SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
UtahWomens Conference
Keeping kids Safe Online
Amy Iverson Natalie Wardel
aiverson@ksl.com nwardel@ksl.com
@amy_iverson @nataliewardel
The problems with kids and
access to tech
 Cyber Bullying
 Sexting
 Access to pornography
 Identity theft via messaging scams, or your
teen giving their information away
 Relationships forming with people with
malicious intent
 And more.
-Summit County Sheriff’s Department
1 in 3 have viewed some kind of pornography in the last week
Utah High School Student Statistics
1 in 4 have participated in sexting in the last week
However.
This isn’t new.
We just need to be ready.
There isn’t a need to fear, there
is a need to be aware.
Remember when we played MASH on paper. Now teens
play it on their phones. Same game. Different method.
The do’s and don’ts of
parenting and social media
Do:
Communicate and know what social networks
your child is using
Have access to the accounts
Treat new friends and followers like you would
guests in your home.
Train your children on social etiquette so they
will be socially savvy when they leave the home
Don’t
Rely on your children to tell you everything
Comment on every picture, post, etc.
Stalk your children endlessly without
communicating with them.
73%
27%
Teens: Do you have at least one social networking profile?
Yes!
Nope
12-17 year olds
- Pew Research 2010
The apps your teens are using
right now. And what to do.
Check out
who they
Friend
Facebook
Set their
Account to
private
Twitter
Don’t let a
false sense of
security fool
you
Snapchat
Hot center
for cyber
bullying.
Monitor.
Ask.Fm
Account set
to private;
turn off
location
check-in
Instagram
What to tell your kids
Do not give
out personal
information
Tell someone if you come
across information that makes
you uncomfortable then block
Do not use hashtags
or check into locations
that identifies your
school or home
address.
Never share
passwords or
click on
pop-ups
Everything
you post
online lives
forever
Prepare your children now so
they are good citizens of
the social world.

Contenu connexe

Tendances

Digital valentinesteensonlinedating
Digital valentinesteensonlinedatingDigital valentinesteensonlinedating
Digital valentinesteensonlinedatingTeenSafe
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Digital Citizens: It Takes a Village
Digital Citizens: It Takes a VillageDigital Citizens: It Takes a Village
Digital Citizens: It Takes a VillageMartin Cisneros
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetyccapozzoli
 
Cyberbulling - TIC
Cyberbulling - TICCyberbulling - TIC
Cyberbulling - TICsanticomolli
 
Sexting powerpoint
Sexting powerpoint Sexting powerpoint
Sexting powerpoint dee12
 
What Is Cyberstalking / Cyberbullying What Does the Law Say About It?
What Is Cyberstalking / Cyberbullying What Does the Law Say About It?What Is Cyberstalking / Cyberbullying What Does the Law Say About It?
What Is Cyberstalking / Cyberbullying What Does the Law Say About It?jhon Smith
 
Cyber-Bullying
Cyber-BullyingCyber-Bullying
Cyber-Bullyingk27fits
 
Cyber Bullying & Sexting
Cyber Bullying & SextingCyber Bullying & Sexting
Cyber Bullying & SextingKBryant
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measureskanika sharma
 
Cyberbullying: The Stats
Cyberbullying: The StatsCyberbullying: The Stats
Cyberbullying: The StatsEmily Thompson
 
Young marketers 5+1 + Lê Hồng Phong
Young marketers 5+1 + Lê Hồng PhongYoung marketers 5+1 + Lê Hồng Phong
Young marketers 5+1 + Lê Hồng PhongHong Phong Le
 

Tendances (18)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital valentinesteensonlinedating
Digital valentinesteensonlinedatingDigital valentinesteensonlinedating
Digital valentinesteensonlinedating
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Digital Citizens: It Takes a Village
Digital Citizens: It Takes a VillageDigital Citizens: It Takes a Village
Digital Citizens: It Takes a Village
 
Kids and the Screen World
Kids and the Screen World Kids and the Screen World
Kids and the Screen World
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Sexting
SextingSexting
Sexting
 
Cyberbulling - TIC
Cyberbulling - TICCyberbulling - TIC
Cyberbulling - TIC
 
Sexting powerpoint
Sexting powerpoint Sexting powerpoint
Sexting powerpoint
 
Nico santi y tomy
Nico santi y tomyNico santi y tomy
Nico santi y tomy
 
What Is Cyberstalking / Cyberbullying What Does the Law Say About It?
What Is Cyberstalking / Cyberbullying What Does the Law Say About It?What Is Cyberstalking / Cyberbullying What Does the Law Say About It?
What Is Cyberstalking / Cyberbullying What Does the Law Say About It?
 
Cyber-Bullying
Cyber-BullyingCyber-Bullying
Cyber-Bullying
 
Cyber Bullying & Sexting
Cyber Bullying & SextingCyber Bullying & Sexting
Cyber Bullying & Sexting
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
Cyberbullying: The Stats
Cyberbullying: The StatsCyberbullying: The Stats
Cyberbullying: The Stats
 
Young marketers 5+1 + Lê Hồng Phong
Young marketers 5+1 + Lê Hồng PhongYoung marketers 5+1 + Lê Hồng Phong
Young marketers 5+1 + Lê Hồng Phong
 

En vedette

Social Media 101, tailored to Thomas Jefferson School of Law
Social Media 101, tailored to Thomas Jefferson School of LawSocial Media 101, tailored to Thomas Jefferson School of Law
Social Media 101, tailored to Thomas Jefferson School of LawNatalie Andrews
 
A brief history of math
A brief history of mathA brief history of math
A brief history of mathFadli Dly
 
Topic1 equations student
Topic1 equations studentTopic1 equations student
Topic1 equations studentmramithnair
 
Topic2 basic statistics_student
Topic2 basic statistics_studentTopic2 basic statistics_student
Topic2 basic statistics_studentmramithnair
 
Condensed resiliency slides and script
Condensed resiliency slides and scriptCondensed resiliency slides and script
Condensed resiliency slides and scripterickson208
 
Social Media for Public Information Officers
Social Media for Public Information OfficersSocial Media for Public Information Officers
Social Media for Public Information OfficersNatalie Andrews
 

En vedette (9)

Charts
ChartsCharts
Charts
 
Social Media 101, tailored to Thomas Jefferson School of Law
Social Media 101, tailored to Thomas Jefferson School of LawSocial Media 101, tailored to Thomas Jefferson School of Law
Social Media 101, tailored to Thomas Jefferson School of Law
 
A brief history of math
A brief history of mathA brief history of math
A brief history of math
 
Status of the field
Status of the fieldStatus of the field
Status of the field
 
Comp intro
Comp introComp intro
Comp intro
 
Topic1 equations student
Topic1 equations studentTopic1 equations student
Topic1 equations student
 
Topic2 basic statistics_student
Topic2 basic statistics_studentTopic2 basic statistics_student
Topic2 basic statistics_student
 
Condensed resiliency slides and script
Condensed resiliency slides and scriptCondensed resiliency slides and script
Condensed resiliency slides and script
 
Social Media for Public Information Officers
Social Media for Public Information OfficersSocial Media for Public Information Officers
Social Media for Public Information Officers
 

Similaire à Keep Kids Safe Online: Tips for Parenting in a Digital Age

Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and CyberbullyingRaleigh ISSA
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting NewRandy Rodgers
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 

Similaire à Keep Kids Safe Online: Tips for Parenting in a Digital Age (20)

Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
102009
102009102009
102009
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying
 
Presentation1
Presentation1Presentation1
Presentation1
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting New
 
022010
022010022010
022010
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 

Dernier

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Dernier (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Keep Kids Safe Online: Tips for Parenting in a Digital Age

  • 1. UtahWomens Conference Keeping kids Safe Online Amy Iverson Natalie Wardel aiverson@ksl.com nwardel@ksl.com @amy_iverson @nataliewardel
  • 2. The problems with kids and access to tech  Cyber Bullying  Sexting  Access to pornography  Identity theft via messaging scams, or your teen giving their information away  Relationships forming with people with malicious intent  And more.
  • 3. -Summit County Sheriff’s Department 1 in 3 have viewed some kind of pornography in the last week Utah High School Student Statistics 1 in 4 have participated in sexting in the last week
  • 4. However. This isn’t new. We just need to be ready.
  • 5. There isn’t a need to fear, there is a need to be aware. Remember when we played MASH on paper. Now teens play it on their phones. Same game. Different method.
  • 6. The do’s and don’ts of parenting and social media Do: Communicate and know what social networks your child is using Have access to the accounts Treat new friends and followers like you would guests in your home. Train your children on social etiquette so they will be socially savvy when they leave the home Don’t Rely on your children to tell you everything Comment on every picture, post, etc. Stalk your children endlessly without communicating with them.
  • 7. 73% 27% Teens: Do you have at least one social networking profile? Yes! Nope 12-17 year olds - Pew Research 2010
  • 8. The apps your teens are using right now. And what to do. Check out who they Friend Facebook Set their Account to private Twitter Don’t let a false sense of security fool you Snapchat Hot center for cyber bullying. Monitor. Ask.Fm Account set to private; turn off location check-in Instagram
  • 9. What to tell your kids Do not give out personal information Tell someone if you come across information that makes you uncomfortable then block Do not use hashtags or check into locations that identifies your school or home address. Never share passwords or click on pop-ups Everything you post online lives forever
  • 10. Prepare your children now so they are good citizens of the social world.