Technicool A Technology Safety Program

Thank you for your cooperation.
We will begin shortly.
© 2011 PCAV
1.
Welcome and Introduction
2.
Warm-up Exercise and Pre-test
3.
Part1: Benefits, Risks, and Concerns
4.
Part 2: Becoming Tech-Savvy
5.
Part 3: Prevention, Intervention, and Responding
6.
Part 4: A Few Tech-Safety Tips
7.
Closing Remarks, Evaluation and Post-Test
Technology safety program:
Children and teens (4-8 grade)
Parents/guardians
Educators
Trainers
Encourages safe online behavior
Addresses benefits and risks of technology use
Provides adult participants with resources and concrete tools
Presentation covers topics in manner that is age appropriate
for group in attendance
Funded by grants
Internet Crimes Against Children Task Force (ICAC)
Comcast Foundation
www.technicoolvt.org
Benefits, Risks and
Concerns of
Technology

Communication

Learning

Being informed

Networking

Entertainment

Employment

IT Skills
Cyberbullying
 “Sexting”
 Meeting online predators/talking to strangers
 Unsafe communities
 Sharing personal info
 Inappropriately sharing pictures and video
 Finding/searching inappropriate material
 Scams
 Violent Online Gaming

www.cybersafefamily.com
Becoming TechSavvy
Type of Instant
Message Program
Users availability
status
Chat/dialogue screen
User’s contacts (often
called a ‘Buddy List’
or ‘Friends List’)
Type of Instant
Message Program
Room ‘Subject’
Contacts/
others
available for
chat
Chat screen
Message bar
Users
availability
status
Anatomy of a Facebook Profile
User name & status
User photo
Personal information
Photos & video of the
user
Comments by user and
user friends
Friends list, Friends
photos, # of friends
*Most other social
networking sites user profiles
include the same types of
information
Anatomy of a Twitter Profile
User photo
Name & Personal
information
Status
bar
Comments
by user and
user friends
“Followers”
Prevention,
Intervention, and
Responding
*This is the MOST IMPORTANT part








Listen
Open dialogue
Keep your cool
Educate them on safe-internet and technology practices
based on resources provided or on your own personal
research
Explain to them that something you put on the internet or
send through technology can never be erased
Discuss media messages and technology
Encourage them to confide in you
Have conversations frequently

Monitor your child’s activities
 Ask your kids to show you where they go online
 Have discussions with them about what they do online
 Ask about who they are talking to online
 Watch how long they spend online
 Let them know you would like to see their user profile(s)
 Set ground rules for technology and internet


Know what access your child has to technology and internet
Google them to see what information is online about them

Learn everything you can about technology and the internet
Look for community classes on computers and software
Attend presentations or webinars on tech safety (like this
one!)
Enlist your child as your teacher
 Great for conversation starting and dialogue
 Also lets you see what they already know
Research technology safety





Check your browser’s history and cookie files
Help create safe passwords and collect them
Ask about unfamiliar email addresses
Invest in monitoring and/or filtering software
Use safe web browsers/kid-friendly search engines for kids
*Remember, software programs are not substitutes for adult
supervision
Visit www.getparentalcontrols.org and
www.internetsafety101.org for reviews of
parental controls and for a list of internet service
providers with parental control features, safe
web searches and kid-friendly search engines



Keep technology in a common room
With cell phones, laptops and gaming devices: have children
shut down the device and store them outside of their
bedrooms in a common room before bed or at other times
you’ve indicated in your technology-use rules
Be aware of wireless networks
in and around the home







Limit access time and establish curfew
Create a safe space/common room
Identify what programs or websites can be used and visited
Define what they can use technology for (i.e. homework)
Require permission and discussion of particular tech/internet use
(i.e. social networking sites or “friending”)
Agree to talk to children about concerns before automatically saying
“no”
Set up consequences for not following the set rules
*Before creating rules, communicate with your children about what types of
activities they like to do online, where they go, who they talk to, etc.
*Make rules and agreements
age-appropriate
See “Family Internet Agreement” in
folder for examples of internet
rules you can set with your
child/dren.
A Few Specific TechSafety Tips




Different passwords for different accounts
Difficult for others to guess
At least 8 characters with a mix of capitals, lower case,
numbers, and special characters
Give only to parents / guardians
Go to www.netsmarz.org to watch a
kid-friendly video, Password Rap, that
details how to make safe passwords.






Only give their number to people they trust
Respond to calls and texts only if they know the number
Inform your child that any pictures / videos taken with
their cell phone are saved (even if they have deleted
them)
Educate them about “sexting”
Teach them how to block numbers from their cell
Create a “Family Cell Phone Use Contract”
See “Family Cell Phone Use Contract”
in folder for example of cell phone
rules you can set with your
child/dren.






Be approachable and
supportive
Collect evidence
Contact the school
Contact the parents of the
offender
Contact the service provider
Teach them to not retaliate
What to do if your child is
being cyber-bullied





Teach them empathy
Explain the hurtful nature
of cyber-bullying
Apply reasonable
consequences
Set firm limits and follow
through
Closely monitor computer,
cell phone and gaming
usage
What to do if you suspect
your child is cyber-bullying
If your child is at risk of:
 Threats of violence
 Extortion
 Obscene or sexually explicit phone calls or text messages
 Stalking or hate crimes
 Child pornography
Evaluation & Post
Test