WELCOME! As you come in and receive a folder, please complete the Pre-Test found in the left pocket. Names are optional. Please flip tests over when you are finished. Thank you for your cooperation. We will begin shortly.
Mar 31, 2015
WELCOME! As you come in and receive a folder, please complete the Pre-Test found in the
left pocket.
Names are optional. Please flip tests over when you are finished.
Thank you for your cooperation.We will begin shortly.
TechnicoolA Technology Safety Program
© 2011 PCAV
1. Welcome and Introduction
2. Warm-up Exercise and Pre-test
3. Part1: Benefits, Risks, and Concerns
4. Part 2: Becoming Tech-Savvy
5. Part 3: Prevention, Intervention, and Responding
6. Part 4: A Few Tech-Safety Tips
7. Closing Remarks, Evaluation and Post-Test
Presentation Agenda
What is TECHNICOOL?
Technology safety program:Children and teens (4-8 grade)Parents/guardiansEducatorsTrainers
Encourages safe online behaviorAddresses benefits and risks of technology useProvides adult participants with resources and concrete toolsPresentation covers topics in manner that is age appropriate for group in attendanceFunded by grants
Internet Crimes Against Children Task Force (ICAC)Comcast Foundation
www.technicoolvt.org
PART 1:Benefits, Risks and Concerns of Technology
BENEFITS OF TECHNOLOGY
Communication
Learning
Being informed
Networking
Entertainment
Employment
IT Skills
POTENTIAL RISKS Cyberbullying “Sexting” Meeting online predators/talking to strangers Unsafe communities Sharing personal info Inappropriately sharing pictures and video Finding/searching inappropriate material Scams Violent Online Gaming
www.cybersafefamily.com
PART 2:Becoming Tech-Savvy
Anatomy of Instant Messenger
Type of Instant Message Program
Users availability status
User’s contacts (often called a ‘Buddy List’ or ‘Friends List’)
Chat/dialogue screen
Anatomy of a Chat Room
Type of Instant Message Program
Room ‘Subject’
Message bar
Chat screen
Contacts/others available for chat
Users availability status
Anatomy of a Facebook Profile User name &
status
Personal informationPhotos & video of the user
Comments by user and user friendsFriends list, Friends photos, # of friends
*Most other social networking sites user profiles include the same types of information
User photo
Anatomy of a Twitter ProfileUser
photo
Name & Personal information
Comments by user and user friends
“Followers”
Status bar
PART 3:Prevention, Intervention, and Responding
*This is the MOST IMPORTANT part Listen Open dialogue Keep your cool Educate them on safe-internet and technology
practices based on resources provided or on your own personal research
Explain to them that something you put on the internet or send through technology can never be erased
Discuss media messages and technology Encourage them to confide in you Have conversations frequently
Communicate
Monitor your child’s activities Ask your kids to show you where they go onlineHave discussions with them about what they do onlineAsk about who they are talking to onlineWatch how long they spend onlineLet them know you would like to see their user profile(s)Set ground rules for technology and internet
Know what access your child has to technology and internet
Google them to see what information is online about them
Supervise
Learn everything you can about technology and the internetLook for community classes on computers and software Attend presentations or webinars on tech safety (like
this one!) Enlist your child as your teacher
Great for conversation starting and dialogueAlso lets you see what they already know
Research technology safety
Be Informed
Check your browser’s history and cookie files Help create safe passwords and collect them Ask about unfamiliar email addresses Invest in monitoring and/or filtering software Use safe web browsers/kid-friendly search engines for
kids*Remember, software programs are not substitutes
for adult supervision
Safety-Check
Visit www.getparentalcontrols.org and www.internetsafety101.org for reviews of parental controls and for a list of internet service providers with parental control features, safe web searches and kid-friendly search engines
Keep technology in a common room With cell phones, laptops and gaming devices: have
children shut down the device and store them outside of their bedrooms in a common room before bed or at other times you’ve indicated in your technology-use rules
Be aware of wireless networks in and around the home
Safe-Space
Limit access time and establish curfew Create a safe space/common room Identify what programs or websites can be used and visited Define what they can use technology for (i.e. homework) Require permission and discussion of particular
tech/internet use (i.e. social networking sites or “friending”) Agree to talk to children about concerns before
automatically saying “no” Set up consequences for not following the set rules*Before creating rules, communicate with your children
about what types of activities they like to do online, where they go, who they talk to, etc.
*Make rules and agreements age-appropriate
Create Technology-Use Rules
See “Family Internet Agreement” in folder for examples of internet rules you can set with your child/dren.
PART 4:A Few Specific Tech-Safety Tips
Go to www.netsmarz.org to watch a kid-friendly video,
Password Rap, that details how to make safe passwords.
Different passwords for different accounts Difficult for others to guess At least 8 characters with a mix of capitals, lower
case, numbers, and special characters Give only to parents / guardians
Making Safe Passwords
See “Family Cell Phone Use Contract” in folder for example of cell phone rules you can set
with your child/dren.
Only give their number to people they trust Respond to calls and texts only if they know the
number Inform your child that any pictures / videos taken
with their cell phone are saved (even if they have deleted them)
Educate them about “sexting” Teach them how to block numbers from their cell Create a “Family Cell Phone Use Contract”
Rules for Cell Phones
In Event of Cyberbullying
What to do if your child is being cyber-bullied
What to do if you suspect your child is cyber-bullying
Be approachable and supportive
Collect evidence Contact the school Contact the parents of
the offender Contact the service
provider Teach them to not
retaliate
Teach them empathy Explain the hurtful
nature of cyber-bullying Apply reasonable
consequences Set firm limits and follow
through Closely monitor
computer, cell phone and gaming usage
Contact the PoliceIf your child is at risk of: Threats of violence Extortion Obscene or sexually explicit phone calls or text
messages Stalking or hate crimes Child pornography
Closing RemarksEvaluation & Post Test
Please visit us at www.technicoolvt.org or email us at [email protected] for
more information and resources.
For information on PCAV please call 1-802-229-5274 or visit us at www.pcavt.org.
Thank you for your attention and participation.