SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
The Risks

Parents’
Guideto
Smart
phone
Safet y
Smartorscary?
Smartphones are essentially little computers,
so you might be a little worried when handing
one over to your child. Take some time to
understand the risks and implement a few
safeguards so that you can help your child
use smartphones safely.

5ways to be smarter
than the Smartphone!

▪▪ Cyberbullying
	 With the constant connectivity of
smartphones, your child may be more
susceptible to cyberbullying or have more
opportunities to cyberbully others.

1.	Be a parent and a resource.
Establish clear guidelines, including time
limits and consequences for inappropriate
behavior, but be open so your child will
come to you with any problems.

▪▪ Geolocation
	 A GPS-enabled smartphone can reveal
your child’s location through online posts
and uploaded photos.

2.	Set up password protection.
This will keep everyone but you and your
child from accessing personal information
stored on the phone.

▪▪ Inappropriate Content
	 With smartphones, your child has mobile
access to content you may consider inappropriate,
such as pornography or violent videos.

3.	Update the operating system.
New versions often contain important
security fixes.

▪▪ Sexting
	 Your child may use the Internet and
social apps to send, receive, or forward
revealing photos.
▪▪ Viruses & Malware
	 Just like a computer, a smartphone is
vulnerable to security attacks if your child
accesses unsecured websites and apps.

About 1 in 4 teens report
owning a smartphone.
Lenhart, Amanda.
Teens, Smartphones & Texting.
Pew Internet & American Life Project,
March 19, 2012.

4.	Approve apps before they are downloaded.
Make sure you understand their capabilities
and approve their content.
5.	Understand location services.
GPS features are useful when using maps,
but you’ll want to disable location-tagging
when your child posts anything online.

For more resources visit NetSmartz.org/TipSheets
Copyright © 2012 National Center for Missing & Exploited Children. All rights reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspaceJanealW
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saulSaul Vidal Swales
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2guest0e1ade
 
Safe Internet Usage
Safe Internet UsageSafe Internet Usage
Safe Internet Usageaazim javed
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 
C Senior Presentation: The Internet
C Senior Presentation: The Internet C Senior Presentation: The Internet
C Senior Presentation: The Internet Lingua Net
 
Renfrow Internet Safety
Renfrow Internet SafetyRenfrow Internet Safety
Renfrow Internet Safetymrenfrow
 
10 rules to be safe on internet
10 rules to be safe on internet10 rules to be safe on internet
10 rules to be safe on internetConstanza Godoy
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETcpsoncanals
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying Saskia1234
 
How to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingHow to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingDanae Rosville
 

Was ist angesagt? (18)

Internet safety
Internet safetyInternet safety
Internet safety
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspace
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Safe Internet Usage
Safe Internet UsageSafe Internet Usage
Safe Internet Usage
 
My protection plan
My protection planMy protection plan
My protection plan
 
Security tips
Security tips Security tips
Security tips
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
C Senior Presentation: The Internet
C Senior Presentation: The Internet C Senior Presentation: The Internet
C Senior Presentation: The Internet
 
Renfrow Internet Safety
Renfrow Internet SafetyRenfrow Internet Safety
Renfrow Internet Safety
 
10 rules to be safe on internet
10 rules to be safe on internet10 rules to be safe on internet
10 rules to be safe on internet
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
How to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingHow to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When Travelling
 

Andere mochten auch

Challenges, Opportunities and Risks for a Smart Future
Challenges, Opportunities and Risks for a Smart FutureChallenges, Opportunities and Risks for a Smart Future
Challenges, Opportunities and Risks for a Smart FutureMLOVE ConFestival
 
Allianz Risk Barometer: Business Risks 2016
Allianz Risk Barometer: Business Risks 2016Allianz Risk Barometer: Business Risks 2016
Allianz Risk Barometer: Business Risks 2016Jaime Cubillo Fleming
 
Enabling IP Mobility with Identifier-Locator Network Protocol (ILNP)-PGTips
Enabling IP Mobility with Identifier-Locator Network Protocol (ILNP)-PGTipsEnabling IP Mobility with Identifier-Locator Network Protocol (ILNP)-PGTips
Enabling IP Mobility with Identifier-Locator Network Protocol (ILNP)-PGTipsDitchaphong Phoomikiattisak, PhD
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Ram Dutt Shukla
 
4th Generation IP for Mobility, Video and Cloud
4th Generation IP for Mobility, Video and Cloud4th Generation IP for Mobility, Video and Cloud
4th Generation IP for Mobility, Video and CloudEricsson Slides
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risksGavan Howe
 
Social Media in 2016: key stats and trends
Social Media in 2016: key stats and trendsSocial Media in 2016: key stats and trends
Social Media in 2016: key stats and trendsDamian Radcliffe
 
Q2 | 2016 Social Media Trends Report
Q2 | 2016 Social Media Trends ReportQ2 | 2016 Social Media Trends Report
Q2 | 2016 Social Media Trends ReportThe Social Lights
 

Andere mochten auch (13)

Out-Smarted!
Out-Smarted!Out-Smarted!
Out-Smarted!
 
Challenges, Opportunities and Risks for a Smart Future
Challenges, Opportunities and Risks for a Smart FutureChallenges, Opportunities and Risks for a Smart Future
Challenges, Opportunities and Risks for a Smart Future
 
Allianz Risk Barometer: Business Risks 2016
Allianz Risk Barometer: Business Risks 2016Allianz Risk Barometer: Business Risks 2016
Allianz Risk Barometer: Business Risks 2016
 
Enabling IP Mobility with Identifier-Locator Network Protocol (ILNP)-PGTips
Enabling IP Mobility with Identifier-Locator Network Protocol (ILNP)-PGTipsEnabling IP Mobility with Identifier-Locator Network Protocol (ILNP)-PGTips
Enabling IP Mobility with Identifier-Locator Network Protocol (ILNP)-PGTips
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
 
4th Generation IP for Mobility, Video and Cloud
4th Generation IP for Mobility, Video and Cloud4th Generation IP for Mobility, Video and Cloud
4th Generation IP for Mobility, Video and Cloud
 
Smart phone and mobile phone risks
Smart phone and mobile phone risksSmart phone and mobile phone risks
Smart phone and mobile phone risks
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
 
Mobility management
Mobility managementMobility management
Mobility management
 
Social Media in 2016: key stats and trends
Social Media in 2016: key stats and trendsSocial Media in 2016: key stats and trends
Social Media in 2016: key stats and trends
 
Smart City Framework
Smart City FrameworkSmart City Framework
Smart City Framework
 
Q2 | 2016 Social Media Trends Report
Q2 | 2016 Social Media Trends ReportQ2 | 2016 Social Media Trends Report
Q2 | 2016 Social Media Trends Report
 
2016 Digital Yearbook
2016 Digital Yearbook2016 Digital Yearbook
2016 Digital Yearbook
 

Ähnlich wie Parents Guide to Smartphone Safety

Why do parents need apps to control their kids.pdf
Why do parents need apps to control their kids.pdfWhy do parents need apps to control their kids.pdf
Why do parents need apps to control their kids.pdfonemonitarsoftware
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital ParentYour eKavach
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014- Mark - Fullbright
 
Rwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptxRwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptxBinyamMeles
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatRaudhat-Rahma Shittu-Agbetola
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Iphone and ipad kids safety
Iphone and ipad kids safetyIphone and ipad kids safety
Iphone and ipad kids safetyUDIA ORG.
 
Internet security for parents
Internet security for parentsInternet security for parents
Internet security for parentsShannon Blackerby
 
Internet safety open house 2011
Internet safety open house 2011Internet safety open house 2011
Internet safety open house 2011Houston ISD
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxajav252888
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from VodaphoneKatherine Lyddon
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsMike Hasley
 

Ähnlich wie Parents Guide to Smartphone Safety (20)

Smartphone Safety - tips for parents
Smartphone Safety - tips for parentsSmartphone Safety - tips for parents
Smartphone Safety - tips for parents
 
Why do parents need apps to control their kids.pdf
Why do parents need apps to control their kids.pdfWhy do parents need apps to control their kids.pdf
Why do parents need apps to control their kids.pdf
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Rwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptxRwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptx
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Cyber saftey for parents
Cyber saftey for parentsCyber saftey for parents
Cyber saftey for parents
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Iphone and ipad kids safety
Iphone and ipad kids safetyIphone and ipad kids safety
Iphone and ipad kids safety
 
You Sure That's Secure?
You Sure That's Secure?You Sure That's Secure?
You Sure That's Secure?
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
Internet security for parents
Internet security for parentsInternet security for parents
Internet security for parents
 
Internet safety open house 2011
Internet safety open house 2011Internet safety open house 2011
Internet safety open house 2011
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from Vodaphone
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 

Mehr von - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Kürzlich hochgeladen

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Kürzlich hochgeladen (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Parents Guide to Smartphone Safety

  • 1. The Risks Parents’ Guideto Smart phone Safet y Smartorscary? Smartphones are essentially little computers, so you might be a little worried when handing one over to your child. Take some time to understand the risks and implement a few safeguards so that you can help your child use smartphones safely. 5ways to be smarter than the Smartphone! ▪▪ Cyberbullying With the constant connectivity of smartphones, your child may be more susceptible to cyberbullying or have more opportunities to cyberbully others. 1. Be a parent and a resource. Establish clear guidelines, including time limits and consequences for inappropriate behavior, but be open so your child will come to you with any problems. ▪▪ Geolocation A GPS-enabled smartphone can reveal your child’s location through online posts and uploaded photos. 2. Set up password protection. This will keep everyone but you and your child from accessing personal information stored on the phone. ▪▪ Inappropriate Content With smartphones, your child has mobile access to content you may consider inappropriate, such as pornography or violent videos. 3. Update the operating system. New versions often contain important security fixes. ▪▪ Sexting Your child may use the Internet and social apps to send, receive, or forward revealing photos. ▪▪ Viruses & Malware Just like a computer, a smartphone is vulnerable to security attacks if your child accesses unsecured websites and apps. About 1 in 4 teens report owning a smartphone. Lenhart, Amanda. Teens, Smartphones & Texting. Pew Internet & American Life Project, March 19, 2012. 4. Approve apps before they are downloaded. Make sure you understand their capabilities and approve their content. 5. Understand location services. GPS features are useful when using maps, but you’ll want to disable location-tagging when your child posts anything online. For more resources visit NetSmartz.org/TipSheets Copyright © 2012 National Center for Missing & Exploited Children. All rights reserved.