Upload
georgiana-griffith
View
216
Download
0
Tags:
Embed Size (px)
Citation preview
Cyber-SafetyHow to Keep Your Kids Safe
Dacula Middle SchoolSeptember 22, 2015
Officer Petrocy
Why is cyber-safety important?Bullying
People use the internet as a way of bullying. We call this cyberbullying.
Victims of bullying have:• Lower self esteem, insecurity• Higher rate of depression• Higher absenteeism rate• Feelings of tension and anxiety• Decline in concentration and social interaction
Why is cyber safety important?
Kids who bully are more likely to:• Get into frequent fights• Steal or vandalize property• Experiment with cigarettes, alcohol or drugs• Skip or drop out of school • Have negative encounters with law enforcement • Carry a weapon
Why is cyber-safety important?Sexual Predators
Sexual predators use the internet as a doorway to interact with children. • Sexual predators like to use chat rooms, instant
messages and email.• Currently, there are over 644,865 registered sex
offenders in the United States; in Gwinnett County we have 461 registered sex offenders.
Why is cyber safety important?
Access to the internet is access to pornography
Pornography at a young age can lead to:• Children becoming victims of sexual violence• Sexual diseases, unplanned pregnancies, and sexual
addiction• Children sexually assaulting other children• Negative attitudes and values• Interference with a child's development and identity
What can I do as a parent?
GCPS Databases vs. Google
• Reliable• Accurate• No ads• Virus free• Age appropriate• Designed for educational use• Links have been evaluated for age
appropriate content
Multiple Access Points
Download this appfor your device. Get password from Mrs. Greer.
Icon onall schoolComputers.
Destiny, the Media Catalog, also is a search engine.
Take Control!
Take Control!Remember an electronic device is not a right, it’s a privilege. You own it, they don’t!Set rules about device:
• Set time limits and place of use• Require permission for use of the device• Require all passwords and codes/pins for device• Set appropriate consequences for misbehavior or
misuse of device
What Can I Do?
Audit the device• Inspect the device thoroughly • Check messages• Look at all photos• Check trash • Open recent searches• Click on apps to test them for authenticity