Professional Documents
Culture Documents
BSA Cyberchip Staying Safe Online Program
BSA Cyberchip Staying Safe Online Program
THE INTERNET
Supplementary Information
https://www.scouting.org/training/youth-protection/cyber-chip/suppiemental-cp.ppt
The First Question
When I’m on line I should never give out:
A. A. My last name, address, phone number,
the name of my school, or teams I play for
B. B. The names of my pets
True False
The answer is C
Question #5
If someone I meet online gives me his
phone number I should:
A. Call him right away.
B. Give him my phone number also
C. Ask my parents permission before I call
The answer is C
Question #6
I should never respond to Email messages
from people or organizations I’m not
familiar with.
True
False
?
The Final ??
Any information you get on the internet is
trustworthy.
True False
___________________________________
Child Sign Here
I will help my child follow this agreement and will allow reasonable use of the Internet as long as these rules and other family rules are
followed.
________________________________________ ______________________________________
Parent(s) Sign Here
Contract Time
A contract is used when you suspect your teen is being
inappropriate online or violating your home rules.
If your teen violates your contract it is automatic
revocation of privileges for your determined period of
time. Have them sign it.
Hang this on the refrigerator.
Some Examples of violations:
If your teen does not know full information of his buddy.
If they X out when you come into the room.
If they tell you “you can’t see this it’s private.”
If your teen is up late at night past bed time.
If they receive money, gift certificates, cameras or scanners that
they can’t explain.
What is a Buddy List?
When looking at your child’s Buddy List
your child should be able to tell you
who each person is by the screen
name.
A Buddy List is a list in Facebook, AIM,
Discord, and Yahoo of the common or
frequent contacts your child has.
If they don’t know them by first, last
name and phone number, they should
not be on the buddy list. If you don’t
know that person neither should they.
Some kids lie about who that person
actually is and they make it up. Check
the Screen names yourself to call their
bluff.
Why is my teen’s cell phone bill
so high?
When teens are banned or
away from the computer, they
use text messaging to IM
friends who are on the
computer.
This is when they could speak
to someone you do not want
them to talk to.
You can check the cell phone
account on line and see who
they are talking to. Just sign
into the cell phone provider
online and check the in box and
out box.
Electronic Harassment
Disorderly Conduct
Electronic Harassment
Disorderly Conduct
Includes the use of electronic communication
for any of the following purposes:
1. Making any comment, request, suggestion or
proposal which is obscene with the intent to offend
2. Interrupting phone service with the intent to harass
3. Transmitting any file, document, or other
communication which prevents a person from using
their telephone or e-comm device.
Harassment… continued
4. Threatening injury to person or property of the
person receiving the e-comm or family or household
members
• Examples: Enlisting the operator to break into a phone
conversation.
• Any form of electronic communication that alarms and/or
disturbs the receiver (like disorderly conduct)
• Email bombs or sending consecutive messages that cause
denial of service (DNS)
• Any forms of threats toward a user or those related to
them
Cyber-Stalking
A person commits cyber-stalking when he/she knowingly
and without lawful justification on at least 2 separate
occasions, harasses another person through the use of
electronic communication and:
At any time transmits a threat of immediate or future
bodily harm, sexual assault, confinement or restraint and
the threat is directed towards that person or a family
member of that person.
Places that person or a family member of that person in
reasonable apprehension of immediate or future bodily
harm, sexual assault, confinement or restraint. (Class 4
Felony)
Social Media Safety
In addition to providing online predators
access to our youth, social media
companies themselves target the weakest
minds among us
In recent years, whistleblowers have
revealed much about the science that is
used to keep internet users engaged
Facebook Whistleblower
Sean Parker, Facebook Co-founder
"The thought process that went into building these applications, Facebook
being the first of them, ... was all about: 'How do we consume as much of
your time and conscious attention as possible?'"
"And that means that we need to sort of give you a little dopamine hit
every once in a while, because someone liked or commented on a photo or
a post or whatever. And that's going to get you to contribute more content,
and that's going to get you ... more likes and comments."
"It's a social-validation feedback loop ... exactly the kind of thing that a
hacker like myself would come up with, because you're exploiting a
vulnerability in human psychology.""The inventors, creators — it's me, it's
Mark [Zuckerberg], it's Kevin Systrom on Instagram, it's all of these people
— understood this consciously. And we did it anyway."
“Dopamine Hacking”
Same science used by casinos and “free” online
pornography sites
Used by all popular sites: Facebook, Instagram,
Youtube, Twitter, Tiktok, etc
Used by video game producers
Used by all device manufacturers: Apple
(iPhone), Google (Android), phone app creators,
etc
Strongly addictive and debilitating to all,
particularly children
Youtube and “Elsagate”
Youtube and “Elsagate”
Originally dismissed as “conspiracy”, evidence is
mounting against Youtube and other online video
content creators that they are targeting (some
suggest “grooming”) the youngest among us
Beginning and end of videos seem “normal”, middle
of videos can be highly disturbing in content
YT Kids offers no protection
YT “auto-play” keeps children engaged for hours if
left unabated
Copyright infringement abounds, YT seems unable
to detect and censor this.
What Can YOU Do?
Inform yourself of these issues and
educate others
Be aware of everything your child
(especially young ones) consume on:
Devices
“apps”
Video services
Empower Yourself
and
The Parents
Lets work together to keep our kids safe.
This is not a matter of violating their privacy.
This is a matter of protecting our children.
This is a matter of teaching our children safety.
The parents are responsible for their children.
We need to guide them in good times and in bad.
It is not that they are doing bad things. They do not
have enough experience to handle adult type situation.
They really have not been here as long as we have!