Online Dangers. According to the National Center for Missing and Exploited Children.

Similar documents
Anti-Cyber Bullying Policy.

Circle Link 1 "Know Before You Go" Web Literacy Tips:

EADS up. stop think connect

Cyber Safety Awareness in Schools. A Delhi Police Initiative

A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST

Cyber Smarts Using Social Media Wisely

It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar

The purchaser of the ebook is licensed to copy ebook for use with immediate family members only.

Verizon Family Protection Powered by McAfee. User Guide

Verizon Family Protection Powered by McAfee. User Guide

Social Media Reputation Management

Social Media and Cyber Safety

Lambton Primary School

So, you re child wants to sign up for Myspace...

Family Internet Agreement

Session Booklet Social Media & Facebook

Optimized Communications Optimized Security Optimized Expressions Optimized Performance Optimized for Your Family...

Glossary

Sunday January Atlantic Shores Baptist Church

SAFEGUARDING YOUR LAPTOP/PC FOR FOSTER CARERS Part One Messaging

Sky Social Media Guidelines for Contributors

Norton s My First Device Report. October 2018

HOW TO CONFIGURE SOCIAL MEDIA PRIVACY SETTINGS

Text and messaging - Safeguarding Guidelines

Privacy Policy. Information we collect about you

Digital Safety and Digital Citizenship

McAfee Family Protection The Easiest, Most Complete Way to Keep Your Children Safe Online

Social Media E-Safety Guide. For more help and advice visit:

ONLINE SAFETY. Messaging, , Vlogging and Sexting

WEBSITE & SOCIAL MEDIA PRIVACY POLICY

KIK s GUIDE FOR LAW ENFORCEMENT

Student E-Safety Induction

Acceptance. Changes to this Policy

The Table Privacy Policy Last revised on August 22, 2012

Information & Communications Technology (ICT) Essentials 2 (2017/2018)

Key Stage 1: Computing

Focused on locking down and monitoring a child s computer/cell phone use. Created for use by Canal Computer Services

YADTEL - Privacy Information INFORMATION WE COLLECT

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Thinkuknow Parents and Carers Guide to Periscope. Periscope

I. INFORMATION WE COLLECT

ONLINE SAFETY FOR KIDS TIPS FOR PARENTS

What is epals SchoolMail? Student Accounts. Passwords. Safety. Flag Attachment

ContentBarrier X4 User's Manual

What is netiquette? K34#%^**(11`IJN+}}C>ET34KH<D>Q!:DL=+szd$R4457DGFG^U%*%&^YDFG#$CV%&58w[SRSBFy>

ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014

Agenda. 1. Cyberwellness Talk 2. How to Login to LMS

ONLINE REGISTRATION: A STEP-BY-STEP GUIDE

Children, Mobile Phones and the Internet

PACT Analysis. People. Windows 8 phone: TWEENS: girls aged years old, inbetween child and teen

Parent/Student. Web Access. User. Manual

Social Security Number Protection Policy.

Family Technology Boundaries:

ETSY.COM - PRIVACY POLICY

PARENT & TEACHER GUIDE TO THE INTE. This book belongs to:

Policy recommendations. Technology fraud and online exploitation

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Community Use Agreement

Peaceful Pill Forum Rules

DROPBOX.COM - PRIVACY POLICY

WEBSITE PRIVACY POLICY TEMPLATE Last updated March 2nd, 2018

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi

RECORD. Published : License : None

Child Online Protection in Child Pornography Namibia

Child. Online Protection (( ( Child Online Protection

St Edmund Arrowsmith Catholic Centre for Learning

2013 edition (version 1.1)

PRIVACY POLICY TABLE OF CONTENTS. Last updated October 05, 2018

Privacy Policy. Third Party Links

Useful Google Apps for Teaching and Learning


Windows users range in experience from people

Victim Assistance & Restorative Justice Program s Registrant/Victim Input at Offender Intake Form

Social Media and Masonry

Tolbert Family SPADE Foundation Privacy Policy

WYNN SOCIAL CASINO PRIVACY POLICY

LightGig Communications, LLC Privacy Policy

ELECTRIC APP - PRIVACY POLICY

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

New to the Mac? Then start with this lesson to learn the basics.

Electronic Device Policy (EDP)

Safe OnLine Outreach Society

GAGGLE SAFETY MANAGEMENT. Welcome Packet

St James Primary School Mobile Phone Policy for staff, visitors, volunteers and pupils

Use of Technology to Stalk

NESTLÉ Consumer Privacy Notice Template PRIVACY NOTICE

Website Privacy Policy

GRANDSTREAM PRIVACY STATEMENT

E-Safety information for Parents

Digital Resources Pack

Fooji Code of Conduct

The West End Community Trust Privacy Policy

Privacy Notice Froneri South Africa (Pty) Ltd t\a Dairymaid ( Froneri ) ( Privacy Notice ) Froneri Froneri Froneri

Privacy Policy. Last Updated: August 2017

UNTITLED HIP HOP PROJECT Privacy Policy. 1. Introduction

Bryn Athyn College Privacy Policy

If you have any questions, check the resources section or me at All comments should be directed to

Odyssey Entertainment Marketing, LLC Privacy Policy

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

Transcription:

Online Dangers One in five youths say they have received a sexual approach or solicitation. One in 33 had received an aggressive sexual solicitation. One in four had unwanted exposure to sexually explicit material. One in 17 has been threatened or harassed. According to the National Center for Missing and Exploited Children.

Where and How Children Receive Sexual Solicitations Chat Rooms Instant Messages Game Rooms Message Boards Email

Social Networking Half of children age 8 to 17 who use the Internet have setup profiles on social network sites. MYSPACE.com has 60 million monthly visitors 300 million accounts 34% are under 18 years old FACEBOOK.com 69 million monthly visitors 18% are under 18 years old 14 million photos are uploaded on Facebook daily

Kids Online Early Online Early: Children start giving out personal information, first name, last name, email address, photographs, phone # and home address from the age of 9. Naiive Perception: Youths may believe that they can safely and anonymously fool around or experiment with strangers on the Internet and find out later, for example, that the photographs that they sent often in exchange for gifts have been commercially distributed as child pornography on the Internet.

Cyber-Bullying Cyber Bullying: Using technology to post cruel text or images to bully their peers to engage in other cruel behavior. Posing as someone other than who they are to manipulate, bully or make others do things they wouldn't normally do or to prey on vulnerable individuals with emotional issues or who are in phases of upset to push them over the edge.

Cyber-Bullying: It can be called online social cruelty. It can involve sending offensive or threatening messages either via email, text messaging or imaging. It can include posting personal information or pictures about another person. Pretending to be someone they are not in order to get a reaction or make a person look bad.

Cyber-Bullying A recent study found 1/3 of those interviewed reported being a victim of a cyber-bullying. Almost 13 percent of respondents reported feeling threatened, while five percent of the test group was scared for their own safety, due to some type of cyberbullying.

What parents can do Get involved and be aware: Learn everything you can about the Internet and what your kids are doing online. Talk to children about the places they go online and the activities that they are involved in. Be aware of what your kids are posting on Web sites, including their own personal home pages.

Communicate/Educate Set online time limits Put computer in area open to all family not in bedroom. Speak with children about what is an appropriate screen name. (not provocative language such as foxy or sexy )

Encourage Communication Encourage your kids to come to you if anybody says or does something online that makes them feel uncomfortable or threatened. Stay calm and keep the lines of communication and trust open. If you "freak out" your kids won't turn to you for help when they need it. Encourage kids to develop their own moral code so they will choose to behave ethically online: Talk to your kids about responsible Internet use.

What Parents Can Do: Teach them to never post or say anything on the Internet that they wouldn't want the whole world - including you - to read. Create an online agreement or contract for computer use, with your kids' input. Make sure your agreement contains clear rules about ethical online behavior. Research shows that in homes where parents have clear rules against certain kinds of activities, young people are much less likely to engage in them.

ComputerCOP Features: Scans for images, Internet graphics and digital camera and cell phone images loaded on the PC. Scans text including web pages, downloaded text, web pages and Internet-based emails for keywords of a sexual, violent, gang or drug related. Optional KeyAlert feature captures chat/email that contain keywords. Captured text can be reviewed at a later date or emailed to parent immediately Scans for videos.

ComputerCOP Quick Start Option to choose to scan for ALL FILES or scan for MOST RECENT First time using ComputerCOP, Select ALL When you use ComputerCOP again on that computer, choose Most Recent. Most Recent will only display new images. Documents and video since ComputerCOP was last used.

Images Below each image, is the number of the image displayed out of the total number of images found. The location of the file is listed here. Click the Next button to go to the next image. To go to the previous image, click on the Prev(ious) button. Up to nine images can be displayed at once by clicking on the Multi View button. Only one image can be printed, saved or emailed at one time. Images may be deleted one at a time or in multiples when in Multi View mode.

Words/Phrases ComputerCOP will then scan for words and phrases from our dictionary of keywords. Keywords and Phrases that are Pornographic Violent or hateful From the drug culture From the gang culture

Words and Phrases Click on the Documents button to review documents. Documents are defined as web pages, word processing files, Internet cookies and text logs. Documents are presented in a flat-file form meaning that they may contain computer language. The keyword or phrase in the document is highlighted. Click on the highlighted word to display its definition.

Viewing File It is often easier to review the document when it is displayed in its associated application; To view a web page in a browser, for example. To do this, right-mouse click on the displayed document and select Open With Application. In ComputerCOP Viewer In Original Application

Videos Click on Videos to review videos. To pause the video, click the Play/Pause button. To resume play, click Play/Pause. You may Delete, Save or Email a video by clicking on appropriate button.

Email Files to Law Enforcement If you are concerned about a particular image, document or video you find while reviewing your child s computer, you may email that file to law enforcement. To email a file, have the file displayed on the screen, click the Email button. In the space provided enter the email address to which you would like the file sent. Accept the terms and conditions and Click the Yes button.

Internet History Click on IE History to view URLs (typically web sites) visited, their titles, the dates they were last accessed and last updated (in your IE cache) and the expiration date of the sites cookie file.

Setting up KeyAlert Select Chat / Email button to initiate Install and follow directions on the screen. After the install is complete. Click the Chat/Email button again. Now, the Keyboard Capture Utility Setup Window will display. Here in the 10 spaces provided, you may enter keywords or phrases such as names and email addresses. The words you enter should be ones that your child might use during a chat/email session.

In addition to the captured Chat/Email being displayed during Documents Review, these captured session can also be emailed to a parent or guardian. Check the box next to Email Me When Keyword is Typed and enter the email address that should receive the captured chat or email. Email Me Feature Next, you have the option to have the ComputerCOP Siren icon display in the system tray. By default, this icon will be displayed. If you do not wish to have the icon displayed, uncheck the box next to Show KeyAlert in System Tray.

Uninstall KeyAlert or Change KeyAlert Settings/keywords The CD must be in the computer to change the settings or unistall the KeyAlert feature. Click on the Chat/Email button to access the KeyAlert Setup window. You may change the keywords or phrases to, as well. After you make your changes to the words or to the settings in this window, click on the Update KeyAlert Setup button. You may also uninstall the KeyAlert utility by clicking on the Uninstall KeyAlert button. You may be prompted to reboot your computer in order for the changes to take effect.

HELP! If you have any problems running or using ComputerCOP, please email or call ComputerCOP Software Corp. at 1-800-210-4209 extension 236 Or Email techsupport@computercop.