Top Banner
WELCOME! As you come in and receive a folder, please complete the Pre-Test found in the left pocket. Names are optional. Please flip tests over when you are finished. Thank you for your cooperation. We will begin shortly.
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Thank you for your cooperation. We will begin shortly.

WELCOME! As you come in and receive a folder, please complete the Pre-Test found in the

left pocket.

Names are optional. Please flip tests over when you are finished.

Thank you for your cooperation.We will begin shortly.

Page 2: Thank you for your cooperation. We will begin shortly.

TechnicoolA Technology Safety Program

© 2011 PCAV

Page 3: Thank you for your cooperation. We will begin shortly.

1. Welcome and Introduction

2. Warm-up Exercise and Pre-test

3. Part1: Benefits, Risks, and Concerns

4. Part 2: Becoming Tech-Savvy

5. Part 3: Prevention, Intervention, and Responding

6. Part 4: A Few Tech-Safety Tips

7. Closing Remarks, Evaluation and Post-Test

Presentation Agenda

Page 4: Thank you for your cooperation. We will begin shortly.

What is TECHNICOOL?

Technology safety program:Children and teens (4-8 grade)Parents/guardiansEducatorsTrainers

Encourages safe online behaviorAddresses benefits and risks of technology useProvides adult participants with resources and concrete toolsPresentation covers topics in manner that is age appropriate for group in attendanceFunded by grants

Internet Crimes Against Children Task Force (ICAC)Comcast Foundation

www.technicoolvt.org

Page 5: Thank you for your cooperation. We will begin shortly.

PART 1:Benefits, Risks and Concerns of Technology

Page 6: Thank you for your cooperation. We will begin shortly.

BENEFITS OF TECHNOLOGY

Communication

Learning

Being informed

Networking

Entertainment

Employment

IT Skills

Page 7: Thank you for your cooperation. We will begin shortly.

POTENTIAL RISKS Cyberbullying “Sexting” Meeting online predators/talking to strangers Unsafe communities Sharing personal info Inappropriately sharing pictures and video Finding/searching inappropriate material Scams Violent Online Gaming

www.cybersafefamily.com

Page 8: Thank you for your cooperation. We will begin shortly.

PART 2:Becoming Tech-Savvy

Page 9: Thank you for your cooperation. We will begin shortly.

Anatomy of Instant Messenger

Type of Instant Message Program

Users availability status

User’s contacts (often called a ‘Buddy List’ or ‘Friends List’)

Chat/dialogue screen

Page 10: Thank you for your cooperation. We will begin shortly.

Anatomy of a Chat Room

Type of Instant Message Program

Room ‘Subject’

Message bar

Chat screen

Contacts/others available for chat

Users availability status

Page 11: Thank you for your cooperation. We will begin shortly.

Anatomy of a Facebook Profile User name &

status

Personal informationPhotos & video of the user

Comments by user and user friendsFriends list, Friends photos, # of friends

*Most other social networking sites user profiles include the same types of information

User photo

Page 12: Thank you for your cooperation. We will begin shortly.

Anatomy of a Twitter ProfileUser

photo

Name & Personal information

Comments by user and user friends

“Followers”

Status bar

Page 13: Thank you for your cooperation. We will begin shortly.

PART 3:Prevention, Intervention, and Responding

Page 14: Thank you for your cooperation. We will begin shortly.

*This is the MOST IMPORTANT part Listen Open dialogue Keep your cool Educate them on safe-internet and technology

practices based on resources provided or on your own personal research

Explain to them that something you put on the internet or send through technology can never be erased

Discuss media messages and technology Encourage them to confide in you Have conversations frequently

Communicate

Page 15: Thank you for your cooperation. We will begin shortly.

Monitor your child’s activities Ask your kids to show you where they go onlineHave discussions with them about what they do onlineAsk about who they are talking to onlineWatch how long they spend onlineLet them know you would like to see their user profile(s)Set ground rules for technology and internet

Know what access your child has to technology and internet

Google them to see what information is online about them

Supervise

Page 16: Thank you for your cooperation. We will begin shortly.

Learn everything you can about technology and the internetLook for community classes on computers and software Attend presentations or webinars on tech safety (like

this one!) Enlist your child as your teacher

Great for conversation starting and dialogueAlso lets you see what they already know

Research technology safety

Be Informed

Page 17: Thank you for your cooperation. We will begin shortly.

Check your browser’s history and cookie files Help create safe passwords and collect them Ask about unfamiliar email addresses Invest in monitoring and/or filtering software Use safe web browsers/kid-friendly search engines for

kids*Remember, software programs are not substitutes

for adult supervision

Safety-Check

Visit www.getparentalcontrols.org and www.internetsafety101.org for reviews of parental controls and for a list of internet service providers with parental control features, safe web searches and kid-friendly search engines

Page 18: Thank you for your cooperation. We will begin shortly.

Keep technology in a common room With cell phones, laptops and gaming devices: have

children shut down the device and store them outside of their bedrooms in a common room before bed or at other times you’ve indicated in your technology-use rules

Be aware of wireless networks in and around the home

Safe-Space

Page 19: Thank you for your cooperation. We will begin shortly.

Limit access time and establish curfew Create a safe space/common room Identify what programs or websites can be used and visited Define what they can use technology for (i.e. homework) Require permission and discussion of particular

tech/internet use (i.e. social networking sites or “friending”) Agree to talk to children about concerns before

automatically saying “no” Set up consequences for not following the set rules*Before creating rules, communicate with your children

about what types of activities they like to do online, where they go, who they talk to, etc.

*Make rules and agreements age-appropriate

Create Technology-Use Rules

See “Family Internet Agreement” in folder for examples of internet rules you can set with your child/dren.

Page 20: Thank you for your cooperation. We will begin shortly.

PART 4:A Few Specific Tech-Safety Tips

Page 21: Thank you for your cooperation. We will begin shortly.

Go to www.netsmarz.org to watch a kid-friendly video,

Password Rap, that details how to make safe passwords.

Different passwords for different accounts Difficult for others to guess At least 8 characters with a mix of capitals, lower

case, numbers, and special characters Give only to parents / guardians

Making Safe Passwords

Page 22: Thank you for your cooperation. We will begin shortly.

See “Family Cell Phone Use Contract” in folder for example of cell phone rules you can set

with your child/dren.

Only give their number to people they trust Respond to calls and texts only if they know the

number Inform your child that any pictures / videos taken

with their cell phone are saved (even if they have deleted them)

Educate them about “sexting” Teach them how to block numbers from their cell Create a “Family Cell Phone Use Contract”

Rules for Cell Phones

Page 23: Thank you for your cooperation. We will begin shortly.

In Event of Cyberbullying

What to do if your child is being cyber-bullied

What to do if you suspect your child is cyber-bullying

Be approachable and supportive

Collect evidence Contact the school Contact the parents of

the offender Contact the service

provider Teach them to not

retaliate

Teach them empathy Explain the hurtful

nature of cyber-bullying Apply reasonable

consequences Set firm limits and follow

through Closely monitor

computer, cell phone and gaming usage

Page 24: Thank you for your cooperation. We will begin shortly.

Contact the PoliceIf your child is at risk of: Threats of violence Extortion Obscene or sexually explicit phone calls or text

messages Stalking or hate crimes Child pornography

Page 25: Thank you for your cooperation. We will begin shortly.

Closing RemarksEvaluation & Post Test

Page 26: Thank you for your cooperation. We will begin shortly.

Please visit us at www.technicoolvt.org or email us at [email protected] for

more information and resources.

For information on PCAV please call 1-802-229-5274 or visit us at www.pcavt.org.

Thank you for your attention and participation.