Our Events > Past Event Resources

Parent Survival Guide Parent_Survival_Guide.doc
 

Ryan's Story http://www.ryanpatrickhalligan.org/

Miss Representation Power Point l  click here to view more
 
Dare to Discuss Drugs  Dare_to_discuss_drugs.ppt
 



Scott Driscoll, President - Internet Safety Concepts

www.InternetSafetyConcepts.com



Today’s technology and apps - How to empower smart online choices


Then and Now - as adults we went from record players, 8 track cassettes, audio cassettes to Spotify, Pandora, etc. More media choices available.



Potential Problems if you don’t use these programs safely.


Picture sharing goes back to Polaroid photos. Facebook is fading with youth, described by youth as for grandparents.


Apps: Scott will talk about how they work and how you can get some control back. Offering Tips and Tricks to help kids use safely.


Digital footprints can have a huge impact.


Every time you load an app, you’re asked for push notifications. If friends go live you’re notified. If we say “yes” and that app can use our phone’s GPS, we’ve given notification. Say no to notifications initially until you learn how they work.


Instagram requests access to GPS. Set control to private. We need to know who with whom we’re connected. Go to Options and select private account.


Another consideration for apps is profiles. Give the required minimum. Give first letter of name and hit submit to see what comes back. Sometimes this is all you need.


Allowing links to other media sites can enable followers from other areas. There can be a crossover between Facebook, Instagram, Twitter, etc.


E.g., a picture at the state capitol in Instagram gives a map location. iPhone can add the address to contacts and provide directions. People across all platforms can see.


Instagram now allows private messages (in red circle on the top right). Following your child on Instagram doesn’t allow for parents to see private communication. Pictures disappear. Even if you delete, a screenshot can be taken.


Instagram has a minimum age of 13. Kids can still sign up regardless.


Snapchat

In the privacy statement it says “we believe in deletion, but we can’t guarantee it.” The timer now has up to 10 seconds and then “no limit” for viewing. We need to understand upgrades.


Adding stories can be viewed for 24 hours.


If you have to put a password on a picture, it probably shouldn’t be on an open phone. Snapchat enables contact when a picture is downloaded.


Snapchat allows for video feed as well.


*Make sure “ghost mode” is on. You can go to the settings page to change the default “everyone” to “private.” Snapchat can be a fun app.




Kik

A messaging program that allows group text messaging. This is not run by the USA and does not follow US law. There is no privacy on Kik. Probably the worst app for kids.


There are cards that run inside the Kik program. Sharing pictures has all programs that run under the Kik icon. You can block matching.



Anonymous Apps


Whisper

Sarahah - run out of a faraway country. It is meant to allow for anonymity.

After School - Parents can’t get in. You have to scan student ID. Two schools were shut down because of this.


Musical.ly

Allows for people to see homes, valuables, house numbers. There’s more concern for kids with popularity than with safety.


Apps to hide folders/pictures

iCalculator a password protected vault. If you have to have a vault, it may not be the right stuff to have on your phone. If you see an additional calculator, ask why?


Facebook

Minimum requirements: Name and email address. If we’re checking in, be careful. Check ins can be noticed years later, and how many times visited. Better to check in the day after, especially if away from your family and home. Kids should be asked permission to have their pictures posted. One child mentioned how she wanted her parent to stop posting pictures of her as she was applying for colleges.


Going Live
“You can’t take it back.” Sometimes accidents have been recorded. Avoid this mode if possible.


Sexting

The sending of sexually explicit digital images, videos, text messages,or emails, usually by cell phone.


53a-196h - Possessing or transmitting child pornagraphy by minor

(1) No person who is thirteen years of age or older but under eighteen years of age may knowingly possess any visual depiction of child pornography that the subject of such visual depiction knowingly and voluntarily transmitted by means of an electronic communication device to such person and in which the subject of such visual depiction is a person thirteen years of age or older but under sixteen years of age.

(2) No person who is thirteen years of age or older but under sixteen years of age may knowingly and voluntarily transmit by means of an electronic communication device a visual depiction of child pornography in which such person is the subject of such visual depiction to another person who is thirteen years of age or older but under eighteen years of age.

(c) Any person who violates the provisions of this section shall be guilty of a class A misdemeanor.


Pictures in three categories: good, inappropriate, or illegal. This law affects the illegal - depending on age, act, body parts exposed, how they are exposed.


If you receive the picture between the ages of 13-18 - delete immediately or bring to law enforcement immediately.


Forwarding makes removal and the situation more difficult.


Scott discussed a story where a girl sent an inappropriate picture to her boyfriend. When they broke up two days later, he sent this around the school. Three weeks later it was on the internet. The picture was taken in 2007. In 2011, Scott Driscoll learned that this girl attempted to apply for a scholarship and was denied when her name was googled. In 2017, the picture was still there.


Is the picture S.A.FE?

Sure

Appropriate

For

Everyone


Bullying vs Cyber Bullying

Bullying is the act of intentionally, and repeatedly, causing harm to others, through verbal harassment, physical assault, or other more subtle methods of coercion.


Cyber bullying

Cyberbullying occurs when a child or teen is embarrassed, humiliated, harassed, tormented or otherwise targeted by another person using the Internet or other form of digital communication.


Avoid the idea that “snitches get stitches”, heroes help others who need help. A girl noticed a message where a boy in another town was being bullied and informed Scott after his presentation in her school. The resource staff member contacted the school where the boy was enrolled to ask for a check in. He was home and was offered help in time as he was not well, and the timely discovery gave him the medical help he needed.


Scott challenges other kids to be positive, respect each other. He quoted a girl’s saying: “Say what you mean, mean what you say, but don’t say it mean.”


Are there social networking positives?

ALS Ice bucket challenge - scientists are crediting the ALC ice bucket challenge for breakthroughs in research. (Article at this link).


There’s a big difference between Friend and Follower. Followers only know what you want them to know. Friends know who you are.


Colleges are looking at what you do; your digital footprint is important. They will pull scholarships due to online activity.


Is a digital footprint important? Look at this through the eyes of a child/parent.


Acronyms to learn:


Controlling access


www.OpenDNS.com is a free parental control for your router. What’s good about the router is that any device that connects to it gives us a little more control.


You can also turn off the router in the home.


Safe Searching there are better search engines out there.


Monitoring Apps

Circle with Disney

MMGuardian

Uknowkids.com

Mobicip

TeenSafe

Qustodio


Go to his website www.CTParentinfo.com - print out the cards which give information about the apps.



You can also download family contracts from Scott’s website.

Child version

Teen version


Families decide what the consequences are for breaking. Parents sign and agree to learn and listen.


Steps we can take with our children

  • Set accounts to private

  • Approvate only to use you know and want to communicate with

  • # can be permanent so use them wisely

  • Don’t post anonymously. If you can’t say it as you, it probably should not be said

  • Protect your password

  • Recognize a person, friend or peer in trouble - GET INVOLVED!!

  • Parental Controls

  • Refresh our brains about strangers (if meeting someone on Craig’s List - ask to go to a police department parking lot)

  • Be respectful

  • Do not share other people’s contact information

  • Sit and learn.

  • Limit our time on line (Good luck!!!)


Book

www.R U in Danger.net

Scott Driscoll and Laurie Gifford Adams

Available on Amazon and Barnes and Noble


To Follow Scott

www.InternetSafetyConcepts.com


Twitter Facebook In YouTube



Q and A

Q. Should the computer be in the kitchen?

A. Depends on the age and maturity.


Q. If you observe something on the internet that’s of concern, eg. guns and violence. Who do you contact? Parent, school, police?

A. It’s a judgement call. Depends on the parent and the community. All can work together.


Scott offered to respond to questions via his website. See the link at the start for more resources and parent supports.


Thank you Scott for an excellent presentation!


 
 
 
 

The Game Has Changed
To Hell and Back
 
Call us:
1-203-788-5199
Find us:
Southbury and Middlebury, CT
© 2012 by S.M.A.R.T., Inc.