101 Internet Safety Tiips for Kids | Social Networking Service | Cyberbullying

Tracking Kid's Activities Online – Yes This is The Best Way

iSafetyOnline – http://www.isafetyonline.com
1

Tracking Kid's Activities Online – Yes This is The Best Way

101 Internet Safety Tips For Kids
Presented By

www.101InternetSafetyTipsForKids.Net

NOTICE : You do not have the right to reprint or sell this guide. You do not have the right to edit this guide in any way. DISCLAIMER AND/OR LEGAL NOTICES: The information presented herein represents the view of the author as of the date of publication. Because of the rate with which conditions change, the author reserves the right to alter and update his opinion based on the new conditions. The report is for informational purposes only. While every attempt has been made to verify the information provided in this report, neither the author nor his affiliates/partners assume any responsibility for errors, inaccuracies or omissions. Any slights of people or organizations are unintentional. If advice concerning legal or related matters is needed, the services of a fully qualified professional should be sought. This report is not intended for use as a source of legal or accounting advice. You should be aware of any laws which govern business transactions or other business practices in your country and state. Any reference to any person or business whether living or dead is purely coincidental.

iSafetyOnline – http://www.isafetyonline.com
2

Tracking Kid's Activities Online – Yes This is The Best Way

Introduction
There’s no doubt about it. We’ve become a technology-driven society. Everything from home appliances to municipal infrastructures is controlled to some extent through computer access. Even the most basic tasks involved in living one’s life either require, or are made easier by, the use of computers and the internet. We shop online. We manage our finances and pay our bills without picking up a pen or stamping an envelope. Recipes, photographs and home videos are stored in a virtual filing cabinet. We stay in touch with family and friends through email, conduct business the same way, and rely on the availability of nearly any piece of information with a few clicks of the mouse. Think back to the last time the power went out during a storm or your computer was in for repairs if you doubt the significance of technology – life almost comes to a standstill without it! As good parents, we naturally want to make sure our children have every opportunity to prepare for the future. These days, that absolutely includes at least a working knowledge of all things computers, including the internet. Most schools, where budgets permit, have computers either in the classroom

iSafetyOnline – http://www.isafetyonline.com
3

Tracking Kid's Activities Online – Yes This is The Best Way

or in a computer lab, and students begin using them as a regular part of the curriculum, as early as kindergarten in many instances. Statistics vary, but it is estimated that 165 million people in the United States regularly access the internet, and the top five websites worldwide are USbased. Seventy-three percent of American homes own at least one computer, and usage figures are rising exponentially. What does all this mean to the parents of budding young minds? Several things. First, our children are benefiting from a world of opportunities that were not available in any previous generation. In addition to the computer skills children are acquiring at a very young age, they are learning more in less time and gaining a deeper understanding of the world around them through the ease and availability of the internet as a research tool and the wealth of information it puts at their fingertips. Second, it means their cognitive abilities are growing in new and unexpected ways. Research suggests that certain computer-related activities actually aid in the development of neural pathways that enable sharper critical thinking skills, multitasking ability, and creativity, similar to the influence of early exposure to music and language. Third, early computer use serves as hands-on training for later life, regardless iSafetyOnline – http://www.isafetyonline.com
4

Part of a parent’s responsibility in this environment is knowing where the potential for danger exists. but new risks as well. the presence of this technology in a child’s life means not only new and better opportunities. Their website reports that one in four children will be exposed to sexually explicit graphics. one in five will receive a sexual proposition. one in 17 will be harassed or threatened. teaching children the skills to avoid harm. From handheld devices to the most advanced and specialized processors in use today. nearly every field capitalizes on the increased efficiency that computers allow. as reported at the website of Parental Control Products.com 5 . providing the structure and limits that will keep children safe until they are mature enough to do so themselves. New Opportunities Bring New Dangers Statistics on internet-related risks. are frightening. and.isafetyonline. as in all areas of life. And finally.Tracking Kid's Activities Online – Yes This is The Best Way of what career path a child chooses. iSafetyOnline – http://www.

Viruses can infect your system through innocent looking email. daughter loves Internet or surfing on the net? Did you know that your child or teen is vulnerable to attacks from Online Predators while innocently going about their activities online? Did you know that all of their activities online leaves footprints which can be traced back. Merchandise can be ordered online by anyone with access to a credit card number. The family email account can be bombarded with spam if the address is used to request information from the wrong individual or website. which might be stumbled upon by others. Unsupervised or without clear. teen.com 6 . rendering it virtually unusable. specific guidelines about internet use. including online predators? iSafetyOnline – http://www. Though far less terrifying than the possibility of child abduction or sexual abuse. albeit less horrific. also overshadow users of the net. a smart child can put himself and his family in an unpleasant or damaging position. Your kid. these risks are actually much more likely to occur and can have negative consequences for the entire family. Unauthorized downloads can clog a computer with adware and spyware.isafetyonline.Tracking Kid's Activities Online – Yes This is The Best Way and one in 33 will be aggressively pursued by sexual predators. son. Other dangers.

It is said that the experiences during childhood or adolescence shapes the iSafetyOnline – http://www.org In the real world. Not that your teen will do anything deliberately.isafetyonline. It is an altogether different scenario in the online world. it is more or less possible. And then there are those places visited by teens which parents have not even heard of. what and how of your teen's activities. but their seemingly friendly interactions with others might turn out to be due to false or assumed identity by others.Tracking Kid's Activities Online – Yes This is The Best Way Take a look at the following * 42% of kids reports of being bullied online * 35% of kids reports of being threatened online * 21% of kids reports of having received mean or threatening email * 58% of kids reports of having being told mean or hurtful things online * 53% of kids admits of having said mean or hurtful things to another person online * 58% of kids have not informed their parents about hurtful experience online *As per study conducted by isafe. It is indeed an altogether different world from the one we know. at least to a large extent. it becomes near impossible to know the where. with so many social networks available.com 7 . to keep a tab on your child's activities.

Tracking Kid's Activities Online – Yes This is The Best Way future of the child. Tracking their kid's activities online with an aim to keep them safe and secure is something not thought of.isafetyonline.com 8 . it has become a top priority now for parents to take steps to keep them safe and secure. it has become very easy to share information and spread it instantly. In this age of cyberworld. whether offline or online. along with the usefulness comes along the harmful side of it too. emotionally in the online world is very real. the online world does not only pertain to internet at home anymore. This has now come to include the experiences online too. but has extended to portable internet enabled computers and devices. As parents there cannot be anything more important than keeping our kids safe and secure. The scar could last a lifetime. mobile phones etc. of such a possibility. even iSafetyOnline – http://www. Your child's security and privacy is of utmost importance. With so many children suffering as a result of some happenings online. due to unawareness on the part of parents. The damage or hurt which could be inflicted on our children mentally. while many successful people has had a history of supportive parents and a well balanced life. With their widespread use. Many criminals are found to have had a history of very disturbed childhood. Like most things else.

We cannot ignore the fact that just as in the physical world where both good and evil resides. can very easily lead them to 'unwanted' sites. which is simply not possible for most people. action and consequences which has made it to the news. In this world we do everything in our hands to keep our kids safe. Like in this world where you can always ask around and gather information of your teen's activities. We cannot afford to ignore this. You need very efficient tracking system. which might compromise their safety. so it does in the online world too. or can lead them to innocently try out some new seemingly interesting activities online. same cannot be applied to the online world.isafetyonline. why should it be any different in the online world too. We don't want any of such things to happen to our children. don't even hesitate in spending wherever and whenever necessary to keep our children more safe.Tracking Kid's Activities Online – Yes This is The Best Way lead to extreme actions.com 9 . where the possibility of getting hurt with deep scar is very real? There has already been a number of cases of extreme hurt. It is understandable that the majority would not even be aware of the iSafetyOnline – http://www. Kids naturally are inquisitive and their curiosity to explore things further when surfing online.

Making friends online has never been easier.. which can be in the form of text. In reality a so called friend can turn out to be a person with assumed identity with not so friendly intentions. Such a content getting leaked could lead to unwelcome sexual solicitations or bullying. There has been stories in the news of children or teens who had been driven to violent crimes or even suicide as a result of being bullied online . It may not seem like it but this can hurt quickly and very badly. iSafetyOnline – http://www. Cyberbullying : It obviously means act of bullying online. Because the words has not spread far and wide yet. and their safety and security now during their most tender years..more on sexting.more on cyberbullying.. Your teen's future depends on their whole well being now. photos or videos among others. which further could lead to disastrous consequences . Nothing should stop you in ensuring that. Online Friends : The internet has facilitated interactions and sharing of information with strangers and acquaintances easy..isafetyonline. Sexting : This refers to the sending of sexually explicit messages. By the time this is realized.com 10 . The following are some of the activities online where your child can be at risks of being attacked from online predators.Tracking Kid's Activities Online – Yes This is The Best Way possibility to keep a track on their kid's activities online with the intention of keeping them safe only.

iSafetyOnline – http://www. Online Photos & Videos : These are media made available on the net via blogs.. The user is not exercising the required activities in terms of their minds and bodies . videos or contents uploaded by your child or someone else might be misused by online predators .more on online photos & videos.more on internet addiction. come across negative content through search engines. The harmful effects of this includes psychological and social problems for teens.. Obviously inappropriate content your child may be viewing via all these might include violence.Tracking Kid's Activities Online – Yes This is The Best Way they would already have access to personal information which can be used for causing tremendous harm . This is believed to mask depression.. Bad Content Online : And of course there is the bad content online.more on bad content online..isafetyonline... pop ups or spams. or schoolwork. could also lead to isolation. in the form of materials which can negatively influence kids and teenagers.. pornography and all kinds of inappropriate content.more on online friends. or employment.com 11 . The photos. social anxiety etc. websites. It becomes easy for your kid to even if inadvertently. Internet Addiction : This refers to uncontrollable use of the internet resulting in damage in regards to relationships. low self-esteem. internet addiction and phobias . emails. social networking sites etc..

iSafetyOnline – http://www. Along with the usefulness. The focus of concern here is that some children having possession of a video shot at a party of other children recording some private scene.. uploads the video online which gets passed around the net.more on video sharing. The harmful effects includes overspending. Online Reputation : Like any reputation. Video Sharing : As the name suggest this involves sharing videos online which is usually passed around.more on kids & online commerce. purchasing prohibited items and damaging the card holder's credit score .. educational and career prospects ... A bad online reputation not only affects self esteem but has an impact on the social. and of course their widespread use. The damage to the image of the children involved can well be imagined . Teens & Mobile Phones : This has come to be included due to the enhanced functionality and usage now possible using mobile phones.. this has also facilitated harassing others.more on online reputation. online reputation is very real and damage to this..Tracking Kid's Activities Online – Yes This is The Best Way Kids & Online Commerce : This is about kids carrying out monetary transactions online.more on teens & mobile phones.. facilitating gossip and other social activity at school .com 12 .isafetyonline. getting scammed.. especially during adolescence years can haunt for years to come.

As technology continues to advance. Make sure your child knows what he or she is and is not allowed to do on the computer. Boundaries can be set based on a child’s age and maturity level. education and fun. Set Rules. Establish consequences for breaking the rules. This could be school-related or just for entertainment. parents should use the tips listed below to ensure that all members of the family can enjoy a safe and fun on-line environment. legal consequences and other on-line dangers. When allowing children to use the Internet. and iSafetyOnline – http://www. 2. Create a family contract regarding Internet use.com 13 .isafetyonline. bullying. Determine what your child needs to use the computer for.Tracking Kid's Activities Online – Yes This is The Best Way Using the Internet has become a way of life for this century's kids. the Internet is essential for communication. The 101 Internet Safety Tips For Kids 1. program use. and can include site restrictions. addiction. However. This document can contain house rules about on-line conduct. the advances in real-time information sharing can pose serious threats to children. and activities. children are also at risk for stalking. Basic templates can be found on-line. In addition to the Internet predators that many parents are aware of. Make a Pact.

You may also want to include facts and statistics about on-line safety to remind children of the dangers. suggest they take one of the quizzes to show you what they know. 4. After discussing Internet safety with your child.Computer Area. children should be involved in activities outside of using a computer. 3. One child using the Internet more than others can also result in jealousy and arguments. Take the Quiz. While the Internet can be fun and useful. and post it near the computer area for easy reference.Tracking Kid's Activities Online – Yes This is The Best Way you can modify the document to include your childrenís input when preparing a final draft. 5.isafetyonline. Many Internet safety websites offer on-line multiple choice quizzes that children can take to test their knowledge about being safe on-line. Have children read and sign the contract.com 14 . Outside of homework research. Determine time limits based on how much Internet use is necessary for homework and other activities.Create a Schedule. no more than an hour on-line daily could be a good rule of thumb. iSafetyOnline – http://www. Make a schedule with fair time limits to allow all family members to have access to the Internet when necessary.

7. iSafetyOnline – http://www. This will make it easier to keep an eye on their activities.Tracking Kid's Activities Online – Yes This is The Best Way Keep the computer in an open.Limit Browser Functionalities.Home Alone.Block Viruses.com 15 . This will allow for cleaner web surfing.isafetyonline. 8. 6. consider designating one as a family computer and password restricting access to the others. 9. A good program will also monitor spyware and alert you of any threats.Block Pop-ups. Be sure that personal computers and laptops are equipped with virus detection software that scans and updates on a regular basis. Until you are confident that rules can be followed. do not let children use the Internet unless a parent is home to monitor activity. Set the Internet browser to block pop-up websites and advertisements. Passwords to block access to the computer can be used to enforce this practice. If there are multiple computers in your home. family area instead of in a child's bedroom. as well as minimize the chances of children viewing offensive material.

Browsers like Glubble and Buddy Browser include features to disable external chat and encourage media sharing and social interactions with family and other people the child already knows. Show your child how to access the bookmark menu to view the sites. Consider Kid-Geared Browsers. iSafetyOnline – http://www. Find educational and wholesome websites for your child to visit. Several companies have created browsers made specifically for younger users. Good suggestions include the websites for your child's favorite educational television programs. protect the wireless network connection with a password and firewall to keep unwanted users out. and add them to a bookmark list. 10. 11. Clear cookies and temporary Internet files on a weekly basis.Tracking Kid's Activities Online – Yes This is The Best Way Modify Internet browser settings so they do not automatically save website information. 12. Suggest Family-Friendly Websites. If wireless Internet access is used.com 16 . These Internet browsers feature built-in filtering capabilities to protect young eyes from unwanted and explicit material.isafetyonline. like user names and passwords. Protect Wireless Networks. government-sponsored educational websites.

and should not be obvious (like a name and birth date. 15. Get in the habit of changing password for computer access and websites on a regular basis. Be sure that all family members update passwords by scheduling a day when everyone makes their changes. Change Passwords Regularly. iSafetyOnline – http://www. it may be a good idea to give a unique log-on identifier to each user. Teach children to create passwords that are easy for them to remember but difficult for others to guess. If a home computer is used by all family members. 13. Parents' user accounts should have full rights to view and change all files saved on the computer. and show them how to make sure that the Caps Lock is not engaged if the password is case-sensitive.isafetyonline.com 17 . Strong passwords will include numbers and letters. Create Solid Passwords. This can help minimize the risk of important files or folders being accidentally deleted by kids. every 60 days or so. as well the ability to add or delete users. 14.) Teach children how to enter their password when logging in.Tracking Kid's Activities Online – Yes This is The Best Way and school or community websites. Create Separate User Accounts.

children might know more about the technology than parents do.isafetyonline. Since Internet use is so prevalent in schools.Tracking Kid's Activities Online – Yes This is The Best Way 16. 17. Don't allow kids to install new programs unless supervised. 18. Learn from Kids. Protect Passwords. Have them change their password if it is discovered by someone else. 19. Keep a list of websites your child uses and the user names and passwords for each. Knowing what is being installed on the computer and where it came from can prevent risk of virus infection. Program Installation. This is useful for monitoring their activity and reminding them of a password when it is forgotten. Know Your Kids' Passwords.com 18 . If you need help understanding how certain iSafetyOnline – http://www. Teach children not to share their user names or passwords with friends and strangers. Adult installation of new programs will also ensure that new programs are installed correctly. Make sure they give you're their new password if they change it. Their passwords should be known only by them and their parents.

Teach children to recognize secure sites by looking for the "https" prefix. kids are always proud to share their knowledge. When latest technologies are used. Teach children to log off of sites that require a user name and password instead of simply closing the browser window.isafetyonline. Close Browser Windows Correctly. 21. 22. iSafetyOnline – http://www. Update. Explain Risks. and it ensures that private information does not remain viewable to hackers or third-parties. Keep software and hardware up to date.Tracking Kid's Activities Online – Yes This is The Best Way sites or programs work. 20. Officially logging off is secure. Teach children to avoid sites when a security warning is displayed. 23. Many browsers also display a padlock or green address bar when a site is secured. the computer will run more smoothly and be less susceptible to hackers and viruses. Most browsers will display a warning when a website's security certificate is inconsistent or expired.com 19 . Secure Sites.

contact police with the user's screen name and any other given information. like sexual predators and cyberstalkers.Tracking Kid's Activities Online – Yes This is The Best Way Teach children about on-line dangers. but intended to protect them from harm. Children are naturally trusting and will talk online with anyone who seems friendly or nice. Instruct children to always be cautious about anyone they meet on-line. 26. If children are approached by strangers in a chat room. Children will have a better appreciation for the family Internet usage rules if they understand that the rules are not created to keep them from having fun. If a child is bullied on-line by a iSafetyOnline – http://www. 24. instruct them not to respond and to tell you about the encounter immediately.com 20 . remind children not to talk in a chat room or via e-mail with anyone they do not know. Know Who to Call. If a child is being stalked or threatened on-line. Don't Talk to Strangers. 25. This tactic often results in children exposing more personal information than they would to an adult stranger. Internet predators are known for posing as children in chat rooms to lure real kids into conversations. Don't Take Anyone at Face Value.isafetyonline. As in real life.

contact the bully's parents. chain emails. contact the manufacturer's technical support department for assistance. accompany your child and meet in a public place. Role Play. especially if they feel they "know" the person from multiple on-line conversations. Too Good to Be True. In-Person Meetings. If parental control software is not working correctly. 27. Educate children on how to avoid Internet scams.Tracking Kid's Activities Online – Yes This is The Best Way classmate. Teach them to feel comfortable ignoring strangers or exiting chat rooms when approached. 29. Do not allow children to meet on-line friends in person. This can be difficult for young children to understand. If they insist on meeting an on-line friend. Children can be naive to these ploys and iSafetyOnline – http://www. This practice will make your kids feel more comfortable if the time comes when they need to deal with the real thing. Use role playing to reinforce how children should act when approached on-line by someone they do not know. Also review how they should handle cyberbullies.com 21 .isafetyonline. and false charities. like moneymaking schemes. Practice what to say and not sharing personal information. 28.

iSafetyOnline – http://www. thank them for bringing it to your attention. Do not get angry at them for seeing something they shouldn't have seen. Let children know that they can tell you if anything they saw on-line made them feel uncomfortable.No Secrets.isafetyonline.Be Fair. Tell children to let you know if anyone on-line asked them to engage in a conversation or activity that was to be kept secret. 30. Express Discomfort. especially when the stranger specifically says not to tell parents.Tracking Kid's Activities Online – Yes This is The Best Way often get taken advantage of. 33. Explain that there is no reason to keep a promise with a stranger. This can include photos or conversations in chat rooms. Instead. it probably isn't. 31. If it's too good to be true. Don't punish children for their friends' bad on-line behavior. 32. Only enforce consequences for actions that your child actually does. This will help to maintain your child's trust that they can tell you about things that happen to them on-line.com 22 . Photo Sharing.

If this information is required for registration with a website. hometown. If children post photos to their website or social network page. Maintain Privacy. ensure that the photos do not contain identifiers.isafetyonline. This includes their last name. 35. phone number. Tell children not to share personal information on-line. like house numbers or car license plate numbers. Although a single photo may not seem harmful. 36.com 23 . or school name. Cost Containment. etc. address. kids should check with parents first before supplying the information. Don't give children credit card numbers to use for on-line purchases or website iSafetyOnline – http://www.Tracking Kid's Activities Online – Yes This is The Best Way Tell children never to send a photo of themselves to anyone they do not know. predators can use information form a collection of photos to determine a child's home or school location. age. Photo Safety. 34. it can make it easy to find children and hurt them. Explain that when strangers learn more information about a kid's appearance.

39. like eBay. Not only could the app's content be inappropriate. be sure that they understand that the same Internet rules apply. Consider Parental Controls. disable the service or install a parental control application. If internet access on a smartphone is too much freedom. Apps Add Up. 37. but the cost of multiple applications can result in a shocking expense on the monthly phone bill.isafetyonline. Require parental approval before children download applications to their smartphones. 38. 40. On-line auction sites. An adult should always supervise any financial transaction online to ensure that the website is legitimate and secure.com 24 . Children can sign up and bid on items without realizing that they are entering a contractual obligation to purchase. whether on the pc or on a handheld device. On-line Auctions. Smartphones. do not require credit card information to establish an account. iSafetyOnline – http://www. If your child has a phone or music player with on-line capabilities.Tracking Kid's Activities Online – Yes This is The Best Way registrations.

Know what websites your child visits and be involved in his or her online activities. Be Involved. Learn Chat Room Abbreviations. 41. Ask your child to show you his or her favorite sites and explain why he or she likes them. iSafetyOnline – http://www. and hate.Tracking Kid's Activities Online – Yes This is The Best Way Software is available to block unwanted content from the Internet. but can also be customized to block specific websites or website categories. Spend time together looking at websites on the Internet and finding new appropriate sites to visit.com 25 . drug use. While parents may immediately think of blocking access to pornography.isafetyonline. 42. there are other websites that children should not be exposed to. Be sure to pick a strong password that your children won't figure out. These programs generally block pornography and violence. Keep in mind that kids may be so familiar with the Internet that they can find ways around parental controls. Depending on age and maturity level. 43. Less Obvious Sites. Adults can use a password to access all sites. Don't forget to restrict access to sites depicting dangerous activities. you may also want to block shopping websites.

45. don't let him or her use it until the purpose is explained. If your child can not describe exactly what he or she needs to use the Internet for. This often leads to children visiting inappropriate sites that were linked from another site or found from a web search.com will lead to a completely different website than the one intended. Get to know the acronyms used in chat rooms and instant messaging so you can tell just what they are talking about.isafetyonline. Have a Purpose. completing a url with .Tracking Kid's Activities Online – Yes This is The Best Way The abbreviations kids use when chatting can seem like a foreign language to parents. Some predatory websites purposely choose close spelling variations of legitimate websites just to expose children to explicit material. Children should also mind the various extensions. Know Your Child's Friends. 44. 46. Do not allow random web surfing.net instead of . Get to know your child's chat room and social networking friends just like you iSafetyOnline – http://www.com 26 . Research on-line can help you decipher the meanings of many abbreviations. or you can ask your child to teach you what those letters mean. Type Carefully. Make sure that children use care when typing a url into the browser's address bar.

Content is not regulated. 48. Know the Source. and how your child met them. Young children may have difficulty separating on-line life from life in the real world. This can be especially confusing when the child is involved in roleplaying games with avatars.Tracking Kid's Activities Online – Yes This is The Best Way would learn about his or her real life friends. attachments or links that come from anyone they do not know. they should delete the message without reading it. Encourage use of reputable sources for homework assignments. Being involved in your child's social circle will help you to recognize any unusual signs as early as possible. iSafetyOnline – http://www.isafetyonline.org. Teach children not to believe everything they see on-line. so nearly anyone can post information regardless of whether or not it is true. 47.edu. 49. Remind children not to open up emails. and . Maintain a healthy balance of real life and Internet use to reinforce the separation. Find out which ones are on-line only friends. Be Skeptical. If they do not know the person who sent the email. including sites with the .com 27 . how old they are. Know the Difference. .gov suffix.

Follow these limits. 51. Talk to them about their interest and explain to them about why they should not visit those websites. encourage them to stay in the public chat area instead of engaging in private chat. Most websites require that registered users be older than 13 years old. 52. Sites that are geared towards teens and adults may include photos or language inappropriate for young children. This will allow parental monitoring of e-mails as the child learns more about how to use the Internet. iSafetyOnline – http://www.com 28 .Tracking Kid's Activities Online – Yes This is The Best Way 50. Chat Room Safety. Pornography. Follow Age Limits. There is safety in numbers. Curious teens may want to view pornographic photos or videos.isafetyonline. Family E-mail. If children use chat rooms. 53. Use parental control software to block these sites if necessary. Create an e-mail address that all family members can share instead of giving young children their own e-mail address. and in a public chat area (as in the real world) a Good Samaritan is likely to jump in if someone is being targeted or threatened. they are there for a reason.

suggest those specifically designed for kids. They also have built in privacy features.com 29 . 56. teach your child how to use the privacy features so they can keep personal information private. These sites offer gaming and a social atmosphere in a kids-only environment. as well as monitor the activity of their friends. "Friend" Your Kids. This will allow you to keep an eye on what they do. like use of an avatar instead of a profile photo. Unless someone is a confirmed friend. If your child wants to join a social networking site. he or she will not be able to view any of the details of your child's page. Kids Social Sites. Social Networking Privacy. Create an account on the same social networking site that you child uses and become one of their friends. like Webkinz or Club Penguin.isafetyonline. If your child uses an adult social networking site.Tracking Kid's Activities Online – Yes This is The Best Way Pornographic websites and websites for tobacco companies often require that visitors be over age 18. iSafetyOnline – http://www. Set up their pages so friends can only be added with their consent. 55. and alcohol manufacturer websites require visitors be older than 21 years of age. 54.

Time Limits. 59. Most websites include a terms and conditions page that may include rules of conduct in discussion boards or use of copyrighted materials. Follow Website Policies. Let the friends' parents know if you notice any postings or activity that could pose risks. 60. which will eliminate messages from unknown users.com 30 . install a program that sets limits on time spent on-line and blocks access during specified hours.Tracking Kid's Activities Online – Yes This is The Best Way 57. When a child iSafetyOnline – http://www. Instant Messaging Privacy.isafetyonline. Help your child set up an instant messaging profile that only allows people from a buddy list to see when he or she is online. Programs that enforce time limitations can be found on-line. His or her status will remain invisible to strangers. and many parental control software programs include time limit features. Review websites and blogs that belong to your child's school friends to ensure that they too are protecting their own privacy. If Internet use becomes excessive or replaces normal socialization and activities. Protect Your Child's Friends. 58.

Most e-mail programs have spam filters that will automatically delete pornographic or bulk advertising messages. Log in to your child's email account from time to time to ensure they are following the house rules of Internet conduct. Avoid E-mail Spam. 64.com 31 . read these policies together to ensure your child understands the expectations. Set email preferences so messages do not display unless clicked on. 61. Email Preview. Reduce e-mail spam by limiting the websites your child registers for using an e-mail address. Although children may like to browse for sale/wanted ads on Backpage or Craigslist. Also teach children not to reply to junk e-mails. Instead. Beware Classified Ads. do not allow them to respond to the ad directly. When iSafetyOnline – http://www. Check both incoming and outgoing messages for anything unusual. 62. Check Their E-mail.isafetyonline. 63. a parent should initiate the communication.Tracking Kid's Activities Online – Yes This is The Best Way registers with a website.

these files could contain viruses or display pornographic materials. 68. Be sure that the name does not contain too much personal information and that it does not include slang or references that are inappropriate for a child. Learn about the filtering programs and protections used anywhere your child accesses the Internet. Require parental approval of children's nicknames for websites. so teach iSafetyOnline – http://www. 67. chat rooms. Photo Downloads. your child may see explicit photos or messages that they had no control over receiving. 65. Although they may be labeled innocently. Tell children not to download pictures or videos from unknown sources. User Names. 66. and on-line games. If an avatar is used for certain websites. Hackers and e-mail viruses can operate under recognized identities. or at friend's houses. at the library. including at school.isafetyonline.com 32 . Research Safeguards. also ensure that it is tasteful and age-appropriate. Be Wary of Strange Messages.Tracking Kid's Activities Online – Yes This is The Best Way the content of e-mail messages displays automatically.

even if the sender's name is familiar. Teach children to operate under the assumption that everything they post on- iSafetyOnline – http://www. Without a filter. Treat these messages as they would ones from unknown senders. To avoid sharing away e-mail addresses of friends and family.Tracking Kid's Activities Online – Yes This is The Best Way children to be aware of any strange e-mails. Using a filtering program can help eliminate inappropriate results from a web search.isafetyonline. Search Engine Filter. Examples of strange messages include attachments with odd file extensions or incoherent words in the message body. Go Direct. 70. 69. 72. Assume Permanence. do not allow children to let social networking sites scan their e-mail address book. 71. Instead of using a search engine to access sites. Protect Others' Email Addresses. have children type the url directly into the address bar or use a bookmark. a web search can bring up material that children should not see.com 33 . This will eliminate the possibility of offensive or unrelated sites being accessed from a web search.

or hobby.isafetyonline. find a site that allows private and password-secured blogs. Positive Examples. While social networking pages and websites can be deleted. Screen your child's writing or photos before they are posted on-line to ensure that they do not include too much personal information. iSafetyOnline – http://www. this will reduce spam and negative or offensive feedback.com 34 . Find content-appropriate blogs made by other children as an example for your child to model his or hers after. Watch out for less obvious identifiers.Tracking Kid's Activities Online – Yes This is The Best Way line is permanent and can be found by predators or hackers even after deletion. If your child wants to write in a blog or web diary. Good examples may be blogs centered on a favorite sports team. television show. 75. Blogs with privacy protection will ensure that your child's personal profile is not revealed. Modify the blog settings so comments can not be added to posts. 74. Blog Privacy. like school mascot names and names of friends. Review Their Posts. people who know how to find it can still access the information. 73.

but they could be signs of emotional stresses and troubles that your child is not comfortable iSafetyOnline – http://www. Blog and diary content can include very personal topics. 79. This research can also help you determine if your child started a website or blog without your knowledge. 78. If he or she is not sure. Vulnerability. Ask your child if he or she is comfortable sharing the content with strangers before they post it. Be aware of blog posts or discussion board comments that show emotional vulnerability.com 35 . Not only are these what Internet predators look for. Watch for Obsessive Behavior.isafetyonline. address and other identifying factors to see if they have posted any personal information on a website. 77. Be a Detective. Watch for signs of obsession. including constantly wanting to check for new messages or frustration when not able to access the sites. E-mail and social networking can become an addiction for adults and children. Protect Emotions. Perform occasional web searches for your child's name. do not post.Tracking Kid's Activities Online – Yes This is The Best Way 76.

Have disciplinary consequences for not treating others kindly. the same child who bullies a child in person will begin to bully on-line through chat or instant messages. Look for signs of cyberbullying. Even though the interactions are not in-person. Bullies no longer exist only in the classroom. Cyberbullying. Do not allow your children to pretend that they are someone else online. 83. Don't allow your child to bully or gossip about others on-line. Golden Rule.Tracking Kid's Activities Online – Yes This is The Best Way sharing with you. 81. 82. Honesty. iSafetyOnline – http://www. teach them to use privacy controls to hide information and not answer questions that make them feel uncomfortable or would require them to reveal personal information. Piracy. This includes not listing their actual age on social networking sites. Oftentimes. like a child becoming upset when online or a not wanting to go to school.isafetyonline. the same rules of conduct and respect should apply.com 36 . 80. Instead of lying.

Even if your child is not distributing the material further. with or without your knowledge.com 37 . share. use of pirated software and music is still illegal. Knowing everyone personally creates the safest environment for iSafetyOnline – http://www. 86.isafetyonline. Encourage Playing with Friends. Block File-Sharing. Some on-line video games allow for voice chatting. 85. File-sharing network sites often distribute copyrighted material. Many file sharing software programs also place a file on your computer that allows others to receive files from you. 84. The unknown source of the download creates privacy and virus risks. they follow the same rules as in a text chat room and do not divulge personal information to strangers. Use Voice Chat With Care. Explain that it is stealing and there are serious legal consequences. Keep in mind that predators may disguise their voices to sound like children even though they are adults. Recommend that your child play on-line games and chat with friends from school and other activities instead of exclusively communicating with on-line only friends. Be sure that if children participate. or duplicate copyrighted software or music without paying.Tracking Kid's Activities Online – Yes This is The Best Way Do not allow children to download.

and average player age. Many on-line video games have monthly service fees that children may not know about until parents receive the bill. Prohibit Gambling.Tracking Kid's Activities Online – Yes This is The Best Way on-line play. Know the Games. Steer your kids towards free games that do not require submission of personal credit card information. Remind your children that it is illegal for minors to gamble on-line. 87. Understand the rules. Become aware of the games your child plays on-line. discourage use of non-monetary casino gambling games (like free poker and blackjack). 89. Even though it's not real money. Always stay with young kids while they are on-line to answer questions and eliminate the iSafetyOnline – http://www. as they still operate around a wagering system that can lead to actual gambling in the future. 90. Minimize Fees. Young children should not use the Internet without supervision.isafetyonline. content. Playing games with your kids is a good way to get involved in their on-line activities without appearing too intrusive. 88. Supervise.com 38 .

91. Parents especially should practice what they preach with regard to software piracy. 92. Role Model. and these romance sites are a haven for Internet predators. and many have niches that may not be appropriate for anyone younger than 18 years old. These sites are intended for adults. All members of the family members should act as positive role models for children who are just beginning to use the Internet. iSafetyOnline – http://www.isafetyonline. people are not always what they seem.com 39 .Tracking Kid's Activities Online – Yes This is The Best Way possibility of wandering onto an inappropriate site. In addition. Confront them with indiscretions or questions you have about their web browsing activities. Cyberdating. Take a look at the history of sites visited to see where your child went on-line and what they did. Discourage teens from using websites to meet potential boyfriends or girlfriends. and chat rooms. Review Browser History. Everyone should follow the same rules of conduct with respect to safety concerning the sharing of personal information. pornography. 93.

Look for Signs of Misconduct. 96. Remind them that once something is posted on-line it can travel quickly and be seen by many people. and teachers. While webcams can be useful for video chat with friends or long distance relatives.com 40 . Review your child's videos before they are posted or distributed to others. iSafetyOnline – http://www. Find out what is going on and discipline accordingly. 95. ensure that children use the device appropriately. it is often a sign that he or she is not following the rules. If a child or teen quickly closes a browsing window when you enter the room or you find that browsing history has been deleted. including family. Children rarely hide good behavior. Once the photo is sent by the originator. Webcams.isafetyonline. friends. Explain the dangers and legal consequences of children and teens sending each other nude or partially nude photos via the Internet. Sexting.Tracking Kid's Activities Online – Yes This is The Best Way 94. 97. Plagiarism. he or she has no control over what other people decide to do with it. Children should avoid video chat with strangers because of the physical recognition factor.

be sure that they do not copy other people's ideas as if they were their own. several free plagiarism-detections services exist on-line. or e-mail rumors to people who don't want to receive them. Teens may not realize that they are candidates for identity theft because they usually do not have bank accounts and credit cards.isafetyonline. Respect Others' Privacy. Also teach kids not to add someone to a mass-mailing e-mail distribution list without asking first. Sibling Enforcement. Explain to your teens that iSafetyOnline – http://www. Explain plagiarism and the consequences it will have at school. 98. Teen Identity Theft. 99. Teach older children to protect younger brothers and sisters on-line and to tell parents if they are engaging in any potentially harmful activities.com 41 . Teach children to respect the privacy of others by not reading e-mails intended for other people. Younger children often look up to older siblings and are comfortable learning the ropes from them.Tracking Kid's Activities Online – Yes This is The Best Way When a child uses on-line resources for homework assignments. 100. If you suspect that your child has used someone else's content. chain letters. This also goes for forwarding jokes.

com 42 . 101.isafetyonline. not to avoid loss of current assets. software programs are available to block users' outgoing content.Tracking Kid's Activities Online – Yes This is The Best Way they still need to safeguard their personal information. If children are not mature enough to follow rules about not providing information to websites. These programs would allow children view-only access to websites. iSafetyOnline – http://www. Block Outgoing Content. but to protect their credit from other people opening accounts in their name.

Sign up to vote on this title
UsefulNot useful