them to see,
• Limit their screen time, and turn the Internet off at night.
• It requires absolutely zero technical expertise to set up
• Can manage all of it from an app on your iPhone.
Circle by Disney
Hidden Apps/Secret Apps
© Cyber Education Consulting 2012-2014
Apps that a child can place apps inside a folder and apply password-protection to that folder
Some names of the apps:• Applocker• Hide It Pro• Vault Hide• Secret Calculator Icon
Hidden Apps/Secret Apps
© Cyber Education Consulting 2012-2014
Apps that a child can place apps inside a folder and apply password-protection to that folder
Some names of the apps:• Applocker• Hide It Pro• Vault Hide• Secret Calculator Icon
© Cyber Education Consulting 2012-2014
APPLE has a “Restrictions” section allow you to set what they have access to at a basic level
Hidden Apps/Secret Apps Solutions
Go to “Settings” > “General” >
“Restrictions”
This password will be
different then the one they use to open the
phone
“Enable restrictions” >
Create Password
* Only monitors Safari browser, not
any secondary browsers (Chrome,
etc.)
Most options are “Allow Changes”
“Don’t Allow changes”
Hiding apps on a Android
© Cyber Education Consulting 2012-2014
ANDROID has a “Hide Applications” feature built in
Select Apps Icon
Select Menu button
Select Hide apps
Select Show hidden apps
Any apps shown here were previous
hidden from you
Removing Geo Tagging
Step 1: Select “settings”
Step 2: Select “Privacy”
Step 3: Select
“Location Services”
Apple Frequent Locations
© Cyber Education Consulting 2012-2014
Step: 4Scroll all the way
down and select
“System Services”
Step: 5Select
Frequent Locations
Step: 6You can turn
offFrequent Locations
also you can “Clear
History”
Removing Geo Tagging
© Cyber Education Consulting 2012-2014
Step: 5Select
Frequent Locations
Apple Frequent Locations Details
Removing Geo Tagging App Permission Controls
© Cyber Education Consulting 2012-2014
Step 1: Select
“Settings”
Step 2: Select “Privacy”
Step 3: Select
“Location Services”
Step 4: Select “App”
Step 5: Select “Never”
Guided Access
© Cyber Education Consulting 2012-2014
Step 1: Select “General” then
“Accessibility”
Step 2: Scroll down and select
“Guided Access”
“Guided Access”
Allows adults to
lock children in apps and
set time limits
Guided Access
© Cyber Education Consulting 2012-2014
Step 4: Select “Passcode Settings”
Step 3: Turn on
“Guided Access”
Guided Access
© Cyber Education Consulting 2012-2014
Step 5: Set a password
then turn on “Touch ID”
Step 6: Select app you want child
lock into
Guided Access
© Cyber Education Consulting 2012-2014
Step 7: Select “Home” button 3 times(above options should appear)
Step 8: You can set what
buttons they can use and set time limits
What do you use it for? How does it work? What does it have
access to? Who else can see it/is
on it? What are the privacy
settings? Can you block/mute
someone?
What do I know about the TECH?
Source: http://resources.uknowkids.com/
Resources for ParentsFiltration / Monitoring Software: !Attempts to prohibit your childfrom accessing certain sites. !Older children can get around the filters.
Cell Phone Monitoring Software" Mymobilewatchdog" Cellphone service providers Family Monitoring Software
WEBSITESwww.wiredsafety.org Info about youth cyber safety
www.commonsensemedia.org Reviews of all types of media
www.spectorsoft.com Monitoring software for computers
www.netnanny.com Filtering Software for computers
www.flexispy.com Monitoring software for cell phones
www.cyberbullyhelp.com Info for parents and youth about cyber bullying
www.snopes.com Info on intent rumors, viruses, urban legends
www.spokeo.com “Reverse look up”
www.openDNS.com “router filter”
vizify.com Social media condensor© Cyber Education Consulting 2012-2014
Thank You For Your Time
© Cyber Education Consulting 2012-2014