SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Protecting Young Children Online

Speaker Name
Speaker Organization
Teach kids
Internet safety.
It’s like teaching
them to swim.
What are the risks?
Kids may:

Reveal personal information
Encounter inappropriate material
Download malicious software
Others may expose kids’ information
Internet safety
for young kids:

1. Pay attention to kids’ activities online
2. Set clear rules

3. Put technology to work

3 steps
Step 1
Pay attention to
kids’ activities
online
Pay attention to
kids’ activities online
Join the fun

Evaluate websites and devices beforehand
Locate consoles and computers centrally
Watch for changes in behavior
Step 2
Set clear rules
Set clear rules
Keep personal information private

Respect others
Use computers safely
Set clear rules:

Keep personal info private
Ask before sharing personal info

Choose safe online names and addresses
Create strong passwords
Keep passwords secret
Set clear rules:

Respect others
Be kind
Be honest
Set clear rules:

Use the computer safely
Be cautious

Think, then click
Be choosy about new friends
Say NO to secret friendships
Step 3
Put technology
to work
Put technology to work
Use family safety tools

Protect children on mobile phones
Boost computer defenses
Be the administrator of home computers
What to do
if there is
a problem
What to do if there is a problem
Teach kids to trust their instincts

Don’t curtail privileges
Always report physical
threats and cyberbullying
Pay attention to
kids’ activities

online
Set clear rules
Put technology
to work
More helpful info
Learn how

Get the latest: microsoft.com/security
Comments? Questions?
Your gateway to the latest information from Microsoft about how to help defend your computer,
safeguard your information, and protect your family: microsoft.com/security.
© 2012. Microsoft Corporation. All rights reserved.
This material is provided for informational purposes only.
Microsoft makes no warranties, express or implied.

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
How to use internet safely
How to use internet safelyHow to use internet safely
How to use internet safelyBijoKG2
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipMsCCostello
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1HamadRabban
 
Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymousccastronovo
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEAlminaVelasco
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital CitizenshipGab Billones
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
Current Issues in Social Networking Presentation
Current Issues in Social Networking PresentationCurrent Issues in Social Networking Presentation
Current Issues in Social Networking PresentationDonna Spear
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 

Was ist angesagt? (20)

Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
How to use internet safely
How to use internet safelyHow to use internet safely
How to use internet safely
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1
 
Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymous
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital Citizenship
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Current Issues in Social Networking Presentation
Current Issues in Social Networking PresentationCurrent Issues in Social Networking Presentation
Current Issues in Social Networking Presentation
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 

Ähnlich wie Protecting young-children-online-power point-presentation-security

Changing World, Changing Demands
Changing World, Changing DemandsChanging World, Changing Demands
Changing World, Changing Demandskjellwr4
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Onlinedgieseler1
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationISTE
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
eSafety Presentation
eSafety PresentationeSafety Presentation
eSafety PresentationMr_Elliott
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habitssharoncindrich
 
Online safety
Online safetyOnline safety
Online safetyelioar8
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsLeon Letkeman
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Safe Internet Usage
Safe Internet UsageSafe Internet Usage
Safe Internet Usageaazim javed
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 

Ähnlich wie Protecting young-children-online-power point-presentation-security (20)

Changing World, Changing Demands
Changing World, Changing DemandsChanging World, Changing Demands
Changing World, Changing Demands
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
 
eSafety Presentation
eSafety PresentationeSafety Presentation
eSafety Presentation
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
 
Online safety
Online safetyOnline safety
Online safety
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Safe Internet Usage
Safe Internet UsageSafe Internet Usage
Safe Internet Usage
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Mehr von Mohamed ElGabry

Ntra a.anis internet recommendations
Ntra a.anis internet recommendationsNtra a.anis internet recommendations
Ntra a.anis internet recommendationsMohamed ElGabry
 
Internet safety comp moe
Internet safety comp moeInternet safety comp moe
Internet safety comp moeMohamed ElGabry
 
اللجنة الوطنية للاستخدام الآمن للإنترنت للأطفال
اللجنة الوطنية للاستخدام الآمن للإنترنت للأطفالاللجنة الوطنية للاستخدام الآمن للإنترنت للأطفال
اللجنة الوطنية للاستخدام الآمن للإنترنت للأطفالMohamed ElGabry
 
Egypt moe education collaboration april 2014 arabic 2-1
Egypt moe education collaboration april 2014   arabic 2-1Egypt moe education collaboration april 2014   arabic 2-1
Egypt moe education collaboration april 2014 arabic 2-1Mohamed ElGabry
 
Protecting young-children-online arabic
Protecting young-children-online arabicProtecting young-children-online arabic
Protecting young-children-online arabicMohamed ElGabry
 

Mehr von Mohamed ElGabry (13)

Win8
Win8Win8
Win8
 
Ntra a.anis internet recommendations
Ntra a.anis internet recommendationsNtra a.anis internet recommendations
Ntra a.anis internet recommendations
 
Internet safety comp moe
Internet safety comp moeInternet safety comp moe
Internet safety comp moe
 
اللجنة الوطنية للاستخدام الآمن للإنترنت للأطفال
اللجنة الوطنية للاستخدام الآمن للإنترنت للأطفالاللجنة الوطنية للاستخدام الآمن للإنترنت للأطفال
اللجنة الوطنية للاستخدام الآمن للإنترنت للأطفال
 
Egypt moe education collaboration april 2014 arabic 2-1
Egypt moe education collaboration april 2014   arabic 2-1Egypt moe education collaboration april 2014   arabic 2-1
Egypt moe education collaboration april 2014 arabic 2-1
 
Case studies
Case studiesCase studies
Case studies
 
Aup
AupAup
Aup
 
Protecting young-children-online arabic
Protecting young-children-online arabicProtecting young-children-online arabic
Protecting young-children-online arabic
 
Children arabic
Children arabicChildren arabic
Children arabic
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
الهوية
الهويةالهوية
الهوية
 
The pot
The potThe pot
The pot
 
Moe Egypt
Moe EgyptMoe Egypt
Moe Egypt
 

Kürzlich hochgeladen

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Kürzlich hochgeladen (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Protecting young-children-online-power point-presentation-security

Hinweis der Redaktion

  1. Slide 5: Step 1 Pay attention to kids’ activities onlineTALKING POINTSThe first step may be the most familiar to you—paying attention to what kids are doing on the web. [click]
  2. Slide 6: Step 1 Pay attention to kids’ activities onlineTALKING POINTSJoin. Just as you’d start in the pool with the littlest ones, regularly sit with young ones while they play online. Or—even more fun--play with them! Let them show you what they’re doing and who they’re interacting with. [click]Evaluate. Visit the websites your children want to visit and, if you can, test the games they want to play. Evaluate the devices children want to use before they use them—preferably before you even buy them.Experiment to make sure you’re comfortable with their features. Restrict any functionality your child isn’t yet ready for. Some examples of features to explore:GPS on mobile phones—this is the phone’s ability to pinpoint where you are at any given time and mark (or “tag”) the location of photos.Internet access on mobile phones.Computer webcams for use with video calls like Skype.The ability to send unfiltered images or download applications (apps). [click]Locate. Put Internet-connected game consoles and computers—especially those with webcams—in central family spaces, and explain why you’re doing this. Make video calls there, too. This helps you watch over kids more comfortably. [click]Watch. As your little ones begin to navigate the web on their own, keep on the lookout for changes in behavior that may be signs of cyberbullying or other issues—for example, if children show an uncharacteristic reluctance to go online or to go to school, unusual secretiveness, or they seem to be spending too much time online. [click]
  3. Slide 7: Step 2 Set clear rulesTALKING POINTSThe second step is setting clear rules. Every young swimmer learns the rules for safe swimming: Never swim alone. Don’t go in the deep end until you’re ready. Don’t push others into the water. It’s the same for learning to use the Internet.Studies show a positive impact on kids when parents clearly define the rules about computer, game, and mobile phone use. [click]
  4. Slide 8: Step 2 Set clear rulesTALKING POINTSAs children begin to go online, these three rules offer supportive guidance with room to grow. Set the stage by discussing with kids …the kinds of sites that are off limits,what information shouldn’t be shared, andthe boundaries for communicating respectfully.Explain that the rules are to protect, not to control, them.Let’s take a closer look at each rule. [click]
  5. Slide 9: Step 2 Set clear rules: Keep personal info privateTALKING POINTSPersonal info. Explain to kids what “personal information” means and teach them to keep it private. Of course, if you’re a parent, you will be the ultimate judge of how to explain this because it will depend on the age and maturity level of your child.Here are some examples of personal information: passwords, age, phone numbers, full name, school, favorite playground, interests, photos (particularly photos that give away where the child lives or goes to school), home and email addresses, even feelings. Stress the value of personal information to those who may want to exploit it—bullies, predators, and identity thieves. [click]Train kids to ask you before sharing personal information about themselves, friends, or family in texts, email, or on social sites. [click]Safe names. Help kids create email addresses, screen names, and gamer tags that don’t reveal anything personal, aren’t suggestive, and don’t make them easy to locate. For example, avoid names like Bobby12, FoxyFrancesca, or JoeyHealyDubuque. Instead, use names like MyDogRover or SoccerFan.Also make sure that the email or instant messages they send don’t show their real names. In the brochure I’ll pass out at the end, there’s a link to step-by-step instructions that explain how to do this. (aka.ms/hide-name) [click]Strong passwords. Help children create strong passwords. Strong passwords are long phrases or sentences that mix capital and lowercase letters, numbers, and symbols. Again, the brochure will have a link to a page with lots more detail. (aka.ms/passwords-create.) [click]Keep them secret. It’s also important to emphasize that kids should not share passwords with anyone but parents or a trusted adult—not even best friends. For example, kids may be impersonated on their own phones because they gave the password to a friend. [click]
  6. Slide 10: Step 2 Set clear rules: Respect othersTALKING POINTSJust as you may need to remind kids not to splash or jump on others in the pool, it’s a good idea to remind them to treat others online as they would like to be treated. [click]Be clear with children that it is never okay to post mean comments, send unkind instant or text messages, or bully others online. Make sure to explain what online bullying is (known as cyberbullying): using the Internet for repeated unwanted or cruel behavior against someone. (And because it’s online, cyberbullying can be virtually invisible to parents and other adults.) [click]You also want kids to be honest online. Of course they know that stealing is wrong. Explain that online, that includes stealing from other players in games, and that downloading music, games, and other copyrighted material without permission or paying for it is stealing, too, so it’s illegal. [click]
  7. Slide 11: Step 2 Set clear rules: Use the computer safelyTALKING POINTSJust as it takes getting used to the water when you’re learning to swim, there’s a lot for kids to get comfortable with when they go online. [click]A good overall rule of thumb to tell kids is: be cautious. Not everything they see online is true, attachments may not be what they seem, nor is everyone who they say they are. Here are three things children can do to put that advice into practice: [click] No matter how splashy or enticing, kids shouldn’t open attachments or click links with free offers in ads, contests, games, or email or IM (even from friends). This might release malicious software. [click] Kids should be choosy about accepting new friends on phones and social sites or in games. Make sure you both know everyone on their contact lists. [click]Teach little ones to say “NO” to and stop contact with anyone who wants to have a secret friendship. They also should not respond to bullies. Ask your children to tell you if this happens. [click]
  8. Slide 12: Step 3 Put technology to workTALKING POINTSSwimmers use technology to make swimming safer—flotation devices for beginners, goggles to protect the eyes, ropes and buoys to indicate the depth of the water. Of course, online you can use technology, too. [click]
  9. Slide 13: Step 3 Put technology to workTALKING POINTSOur third step explains four ways you can use technology to bolster kids’ safety online. [click]You can use family safety tools (built into many programs) to help you block harmful content and sharing of personal information, manage the sites children visit, monitor their contacts and time online, and watch for behavior like cyberbullying. Microsoft, for example, offers free safety features in many of its programs including Windows® 7, Windows Vista®, and Xbox®.However, if you use these tools, tell your kids. Explain what you are watching for and why—and that you are doing it to help keep them safe while they learn. [click]Mobile phones:Lock the phone with a PIN to keep anyone from using it to call, text, or get personal info. Just as with passwords, teach your child never to share the PIN. Use the GPS in mobile phones cautiously. If you use a family location service to monitor your kids’ whereabouts, make sure others can’t locate them. Otherwise, consider disabling this feature on your child’s phone. At the very least, turn it off for the phone’s camera. [click]Boost your computer’s defenses. These are the best all ‘round things you can do to help secure your computer against Internet threats. Start by keeping all software (including your web browser) current with automatic updating. Install legitimate antivirus and antispyware software from source that you trust, like Microsoft Security Essentials. Never turn off your firewall. (Sometimes games suggest doing this.) A firewall puts a protective barrier between your PC and the Internet, and turning it off even for a minute increases risk. (Microsoft can help you do these three things. There will be a link to that information in the brochure.)Protect your wireless router with a password. Find out how from the company that provides your router.Use flash drives cautiously to minimize the chance that you’ll infect your computer. [click]Be the administrator of home computers. Learn to create different user accounts so you can manage your child’s settings: aka.ms/childsafety. (You’ll have to scroll down on the page to find these instructions under “Create different user accounts.”) [click][Note to speaker: Consider distributing the brochure at this point. Point out the links in this section, as well as the one for creating strong passwords under “Teach kids to keep personal information private.”]
  10. Slides 14: What to do if there is a problemTALKING POINTSMost of the time spent on the Internet is safe and fun. But sometimes children may run into problems. [click]
  11. Slides 15: What to do if there is a problemTALKING POINTSThe most fundamental advice is to teach children to pay attention to their instincts and to trust those instincts—just as young swimmers pay attention if they feel short of breath while under water. If something feels uncomfortable or alarms them, that’s a good warning sign. Let kids know they can come to you and that you will help solve the problem. [click] Agree that you won’t take away their phone or curtail privileges because of someone else’s actions. [click] Immediately report:Physical threats, persistent cyberbullying, or any form of exploitation to the police and the web service or phone carrier. (Also consider blocking the person.) Inappropriate behavior to the school (if it involves another student) and to the phone carrier or web service. For example, in Microsoft services or software, look for the Report Abuse link.Also, note that in the United States, it is illegal to collect personal information on anyone under age 13 without express parental consent. If you see this happening, report it tothe site immediately and to the FTC at www.ftccomplaintassistant.gov. Or you can call (877) 382-4357 (toll free) to submit your complaint to a live operator.Let’s recap the three things you can do to help protect kids online. [click]
  12. Slide 16: Pay attention to kids onlineTALKING POINTSRegularly sit with young children while they play online (or play with them). Let them show you what they’re doing and who they’re interacting with. Make sure to evaluate the devices kids want to use, the websites they want to visit, and the games they want to play. [click]
  13. Slide 17: Set clear rulesTALKING POINTSThere are three basic rules you can teach children to use the Internet more safely: keep personal information private, respect others, and use computers safely. [click]
  14. Slide 18: Put technology to workTALKING POINTSYour first line of defense is to strengthen your computer’s defenses against Internet threats. You can also help protect kids on computers by using family safety tools and keep them on mobile phones with PINs and the cautious use of GPS. [click]
  15. Slide 19: More helpful infoTALKING POINTS[Note to speaker: If you haven’t done so already, pass out the brochure. To easily find the links in the brochure, simply scan for the bold text.]To learn how to do some of the things I’ve talked about today—for example, build strong passwords or boost your computer’s defenses—let’s review the links on the inside. On the back, you’ll find links to more helpful information. Get the latest information on defending your computer, safeguarding your information, and protecting your family online with regular visits to Microsoft’s Safety & Security Center. Any comments or questions? [click][Note to speaker: Round out your presentation with a discussion among audience members so they can share their experiences. Or try a question-and-answer session if you feel comfortable answering questions on online safety. If you don’t feel comfortable, but questions come up, solicit answers from the audience.]
  16. Slide 20: Microsoft slideTALKING POINTSThanks for your time and for your questions and comments.