Internet Safety For Everyone
Did you know? Millions of people are now going online to… “ Surf” the millions of websites on the Internet Post and read messages in newsgroups, forums or blogs Exchange email and instant messages Pay bills and check bank accounts Shop at online stores Search for jobs Use the library to search for books
Did you know? Children are more likely to be online than adults.
Internet Access Is Available Almost Anywhere At… Home A friend’s house School or college The library Cafés Fast food restaurants and bars
The Internet Can Be Accessed With Computers Mobile devices such as PDAs, iPhones, and cellular phones Game consoles such as Xbox, PS2, PSP
What’s the Big Deal About Internet Safety? There are no censors on the Internet ANYONE can create a website with ANYTHING on it Because of this, you need to use caution
Who Is at Risk? There are risks for kids, teens and adults. But, teens are more likely to go online without supervision and are more apt to talk about personal issues.
What Can Happen?
Exposure You might be exposed to material that is sexual, hateful, violent, or encourages activities that are dangerous or illegal (such as viewing gang related items, child pornography, or hate related items). You might seek out this material or inadvertently come across it on the Internet via websites, chat rooms, email, or instant messages.
Physical Molestation You might be asked to provide information or arrange an encounter that could risk your safety or the safety of family members. In some cases child molesters have used chat areas, email, and instant messaging to gain a child’s confidence and then arrange a face-to-face meeting.
Harassment & Bullying Like bullying at school, you might encounter messages via chat, email, or your cell phone that are belligerent, demeaning, or harassing.  Bullies often use the Internet to bother their victims.
Viruses & Hackers You could download a file containing a virus via email, or from a website, that could damage the computer (with things like spyware or adware) or increase the risk of a “hacker” gaining remote access to the computer; jeopardizing your family’s privacy and perhaps safety.
Legal and Financial You might be asked to give personal information such as your social security number at an unsecured site, and be a victim of identity theft. You could do something that has negative legal or financial consequences such as giving out credit-card or bank account information.
What Can You Do?
Protect Your Computer First Thing:  Install Anti-Virus and Internet Security Software What is anti-virus and Internet security software? Anti-Virus Software is a program that can find and remove viruses from your computer.  Examples are Norton, McAfee, NOD32 Internet Security Software helps prevent viruses and hackers from breaking into your computer when online.  Examples are Norton, McAfee, Panda, BitDefender
Secure Pages… Believe it or not, your Internet Service Provider (ISP) – where you get your Internet from – CAN view what you are doing when you’re online.  Are they? Probably not. But, when you are asked to enter a password, credit card number or other important secure information, which no one else should have access to, you should make sure you’re on a secure page.
Secure Pages… On a secure page, the information is encrypted – meaning it’s in code – so no one can see what you’re doing unless they’re looking over your shoulder.
Secure Pages… A normal web page has the beginning address of  http:// When a page is secure, the http gains an “s” (for secure), so it looks like  https://
Secure Pages A menu will come up (unless disabled) that tells you the page you are going to is secure.  The menu looks like: If you are shopping online and are about to pay or are about to input personal information such as a social security number, make sure the page is secure.
Social Networking… According to Netsmartz411, social networking is an online community where people from all over the world can meet and share common interests. MySpace, Tagged, Hi5, and Yahoo360 are a few examples of social networking.
Social Networking… A few good ways to protect yourself on social networking sites – or any Internet site - are: Do not use your real picture.  Instead, use an avatar or cartoon image. Do not put too much detailed information about yourself.
Social Networking Instead of saying you live at 1234 Anywhere St. in Houston, TX only say you live in Texas or Houston. Be careful meeting online friends in person.  Be sure to tell a real-life friend about the meeting and meet them in a public place.  For kids and teens, don’t meet online friends in person without first telling your parent or guardian.
Email Most viruses get on computers from email.  When checking your email, make sure you only open attachments from people that you know and trust. If you receive an email from someone you don’t know, don’t open it.  If you receive an email from a person you know with an odd subject line, for example “Fw:FW:FW:FW:your pic” or “See Jennifer Lopez Naked” DO NOT open it because it most likely contains a virus. Open more than one email account.  Use one email address for personal business and another for sites you don’t trust.
Child Pornography There are areas on the Internet that contain illegal child pornography.  If you or your children come across this type of material, report it to the National Center for Missing & Exploited Children’s (NCMEC) CyberTipline® at  www.cybertipline.com
Tips… Never give too much information about yourself to a person online or to a website. If it’s too good to be true, it probably is. When chatting with people online, keep in mind that the 13 year old girl who you’re chatting with could very well be a 45 year old man. Just because it’s on the Internet doesn’t make it true.  If you’re doing research, verify your data.
Tips You can contact your ISP about services they offer to block offensive or harmful sites and spam. You can get filtering software that will block your browser from going to most offensive and harmful sites. Many people make the mistake of using common passwords such as birthdays, children’s names, “love,” “money,” “sex,” and “password.” Always use hard to guess passwords that contain letters, numbers and symbols.
For Parents… Talk with your child about what is appropriate and what is not.  Parental involvement and supervision in your child’s online activities is the number one thing to reduce risks on the Internet. If your child tells you about an upsetting message, person or website they encountered while online, don’t blame your child. Work together to avoid future problems.
For Parents… If you do not know how to approach this, seek out the advice and counsel of teachers, librarians, and other Internet and online service users in your area. Maintain open communication with your children.  Use computer resources, and get online yourself, which will help alert you to any potential problems.
For Parents… Some search engines have a “childsafe” option that you can activate to prevent your child from viewing inappropriate sites. Check out filtering, blocking, and rating applications.
For Parents Share an email address with your children and keep track of files they download. Keep the computer in a public room instead of a child’s bedroom. Be aware of your child’s online friends.
Putting It In Perspective There have been some highly publicized incidents involving exploitation on the Internet and there are dangers involved with the Internet. The fact is most users don’t experience serious problems on the Internet. By exercising caution and being knowledgeable about the Internet you will be safer going online.
For More Information http://www.hcpl.net/about/internetsafety.htm http://www.netsmartz.org http://www.netsmartz411.org http://www.getnetwise.org http://www.wiredsafety.org Library staff is available to give guidance and assistance in using online resources.

More Related Content

PPTX
Internet safety ppt
PPTX
Online Safety 3.0 - Presentation for Parents and Teachers
PPT
Digital Footprints Presentation
PPTX
Staying Safe Online For Kids
PPTX
Cyber safety: internet safety presentation for middle school students
PPTX
Internet Safety | Online Safety | Internet Safety Tips
PPS
Internet safety
PPTX
Internet do's and don'ts. Kids safety on the Internet
Internet safety ppt
Online Safety 3.0 - Presentation for Parents and Teachers
Digital Footprints Presentation
Staying Safe Online For Kids
Cyber safety: internet safety presentation for middle school students
Internet Safety | Online Safety | Internet Safety Tips
Internet safety
Internet do's and don'ts. Kids safety on the Internet

What's hot (20)

PDF
Internet Safety
PPT
Cyber Bullying
PDF
Cyber safety tips
PPTX
What is cyberbullying presentation
PPT
A Quick Online Safety Presentation
PPT
Cyber safety training for 6th grade
PPT
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
PPTX
Cybersafety powerpoint
PPTX
Cyberbullying
PPTX
Stop Cyberbullying
PPT
Internet Safety Elementary
PPTX
Cyberbullying
PPTX
Power Point Cyber-bullying
PPT
Internet Safety
PDF
Internet safety tips for kids and teens
PPTX
Cyber safety
PPTX
Cyber bullying
PPT
Internet Safety Presentation
PPTX
Cyberbullying powerpoint
PPTX
Cyber bullying
Internet Safety
Cyber Bullying
Cyber safety tips
What is cyberbullying presentation
A Quick Online Safety Presentation
Cyber safety training for 6th grade
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cybersafety powerpoint
Cyberbullying
Stop Cyberbullying
Internet Safety Elementary
Cyberbullying
Power Point Cyber-bullying
Internet Safety
Internet safety tips for kids and teens
Cyber safety
Cyber bullying
Internet Safety Presentation
Cyberbullying powerpoint
Cyber bullying
Ad

Viewers also liked (20)

PPTX
Internet safety
PPTX
Internet safety
PPT
Internet Safety
PPT
Internet Safety; A Guide for Parents & Teachers
PPTX
Internet Safety and Chldren
PPT
Level2 lesson11 v2
KEY
Internet safety slides
PPT
Successful writing. Lecture three.
PPT
Comp I Section 33 Ppt
PPTX
Internet Safety 2008 Parent Univ
PPTX
English 101. Antecedent & Referent
PPTX
Cross cultural communication
PPTX
Internet Safety
PPT
pronouns
PPTX
Presentation1 pronoun
PPTX
Problems with Pronouns
PPTX
Introduction to Internet Safety, Social Media and Blogging
PPT
Internet safety v 4 slides and notes
PPTX
03. directly answered questions
PPT
Pronoun.antecedent
Internet safety
Internet safety
Internet Safety
Internet Safety; A Guide for Parents & Teachers
Internet Safety and Chldren
Level2 lesson11 v2
Internet safety slides
Successful writing. Lecture three.
Comp I Section 33 Ppt
Internet Safety 2008 Parent Univ
English 101. Antecedent & Referent
Cross cultural communication
Internet Safety
pronouns
Presentation1 pronoun
Problems with Pronouns
Introduction to Internet Safety, Social Media and Blogging
Internet safety v 4 slides and notes
03. directly answered questions
Pronoun.antecedent
Ad

Similar to Internet Safety (20)

PPTX
Internet safety update
PPTX
Lesson 2 rules of netiquette
PPTX
Online-Safety-Security-and-etiquette.pptx
PPTX
Rules of Netiquette Empowerment Technologies Lesson
PPT
Internet Safety for Your Child
PPT
Internet Safety
PDF
Empowerment Technologies - Module 2
PPT
Digital safety[1]
PPTX
Empowerment TECHONOLOGY 12- FIRST SEMESTER
PPTX
EMTECH Q1, M2 ONLINE SAFETY SECURITY ETHIC AND ETIQUETTE.pptx
PPTX
Tot edu eng.
PDF
Internetsecurity
PDF
Rules of Netiquette
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
PPTX
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
PPTX
Internet safety
PPS
Microsoft (Projects)
PPT
Protect Yourself From Internet Pests
PPT
8th grade presentation for slideshare
PPT
Secure social networking
Internet safety update
Lesson 2 rules of netiquette
Online-Safety-Security-and-etiquette.pptx
Rules of Netiquette Empowerment Technologies Lesson
Internet Safety for Your Child
Internet Safety
Empowerment Technologies - Module 2
Digital safety[1]
Empowerment TECHONOLOGY 12- FIRST SEMESTER
EMTECH Q1, M2 ONLINE SAFETY SECURITY ETHIC AND ETIQUETTE.pptx
Tot edu eng.
Internetsecurity
Rules of Netiquette
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
Internet safety
Microsoft (Projects)
Protect Yourself From Internet Pests
8th grade presentation for slideshare
Secure social networking

More from harriscountypubliclibrary (17)

PPTX
Galena Park Branch Library Virtual Tour
PPTX
LaPorte Branch Library Virtual Tour
PPTX
Freeman Branch Library Virtual Tour
PPTX
Personal Reading Consultants: Blending Technology and Touch
PPTX
Baldwin Boettcher Virtual Tour
PPTX
Kingwood Branch Virtual Tour
PPT
Stratford Branch Virtual Tour
PPT
PAC 2.0: Patron Reviews
PPTX
Parker Williams Virtual Tour
PDF
Going Quackers: Tale of an Unlikely Librarian by Daisy Mae Duck
PPTX
Cy-Fair Virtual Tour
PPTX
Fairbanks Branch Library
PPT
High Meadows Virtual Tour
PPTX
Atascocita Virtual Tour
PPTX
Barbara Bush Virtual Tour
PPT
Seguridad En Internet
PPT
iHCPL Motivation
Galena Park Branch Library Virtual Tour
LaPorte Branch Library Virtual Tour
Freeman Branch Library Virtual Tour
Personal Reading Consultants: Blending Technology and Touch
Baldwin Boettcher Virtual Tour
Kingwood Branch Virtual Tour
Stratford Branch Virtual Tour
PAC 2.0: Patron Reviews
Parker Williams Virtual Tour
Going Quackers: Tale of an Unlikely Librarian by Daisy Mae Duck
Cy-Fair Virtual Tour
Fairbanks Branch Library
High Meadows Virtual Tour
Atascocita Virtual Tour
Barbara Bush Virtual Tour
Seguridad En Internet
iHCPL Motivation

Recently uploaded (20)

PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Human Computer Interaction Miterm Lesson
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PPTX
Internet of Everything -Basic concepts details
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
A symptom-driven medical diagnosis support model based on machine learning te...
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Human Computer Interaction Miterm Lesson
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Presentation - Principles of Instructional Design.pptx
Rapid Prototyping: A lecture on prototyping techniques for interface design
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Ensemble model-based arrhythmia classification with local interpretable model...
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Auditboard EB SOX Playbook 2023 edition.
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Internet of Everything -Basic concepts details
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
4 layer Arch & Reference Arch of IoT.pdf
CEH Module 2 Footprinting CEH V13, concepts
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf

Internet Safety

  • 2. Did you know? Millions of people are now going online to… “ Surf” the millions of websites on the Internet Post and read messages in newsgroups, forums or blogs Exchange email and instant messages Pay bills and check bank accounts Shop at online stores Search for jobs Use the library to search for books
  • 3. Did you know? Children are more likely to be online than adults.
  • 4. Internet Access Is Available Almost Anywhere At… Home A friend’s house School or college The library Cafés Fast food restaurants and bars
  • 5. The Internet Can Be Accessed With Computers Mobile devices such as PDAs, iPhones, and cellular phones Game consoles such as Xbox, PS2, PSP
  • 6. What’s the Big Deal About Internet Safety? There are no censors on the Internet ANYONE can create a website with ANYTHING on it Because of this, you need to use caution
  • 7. Who Is at Risk? There are risks for kids, teens and adults. But, teens are more likely to go online without supervision and are more apt to talk about personal issues.
  • 9. Exposure You might be exposed to material that is sexual, hateful, violent, or encourages activities that are dangerous or illegal (such as viewing gang related items, child pornography, or hate related items). You might seek out this material or inadvertently come across it on the Internet via websites, chat rooms, email, or instant messages.
  • 10. Physical Molestation You might be asked to provide information or arrange an encounter that could risk your safety or the safety of family members. In some cases child molesters have used chat areas, email, and instant messaging to gain a child’s confidence and then arrange a face-to-face meeting.
  • 11. Harassment & Bullying Like bullying at school, you might encounter messages via chat, email, or your cell phone that are belligerent, demeaning, or harassing. Bullies often use the Internet to bother their victims.
  • 12. Viruses & Hackers You could download a file containing a virus via email, or from a website, that could damage the computer (with things like spyware or adware) or increase the risk of a “hacker” gaining remote access to the computer; jeopardizing your family’s privacy and perhaps safety.
  • 13. Legal and Financial You might be asked to give personal information such as your social security number at an unsecured site, and be a victim of identity theft. You could do something that has negative legal or financial consequences such as giving out credit-card or bank account information.
  • 15. Protect Your Computer First Thing: Install Anti-Virus and Internet Security Software What is anti-virus and Internet security software? Anti-Virus Software is a program that can find and remove viruses from your computer. Examples are Norton, McAfee, NOD32 Internet Security Software helps prevent viruses and hackers from breaking into your computer when online. Examples are Norton, McAfee, Panda, BitDefender
  • 16. Secure Pages… Believe it or not, your Internet Service Provider (ISP) – where you get your Internet from – CAN view what you are doing when you’re online. Are they? Probably not. But, when you are asked to enter a password, credit card number or other important secure information, which no one else should have access to, you should make sure you’re on a secure page.
  • 17. Secure Pages… On a secure page, the information is encrypted – meaning it’s in code – so no one can see what you’re doing unless they’re looking over your shoulder.
  • 18. Secure Pages… A normal web page has the beginning address of http:// When a page is secure, the http gains an “s” (for secure), so it looks like https://
  • 19. Secure Pages A menu will come up (unless disabled) that tells you the page you are going to is secure. The menu looks like: If you are shopping online and are about to pay or are about to input personal information such as a social security number, make sure the page is secure.
  • 20. Social Networking… According to Netsmartz411, social networking is an online community where people from all over the world can meet and share common interests. MySpace, Tagged, Hi5, and Yahoo360 are a few examples of social networking.
  • 21. Social Networking… A few good ways to protect yourself on social networking sites – or any Internet site - are: Do not use your real picture. Instead, use an avatar or cartoon image. Do not put too much detailed information about yourself.
  • 22. Social Networking Instead of saying you live at 1234 Anywhere St. in Houston, TX only say you live in Texas or Houston. Be careful meeting online friends in person. Be sure to tell a real-life friend about the meeting and meet them in a public place. For kids and teens, don’t meet online friends in person without first telling your parent or guardian.
  • 23. Email Most viruses get on computers from email. When checking your email, make sure you only open attachments from people that you know and trust. If you receive an email from someone you don’t know, don’t open it. If you receive an email from a person you know with an odd subject line, for example “Fw:FW:FW:FW:your pic” or “See Jennifer Lopez Naked” DO NOT open it because it most likely contains a virus. Open more than one email account. Use one email address for personal business and another for sites you don’t trust.
  • 24. Child Pornography There are areas on the Internet that contain illegal child pornography. If you or your children come across this type of material, report it to the National Center for Missing & Exploited Children’s (NCMEC) CyberTipline® at www.cybertipline.com
  • 25. Tips… Never give too much information about yourself to a person online or to a website. If it’s too good to be true, it probably is. When chatting with people online, keep in mind that the 13 year old girl who you’re chatting with could very well be a 45 year old man. Just because it’s on the Internet doesn’t make it true. If you’re doing research, verify your data.
  • 26. Tips You can contact your ISP about services they offer to block offensive or harmful sites and spam. You can get filtering software that will block your browser from going to most offensive and harmful sites. Many people make the mistake of using common passwords such as birthdays, children’s names, “love,” “money,” “sex,” and “password.” Always use hard to guess passwords that contain letters, numbers and symbols.
  • 27. For Parents… Talk with your child about what is appropriate and what is not. Parental involvement and supervision in your child’s online activities is the number one thing to reduce risks on the Internet. If your child tells you about an upsetting message, person or website they encountered while online, don’t blame your child. Work together to avoid future problems.
  • 28. For Parents… If you do not know how to approach this, seek out the advice and counsel of teachers, librarians, and other Internet and online service users in your area. Maintain open communication with your children. Use computer resources, and get online yourself, which will help alert you to any potential problems.
  • 29. For Parents… Some search engines have a “childsafe” option that you can activate to prevent your child from viewing inappropriate sites. Check out filtering, blocking, and rating applications.
  • 30. For Parents Share an email address with your children and keep track of files they download. Keep the computer in a public room instead of a child’s bedroom. Be aware of your child’s online friends.
  • 31. Putting It In Perspective There have been some highly publicized incidents involving exploitation on the Internet and there are dangers involved with the Internet. The fact is most users don’t experience serious problems on the Internet. By exercising caution and being knowledgeable about the Internet you will be safer going online.
  • 32. For More Information http://www.hcpl.net/about/internetsafety.htm http://www.netsmartz.org http://www.netsmartz411.org http://www.getnetwise.org http://www.wiredsafety.org Library staff is available to give guidance and assistance in using online resources.