Social Media Risks and School Safety

undefined
 
Forsyth County Schools
Forsyth County Schools
Todd Shirley, Director
Todd Shirley, Director
Tim Monroe, Assistant Director
Tim Monroe, Assistant Director
Steve Honn, School Safety Manager
Steve Honn, School Safety Manager
Ola Shadburn, General Administrative
Ola Shadburn, General Administrative
School Safety and Student Discipline
School Safety and Student Discipline
Joey Pirkle
Associate Superintendent 
Educational Leadership
Dr. L. C. (Buster) Evans
Superintendent of Schools
Department of School Safety and Student Discipline
Department of School Safety and Student Discipline
Session #5
2
Facebook
Twitter
Instagram
-online 
photo-sharing
, 
video-sharing
 and 
social networking
 service
that enables its users to take pictures and videos, apply digital 
filters
 to them, and
share them on a variety of social networking services, such as 
Facebook
, 
Twitter
,
Tumblr
 and 
Flickr
Vine
-
Owned by 
Twitter
, enables its users to create and post short 
video clips
Snapchat
-Allows users to take photos or short videos, then share them with friends
for up to 10 seconds before the image self-destructs. If a recipient screenshots the
photo, the app alerts the original sender, though 
hacks to interrupt this function 
do
exist.
Askfm
-
social networking
 website where users can ask other users questions,
with the option of anonymity used in foreign countries mostly
KIK
-
allows users to send texts via the Internet without having to use a cellular
telephone
Yik Yak
-
social media site that gives you an anonymous live feed of what people
are saying and doing.  Users create all the content.
3
 
Bullies can use your information
Predators can use the information
Comments – sued for defamation
Info – arrested or school discipline
No reasonable expectation of privacy
Future employers and schools can use
information as “instant background checks”
4
5
Connor Riley had a job offer from
Cisco on the table. 
She tweeted
:
“Cisco just offered me a job! Now
I have to weigh the utility of a
fatty paycheck against the daily
commute to San Jose and hating
the work.”
Shortly after that, there was a
reply from Cisco employee Tim
Levad: “Who is the hiring
manager? I’m sure they would
love to know that you will hate
the work. We here at Cisco are
versed in the Web.”
Connor Riley 
MSNBC
6
Eliminate all identifying information
Anything that allows you to be located
Anything that pairs the profile to your name
Delete inappropriate information
Read your information to determine what
impression it gives
Your site may appeal to someone you didn’t intend
for it to impress
7
Choose appropriate photos
Setting privacy settings appropriately
For privacy:
Develop your profile to be associated with a
nickname rather than your official name
8
9
10
Protect your friends’ info – no name, location,
birthday wish, phone numbers, etc.
Don’t write anything you wouldn’t want your
parents or principal to read (because they can
and MIGHT!)
Set your profile to private so you control who
views your profile.
Be careful when you post pics
11
What sport you play, the movies you like,
your music…that would be okay
Remember that these facts can be used to fool you
Be smarter than them
Always tell a trusted adult if you have
problems online
12
High-tech version of flirting, teens texting
explicit messages or photos to each other
Experimental
Aggravated
13
http://www.unh.edu/ccrc/pdf/CV231_Sexting Typology Bulletin_4-6-
11_revised.pdf
14
Pennsylvania -Sept. 6, 2013 State police slapped three Dauphin
County teenagers with child pornography charges. That was a
felony and a rarity for prosecutors.
TAMPA — Sept. 17, 2013 a Riverview teacher accused of sex acts
with a 12-year-old student had an unforeseen explanation for
hundreds of explicit text messages she sent the boy. She wanted
to get his attention for the purpose of education.
COLUMBUS, GA-Sept. 18, 2013Teacher Tucker Hearn officially
terminated from North side High School on Sept. 27
th
 charged
with attempted sexual assault. The female student is 16-years-
old. Sources say the student and Hearn were sexting and planned
to get together, but their plans were intercepted by police.  His
bond was set at $10,000. 
15
Florida-14 year old girl charged in connection with the
suicide of a 12 year old schoolmate after months of bullying
plead not guilty.
The girl was one of two Polk County students, ages 12 and
14, 
arrested and charged
 with aggravated stalking for
“maliciously harassing” Rebecca Ann Sedwick, 12, with verbal
and physical abuse and cyber-bullying, according to Polk
County Sheriff Grady Judd.  Charges were dropped.
Sedwick, 12, died after jumping from a third-story cement
plant structure on Sept. 10, 2013.
St. Petersburg-Nov. 7, 2013 A 15-year-old girl was arrested
and accused of sending hundreds of threatening text
messages to three other 15-year-old girls who are students
at the same St. Petersburg high school, in what police say is a
case of cyber-bullying. Using a software application called
KIK, allows users to send texts via the Internet without having
to use a cellular telephone
16
Tuesday, March 4, 2014
Bond was set at $50,000 for a suspended Douglas County elementary
school principal who was arrested in an undercover child sex sting.
John Harold McGill is facing child porn and exploitation charges and
made a first appearance in DeKalb County Court. He was one of 14
people who were arrested in a sting the Georgia Bureau of Investigation
called "Operation Broken Heart.“
17
Obscene
Average person would
find it wrong
It depicts sexual
conduct
It has no literary,
artistic, political or
scientific value
Child Pornography
Images of sexual
conduct
Under 18 years
413 US 15, OCGA § 16-12-80
OCGA § 16-12-100
If someone sends you something
Inappropriate – delete
Obscene and/or makes you uncomfortable – alert your
parent or authority
If you sent something
Ask recipient to delete it and not to forward it
Never send inappropriate text or images
In 2010, 20 percent of teenagers (22 % of girls and 18 %
of boys) sent naked/seminude images of themselves or
posted them online.
Nearly 1 in 6 teens between the ages of 12 and 17 have
received naked or nearly nude pictures via text message
from someone they know. (FBI Law Enforcement
Bulletin)
18
GBI tracking apparent nude pics of Gwinnett teens
Pictures have appeared on Twitter and Instagram
WSB-TV
GWINNETT COUNTY, Ga. — Tuesday, Dec. 17, 2013
The GBI investigating social media accounts that started
distributing nude pictures of Gwinnett teenagers. Gwinnett
County school police say a parent filed a report after a 3-
year-old nude photo of their daughter started circulating.
The victimized students appear to come from a variety of
high schools in Gwinnett County. It's possible that the girls
willingly took the photos without realizing where they would
end up or what would happen
The GBI is actively trying to identify the girls and determine
their ages to determine what crime has been committed
. If
the girls are under 18, a simple retweet could constitute
charges for distributing child pornography.
19
Cyber bullying: One form of bullying
Youth use technology to:
Send Text Messages
Make Web Postings
Stalk Others
Post Unauthorized Photos
Online Deception and Violence
Cyber-ostracism
20
http://www.smlinks.com/sotw/why/
One mistreating others – usually someone
that the target knows
Target – can be anyone
Bystander
Harmful-if complacent
Helpful-if report to adult
21
Making threats of violence to people or
property
Engaging in coercion
Making obscene or harassing text messages
Harassment or stalking
22
Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe
and Responsible Use of the Internet, January 2007
Hate or bias crime
Creating or sending sexually explicit images
of teens or children
Sexual exploitation
Taking a photo of someone in a place where
privacy is expected
23
Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe
and Responsible Use of the Internet, January 2007
10% to 20%  of youth have been targets
and/or aggressors
Cyberbullying  peaks in the middle school
years (grades 6-8)
Girls are more likely to be the target
Looks and body shape are the most
targeted characteristics
While there is an increase in cyberbullying,
it is likely because there is an increase in
use of technology
24
http://cyberbullying.us/blog
www.unh.edu/ccrc
25
26
Since January 23, 2004, criminals have been using the FDIC's name and reputation to
perpetrate various "phishing" schemes. It is important to note that the FDIC will never ask for
personal or confidential information in this manner.
27
If you suspect an e-mail or Web site is fraudulent, relay that
information to the real bank, company or government agency,
using a phone number or e-mail address from a reliable
source. Example: If your bank's Web page looks different or
unusual, contact the institution directly to confirm that you
haven't landed on a copycat Web site set up by criminals. Also,
contact the Internet Crime Complaint Center (
www.ic3.gov
), a
partnership between the FBI and the National White Collar
Crime Center.
If you suspect that you have been a victim of identity theft,
perhaps because you submitted personal information in
response to a suspicious, unsolicited e-mail or you see
unauthorized charges on your credit card, immediately contact
your financial institution and, if necessary, close existing
accounts and open new ones. Also contact the police and
request a copy of any police report or case number for later
reference.
March 05, 2014
Pre-installed malware turns up on new
Android devices
Fake version of Netflix that steals personal
data and sends it to Russia has been found
on some smartphones and tablets from
Samsung, Motorola, and LG
28
Child Identity Theft
Credit Reports
www.annualcreditreport.com
Federal Law allows you to get a free copy of your
credit report every 12 months from each credit
reporting company.
Credit Reporting Agencies
Equifax 
  
800-525-6285
Experian 
 
888-397-3742
TransUnion 
 
800-680-7289
29
1.
Make sure your child does not spend all of his/her time on the computer. People,
not computers, should be their best friends and companions.
2.
Keep the computer in an area where it can be monitored, like the family room,
kitchen or living room, not in your child’s bedroom.
3.
Learn enough about computers so you can enjoy them together with your kids.
4.
Teach them never to meet an online friend offline unless you are with them.
5.
Watch your children when they’re online and see where they go.
6.
Make sure that your children feel comfortable coming to you with questions and
don’t over react if things go wrong.
7.
Keep kids out of chatrooms unless they are monitored.
8.
Encourage discussions between you and your child about what they enjoy online.
30
Next page
9.
Teach them what information they can share with others online and what
they can’t (like telephone numbers, address, their full name and school)
10.
Get to know their “online friends” just as you get to know all of their other
friends.
11.
Warn them that people may not be what they seem to be and that people
they chat with are not their friends, they are just people they chat with.
12.
Discuss these rules, get your children to agree to adhere to them, and
post them near the computer as a reminder.
www.cyber-safety.com
31
Four steps you can start taking now to make ID security a priority — and a practice:
1. Change weak passwords. Do not use your birth date or part of your address or phone
number. Strongest passwords combine upper- and lowercase letters, numbers and
special characters.
2
.
 Make sure your 
home Wi-Fi network is password-protected
. Be careful how you use
your devices at 
public hot spots
. Most aren't secure — which means any information you
send is only protected if you're on an encrypted website. To be sure a website is
encrypted, look for "https" in the address before you log in or send any personal info.
3
.
 
Don't click on links in unsolicited emails
.  Don't give out information over the phone
or online unless you've verified the source.
4
.
 
Keep your eye on debit and credit cards when paying for purchases
. If anything seems
out of the ordinary, be cautious using your card.
www.ftc.gov/idtheft
32
ConnectSafely 
Smart Socializing Starts Here
http://www.connectsafely.org/safety-tips-advice/
National Center for Missing & Exploited Children
http://www.netsmartz.org/InternetSafety
FBI-Internet Crime Complaints
www.FBI.GOV
Internet Monitoring Software (Free)
http://www.qustodio.com/internet_monitoring_software/
http://www.nchsoftware.com/childmonitoring/index.html
http://www.monitor.us/en/website-monitoring
https://onlinefamily.norton.com/familysafety/basicpremium.fs
Internet Monitoring Software-All have mixed reviews
1. Net Nanny $28.99
2. WebWatcher $97.00
3. McAfee Safe Eyes $49.95
4. Spectorsoft-eblaster $99.95
33
undefined
 
34
Slide Note
Embed
Share

Social media platforms like Facebook, Twitter, and Instagram pose risks such as cyberbullying, privacy breaches, and defamation issues for students. Information shared online can be used by bullies and predators, leading to potential harm and consequences like school discipline or arrest. Future implications include background checks by employers and schools, impacting one's reputation. Examples like the case of Connor Riley highlight the importance of understanding and managing social media risks to ensure student safety and well-being.

  • Social Media
  • School Safety
  • Cyberbullying
  • Privacy
  • Reputation Management

Uploaded on Sep 17, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Department of School Safety and Student Discipline Department of School Safety and Student Discipline Forsyth County Schools Forsyth County Schools Todd Shirley, Director Tim Monroe, Assistant Director Steve Honn, School Safety Manager Ola Shadburn, General Administrative School Safety and Student Discipline Todd Shirley, Director Tim Monroe, Assistant Director Steve Honn, School Safety Manager Ola Shadburn, General Administrative School Safety and Student Discipline Dr. L. C. (Buster) Evans Superintendent of Schools Dr. L. C. (Buster) Evans Superintendent of Schools Session #5 Session #5 Joey Pirkle Associate Superintendent Educational Leadership Joey Pirkle Associate Superintendent Educational Leadership

  2. http://tbn2.google.com/images?q=tbn:mh_6OkyoO6EWLM:http://www.fox5sandiego.com/common/medialib/image/44532.jpghttp://tbn2.google.com/images?q=tbn:mh_6OkyoO6EWLM:http://www.fox5sandiego.com/common/medialib/image/44532.jpg http://tbn2.google.com/images?q=tbn:nBrmRDOFPed1PM:http://z.about.com/d/personalweb/1/0/M/H/hi5.jpg http://tbn3.google.com/images?q=tbn:Vunjsn3Cz4gGEM:http://prmeetsmarketing.files.wordpress.com/2007/09/reputation_balloon.jpg http://tbn1.google.com/images?q=tbn:8hxF4lcVE1HyuM:http://lnbooks.typepad.com/photos/uncategorized/2008/02/22/social_networking_timeline.jpg 2

  3. Facebook Twitter Instagram-online photo-sharing, video-sharing and social networking service that enables its users to take pictures and videos, apply digital filters to them, and share them on a variety of social networking services, such as Facebook, Twitter, Tumblr and Flickr Vine-Owned by Twitter, enables its users to create and post short video clips Snapchat-Allows users to take photos or short videos, then share them with friends for up to 10 seconds before the image self-destructs. If a recipient screenshots the photo, the app alerts the original sender, though hacks to interrupt this function do exist. Askfm-social networking website where users can ask other users questions, with the option of anonymity used in foreign countries mostly KIK- -allows users to send texts via the Internet without having to use a cellular telephone Yik Yak- -social media site that gives you an anonymous live feed of what people are saying and doing. Users create all the content. 3

  4. Bullies can use your information Predators can use the information Comments sued for defamation Info arrested or school discipline No reasonable expectation of privacy Future employers and schools can use information as instant background checks 4

  5. Connor Riley had a job offer from Cisco on the table. She tweeted: Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work. Shortly after that, there was a reply from Cisco employee Tim Levad: Who is the hiring manager? I m sure they would love to know that you will hate the work. We here at Cisco are versed in the Web. Connor Riley MSNBC 5

  6. DadGuard TextGuard My Mobile Watchdog iWonder Surf 6

  7. Eliminate all identifying information Anything that allows you to be located Anything that pairs the profile to your name Delete inappropriate information Read your information to determine what impression it gives Your site may appeal to someone you didn t intend for it to impress 7

  8. Choose appropriate photos Setting privacy settings appropriately For privacy: Develop your profile to be associated with a nickname rather than your official name 8

  9. 9

  10. 10

  11. Protect your friends info no name, location, birthday wish, phone numbers, etc. Don t write anything you wouldn t want your parents or principal to read (because they can and MIGHT!) Set your profile to private so you control who views your profile. Be careful when you post pics 11

  12. What sport you play, the movies you like, your music that would be okay Remember that these facts can be used to fool you Be smarter than them Always tell a trusted adult if you have problems online 12

  13. High-tech version of flirting, teens texting explicit messages or photos to each other Experimental Aggravated http://www.unh.edu/ccrc/pdf/CV231_Sexting Typology Bulletin_4-6- 11_revised.pdf 13

  14. Pennsylvania -Sept. 6, 2013 State police slapped three Dauphin County teenagers with child pornography charges. That was a felony and a rarity for prosecutors. TAMPA Sept. 17, 2013 a Riverview teacher accused of sex acts with a 12-year-old student had an unforeseen explanation for hundreds of explicit text messages she sent the boy. She wanted to get his attention for the purpose of education. COLUMBUS, GA-Sept. 18, 2013Teacher Tucker Hearn officially terminated from North side High School on Sept. 27th charged with attempted sexual assault. The female student is 16-years- old. Sources say the student and Hearn were sexting and planned to get together, but their plans were intercepted by police. His bond was set at $10,000. 14

  15. Florida-14 year old girl charged in connection with the suicide of a 12 year old schoolmate after months of bullying plead not guilty. The girl was one of two Polk County students, ages 12 and 14, arrested and charged with aggravated stalking for maliciously harassing Rebecca Ann Sedwick, 12, with verbal and physical abuse and cyber-bullying, according to Polk County Sheriff Grady Judd. Charges were dropped. Sedwick, 12, died after jumping from a third-story cement plant structure on Sept. 10, 2013. St. Petersburg-Nov. 7, 2013 A 15-year-old girl was arrested and accused of sending hundreds of threatening text messages to three other 15-year-old girls who are students at the same St. Petersburg high school, in what police say is a case of cyber-bullying. Using a software application called KIK, allows users to send texts via the Internet without having to use a cellular telephone 15

  16. Tuesday, March 4, 2014 Bond was set at $50,000 for a suspended Douglas County elementary school principal who was arrested in an undercover child sex sting. John Harold McGill is facing child porn and exploitation charges and made a first appearance in DeKalb County Court. He was one of 14 people who were arrested in a sting the Georgia Bureau of Investigation called "Operation Broken Heart. 16

  17. Obscene Average person would find it wrong It depicts sexual conduct It has no literary, artistic, political or scientific value Child Pornography Images of sexual conduct Under 18 years 413 US 15, OCGA 413 US 15, OCGA 16 16- -12 12- -80 80 OCGA OCGA 16 16- -12 12- -100 100 17

  18. If someone sends you something Inappropriate delete Obscene and/or makes you uncomfortable alert your parent or authority If you sent something Ask recipient to delete it and not to forward it Never send inappropriate text or images In 2010, 20 percent of teenagers (22 % of girls and 18 % of boys) sent naked/seminude images of themselves or posted them online. Nearly 1 in 6 teens between the ages of 12 and 17 have received naked or nearly nude pictures via text message from someone they know. (FBI Law Enforcement Bulletin) 18

  19. GBI tracking apparent nude Pictures have appeared on Twitter and GBI tracking apparent nude pics Pictures have appeared on Twitter and Instagram pics of Gwinnett teens Instagram of Gwinnett teens WSB-TV GWINNETT COUNTY, Ga. Tuesday, Dec. 17, 2013 The GBI investigating social media accounts that started distributing nude pictures of Gwinnett teenagers. Gwinnett County school police say a parent filed a report after a 3- year-old nude photo of their daughter started circulating. The victimized students appear to come from a variety of high schools in Gwinnett County. It's possible that the girls willingly took the photos without realizing where they would end up or what would happen The GBI is actively trying to identify the girls and determine their ages to determine what crime has been committed. If the girls are under 18, a simple charges for distributing child pornography. . If the girls are under 18, a simple retweet charges for distributing child pornography. retweet could constitute could constitute 19

  20. Cyber bullying: One form of bullying Youth use technology to: Send Text Messages Make Web Postings Stalk Others Post Unauthorized Photos Online Deception and Violence Cyber-ostracism 20 http://www.smlinks.com/sotw/why/

  21. One mistreating others usually someone that the target knows Target can be anyone Bystander Harmful-if complacent Helpful-if report to adult 21

  22. Making threats of violence to people or property Engaging in coercion Making obscene or harassing text messages Harassment or stalking Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe and Responsible Use of the Internet, January 2007 22

  23. Hate or bias crime Creating or sending sexually explicit images of teens or children Sexual exploitation Taking a photo of someone in a place where privacy is expected Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe and Responsible Use of the Internet, January 2007 23

  24. 10% to 20% of youth have been targets and/or aggressors Cyberbullying peaks in the middle school years (grades 6-8) Girls are more likely to be the target Looks and body shape are the most targeted characteristics While there is an increase in cyberbullying, it is likely because there is an increase in use of technology http://cyberbullying.us/blog www.unh.edu/ccrc 24

  25. http://www.microsoft.com/global/security/PublishingImages/online-privacy/phishing_email_example.jpghttp://www.microsoft.com/global/security/PublishingImages/online-privacy/phishing_email_example.jpg 25

  26. Since January 23, 2004, criminals have been using the FDIC's name and reputation to perpetrate various "phishing" schemes. It is important to note that the FDIC will never ask for personal or confidential information in this manner. http://www.hoax-slayer.com/images/citibank-example.gif 26

  27. If you suspect an e-mail or Web site is fraudulent, relay that information to the real bank, company or government agency, using a phone number or e-mail address from a reliable source. Example: If your bank's Web page looks different or unusual, contact the institution directly to confirm that you haven't landed on a copycat Web site set up by criminals. Also, contact the Internet Crime Complaint Center (www.ic3.gov), a partnership between the FBI and the National White Collar Crime Center. If you suspect that you have been a victim of identity theft, perhaps because you submitted personal information in response to a suspicious, unsolicited e-mail or you see unauthorized charges on your credit card, immediately contact your financial institution and, if necessary, close existing accounts and open new ones. Also contact the police and request a copy of any police report or case number for later reference. 27

  28. March 05, 2014 Pre-installed malware turns up on new Android devices Fake version of Netflix that steals personal data and sends it to Russia has been found on some smartphones and tablets from Samsung, Motorola, and LG 28

  29. Child Identity Theft Credit Reports www.annualcreditreport.com Federal Law allows you to get a free copy of your credit report every 12 months from each credit reporting company. Credit Reporting Agencies Equifax Experian TransUnion 800-525-6285 888-397-3742 800-680-7289 29

  30. Make sure your child does not spend all of his/her time on the computer. People, not computers, should be their best friends and companions. 1. Keep the computer in an area where it can be monitored, like the family room, kitchen or living room, not in your child s bedroom. 2. Learn enough about computers so you can enjoy them together with your kids. 3. Teach them never to meet an online friend offline unless you are with them. 4. Watch your children when they re online and see where they go. 5. Make sure that your children feel comfortable coming to you with questions and don t over react if things go wrong. 6. Keep kids out of chatrooms unless they are monitored. 7. Encourage discussions between you and your child about what they enjoy online. 8. Next page 30

  31. Teach them what information they can share with others online and what they can t (like telephone numbers, address, their full name and school) 9. Get to know their online friends just as you get to know all of their other friends. 10. Warn them that people may not be what they seem to be and that people they chat with are not their friends, they are just people they chat with. 11. Discuss these rules, get your children to agree to adhere to them, and post them near the computer as a reminder. 12. www.cyber-safety.com 31

  32. Four steps you can start taking now to make ID security a priority and a practice: 1. Change weak passwords. Do not use your birth date or part of your address or phone number. Strongest passwords combine upper- and lowercase letters, numbers and special characters. 2. . Make sure your home Wi your devices at public hot spots send is only protected if you're on an encrypted website. To be sure a website is encrypted, look for "https" in the address before you log in or send any personal info. home Wi- -Fi network is password public hot spots. Most aren't secure which means any information you Fi network is password- -protected protected. Be careful how you use 3. . Don't click on links in unsolicited emails or online unless you've verified the source. Don't click on links in unsolicited emails. Don't give out information over the phone 4. . Keep your eye on debit and credit cards when paying for purchases out of the ordinary, be cautious using your card. Keep your eye on debit and credit cards when paying for purchases. If anything seems www.ftc.gov/idtheft 32

  33. ConnectSafely Smart Socializing Starts Here http://www.connectsafely.org/safety-tips-advice/ National Center for Missing & Exploited Children http://www.netsmartz.org/InternetSafety FBI-Internet Crime Complaints www.FBI.GOV Internet Monitoring Software (Free) http://www.qustodio.com/internet_monitoring_software/ http://www.nchsoftware.com/childmonitoring/index.html http://www.monitor.us/en/website-monitoring https://onlinefamily.norton.com/familysafety/basicpremium.fs Internet Monitoring Software-All have mixed reviews 1. Net Nanny $28.99 2. WebWatcher $97.00 3. McAfee Safe Eyes $49.95 4. Spectorsoft-eblaster $99.95 33

  34. 34

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#