SlideShare une entreprise Scribd logo
1  sur  26
The effects  of New Technology
Video Cameras Video – cassette recorders Making and Storing images and sounds Computers Different sorts of communication devices Scanners Digital cameras
 Morphing  and  Pseudo Pornography
The Impact of Internet
World Wide Web Japan73% USA 14% U.K. 3%
Country			Percentages United States		62.7 Russian Federation	10.3 Cyrus			3.9 Canada			3.6 Korea (South)		2.6 United Kingdom	2.5 Belgium			1.6 Taiwan			1.5 Others			11.3 Newsgroups and Communities
Chat Room Titles Baby sex Preteen sex Chat Room Toddler Spanking Chicken hawking A term coined by sex abuses for  their search for children in chat room
Law Enforcement Operations 1. No uniform system for recording offenses The three key Federal Agencies involved are the: FBI US Customs US Postal Inspection Service
Law Enforcement Operations 2.FBI’s Innocent Images Campaign Began in 1995 3.US Postal Inspection Service started since 1977 3,300 child molesters and pornographers  were arrested
Law Enforcement Operations 4.Conclusions from US data 5.Operation Cathedral and the     Wonder Land Club 6.Conclusions from Wonder Land 7.Special Police Units
Other Responses  to  Child Pornography
Other Responses to Child Pornography “Hotlines” or “Tiplines” are Mechanisms which allow people who have found what they think is illegal material on the internet to report it. Community Responses –Hotline INHOPE Internet Hotlines for EuropeAssociation of the Hotlines and Tip Lines across the world
Other Responses to Child Pornography Other Community Responses ASACP Adult Sites Against Child Pornography
Other Responses to Child Pornography Internet Industry Responses Governmental andInter-Governmental  approaches Recommendation
Other Responses to Child Pornography Internet Hotline Provides in Europe Association Members Internet Hotline Provides  in  Europe Association Members
Other Responses to Child Pornography Netsmart Rules to Help Parents  teach  their Children ,[object Object]
Never send anyone your picture, credit card or bank details, or anything else, without first checking with your parent or carer.
Never give your password to anyone, even a best friend.
Never arrange to meet anyone in person without first agreeing it with your parent or carer, and get them to come along to the first meeting, which should always be in a public place and you should always tell someone else where you are going and why.,[object Object]
Never respond to nasty, suggestive or rude emails or postings in Usenet Groups
Never open attachments to emails that come from people or sources you do not already know and trust
Delete the attachments immediately. They could contain viruses or other programmes which could completely destroy all the information and software on your computer.,[object Object]
Always be yourself and do not pretend to be anyone or anything you are not.
Always remember that if a site is described as being for adults only, or as being only for people of a certain age, you should respect that and stay out if you do not meet their criteria.
Always remember, if someone makes you an offer that seems too good to be true, it probably is.

Contenu connexe

Tendances

For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1Vinay Kumar
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingMatt Britland
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingst josephs
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5Melissa Halcott
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting InfographicuKnow.com
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 

Tendances (15)

For schoolchildren1
For schoolchildren1For schoolchildren1
For schoolchildren1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5
 
Internet Safty
Internet SaftyInternet Safty
Internet Safty
 
Digital Parenting Infographic
Digital Parenting InfographicDigital Parenting Infographic
Digital Parenting Infographic
 
10things
10things10things
10things
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Safety
Online SafetyOnline Safety
Online Safety
 

En vedette

Pauline De Guzman
Pauline De GuzmanPauline De Guzman
Pauline De Guzmaneyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Second Speaker
Second SpeakerSecond Speaker
Second Speakereyescloud
 
Content for Small Business
Content for Small BusinessContent for Small Business
Content for Small BusinessBetsy Decillis
 
Creating Content for Meetings
Creating Content for MeetingsCreating Content for Meetings
Creating Content for MeetingsBetsy Decillis
 

En vedette (8)

Pauline De Guzman
Pauline De GuzmanPauline De Guzman
Pauline De Guzman
 
Jezell
JezellJezell
Jezell
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Second Speaker
Second SpeakerSecond Speaker
Second Speaker
 
Content for Small Business
Content for Small BusinessContent for Small Business
Content for Small Business
 
Creating Content for Meetings
Creating Content for MeetingsCreating Content for Meetings
Creating Content for Meetings
 

Similaire à Second Speaker

Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital worldDan Bowen
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kidspeterhitch
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital CitizensJason Rushing
 
Internet safety
Internet safetyInternet safety
Internet safetymbend360
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetyt2839ms18
 

Similaire à Second Speaker (20)

Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Raising Responsible Digital Citizens
Raising Responsible Digital CitizensRaising Responsible Digital Citizens
Raising Responsible Digital Citizens
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
102009
102009102009
102009
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 

Dernier

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Second Speaker

  • 1.
  • 2. The effects of New Technology
  • 3. Video Cameras Video – cassette recorders Making and Storing images and sounds Computers Different sorts of communication devices Scanners Digital cameras
  • 4. Morphing and Pseudo Pornography
  • 5. The Impact of Internet
  • 6. World Wide Web Japan73% USA 14% U.K. 3%
  • 7. Country Percentages United States 62.7 Russian Federation 10.3 Cyrus 3.9 Canada 3.6 Korea (South) 2.6 United Kingdom 2.5 Belgium 1.6 Taiwan 1.5 Others 11.3 Newsgroups and Communities
  • 8. Chat Room Titles Baby sex Preteen sex Chat Room Toddler Spanking Chicken hawking A term coined by sex abuses for their search for children in chat room
  • 9. Law Enforcement Operations 1. No uniform system for recording offenses The three key Federal Agencies involved are the: FBI US Customs US Postal Inspection Service
  • 10. Law Enforcement Operations 2.FBI’s Innocent Images Campaign Began in 1995 3.US Postal Inspection Service started since 1977 3,300 child molesters and pornographers were arrested
  • 11. Law Enforcement Operations 4.Conclusions from US data 5.Operation Cathedral and the Wonder Land Club 6.Conclusions from Wonder Land 7.Special Police Units
  • 12. Other Responses to Child Pornography
  • 13. Other Responses to Child Pornography “Hotlines” or “Tiplines” are Mechanisms which allow people who have found what they think is illegal material on the internet to report it. Community Responses –Hotline INHOPE Internet Hotlines for EuropeAssociation of the Hotlines and Tip Lines across the world
  • 14. Other Responses to Child Pornography Other Community Responses ASACP Adult Sites Against Child Pornography
  • 15. Other Responses to Child Pornography Internet Industry Responses Governmental andInter-Governmental approaches Recommendation
  • 16. Other Responses to Child Pornography Internet Hotline Provides in Europe Association Members Internet Hotline Provides in Europe Association Members
  • 17.
  • 18. Never send anyone your picture, credit card or bank details, or anything else, without first checking with your parent or carer.
  • 19. Never give your password to anyone, even a best friend.
  • 20.
  • 21. Never respond to nasty, suggestive or rude emails or postings in Usenet Groups
  • 22. Never open attachments to emails that come from people or sources you do not already know and trust
  • 23.
  • 24. Always be yourself and do not pretend to be anyone or anything you are not.
  • 25. Always remember that if a site is described as being for adults only, or as being only for people of a certain age, you should respect that and stay out if you do not meet their criteria.
  • 26. Always remember, if someone makes you an offer that seems too good to be true, it probably is.
  • 27.
  • 28. Some Very Useful Websites Educational http://www.freecampus.co.uk http://safety.ngfl.gov.uk http://www.bbc.co.uk/education/home http://www.yahooligans.com http://www.becta.org.uk http://www.24hourmuseum.org.uk http://www.worldwildlife.org/fun Kids. sites http://www.kidsdomain.co.uk http://www.bbc.co.uk/cbbc http://www.beritsbest.com http://www.ala.org
  • 29. Some Very Useful Websites Internet safety generally http://www.nch.org.uk http://www.getnetwise.org http://www.bbc.co.uk/webwise/basics http://www.disney.co.uk/DisneyOnline/Safesurfing/index.html Information for Parents http://www.nch.org.uk http://www.pin.org.uk http://www.netparents.org Consumer advice and information http://www.net-consumers.org http://www.tradingstandards.gov.uk http://www.which.net http://www.oft.gov.uk
  • 30. Some Very Useful Websites Search engines http://www.searchenginewatch.com/links/Major_Search_Engines Search engines especially for children http://www.searchenginewatch.com/links/Kids_Search_Engines http://www.yahooligans.com http://sunsite.berkeley.edu/kidsclick Chat http://www.chatdanger.com Reporting bad stuff http://www.iwf.org.uk Filtering and blocking and parental control software http://www.getnetwise.org
  • 31. The 49 countries with identified members of the Wonderland Club
  • 32. The 49 countries with identified members of the Wonderland Club
  • 33. Countries identified as having members of Wonderland but who were not involved inOperation Cathedral: