Internet safety for parents Spring 2014
Uploaded and shared by Integrity Computer Concepts
You may freely distribute and share this presentation with friends, neighbors and family.
Scott Burnett
949-689-5078
4. What are we going to learn today?
Part 1 “WHAT”
• What kids are doing online
• Where technology is going
• What to look for
Part 2 “HOW”
• Practical filters
• Monitoring applications
• Common sense rules to put into place at
home
Q & A
5. Current Statistics
• Teens spend about 5 hours a day online
• 15% have met up in person somebody they met online
• 17% have hacked into a friends social media account or email
• 25% of teens have cheated on a test using a mobile phone
• 32% have accessed pornography online (purposely)
• Only 50% of kids have parental controls on their computers
• 70% of teens hide their online behavior from parents
• Parents MUST stay in the know. We can not give up!
11. Social Networking
Vine
• 6 seconds of looping video
• Owned by Twitter
• Easy to post & find porn on Vine
12. Social Networking
Social Media Clean up!
•Talk to your child
•Google their name
•Review all their profiles
•Help them remove unused profiles
•Don’t forget the blogs…
13. Pornography
• 1 in 9 websites online are pornographic
• Put a filter program on ANY computer that
your child will use.
14. Pornography
• Family Computer
• Laptop
• Cell phone
• iPad / Tablet
• Game console
• Friends house
• Put a filter program on ANY device that your
child will use, especially when they are
young.
15. Pornography
• The average child accidentally stumbles
onto pornographic website by age 12
• The time for the “new” pornography talk is
BEFORE this happens, not after..
17. Yik Yak
• 4 months old (March 2014)
• Mostly east coast & Southern CA
• 400,000 users
• Cross / Twitter and SnapChat
• Designed for college students
• Completely anonymous
• Share with 100 up to 10,000
• a VIRTUAL bathroom wall
20. Online Predators
Catfishing
someone who pretends to be someone they're not using Facebook or
other social media to create false identities, particularly to pursue
deceptive online romances.
Sextortion
When a person uses guilt, power, or knowledge of certain secrecy, to
force another person into having sex or performing sexual favors.
25. Cyber Bullying
1) Ask the tough uncomfortable questions!
Ask “What if…” questions.
2) Keep the laptop and cell phone out of the
bedroom for as long as possible.
3) Look for the signs of bullying.
Depression, excessive sleeping, complains
of headaches / stomach aches.
4) Remove apps that are commonly used for
bullying.
5) Look at your kids texts. Monitor their apps.
54. CellPhoneparentalControl
SAFEONLINE
TO KEEP YOUR FAMILY
• Set internet usage rules
• Disable ALL internet on phone
• See list of currently installed apps
• See internet usage per app
• Weekly reports, emailed
• http://curbi.com/c/iccguru
57. Scott’s Final Tips
1)Educate yourselves on social media
whenever possible
2)Know the log-ins of all your children's
accounts
3) Remove technology at bedtime
4)Talk about consequences of social media
5)Consider some monitoring software