SlideShare une entreprise Scribd logo
1  sur  32
Using Technology
     Safely

      Paul O’Briant
    paul@obriant.net
www.21stCenturySheep.com
Do you love me? Tend my
        sheep.
           2
               John 21:16
Inappropriate content,
 contact, conduct
• 5 million Americans
  watch Major League
  Baseball




                        • 40 million Americans
                         regularly access internet
                                    porn
In 2009 over half of male college
  students and nearly a third of
  female students report being
 exposed to pornography before
their teenage years (by age 12),
and 35% of all students say their
  first exposure .was Internet or
         computer-based.
         Porn University, Michael Leahy
www.MartinLutherKing.org
Viruses – Malware- Spyware - Scareware
Inappropriate Contact
GeoTags
Inappropriate Conduct
• 33 percent of youth
Cyberbullying          have been victims
                     • 34 percent of youth
                       who are bullied feel
                       frustrated, 30 percent
                       angry and 22 percent
                       feel sad
                     • 41 percent of victims
                       do not tell anyone in
                       their off-screen lives
                       about their abuse
                     •   Cyberbullying.us




                14
2% of teens say they have sent a nude or
partially nude photo or video

 www.athinline.org




 16% of teens says they have received one
• 1/3 teens ages 16-17 say they have
         texted while driving. Pew
• A driver is 23 times more likely to have
  an accident when 16 texting and driving.
Cyber-Crime




      www.ic3.gov
18
Where do you start?
•   Can’t claim ignorance
•   Talk about the issues
•   Cybersafety rules
•   Model good behavior
•   Limit access

       www.onguardonline.gov
www.CovenantEyes.com

    Resources/eBooks
Technical Strategies

          • Parental Controls
            filtering/monitoring
            software
          • Safe search options
          • Check History
Safe Search
• Use antivirus and
  anti-malware software
• Keep operating
  systems up to date
Filtering is not enough
Parental Controls
•   www.ActionAlert.com (free)
•   www.NetNanny.com
•   http://parentalcontrolbar.com/ (free)
•   http://www1.k9webprotection.com/
    (free)
Using Technology
     Safely

      Paul O’Briant
    paul@obriant.net
www.21stCenturySheep.com

Contenu connexe

En vedette

Deploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalitiesDeploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalitiesFredrick Ishengoma
 
Chapter 4
Chapter 4Chapter 4
Chapter 4detjen
 
Drucker chapter 3
Drucker chapter 3Drucker chapter 3
Drucker chapter 3detjen
 
Arte a medio dibujar
Arte a medio dibujarArte a medio dibujar
Arte a medio dibujarmaugepe
 
Chapter 13
Chapter 13Chapter 13
Chapter 13detjen
 
Cyber safety, technology and the church
Cyber safety, technology and the churchCyber safety, technology and the church
Cyber safety, technology and the churchPaul OBriant
 
Luxembourg Blockchain Meetup 13 July 2016 - Bertolo
Luxembourg Blockchain Meetup 13 July 2016 - BertoloLuxembourg Blockchain Meetup 13 July 2016 - Bertolo
Luxembourg Blockchain Meetup 13 July 2016 - BertoloStefano Bertolo
 
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma
 
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...Fredrick Ishengoma
 
Staying safe online
Staying safe onlineStaying safe online
Staying safe onlinePaul OBriant
 
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File SystemFredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File SystemFredrick Ishengoma
 

En vedette (12)

Deploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalitiesDeploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalities
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Drucker chapter 3
Drucker chapter 3Drucker chapter 3
Drucker chapter 3
 
Arte a medio dibujar
Arte a medio dibujarArte a medio dibujar
Arte a medio dibujar
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Cyber safety, technology and the church
Cyber safety, technology and the churchCyber safety, technology and the church
Cyber safety, technology and the church
 
Luxembourg Blockchain Meetup 13 July 2016 - Bertolo
Luxembourg Blockchain Meetup 13 July 2016 - BertoloLuxembourg Blockchain Meetup 13 July 2016 - Bertolo
Luxembourg Blockchain Meetup 13 July 2016 - Bertolo
 
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
Fredrick Ishengoma - Online Social Networks and Terrorism 2.0 in Developing C...
 
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
Fredrick Ishengoma - A Novel Design of IEEE 802.15.4 and Solar Based Autonomo...
 
Using tech safely
Using tech safelyUsing tech safely
Using tech safely
 
Staying safe online
Staying safe onlineStaying safe online
Staying safe online
 
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File SystemFredrick Ishengoma -  HDFS+- Erasure Coding Based Hadoop Distributed File System
Fredrick Ishengoma - HDFS+- Erasure Coding Based Hadoop Distributed File System
 

Similaire à Dakotas Parent Meeting Presentation

How to stay safe online p2
How to stay safe online p2How to stay safe online p2
How to stay safe online p2Typho8000
 
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...soissues
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartJorge Borges
 
Facebook and your child
Facebook and your childFacebook and your child
Facebook and your childlissecondary
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationspringvillegi
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School
 
Mc afee digital deception study 2013
Mc afee digital deception study 2013Mc afee digital deception study 2013
Mc afee digital deception study 2013PNMI
 
Social media and its effects on youth -sb
Social media and its effects on youth -sbSocial media and its effects on youth -sb
Social media and its effects on youth -sbSachin Dahiya
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet SafetyJVGAJJAR
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupScott Burnett
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07TristanLG
 

Similaire à Dakotas Parent Meeting Presentation (20)

How to stay safe online p2
How to stay safe online p2How to stay safe online p2
How to stay safe online p2
 
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
 
Facebook and Your Child
Facebook and Your ChildFacebook and Your Child
Facebook and Your Child
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Youth, Sex & the Internet: What practitioners need to know
Youth, Sex & the Internet:  What practitioners need to knowYouth, Sex & the Internet:  What practitioners need to know
Youth, Sex & the Internet: What practitioners need to know
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda Lenhart
 
Facebook and your child
Facebook and your childFacebook and your child
Facebook and your child
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura BatesCranleigh School Technology & Teenage Mental Health Conference: Laura Bates
Cranleigh School Technology & Teenage Mental Health Conference: Laura Bates
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Mc afee digital deception study 2013
Mc afee digital deception study 2013Mc afee digital deception study 2013
Mc afee digital deception study 2013
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Social media and its effects on youth -sb
Social media and its effects on youth -sbSocial media and its effects on youth -sb
Social media and its effects on youth -sb
 
Web safety
Web safetyWeb safety
Web safety
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07APA IPS 2011 - Workshop 07
APA IPS 2011 - Workshop 07
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Dakotas Parent Meeting Presentation

  • 1. Using Technology Safely Paul O’Briant paul@obriant.net www.21stCenturySheep.com
  • 2. Do you love me? Tend my sheep. 2 John 21:16
  • 3.
  • 5. • 5 million Americans watch Major League Baseball • 40 million Americans regularly access internet porn
  • 6.
  • 7. In 2009 over half of male college students and nearly a third of female students report being exposed to pornography before their teenage years (by age 12), and 35% of all students say their first exposure .was Internet or computer-based. Porn University, Michael Leahy
  • 9. Viruses – Malware- Spyware - Scareware
  • 11.
  • 14. • 33 percent of youth Cyberbullying have been victims • 34 percent of youth who are bullied feel frustrated, 30 percent angry and 22 percent feel sad • 41 percent of victims do not tell anyone in their off-screen lives about their abuse • Cyberbullying.us 14
  • 15. 2% of teens say they have sent a nude or partially nude photo or video www.athinline.org 16% of teens says they have received one
  • 16. • 1/3 teens ages 16-17 say they have texted while driving. Pew • A driver is 23 times more likely to have an accident when 16 texting and driving.
  • 17. Cyber-Crime www.ic3.gov
  • 18. 18
  • 19. Where do you start? • Can’t claim ignorance • Talk about the issues • Cybersafety rules • Model good behavior • Limit access www.onguardonline.gov
  • 20.
  • 21.
  • 22. www.CovenantEyes.com Resources/eBooks
  • 23.
  • 24.
  • 25. Technical Strategies • Parental Controls filtering/monitoring software • Safe search options • Check History
  • 26.
  • 27.
  • 29. • Use antivirus and anti-malware software • Keep operating systems up to date
  • 31. Parental Controls • www.ActionAlert.com (free) • www.NetNanny.com • http://parentalcontrolbar.com/ (free) • http://www1.k9webprotection.com/ (free)
  • 32. Using Technology Safely Paul O’Briant paul@obriant.net www.21stCenturySheep.com