You are on page 1of 32

STAYING SAFE ON

THE INTERNET

Supplementary Information
https://www.scouting.org/training/youth-protection/cyber-chip/suppiemental-cp.ppt
The First Question
When I’m on line I should never give out:
A. A. My last name, address, phone number,
the name of my school, or teams I play for
B. B. The names of my pets

C. C. The names of my favorite book or TV


shows
D. D. Any personally identifying information!
The Correct Answer is D
Never Give Out :
 Your name
 Your address
 Your phone number
 Your birthday
 Your school name
 Family, friend, or siblings names
 Any other personal information

 EVERY TIME YOU ENTER INFORMATION


YOU GIVE UP PRIVACY
Question 2
 Before I buy something online or access
a site requiring payment I should:
A. A. First make sure I really want it
B. B. Check with my parents
C. C. Check out store prices first.
The Correct Answer is B
Question 3
 It’s OK to give someone by password.

True False

The correct answer is of course False


Passwords are:
 Valuable pieces of information
 Can allow someone to access your Email
 Allow access to your Gmail account to
charge products sold on the Internet

No legitimate website or person would ever


quest them.
Question Four
 I can send a photo of myself online
when:
A. It’s to a friend or family member
B. I’ve told my parents and they’ve given me
permission to do so
C. It’s to my cyber friend
The right answer is B
Question #5
 If someone I meet online gives me his
phone number I should:
A. Call him right away.
B. Give him my phone number also
C. Ask my parents permission before I call

The answer is C
Question #5
 If someone I meet online gives me his
phone number I should:
A. Call him right away.
B. Give him my phone number also
C. Ask my parents permission before I call

The answer is C
Question #6
 I should never respond to Email messages
from people or organizations I’m not
familiar with.
 True
 False

Obviously the correct answer is true


Dangers are:
 The Email may be a scam to sell you
something
 If you respond you are confirming a valid
Email address
 You can encourage the sender to forward
inappropriate Emails or add you to other
lists
Dangers are:
 The Email may be a scam to sell you
something
 If you respond you are confirming a valid
Email address
 You can encourage the sender to forward
inappropriate Emails or add you to other
lists
Question #7
 Photos can be downloaded from the
internet when:
A. A. They’re from a cyber friend
B. B. It’s in your Email
C. C. My parents give me permission to do so
The correct answer is C
Question #8
 If someone send me an inappropriate
message or materials I should
immediately:
A. A. Not reply to it and save it
B. B. Tell my parents
C. C. Contact my service provider
D. D. All of the above
The right answer is D
Question #9
 If someone I’ve met online wants to
meet in person I should:
A. A. Never consider doing so before talking to
my parents about it
B. B. Tell my best friend and take her with
C. C. Keep it a secret
Of course the right answer is A
Question #10
 Who Developed the Internet?
A. A. Bill Gates from Microsoft
B. B. The U. S. Government
C. C. A man from the Netherlands named
LINUX
The answer is B

?
The Final ??
 Any information you get on the internet is
trustworthy.

True False

The answer is definitely False


Family Contract For Online Safety
Kids Pledge
1. I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the
name and location of my school without my parent’s permission.
2. I will tell my parents right away if I come across any information that makes me feel uncomfortable.
3. I will never agree to get together with someone I “meet” online without first checking with my parents. If my parents agree to the
meeting, I will be sure that it is in a public place and bring my mother or father along.
4. I will never send a person my picture or anything else without first checking with my parents.
5. I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message
like that. If I do I tell my parents right away so that they can contact the service provider.
6. I will talk with my parents so that we can set up rules for going online. We will decide upon the time of day that I can be online,
the length of time I can be online, and appropriate areas for me to visit. I will not access other areas or break these rules without
their permission.
7. I will not give out my Internet password to anyone (even my best friends) other than my parents.
8. I will be a good online citizen and not do anything that hurts other people or is against the law.

I AGREE TO THE ABOVE:

___________________________________
Child Sign Here

I will help my child follow this agreement and will allow reasonable use of the Internet as long as these rules and other family rules are
followed.

________________________________________ ______________________________________
Parent(s) Sign Here
Contract Time
 A contract is used when you suspect your teen is being
inappropriate online or violating your home rules.
 If your teen violates your contract it is automatic
revocation of privileges for your determined period of
time. Have them sign it.
 Hang this on the refrigerator.
 Some Examples of violations:
 If your teen does not know full information of his buddy.
 If they X out when you come into the room.
 If they tell you “you can’t see this it’s private.”
 If your teen is up late at night past bed time.
 If they receive money, gift certificates, cameras or scanners that
they can’t explain.
What is a Buddy List?
 When looking at your child’s Buddy List
your child should be able to tell you
who each person is by the screen
name.
 A Buddy List is a list in Facebook, AIM,
Discord, and Yahoo of the common or
frequent contacts your child has.
 If they don’t know them by first, last
name and phone number, they should
not be on the buddy list. If you don’t
know that person neither should they.
 Some kids lie about who that person
actually is and they make it up. Check
the Screen names yourself to call their
bluff.
Why is my teen’s cell phone bill
so high?
 When teens are banned or
away from the computer, they
use text messaging to IM
friends who are on the
computer.
 This is when they could speak
to someone you do not want
them to talk to.
 You can check the cell phone
account on line and see who
they are talking to. Just sign
into the cell phone provider
online and check the in box and
out box.
Electronic Harassment
Disorderly Conduct
Electronic Harassment
Disorderly Conduct
 Includes the use of electronic communication
for any of the following purposes:
1. Making any comment, request, suggestion or
proposal which is obscene with the intent to offend
2. Interrupting phone service with the intent to harass
3. Transmitting any file, document, or other
communication which prevents a person from using
their telephone or e-comm device.
Harassment… continued
4. Threatening injury to person or property of the
person receiving the e-comm or family or household
members
• Examples: Enlisting the operator to break into a phone
conversation.
• Any form of electronic communication that alarms and/or
disturbs the receiver (like disorderly conduct)
• Email bombs or sending consecutive messages that cause
denial of service (DNS)
• Any forms of threats toward a user or those related to
them
Cyber-Stalking
 A person commits cyber-stalking when he/she knowingly
and without lawful justification on at least 2 separate
occasions, harasses another person through the use of
electronic communication and:
 At any time transmits a threat of immediate or future
bodily harm, sexual assault, confinement or restraint and
the threat is directed towards that person or a family
member of that person.
 Places that person or a family member of that person in
reasonable apprehension of immediate or future bodily
harm, sexual assault, confinement or restraint. (Class 4
Felony)
Social Media Safety
 In addition to providing online predators
access to our youth, social media
companies themselves target the weakest
minds among us
 In recent years, whistleblowers have
revealed much about the science that is
used to keep internet users engaged
Facebook Whistleblower
Sean Parker, Facebook Co-founder
 "The thought process that went into building these applications, Facebook
being the first of them, ... was all about: 'How do we consume as much of
your time and conscious attention as possible?'"
 "And that means that we need to sort of give you a little dopamine hit
every once in a while, because someone liked or commented on a photo or
a post or whatever. And that's going to get you to contribute more content,
and that's going to get you ... more likes and comments."
 "It's a social-validation feedback loop ... exactly the kind of thing that a
hacker like myself would come up with, because you're exploiting a
vulnerability in human psychology.""The inventors, creators — it's me, it's
Mark [Zuckerberg], it's Kevin Systrom on Instagram, it's all of these people
— understood this consciously. And we did it anyway."
“Dopamine Hacking”
 Same science used by casinos and “free” online
pornography sites
 Used by all popular sites: Facebook, Instagram,
Youtube, Twitter, Tiktok, etc
 Used by video game producers
 Used by all device manufacturers: Apple
(iPhone), Google (Android), phone app creators,
etc
 Strongly addictive and debilitating to all,
particularly children
Youtube and “Elsagate”
Youtube and “Elsagate”
 Originally dismissed as “conspiracy”, evidence is
mounting against Youtube and other online video
content creators that they are targeting (some
suggest “grooming”) the youngest among us
 Beginning and end of videos seem “normal”, middle
of videos can be highly disturbing in content
 YT Kids offers no protection
 YT “auto-play” keeps children engaged for hours if
left unabated
 Copyright infringement abounds, YT seems unable
to detect and censor this.
What Can YOU Do?
 Inform yourself of these issues and
educate others
 Be aware of everything your child
(especially young ones) consume on:
 Devices
 “apps”
 Video services
Empower Yourself
and
The Parents
 Lets work together to keep our kids safe.
 This is not a matter of violating their privacy.
 This is a matter of protecting our children.
 This is a matter of teaching our children safety.
 The parents are responsible for their children.
 We need to guide them in good times and in bad.
 It is not that they are doing bad things. They do not
have enough experience to handle adult type situation.
 They really have not been here as long as we have!

You might also like