This action might not be possible to undo. Are you sure you want to continue?
iSafetyOnline – http://www.isafetyonline.com
Tracking Kid's Activities Online – Yes This is The Best Way
101 Internet Safety Tips For Kids
NOTICE : You do not have the right to reprint or sell this guide. You do not have the right to edit this guide in any way. DISCLAIMER AND/OR LEGAL NOTICES: The information presented herein represents the view of the author as of the date of publication. Because of the rate with which conditions change, the author reserves the right to alter and update his opinion based on the new conditions. The report is for informational purposes only. While every attempt has been made to verify the information provided in this report, neither the author nor his affiliates/partners assume any responsibility for errors, inaccuracies or omissions. Any slights of people or organizations are unintentional. If advice concerning legal or related matters is needed, the services of a fully qualified professional should be sought. This report is not intended for use as a source of legal or accounting advice. You should be aware of any laws which govern business transactions or other business practices in your country and state. Any reference to any person or business whether living or dead is purely coincidental.
iSafetyOnline – http://www.isafetyonline.com
Tracking Kid's Activities Online – Yes This is The Best Way
There’s no doubt about it. We’ve become a technology-driven society. Everything from home appliances to municipal infrastructures is controlled to some extent through computer access. Even the most basic tasks involved in living one’s life either require, or are made easier by, the use of computers and the internet. We shop online. We manage our finances and pay our bills without picking up a pen or stamping an envelope. Recipes, photographs and home videos are stored in a virtual filing cabinet. We stay in touch with family and friends through email, conduct business the same way, and rely on the availability of nearly any piece of information with a few clicks of the mouse. Think back to the last time the power went out during a storm or your computer was in for repairs if you doubt the significance of technology – life almost comes to a standstill without it! As good parents, we naturally want to make sure our children have every opportunity to prepare for the future. These days, that absolutely includes at least a working knowledge of all things computers, including the internet. Most schools, where budgets permit, have computers either in the classroom
iSafetyOnline – http://www.isafetyonline.com
Tracking Kid's Activities Online – Yes This is The Best Way
or in a computer lab, and students begin using them as a regular part of the curriculum, as early as kindergarten in many instances. Statistics vary, but it is estimated that 165 million people in the United States regularly access the internet, and the top five websites worldwide are USbased. Seventy-three percent of American homes own at least one computer, and usage figures are rising exponentially. What does all this mean to the parents of budding young minds? Several things. First, our children are benefiting from a world of opportunities that were not available in any previous generation. In addition to the computer skills children are acquiring at a very young age, they are learning more in less time and gaining a deeper understanding of the world around them through the ease and availability of the internet as a research tool and the wealth of information it puts at their fingertips. Second, it means their cognitive abilities are growing in new and unexpected ways. Research suggests that certain computer-related activities actually aid in the development of neural pathways that enable sharper critical thinking skills, multitasking ability, and creativity, similar to the influence of early exposure to music and language. Third, early computer use serves as hands-on training for later life, regardless iSafetyOnline – http://www.isafetyonline.com
are frightening. and. one in 17 will be harassed or threatened. one in five will receive a sexual proposition.Tracking Kid's Activities Online – Yes This is The Best Way of what career path a child chooses. And finally.isafetyonline. From handheld devices to the most advanced and specialized processors in use today. as reported at the website of Parental Control Products.com 5 . Part of a parent’s responsibility in this environment is knowing where the potential for danger exists. New Opportunities Bring New Dangers Statistics on internet-related risks. providing the structure and limits that will keep children safe until they are mature enough to do so themselves. as in all areas of life. Their website reports that one in four children will be exposed to sexually explicit graphics. the presence of this technology in a child’s life means not only new and better opportunities. iSafetyOnline – http://www. but new risks as well. nearly every field capitalizes on the increased efficiency that computers allow. teaching children the skills to avoid harm.
Other dangers. Merchandise can be ordered online by anyone with access to a credit card number. son. which might be stumbled upon by others. Unsupervised or without clear. Unauthorized downloads can clog a computer with adware and spyware. specific guidelines about internet use. including online predators? iSafetyOnline – http://www.com 6 . albeit less horrific. daughter loves Internet or surfing on the net? Did you know that your child or teen is vulnerable to attacks from Online Predators while innocently going about their activities online? Did you know that all of their activities online leaves footprints which can be traced back. Your kid. rendering it virtually unusable. teen.Tracking Kid's Activities Online – Yes This is The Best Way and one in 33 will be aggressively pursued by sexual predators. a smart child can put himself and his family in an unpleasant or damaging position.isafetyonline. Though far less terrifying than the possibility of child abduction or sexual abuse. Viruses can infect your system through innocent looking email. also overshadow users of the net. these risks are actually much more likely to occur and can have negative consequences for the entire family. The family email account can be bombarded with spam if the address is used to request information from the wrong individual or website.
with so many social networks available. what and how of your teen's activities.isafetyonline. it is more or less possible. it becomes near impossible to know the where.com 7 . It is said that the experiences during childhood or adolescence shapes the iSafetyOnline – http://www. at least to a large extent. And then there are those places visited by teens which parents have not even heard of. Not that your teen will do anything deliberately. It is an altogether different scenario in the online world. to keep a tab on your child's activities.org In the real world.Tracking Kid's Activities Online – Yes This is The Best Way Take a look at the following * 42% of kids reports of being bullied online * 35% of kids reports of being threatened online * 21% of kids reports of having received mean or threatening email * 58% of kids reports of having being told mean or hurtful things online * 53% of kids admits of having said mean or hurtful things to another person online * 58% of kids have not informed their parents about hurtful experience online *As per study conducted by isafe. but their seemingly friendly interactions with others might turn out to be due to false or assumed identity by others. It is indeed an altogether different world from the one we know.
This has now come to include the experiences online too. but has extended to portable internet enabled computers and devices. mobile phones etc. Like most things else.com 8 .isafetyonline. whether offline or online. due to unawareness on the part of parents. Many criminals are found to have had a history of very disturbed childhood. it has become very easy to share information and spread it instantly. Tracking their kid's activities online with an aim to keep them safe and secure is something not thought of. while many successful people has had a history of supportive parents and a well balanced life. of such a possibility. The scar could last a lifetime. The damage or hurt which could be inflicted on our children mentally. In this age of cyberworld. Your child's security and privacy is of utmost importance. As parents there cannot be anything more important than keeping our kids safe and secure. along with the usefulness comes along the harmful side of it too. the online world does not only pertain to internet at home anymore.Tracking Kid's Activities Online – Yes This is The Best Way future of the child. emotionally in the online world is very real. it has become a top priority now for parents to take steps to keep them safe and secure. With so many children suffering as a result of some happenings online. even iSafetyOnline – http://www. With their widespread use.
Like in this world where you can always ask around and gather information of your teen's activities. which is simply not possible for most people. same cannot be applied to the online world. or can lead them to innocently try out some new seemingly interesting activities online. You need very efficient tracking system.Tracking Kid's Activities Online – Yes This is The Best Way lead to extreme actions. so it does in the online world too. We don't want any of such things to happen to our children. which might compromise their safety. can very easily lead them to 'unwanted' sites. why should it be any different in the online world too. We cannot ignore the fact that just as in the physical world where both good and evil resides. Kids naturally are inquisitive and their curiosity to explore things further when surfing online. In this world we do everything in our hands to keep our kids safe. don't even hesitate in spending wherever and whenever necessary to keep our children more safe. We cannot afford to ignore this. It is understandable that the majority would not even be aware of the iSafetyOnline – http://www.isafetyonline.com 9 . where the possibility of getting hurt with deep scar is very real? There has already been a number of cases of extreme hurt. action and consequences which has made it to the news.
and their safety and security now during their most tender years. Cyberbullying : It obviously means act of bullying online. By the time this is realized. Nothing should stop you in ensuring that. Your teen's future depends on their whole well being now.. which can be in the form of text.com 10 .isafetyonline. Online Friends : The internet has facilitated interactions and sharing of information with strangers and acquaintances easy. Making friends online has never been easier. Because the words has not spread far and wide yet. photos or videos among others.. iSafetyOnline – http://www.more on sexting.more on cyberbullying. It may not seem like it but this can hurt quickly and very badly. There has been stories in the news of children or teens who had been driven to violent crimes or even suicide as a result of being bullied online . Such a content getting leaked could lead to unwelcome sexual solicitations or bullying... The following are some of the activities online where your child can be at risks of being attacked from online predators.Tracking Kid's Activities Online – Yes This is The Best Way possibility to keep a track on their kid's activities online with the intention of keeping them safe only. which further could lead to disastrous consequences . In reality a so called friend can turn out to be a person with assumed identity with not so friendly intentions. Sexting : This refers to the sending of sexually explicit messages.
social anxiety etc. internet addiction and phobias . could also lead to isolation. in the form of materials which can negatively influence kids and teenagers. low self-esteem. or employment.. The photos. come across negative content through search engines..isafetyonline. This is believed to mask depression.com 11 ... Internet Addiction : This refers to uncontrollable use of the internet resulting in damage in regards to relationships.. The user is not exercising the required activities in terms of their minds and bodies .more on online photos & videos.more on bad content online. It becomes easy for your kid to even if inadvertently. social networking sites etc.. Obviously inappropriate content your child may be viewing via all these might include violence. emails. pop ups or spams. or schoolwork.. Online Photos & Videos : These are media made available on the net via blogs. Bad Content Online : And of course there is the bad content online.more on internet addiction. iSafetyOnline – http://www. pornography and all kinds of inappropriate content.Tracking Kid's Activities Online – Yes This is The Best Way they would already have access to personal information which can be used for causing tremendous harm . videos or contents uploaded by your child or someone else might be misused by online predators .. The harmful effects of this includes psychological and social problems for teens.more on online friends. websites.
.. The focus of concern here is that some children having possession of a video shot at a party of other children recording some private scene.. and of course their widespread use. uploads the video online which gets passed around the net. Teens & Mobile Phones : This has come to be included due to the enhanced functionality and usage now possible using mobile phones. Online Reputation : Like any reputation.. A bad online reputation not only affects self esteem but has an impact on the social.more on online reputation. The harmful effects includes overspending. online reputation is very real and damage to this. purchasing prohibited items and damaging the card holder's credit score .. Video Sharing : As the name suggest this involves sharing videos online which is usually passed around.more on video sharing.com 12 . educational and career prospects . this has also facilitated harassing others. especially during adolescence years can haunt for years to come. facilitating gossip and other social activity at school . iSafetyOnline – http://www.more on teens & mobile phones..Tracking Kid's Activities Online – Yes This is The Best Way Kids & Online Commerce : This is about kids carrying out monetary transactions online... Along with the usefulness. getting scammed. The damage to the image of the children involved can well be imagined .more on kids & online commerce.isafetyonline.
education and fun. and iSafetyOnline – http://www. Basic templates can be found on-line. addiction. the advances in real-time information sharing can pose serious threats to children. children are also at risk for stalking. Make a Pact. and can include site restrictions. As technology continues to advance. Make sure your child knows what he or she is and is not allowed to do on the computer. the Internet is essential for communication. Set Rules. Create a family contract regarding Internet use. Determine what your child needs to use the computer for. Establish consequences for breaking the rules.isafetyonline. 2.com 13 . legal consequences and other on-line dangers. When allowing children to use the Internet. However. and activities. In addition to the Internet predators that many parents are aware of. bullying. This document can contain house rules about on-line conduct. This could be school-related or just for entertainment. The 101 Internet Safety Tips For Kids 1. parents should use the tips listed below to ensure that all members of the family can enjoy a safe and fun on-line environment. Boundaries can be set based on a child’s age and maturity level. program use.Tracking Kid's Activities Online – Yes This is The Best Way Using the Internet has become a way of life for this century's kids.
While the Internet can be fun and useful. 4. no more than an hour on-line daily could be a good rule of thumb. suggest they take one of the quizzes to show you what they know.Tracking Kid's Activities Online – Yes This is The Best Way you can modify the document to include your childrenís input when preparing a final draft. After discussing Internet safety with your child. Determine time limits based on how much Internet use is necessary for homework and other activities. 5. Many Internet safety websites offer on-line multiple choice quizzes that children can take to test their knowledge about being safe on-line. One child using the Internet more than others can also result in jealousy and arguments. You may also want to include facts and statistics about on-line safety to remind children of the dangers.Create a Schedule. 3.com 14 .Computer Area. and post it near the computer area for easy reference. iSafetyOnline – http://www. Have children read and sign the contract. Make a schedule with fair time limits to allow all family members to have access to the Internet when necessary. Take the Quiz. children should be involved in activities outside of using a computer. Outside of homework research.isafetyonline.
Block Pop-ups. as well as minimize the chances of children viewing offensive material. 7. family area instead of in a child's bedroom.Block Viruses. A good program will also monitor spyware and alert you of any threats.Tracking Kid's Activities Online – Yes This is The Best Way Keep the computer in an open.com 15 . 6. Passwords to block access to the computer can be used to enforce this practice. This will make it easier to keep an eye on their activities.isafetyonline.Limit Browser Functionalities. Set the Internet browser to block pop-up websites and advertisements. iSafetyOnline – http://www. 9. Be sure that personal computers and laptops are equipped with virus detection software that scans and updates on a regular basis. do not let children use the Internet unless a parent is home to monitor activity. 8. This will allow for cleaner web surfing. If there are multiple computers in your home. Until you are confident that rules can be followed.Home Alone. consider designating one as a family computer and password restricting access to the others.
These Internet browsers feature built-in filtering capabilities to protect young eyes from unwanted and explicit material. iSafetyOnline – http://www. Suggest Family-Friendly Websites. Find educational and wholesome websites for your child to visit. 11. government-sponsored educational websites. 12. Several companies have created browsers made specifically for younger users.com 16 . and add them to a bookmark list.isafetyonline. Good suggestions include the websites for your child's favorite educational television programs. Consider Kid-Geared Browsers.Tracking Kid's Activities Online – Yes This is The Best Way Modify Internet browser settings so they do not automatically save website information. Clear cookies and temporary Internet files on a weekly basis. Browsers like Glubble and Buddy Browser include features to disable external chat and encourage media sharing and social interactions with family and other people the child already knows. Show your child how to access the bookmark menu to view the sites. Protect Wireless Networks. protect the wireless network connection with a password and firewall to keep unwanted users out. 10. If wireless Internet access is used. like user names and passwords.
as well the ability to add or delete users. This can help minimize the risk of important files or folders being accidentally deleted by kids. 13.isafetyonline. If a home computer is used by all family members. Parents' user accounts should have full rights to view and change all files saved on the computer. Teach children to create passwords that are easy for them to remember but difficult for others to guess. every 60 days or so.) Teach children how to enter their password when logging in. Strong passwords will include numbers and letters. iSafetyOnline – http://www. and show them how to make sure that the Caps Lock is not engaged if the password is case-sensitive.Tracking Kid's Activities Online – Yes This is The Best Way and school or community websites. Create Solid Passwords. it may be a good idea to give a unique log-on identifier to each user. Get in the habit of changing password for computer access and websites on a regular basis. Create Separate User Accounts. 15.com 17 . and should not be obvious (like a name and birth date. Be sure that all family members update passwords by scheduling a day when everyone makes their changes. Change Passwords Regularly. 14.
Know Your Kids' Passwords. Don't allow kids to install new programs unless supervised. Keep a list of websites your child uses and the user names and passwords for each. 19.isafetyonline. Teach children not to share their user names or passwords with friends and strangers. Program Installation. Make sure they give you're their new password if they change it. children might know more about the technology than parents do. Learn from Kids. Their passwords should be known only by them and their parents.com 18 . 17. 18.Tracking Kid's Activities Online – Yes This is The Best Way 16. Have them change their password if it is discovered by someone else. Knowing what is being installed on the computer and where it came from can prevent risk of virus infection. This is useful for monitoring their activity and reminding them of a password when it is forgotten. If you need help understanding how certain iSafetyOnline – http://www. Protect Passwords. Adult installation of new programs will also ensure that new programs are installed correctly. Since Internet use is so prevalent in schools.
iSafetyOnline – http://www. 22. and it ensures that private information does not remain viewable to hackers or third-parties.com 19 . Secure Sites. Many browsers also display a padlock or green address bar when a site is secured.isafetyonline. Close Browser Windows Correctly. kids are always proud to share their knowledge. Explain Risks. Update. Teach children to log off of sites that require a user name and password instead of simply closing the browser window. 23. Teach children to recognize secure sites by looking for the "https" prefix. Officially logging off is secure. the computer will run more smoothly and be less susceptible to hackers and viruses. Most browsers will display a warning when a website's security certificate is inconsistent or expired.Tracking Kid's Activities Online – Yes This is The Best Way sites or programs work. When latest technologies are used. 20. Teach children to avoid sites when a security warning is displayed. 21. Keep software and hardware up to date.
Don't Talk to Strangers.isafetyonline. instruct them not to respond and to tell you about the encounter immediately. but intended to protect them from harm. Internet predators are known for posing as children in chat rooms to lure real kids into conversations. remind children not to talk in a chat room or via e-mail with anyone they do not know. If children are approached by strangers in a chat room. Instruct children to always be cautious about anyone they meet on-line. Children will have a better appreciation for the family Internet usage rules if they understand that the rules are not created to keep them from having fun. Children are naturally trusting and will talk online with anyone who seems friendly or nice. This tactic often results in children exposing more personal information than they would to an adult stranger. If a child is bullied on-line by a iSafetyOnline – http://www. Know Who to Call.Tracking Kid's Activities Online – Yes This is The Best Way Teach children about on-line dangers. like sexual predators and cyberstalkers. 24. 25. As in real life.com 20 . 26. If a child is being stalked or threatened on-line. contact police with the user's screen name and any other given information. Don't Take Anyone at Face Value.
contact the bully's parents.Tracking Kid's Activities Online – Yes This is The Best Way classmate. and false charities. Too Good to Be True. like moneymaking schemes. Children can be naive to these ploys and iSafetyOnline – http://www. 29. Practice what to say and not sharing personal information.isafetyonline. Educate children on how to avoid Internet scams. 27. especially if they feel they "know" the person from multiple on-line conversations. Teach them to feel comfortable ignoring strangers or exiting chat rooms when approached. Role Play. 28. Use role playing to reinforce how children should act when approached on-line by someone they do not know. accompany your child and meet in a public place. In-Person Meetings. Also review how they should handle cyberbullies. This practice will make your kids feel more comfortable if the time comes when they need to deal with the real thing. contact the manufacturer's technical support department for assistance. This can be difficult for young children to understand. chain emails. Do not allow children to meet on-line friends in person. If they insist on meeting an on-line friend. If parental control software is not working correctly.com 21 .
Be Fair. 31. This will help to maintain your child's trust that they can tell you about things that happen to them on-line. 32.isafetyonline. thank them for bringing it to your attention. Instead. If it's too good to be true. Don't punish children for their friends' bad on-line behavior. Let children know that they can tell you if anything they saw on-line made them feel uncomfortable. Explain that there is no reason to keep a promise with a stranger. Tell children to let you know if anyone on-line asked them to engage in a conversation or activity that was to be kept secret.No Secrets.com 22 .Tracking Kid's Activities Online – Yes This is The Best Way often get taken advantage of. Do not get angry at them for seeing something they shouldn't have seen. it probably isn't. 33. Only enforce consequences for actions that your child actually does. 30. Express Discomfort. iSafetyOnline – http://www. especially when the stranger specifically says not to tell parents. Photo Sharing. This can include photos or conversations in chat rooms.
Cost Containment. address. If this information is required for registration with a website. hometown. kids should check with parents first before supplying the information.Tracking Kid's Activities Online – Yes This is The Best Way Tell children never to send a photo of themselves to anyone they do not know. 36. Tell children not to share personal information on-line. etc. age. ensure that the photos do not contain identifiers.com 23 . Maintain Privacy. Explain that when strangers learn more information about a kid's appearance. If children post photos to their website or social network page. 35.isafetyonline. Don't give children credit card numbers to use for on-line purchases or website iSafetyOnline – http://www. This includes their last name. it can make it easy to find children and hurt them. like house numbers or car license plate numbers. phone number. 34. predators can use information form a collection of photos to determine a child's home or school location. or school name. Although a single photo may not seem harmful. Photo Safety.
com 24 . Smartphones. On-line Auctions. Consider Parental Controls. Require parental approval before children download applications to their smartphones. disable the service or install a parental control application. like eBay. Children can sign up and bid on items without realizing that they are entering a contractual obligation to purchase. iSafetyOnline – http://www. 39. whether on the pc or on a handheld device.isafetyonline. 38. If your child has a phone or music player with on-line capabilities. An adult should always supervise any financial transaction online to ensure that the website is legitimate and secure. Not only could the app's content be inappropriate. be sure that they understand that the same Internet rules apply. 40. do not require credit card information to establish an account. On-line auction sites. If internet access on a smartphone is too much freedom. 37. Apps Add Up.Tracking Kid's Activities Online – Yes This is The Best Way registrations. but the cost of multiple applications can result in a shocking expense on the monthly phone bill.
com 25 . you may also want to block shopping websites. These programs generally block pornography and violence. drug use. Ask your child to show you his or her favorite sites and explain why he or she likes them. Know what websites your child visits and be involved in his or her online activities. but can also be customized to block specific websites or website categories. Keep in mind that kids may be so familiar with the Internet that they can find ways around parental controls. Depending on age and maturity level. Don't forget to restrict access to sites depicting dangerous activities. there are other websites that children should not be exposed to. and hate. Less Obvious Sites. 41. Spend time together looking at websites on the Internet and finding new appropriate sites to visit. Be Involved. Adults can use a password to access all sites.isafetyonline. While parents may immediately think of blocking access to pornography. Learn Chat Room Abbreviations. Be sure to pick a strong password that your children won't figure out.Tracking Kid's Activities Online – Yes This is The Best Way Software is available to block unwanted content from the Internet. iSafetyOnline – http://www. 42. 43.
Make sure that children use care when typing a url into the browser's address bar. Know Your Child's Friends. completing a url with . Have a Purpose. or you can ask your child to teach you what those letters mean. Research on-line can help you decipher the meanings of many abbreviations. 46. 45.isafetyonline.Tracking Kid's Activities Online – Yes This is The Best Way The abbreviations kids use when chatting can seem like a foreign language to parents.com will lead to a completely different website than the one intended. Get to know the acronyms used in chat rooms and instant messaging so you can tell just what they are talking about. don't let him or her use it until the purpose is explained. Some predatory websites purposely choose close spelling variations of legitimate websites just to expose children to explicit material. Children should also mind the various extensions. Type Carefully. This often leads to children visiting inappropriate sites that were linked from another site or found from a web search.net instead of . 44. Do not allow random web surfing. If your child can not describe exactly what he or she needs to use the Internet for. Get to know your child's chat room and social networking friends just like you iSafetyOnline – http://www.com 26 .
Content is not regulated.com 27 . . including sites with the . This can be especially confusing when the child is involved in roleplaying games with avatars.org. and . they should delete the message without reading it. Encourage use of reputable sources for homework assignments. Find out which ones are on-line only friends.edu.Tracking Kid's Activities Online – Yes This is The Best Way would learn about his or her real life friends. Teach children not to believe everything they see on-line.gov suffix. and how your child met them. Know the Source. Young children may have difficulty separating on-line life from life in the real world. iSafetyOnline – http://www. 48. Remind children not to open up emails.isafetyonline. attachments or links that come from anyone they do not know. how old they are. 49. If they do not know the person who sent the email. Being involved in your child's social circle will help you to recognize any unusual signs as early as possible. 47. Be Skeptical. Know the Difference. Maintain a healthy balance of real life and Internet use to reinforce the separation. so nearly anyone can post information regardless of whether or not it is true.
53. Create an e-mail address that all family members can share instead of giving young children their own e-mail address. Most websites require that registered users be older than 13 years old. Family E-mail. There is safety in numbers. This will allow parental monitoring of e-mails as the child learns more about how to use the Internet. 51.com 28 . Curious teens may want to view pornographic photos or videos. 52.isafetyonline. Follow Age Limits. Follow these limits. encourage them to stay in the public chat area instead of engaging in private chat. they are there for a reason. iSafetyOnline – http://www.Tracking Kid's Activities Online – Yes This is The Best Way 50. Chat Room Safety. Sites that are geared towards teens and adults may include photos or language inappropriate for young children. If children use chat rooms. Use parental control software to block these sites if necessary. and in a public chat area (as in the real world) a Good Samaritan is likely to jump in if someone is being targeted or threatened. Pornography. Talk to them about their interest and explain to them about why they should not visit those websites.
55. 54. Unless someone is a confirmed friend. Create an account on the same social networking site that you child uses and become one of their friends. This will allow you to keep an eye on what they do. Kids Social Sites.com 29 . If your child uses an adult social networking site. suggest those specifically designed for kids. teach your child how to use the privacy features so they can keep personal information private.isafetyonline.Tracking Kid's Activities Online – Yes This is The Best Way Pornographic websites and websites for tobacco companies often require that visitors be over age 18. he or she will not be able to view any of the details of your child's page. Social Networking Privacy. "Friend" Your Kids. If your child wants to join a social networking site. 56. Set up their pages so friends can only be added with their consent. as well as monitor the activity of their friends. like use of an avatar instead of a profile photo. iSafetyOnline – http://www. They also have built in privacy features. and alcohol manufacturer websites require visitors be older than 21 years of age. These sites offer gaming and a social atmosphere in a kids-only environment. like Webkinz or Club Penguin.
58. Review websites and blogs that belong to your child's school friends to ensure that they too are protecting their own privacy. 60.Tracking Kid's Activities Online – Yes This is The Best Way 57. Protect Your Child's Friends.com 30 . If Internet use becomes excessive or replaces normal socialization and activities. Let the friends' parents know if you notice any postings or activity that could pose risks.isafetyonline. Time Limits. Help your child set up an instant messaging profile that only allows people from a buddy list to see when he or she is online. and many parental control software programs include time limit features. 59. which will eliminate messages from unknown users. Programs that enforce time limitations can be found on-line. install a program that sets limits on time spent on-line and blocks access during specified hours. When a child iSafetyOnline – http://www. Instant Messaging Privacy. Follow Website Policies. His or her status will remain invisible to strangers. Most websites include a terms and conditions page that may include rules of conduct in discussion boards or use of copyrighted materials.
Tracking Kid's Activities Online – Yes This is The Best Way registers with a website. 63.com 31 . Check Their E-mail. Most e-mail programs have spam filters that will automatically delete pornographic or bulk advertising messages. Email Preview. 61. Set email preferences so messages do not display unless clicked on. Avoid E-mail Spam. Reduce e-mail spam by limiting the websites your child registers for using an e-mail address. Log in to your child's email account from time to time to ensure they are following the house rules of Internet conduct. read these policies together to ensure your child understands the expectations. 64. a parent should initiate the communication. Although children may like to browse for sale/wanted ads on Backpage or Craigslist. Instead.isafetyonline. 62. do not allow them to respond to the ad directly. Also teach children not to reply to junk e-mails. Check both incoming and outgoing messages for anything unusual. Beware Classified Ads. When iSafetyOnline – http://www.
68. also ensure that it is tasteful and age-appropriate. Learn about the filtering programs and protections used anywhere your child accesses the Internet. Require parental approval of children's nicknames for websites. your child may see explicit photos or messages that they had no control over receiving. 66. Be sure that the name does not contain too much personal information and that it does not include slang or references that are inappropriate for a child.isafetyonline.com 32 . If an avatar is used for certain websites. Although they may be labeled innocently. chat rooms. and on-line games. Research Safeguards. or at friend's houses.Tracking Kid's Activities Online – Yes This is The Best Way the content of e-mail messages displays automatically. so teach iSafetyOnline – http://www. User Names. 65. Hackers and e-mail viruses can operate under recognized identities. Photo Downloads. including at school. at the library. Be Wary of Strange Messages. Tell children not to download pictures or videos from unknown sources. 67. these files could contain viruses or display pornographic materials.
Search Engine Filter. do not allow children to let social networking sites scan their e-mail address book. This will eliminate the possibility of offensive or unrelated sites being accessed from a web search.Tracking Kid's Activities Online – Yes This is The Best Way children to be aware of any strange e-mails. Examples of strange messages include attachments with odd file extensions or incoherent words in the message body. Go Direct. Instead of using a search engine to access sites.com 33 . Assume Permanence. Treat these messages as they would ones from unknown senders. have children type the url directly into the address bar or use a bookmark. a web search can bring up material that children should not see. Teach children to operate under the assumption that everything they post on- iSafetyOnline – http://www. 70. 72. even if the sender's name is familiar. To avoid sharing away e-mail addresses of friends and family. Using a filtering program can help eliminate inappropriate results from a web search. 71. Without a filter. Protect Others' Email Addresses. 69.isafetyonline.
Find content-appropriate blogs made by other children as an example for your child to model his or hers after.Tracking Kid's Activities Online – Yes This is The Best Way line is permanent and can be found by predators or hackers even after deletion. Blogs with privacy protection will ensure that your child's personal profile is not revealed. If your child wants to write in a blog or web diary. While social networking pages and websites can be deleted. iSafetyOnline – http://www. Positive Examples. Screen your child's writing or photos before they are posted on-line to ensure that they do not include too much personal information. or hobby. television show. people who know how to find it can still access the information. Modify the blog settings so comments can not be added to posts. 74. find a site that allows private and password-secured blogs.isafetyonline. this will reduce spam and negative or offensive feedback. Review Their Posts. 73. Watch out for less obvious identifiers.com 34 . like school mascot names and names of friends. Blog Privacy. Good examples may be blogs centered on a favorite sports team. 75.
Watch for signs of obsession. 77. Blog and diary content can include very personal topics. including constantly wanting to check for new messages or frustration when not able to access the sites. Watch for Obsessive Behavior.Tracking Kid's Activities Online – Yes This is The Best Way 76. Be a Detective.isafetyonline.com 35 . Not only are these what Internet predators look for. Be aware of blog posts or discussion board comments that show emotional vulnerability. Protect Emotions. 78. but they could be signs of emotional stresses and troubles that your child is not comfortable iSafetyOnline – http://www. If he or she is not sure. Ask your child if he or she is comfortable sharing the content with strangers before they post it. Vulnerability. address and other identifying factors to see if they have posted any personal information on a website. E-mail and social networking can become an addiction for adults and children. This research can also help you determine if your child started a website or blog without your knowledge. do not post. 79. Perform occasional web searches for your child's name.
Look for signs of cyberbullying. Bullies no longer exist only in the classroom. Instead of lying. This includes not listing their actual age on social networking sites.isafetyonline. iSafetyOnline – http://www.com 36 . 83. like a child becoming upset when online or a not wanting to go to school. 82. Don't allow your child to bully or gossip about others on-line. Honesty. teach them to use privacy controls to hide information and not answer questions that make them feel uncomfortable or would require them to reveal personal information. the same rules of conduct and respect should apply. 81. Even though the interactions are not in-person. the same child who bullies a child in person will begin to bully on-line through chat or instant messages. Piracy.Tracking Kid's Activities Online – Yes This is The Best Way sharing with you. 80. Have disciplinary consequences for not treating others kindly. Cyberbullying. Oftentimes. Do not allow your children to pretend that they are someone else online. Golden Rule.
com 37 . The unknown source of the download creates privacy and virus risks. Explain that it is stealing and there are serious legal consequences. Block File-Sharing. Knowing everyone personally creates the safest environment for iSafetyOnline – http://www. Keep in mind that predators may disguise their voices to sound like children even though they are adults. 84. 86. File-sharing network sites often distribute copyrighted material. Some on-line video games allow for voice chatting. Even if your child is not distributing the material further. Use Voice Chat With Care.isafetyonline. use of pirated software and music is still illegal. Be sure that if children participate. share. or duplicate copyrighted software or music without paying. they follow the same rules as in a text chat room and do not divulge personal information to strangers.Tracking Kid's Activities Online – Yes This is The Best Way Do not allow children to download. Encourage Playing with Friends. with or without your knowledge. 85. Many file sharing software programs also place a file on your computer that allows others to receive files from you. Recommend that your child play on-line games and chat with friends from school and other activities instead of exclusively communicating with on-line only friends.
Tracking Kid's Activities Online – Yes This is The Best Way on-line play. Know the Games. discourage use of non-monetary casino gambling games (like free poker and blackjack). Become aware of the games your child plays on-line. Playing games with your kids is a good way to get involved in their on-line activities without appearing too intrusive.com 38 . Minimize Fees. 90. Prohibit Gambling.isafetyonline. 87. Many on-line video games have monthly service fees that children may not know about until parents receive the bill. Understand the rules. Young children should not use the Internet without supervision. 88. content. and average player age. Supervise. Always stay with young kids while they are on-line to answer questions and eliminate the iSafetyOnline – http://www. as they still operate around a wagering system that can lead to actual gambling in the future. Remind your children that it is illegal for minors to gamble on-line. Even though it's not real money. 89. Steer your kids towards free games that do not require submission of personal credit card information.
com 39 .Tracking Kid's Activities Online – Yes This is The Best Way possibility of wandering onto an inappropriate site.isafetyonline. In addition. Cyberdating. Role Model. iSafetyOnline – http://www. Confront them with indiscretions or questions you have about their web browsing activities. 92. pornography. and these romance sites are a haven for Internet predators. and chat rooms. Take a look at the history of sites visited to see where your child went on-line and what they did. people are not always what they seem. 91. Review Browser History. Parents especially should practice what they preach with regard to software piracy. Discourage teens from using websites to meet potential boyfriends or girlfriends. All members of the family members should act as positive role models for children who are just beginning to use the Internet. Everyone should follow the same rules of conduct with respect to safety concerning the sharing of personal information. and many have niches that may not be appropriate for anyone younger than 18 years old. These sites are intended for adults. 93.
Find out what is going on and discipline accordingly. Children rarely hide good behavior. 96. friends. Explain the dangers and legal consequences of children and teens sending each other nude or partially nude photos via the Internet. Plagiarism. Once the photo is sent by the originator. he or she has no control over what other people decide to do with it. 95. iSafetyOnline – http://www. Webcams. Sexting. Review your child's videos before they are posted or distributed to others. Look for Signs of Misconduct.com 40 . 97. including family.Tracking Kid's Activities Online – Yes This is The Best Way 94. it is often a sign that he or she is not following the rules. ensure that children use the device appropriately. If a child or teen quickly closes a browsing window when you enter the room or you find that browsing history has been deleted. While webcams can be useful for video chat with friends or long distance relatives.isafetyonline. and teachers. Children should avoid video chat with strangers because of the physical recognition factor. Remind them that once something is posted on-line it can travel quickly and be seen by many people.
isafetyonline. Explain to your teens that iSafetyOnline – http://www.Tracking Kid's Activities Online – Yes This is The Best Way When a child uses on-line resources for homework assignments. Teens may not realize that they are candidates for identity theft because they usually do not have bank accounts and credit cards. Teen Identity Theft. Respect Others' Privacy. Also teach kids not to add someone to a mass-mailing e-mail distribution list without asking first. If you suspect that your child has used someone else's content. several free plagiarism-detections services exist on-line. Teach older children to protect younger brothers and sisters on-line and to tell parents if they are engaging in any potentially harmful activities. 98. be sure that they do not copy other people's ideas as if they were their own. chain letters. 99. Teach children to respect the privacy of others by not reading e-mails intended for other people. Younger children often look up to older siblings and are comfortable learning the ropes from them. This also goes for forwarding jokes. or e-mail rumors to people who don't want to receive them. Sibling Enforcement.com 41 . 100. Explain plagiarism and the consequences it will have at school.
com 42 . software programs are available to block users' outgoing content.isafetyonline. 101. Block Outgoing Content. not to avoid loss of current assets.Tracking Kid's Activities Online – Yes This is The Best Way they still need to safeguard their personal information. These programs would allow children view-only access to websites. but to protect their credit from other people opening accounts in their name. If children are not mature enough to follow rules about not providing information to websites. iSafetyOnline – http://www.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.