SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Friendship Baptist Church Protecting Our Families on the Internet“Be sober, be vigilant; because your adversary the devil, as a roaring lion, walketh about, seeking whom he may devour:”—(1 Peter 5:8)
Agenda Introduction Family Internet Covenant 10 Clues To Detect Broken Family Rules Law Enforcement Resources Parental Control Tools Home Network Security Cell Phone Controls Resources for Parents 2
Introduction Recent Headlines: Former United Nations Weapons Inspector Scott Ritter National Center for Missing & Exploited Children (NCMEC) Congress authorized CyberTipline, launched March 1998, operated in partnership with: Federal Bureau of Investigation (FBI) Department of Homeland Security’s Immigration and Customs Enforcement (ICE) U.S. Postal Inspection Service (USPIS) Internet Crimes Against Children Task Forces (ICACs) U.S. Secret Service (USSS) U.S. Department of Justice’s Child Exploitation and Obscenity Section (CEOS) Other international, state, and local law enforcement 3
CyberTipline Statistics As of October 2009: 4
Studies Show… 90% of kids between 8-16 have accidentally stumbled onto a pornographic website, usually while doing their homework 79% of unwanted pornography exposure occurs at home 64% of teens say they do things online that they don't want their parents to know about 5
What is Cyberbullying? The National Crime Prevention Council defines cyber-bullying as: “when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person” StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: “a situation when a child, tween or teen is repeatedly ‘tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted’ by another child or teenager using text messaging, email, instant messaging or any other type of digital technology.” 6
Cyber-bullying Statistics 2004 I-Safe.org survey of 1,500 students between grades 4-8 reported: 42% of kids were bullied while online. 1 in 4 had it happen more than once  35% of kids were threatened online. 1 in 5 repeatedly  21% of kids have received mean or threatening e-mails or other messages.  58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say it has happened more than once.  58% have not told their parents or an adult about something mean or hurtful that happened to them online.  A 2006 survey by Harris Interactive reported: 43% of U.S. teens experienced some form of cyberbullying in the past year.  Similarly, a Canadian study found: 23% of middle-schoolers surveyed had been bullied by e-mail  35% in chat rooms  41% by text messages on their cell phones  41% did not know the identity of the perpetrators.  7
Case Study: Megan Meier Missouri 13-year old Megan Meier committed suicide at home in October 2006 after receiving cruel messages, including one stating the world would be better off without her She thought she was chatting with a 16-year-old boy named Josh Evans. Josh didn't exist. A federal grand jury indicted Lori Drew, a 47-year old woman, on four counts of violating the Computer Fraud and Abuse Act for her alleged role in perpetrating a hoax on MySpace The jury found Drew guilty of one count to a reduced misdemeanor charge. A federal judge overturned the jury’s conviction and acquitted her on his technical interpretation of the law Drew lived four houses away from Megan and started talking to her via the Internet to find out what Megan was saying about her daughter, who was a former friend 8
A Very Disturbing Trend… The National Campaign to Prevent Teen and Unplanned Pregnancy surveyed 653 teens and 627 young adults—between September 25, 2008 and October 3, 2008 20% of teens and 33% of young adults send/post unclothed or scantily clad pictures/videos of themselves, mostly girls sending to boys 39% of teens and 59% of young adults send or post sexually suggestive messages Most teens and young adults send suggestive content to boyfriends/girlfriends, others are sending to those they want to hook up with or only know online A 2009 UK survey of 2,094 teens (11–18) found 38% received obscene or disturbing sexual images via text or email Practice of sending via cell phone is called “Sexting” a portmanteau of “sex” and “texting” 9
Legal Consequences… In many countries and states, teens are charged as child pornographers or sex offenders: Australia (2007): 32 teenagers prosecuted for sexting Greensburg, Pennsylvania (January 2009): six teenagers charged with child pornography; 3 girls who sent the photos charged as accomplices in producing child pornography Indiana’s two options: 1.) do nothing; 2.) charge child with felony and require the minor to register as a sex offender for 10 years; conviction follows them for the rest of their lives. Fort Wayne, Indiana: teenage boy indicted on felony obscenity charges after sending pictures of himself to girls in his class Two Ohio teenagers charged with contributing to the delinquency of minors after sending photos to other teenagers Orlando, Fla: Phillip Alpert, 18, convicted as a sex offender after sending photos of his 16-year old girlfriend to dozens of her friends and family after an argument. They dated for 2 ½ years 10
The Ultimate Consequence Jessie Logan, a Cincinnati 18-year old committed suicide after pictures she sexted to her boyfriend were maliciously forwarded to hundreds of students in her high school after their break-up. In an interview by WLTW a local Cincinnati news station, Cynthia Logan, Jessie’s mom said this about her daughter’s last words in a phone call, “And she said ‘I love you madre.’ And I said ‘I love you baby and I’ll see you soon.’” 11
Think it can’t happen to Christians? Don’t think for one second it can’t happen in a Christian home, school or youth group Pastor and former missionary Schools banning cell phone use/possession February 2010 Study: 1 in 4 millennials have no religion, of those who do 1 in 3 claim a strong faith (Pew Forum on Religion & Public) Parents reach their kids when they: Teach and model truth Build relationships Are authentic Ask for forgiveness when they're wrong “Rules without relationship lead to rebellion.”—Josh McDowell 12
Dads… Today’s youth readily exchange their privacy for social acceptance. (facebook, MySpace, etc.) The responsibility is on us as… Protectors Providers Nurturers Correctors Spiritual leaders in the home “But if any provide not for his own, and specially for those of his own house, he hath denied the faith, and is worse than an infidel.”—(1 Timothy 5:8) 13
Today’s Home Network  14
Family Internet Covenant Sets ground rules in your home to govern the use of the internet Pray about it with your children Fosters an open dialog Strengthens your relationship with your kids Matures your kids sense of responsibility and gains their buy-in Demonstrates your love for them because you want to guard their hearts 15
Start with “The Game Plan” Start with “The Game Plan” document from www.internetsafety.com Collaborate with you kids and modify it to address your particular needs May want to include curfews and penalties Parents and children sign it when complete Post it in a prominent area as a continual reminder of the covenant Remember, this is a “Family” covenant. Parents need to comply as well  16
Suggested Rules 1-5 We will never give out personal information such as our last name, address or phone number. We will not give out the name of our school, our city, our siblings, our sports team or our parent’s workplace.  We all agree to not give our passwords to anyone outside of our family. I will not change the settings for my computer or my password without my parent’s permission.  We all agree to limit our online time so that it doesn’t interfere with other activities.  I will never meet an online friend in person. If anyone ever asks to meet with me off line, I will notify my parents immediately.  I will tell my mom or dad right away if I come across something that makes me feel uncomfortable. 17
Suggested Rules 6-10 I will not remain on or click on a page that says, “For Over 18 Years Only.”  I will only download pictures and files with my parent’s permission.  I will not send pictures of my family or myself to anyone online without my parent’s permission.  I will be safe everywhere and will follow the same Internet safety rules at my friends’ houses, at school and at the library that I do while I’m at home.  I understand that nothing is private on the Internet. I agree that my mom or dad can read my mail or check the sites that I have been visiting—because they want to make sure that I am safe. 18
10 Clues To Detect Broken Rules (1) You or your child receives unusual amounts of unsolicited email or pop-ups.  Your child tries to block the computer screen or quickly closes the window in which he is typing.  Your child spends an unusual amount of time online, especially in the evenings.  Your child changes her password and/or will not share it with you.  Your child uses an online account other than her own.  19
10 Clues To Detect Broken Rules (2) Your child withdraws from family or friends.  You discover photos of strangers on your child’s computer.  Your child receives phone calls from strangers.  Your child receives mail, gifts, or packages from someone you don’t know.  You discover inappropriate images or files on your child’s computer 20
Parental Control Tools What are “Parental Controls”? Tools that allow parents to choose appropriate content for their children. Parental control software has been developed for everything from TV to the internet and cell phones. (Remember the V-chip?) PCMag.com ran an informative article called “Child-Proof Your Computer.” Top three “big-kid” parental control systems: NetNanny 6.0 OnlineFamily.Norton Safe Eyes 5.0 21
Safe Eyes (www.internetsafety.com) 22
Endorsed by Dave Ramsey 23
Listen to what Dave has to say… 24 The Dave Ramsey video can be found here: http://www.internetsafety.com/tell-a-friend.php
What Safe Eyes Does Content controls: Select the types of website that are appropriate Blocks unwanted email Program controls: Control Instant Messengers, File Sharing, and other harmful programs Time controls: Control the amount of time spent online, and the times when the internet is available. Usage logging: Create and review logs of websites visited, programs used on the Internet, and Instant Messaging Chats Usage alerts—Be notified instantly via email, text message, or phone call when someone visits inappropriate websites 25
More Features Works with PC or Mac iPod version also available Cost: $49.95/yr – install on up to three machines 26
Alerts 27
Activity with Banned Hits 28
Activity with Banned Hits 29
Activity with No Banned Hits 30
Program Activity 31
Website Posts 32
Home Network Security If you have a home network, you can create security policies to restrict internet access or impose time limits Computers are restricted by IP or MAC address Performing a firmware upgrade may erase security policies Read your manual or visit your vendor’s website for instructions 33
Cell Phone Controls All major wireless carriers offer parental controls for their children’s phones Phone must be compatible Additional charges may apply 34
Resources for Parents CyberTipline: www.cybertipline.com or 1-800-843-5678  NCMEC: www.missingkids.com National Campaign Survey: http://www.thenationalcampaign.org/sextech/PDF/SexTech_Summary.pdf Safe Eyes: www.internetsafety.com NetNanny: www.netnanny.com OnlineFamily.Norton: http://onlinefamily.norton.com 35
What If It’s Not My Kid? What would you do if you find out that one of your kid’s friends makes a post that doesn’t live up to your family’s standards? Avoid immediate knee jerk reactions Nothing we do can prevent immature attempts at humor, bad judgment or completely innocent mistakes Turn it into an opportunity to disciple your weaker brother/sister “Brethren, if a man be overtaken in a fault, ye which are spiritual, restore such an one in the spirit of meekness; considering thyself, lest thou also be tempted.” (Galatians 6:1, KJV) If all else fails, and the behavior becomes pervasive, talk to the other parents and follow Mathew 18 36

Weitere ähnliche Inhalte

Was ist angesagt?

Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson Martinez
 
The map is not the territory (part1)
The map is not the territory (part1)The map is not the territory (part1)
The map is not the territory (part1)Derek Moore
 
The Wakefield Monster
The Wakefield MonsterThe Wakefield Monster
The Wakefield MonsterJango11
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
Cyberbullying powerpoint shawn lemus
Cyberbullying powerpoint shawn lemusCyberbullying powerpoint shawn lemus
Cyberbullying powerpoint shawn lemusshawnlemus
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011daniel_eukids
 
New Amber Network Pp Eddy
New Amber Network Pp EddyNew Amber Network Pp Eddy
New Amber Network Pp Eddyedwardmurphy
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyinglheikkila
 
A internet e as crianças
A internet e as criançasA internet e as crianças
A internet e as criançasAlex Ciqueira
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
 
Is censorship a good or bad idea?
Is censorship a good or bad idea?Is censorship a good or bad idea?
Is censorship a good or bad idea?cloestead
 
Foster teens turning 18 face tough road
Foster teens turning 18 face tough roadFoster teens turning 18 face tough road
Foster teens turning 18 face tough roadsuzi smith
 
Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Gennia Holder
 
Keeping Kids Safe Online
Keeping Kids Safe OnlineKeeping Kids Safe Online
Keeping Kids Safe OnlineNatalie Andrews
 

Was ist angesagt? (19)

Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
The map is not the territory (part1)
The map is not the territory (part1)The map is not the territory (part1)
The map is not the territory (part1)
 
The Wakefield Monster
The Wakefield MonsterThe Wakefield Monster
The Wakefield Monster
 
Presentation1
Presentation1Presentation1
Presentation1
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
Cyberbullying powerpoint shawn lemus
Cyberbullying powerpoint shawn lemusCyberbullying powerpoint shawn lemus
Cyberbullying powerpoint shawn lemus
 
Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011Eu kids online II key findings 11 april 2011
Eu kids online II key findings 11 april 2011
 
New Amber Network Pp Eddy
New Amber Network Pp EddyNew Amber Network Pp Eddy
New Amber Network Pp Eddy
 
Sexting
SextingSexting
Sexting
 
FBI Cybercrime Presentation
FBI Cybercrime PresentationFBI Cybercrime Presentation
FBI Cybercrime Presentation
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
A internet e as crianças
A internet e as criançasA internet e as crianças
A internet e as crianças
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Sexting?What would your Grandma Think?
Sexting?What would your Grandma Think?Sexting?What would your Grandma Think?
Sexting?What would your Grandma Think?
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Is censorship a good or bad idea?
Is censorship a good or bad idea?Is censorship a good or bad idea?
Is censorship a good or bad idea?
 
Foster teens turning 18 face tough road
Foster teens turning 18 face tough roadFoster teens turning 18 face tough road
Foster teens turning 18 face tough road
 
Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence
 
Keeping Kids Safe Online
Keeping Kids Safe OnlineKeeping Kids Safe Online
Keeping Kids Safe Online
 

Andere mochten auch

Getting Started with Blogging
Getting Started with BloggingGetting Started with Blogging
Getting Started with BloggingVictor Font
 
IT Business Value
IT Business ValueIT Business Value
IT Business ValueVictor Font
 
The journey to authentic leadership (aitp)
The journey to authentic leadership (aitp)The journey to authentic leadership (aitp)
The journey to authentic leadership (aitp)Victor Font
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 

Andere mochten auch (6)

Getting Started with Blogging
Getting Started with BloggingGetting Started with Blogging
Getting Started with Blogging
 
IT Business Value
IT Business ValueIT Business Value
IT Business Value
 
The journey to authentic leadership (aitp)
The journey to authentic leadership (aitp)The journey to authentic leadership (aitp)
The journey to authentic leadership (aitp)
 
Blogging ppt
Blogging pptBlogging ppt
Blogging ppt
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Ähnlich wie Protecting our families on the internet

Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineMichael Heron
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting NewRandy Rodgers
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramDaniel Hanttula
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
ArticleConnected To Nowhere
ArticleConnected To NowhereArticleConnected To Nowhere
ArticleConnected To Nowheremcneeteach
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online PedophilesJustine
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient informationsmithmpa
 

Ähnlich wie Protecting our families on the internet (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting New
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
 
102010a
102010a102010a
102010a
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
ArticleConnected To Nowhere
ArticleConnected To NowhereArticleConnected To Nowhere
ArticleConnected To Nowhere
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient information
 

Kürzlich hochgeladen

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 

Kürzlich hochgeladen (20)

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 

Protecting our families on the internet

  • 1. Friendship Baptist Church Protecting Our Families on the Internet“Be sober, be vigilant; because your adversary the devil, as a roaring lion, walketh about, seeking whom he may devour:”—(1 Peter 5:8)
  • 2. Agenda Introduction Family Internet Covenant 10 Clues To Detect Broken Family Rules Law Enforcement Resources Parental Control Tools Home Network Security Cell Phone Controls Resources for Parents 2
  • 3. Introduction Recent Headlines: Former United Nations Weapons Inspector Scott Ritter National Center for Missing & Exploited Children (NCMEC) Congress authorized CyberTipline, launched March 1998, operated in partnership with: Federal Bureau of Investigation (FBI) Department of Homeland Security’s Immigration and Customs Enforcement (ICE) U.S. Postal Inspection Service (USPIS) Internet Crimes Against Children Task Forces (ICACs) U.S. Secret Service (USSS) U.S. Department of Justice’s Child Exploitation and Obscenity Section (CEOS) Other international, state, and local law enforcement 3
  • 4. CyberTipline Statistics As of October 2009: 4
  • 5. Studies Show… 90% of kids between 8-16 have accidentally stumbled onto a pornographic website, usually while doing their homework 79% of unwanted pornography exposure occurs at home 64% of teens say they do things online that they don't want their parents to know about 5
  • 6. What is Cyberbullying? The National Crime Prevention Council defines cyber-bullying as: “when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person” StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: “a situation when a child, tween or teen is repeatedly ‘tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted’ by another child or teenager using text messaging, email, instant messaging or any other type of digital technology.” 6
  • 7. Cyber-bullying Statistics 2004 I-Safe.org survey of 1,500 students between grades 4-8 reported: 42% of kids were bullied while online. 1 in 4 had it happen more than once 35% of kids were threatened online. 1 in 5 repeatedly 21% of kids have received mean or threatening e-mails or other messages. 58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say it has happened more than once. 58% have not told their parents or an adult about something mean or hurtful that happened to them online. A 2006 survey by Harris Interactive reported: 43% of U.S. teens experienced some form of cyberbullying in the past year. Similarly, a Canadian study found: 23% of middle-schoolers surveyed had been bullied by e-mail 35% in chat rooms 41% by text messages on their cell phones 41% did not know the identity of the perpetrators. 7
  • 8. Case Study: Megan Meier Missouri 13-year old Megan Meier committed suicide at home in October 2006 after receiving cruel messages, including one stating the world would be better off without her She thought she was chatting with a 16-year-old boy named Josh Evans. Josh didn't exist. A federal grand jury indicted Lori Drew, a 47-year old woman, on four counts of violating the Computer Fraud and Abuse Act for her alleged role in perpetrating a hoax on MySpace The jury found Drew guilty of one count to a reduced misdemeanor charge. A federal judge overturned the jury’s conviction and acquitted her on his technical interpretation of the law Drew lived four houses away from Megan and started talking to her via the Internet to find out what Megan was saying about her daughter, who was a former friend 8
  • 9. A Very Disturbing Trend… The National Campaign to Prevent Teen and Unplanned Pregnancy surveyed 653 teens and 627 young adults—between September 25, 2008 and October 3, 2008 20% of teens and 33% of young adults send/post unclothed or scantily clad pictures/videos of themselves, mostly girls sending to boys 39% of teens and 59% of young adults send or post sexually suggestive messages Most teens and young adults send suggestive content to boyfriends/girlfriends, others are sending to those they want to hook up with or only know online A 2009 UK survey of 2,094 teens (11–18) found 38% received obscene or disturbing sexual images via text or email Practice of sending via cell phone is called “Sexting” a portmanteau of “sex” and “texting” 9
  • 10. Legal Consequences… In many countries and states, teens are charged as child pornographers or sex offenders: Australia (2007): 32 teenagers prosecuted for sexting Greensburg, Pennsylvania (January 2009): six teenagers charged with child pornography; 3 girls who sent the photos charged as accomplices in producing child pornography Indiana’s two options: 1.) do nothing; 2.) charge child with felony and require the minor to register as a sex offender for 10 years; conviction follows them for the rest of their lives. Fort Wayne, Indiana: teenage boy indicted on felony obscenity charges after sending pictures of himself to girls in his class Two Ohio teenagers charged with contributing to the delinquency of minors after sending photos to other teenagers Orlando, Fla: Phillip Alpert, 18, convicted as a sex offender after sending photos of his 16-year old girlfriend to dozens of her friends and family after an argument. They dated for 2 ½ years 10
  • 11. The Ultimate Consequence Jessie Logan, a Cincinnati 18-year old committed suicide after pictures she sexted to her boyfriend were maliciously forwarded to hundreds of students in her high school after their break-up. In an interview by WLTW a local Cincinnati news station, Cynthia Logan, Jessie’s mom said this about her daughter’s last words in a phone call, “And she said ‘I love you madre.’ And I said ‘I love you baby and I’ll see you soon.’” 11
  • 12. Think it can’t happen to Christians? Don’t think for one second it can’t happen in a Christian home, school or youth group Pastor and former missionary Schools banning cell phone use/possession February 2010 Study: 1 in 4 millennials have no religion, of those who do 1 in 3 claim a strong faith (Pew Forum on Religion & Public) Parents reach their kids when they: Teach and model truth Build relationships Are authentic Ask for forgiveness when they're wrong “Rules without relationship lead to rebellion.”—Josh McDowell 12
  • 13. Dads… Today’s youth readily exchange their privacy for social acceptance. (facebook, MySpace, etc.) The responsibility is on us as… Protectors Providers Nurturers Correctors Spiritual leaders in the home “But if any provide not for his own, and specially for those of his own house, he hath denied the faith, and is worse than an infidel.”—(1 Timothy 5:8) 13
  • 15. Family Internet Covenant Sets ground rules in your home to govern the use of the internet Pray about it with your children Fosters an open dialog Strengthens your relationship with your kids Matures your kids sense of responsibility and gains their buy-in Demonstrates your love for them because you want to guard their hearts 15
  • 16. Start with “The Game Plan” Start with “The Game Plan” document from www.internetsafety.com Collaborate with you kids and modify it to address your particular needs May want to include curfews and penalties Parents and children sign it when complete Post it in a prominent area as a continual reminder of the covenant Remember, this is a “Family” covenant. Parents need to comply as well 16
  • 17. Suggested Rules 1-5 We will never give out personal information such as our last name, address or phone number. We will not give out the name of our school, our city, our siblings, our sports team or our parent’s workplace. We all agree to not give our passwords to anyone outside of our family. I will not change the settings for my computer or my password without my parent’s permission. We all agree to limit our online time so that it doesn’t interfere with other activities. I will never meet an online friend in person. If anyone ever asks to meet with me off line, I will notify my parents immediately. I will tell my mom or dad right away if I come across something that makes me feel uncomfortable. 17
  • 18. Suggested Rules 6-10 I will not remain on or click on a page that says, “For Over 18 Years Only.” I will only download pictures and files with my parent’s permission. I will not send pictures of my family or myself to anyone online without my parent’s permission. I will be safe everywhere and will follow the same Internet safety rules at my friends’ houses, at school and at the library that I do while I’m at home. I understand that nothing is private on the Internet. I agree that my mom or dad can read my mail or check the sites that I have been visiting—because they want to make sure that I am safe. 18
  • 19. 10 Clues To Detect Broken Rules (1) You or your child receives unusual amounts of unsolicited email or pop-ups. Your child tries to block the computer screen or quickly closes the window in which he is typing. Your child spends an unusual amount of time online, especially in the evenings. Your child changes her password and/or will not share it with you. Your child uses an online account other than her own. 19
  • 20. 10 Clues To Detect Broken Rules (2) Your child withdraws from family or friends. You discover photos of strangers on your child’s computer. Your child receives phone calls from strangers. Your child receives mail, gifts, or packages from someone you don’t know. You discover inappropriate images or files on your child’s computer 20
  • 21. Parental Control Tools What are “Parental Controls”? Tools that allow parents to choose appropriate content for their children. Parental control software has been developed for everything from TV to the internet and cell phones. (Remember the V-chip?) PCMag.com ran an informative article called “Child-Proof Your Computer.” Top three “big-kid” parental control systems: NetNanny 6.0 OnlineFamily.Norton Safe Eyes 5.0 21
  • 23. Endorsed by Dave Ramsey 23
  • 24. Listen to what Dave has to say… 24 The Dave Ramsey video can be found here: http://www.internetsafety.com/tell-a-friend.php
  • 25. What Safe Eyes Does Content controls: Select the types of website that are appropriate Blocks unwanted email Program controls: Control Instant Messengers, File Sharing, and other harmful programs Time controls: Control the amount of time spent online, and the times when the internet is available. Usage logging: Create and review logs of websites visited, programs used on the Internet, and Instant Messaging Chats Usage alerts—Be notified instantly via email, text message, or phone call when someone visits inappropriate websites 25
  • 26. More Features Works with PC or Mac iPod version also available Cost: $49.95/yr – install on up to three machines 26
  • 30. Activity with No Banned Hits 30
  • 33. Home Network Security If you have a home network, you can create security policies to restrict internet access or impose time limits Computers are restricted by IP or MAC address Performing a firmware upgrade may erase security policies Read your manual or visit your vendor’s website for instructions 33
  • 34. Cell Phone Controls All major wireless carriers offer parental controls for their children’s phones Phone must be compatible Additional charges may apply 34
  • 35. Resources for Parents CyberTipline: www.cybertipline.com or 1-800-843-5678 NCMEC: www.missingkids.com National Campaign Survey: http://www.thenationalcampaign.org/sextech/PDF/SexTech_Summary.pdf Safe Eyes: www.internetsafety.com NetNanny: www.netnanny.com OnlineFamily.Norton: http://onlinefamily.norton.com 35
  • 36. What If It’s Not My Kid? What would you do if you find out that one of your kid’s friends makes a post that doesn’t live up to your family’s standards? Avoid immediate knee jerk reactions Nothing we do can prevent immature attempts at humor, bad judgment or completely innocent mistakes Turn it into an opportunity to disciple your weaker brother/sister “Brethren, if a man be overtaken in a fault, ye which are spiritual, restore such an one in the spirit of meekness; considering thyself, lest thou also be tempted.” (Galatians 6:1, KJV) If all else fails, and the behavior becomes pervasive, talk to the other parents and follow Mathew 18 36

Hinweis der Redaktion

  1. “Be sober, be vigilant; because your adversary the devil, as a roaring lion, walketh about, seeking whom he may devour:”—(1 Peter 5:8)Scott Ritter was arrested in November 2009 over communications with a police decoy he met on an Internet chat site. Police claim that he showed himself in lewd behaviors via a web camera after the officer said she was a 15-year-old girl. Charges included "unlawful contact with a minor, criminal use of a communications facility, corruption of minors, indecent exposure, possessing instruments of crime, criminal attempt and criminal solicitation." Ritter faces up to seven years in prison.Not the first time he was arrested. Ritter was arrested in April 2001and again in June 2001 in connection with police stings in which officers posed as under-aged girls to arrange meetings of a sexual nature. The first incident did not lead to any charges. He was charged with a misdemeanor crime of "attempted endangerment of the welfare of a child" after the second, but charges were dropped and the record was sealed on condition that he avoid further trouble for a period of time.Shortly after Ritter’s news, I was waiting for Sue and Tori after a Sunday evening service. While waiting, I chatted with the mom of one of the teens in the youth group. I’m not sure how we got onto the subject, but she expressed her frustration over not knowing enough about technology to adequately protect her children on the internet.Over the next few days, I couldn’t stop thinking about her comments and went to prayer asking God what could I do about it. God has blessed me with a 25-year career in information technology. At least one of the hats I’ve worn over during my career is that of an information security officer for one of Pfizer’s divisions. The heads of the corporate information security council were retired FBI agents. I learned a lot at Pfizer about protecting people’s safety from electronic threats and have applied some of the principles I’ve learned in our own home. As I continued in prayer, the idea for this class came through loud and clear. I sent Pastors Vradenburgh and D’Angelo an email explaining what was on my heart and what I could do to address the problem of internet safety. I heard back from Pastor V. within an hour with his blessing to move forward. That was just a little over a month ago. I never expected Pastor to schedule this so quickly, but I think it punctuates how important he believes this topic is. I want to share my heart for a moment (timing, upcoming revival, Aiken prayers)
  2. Susan Herring, Professor of Information Science, Adjunct Professor of Linguistics, School of Library and Information Science, Indiana University, Computer Mediated Discourse