Tracking Kid's Activities Online – Yes This is The Best Way

iSafetyOnline – http://www.isafetyonline.com
1

Tracking Kid's Activities Online – Yes This is The Best Way

101 Internet Safety Tips For Kids
Presented By

www.101InternetSafetyTipsForKids.Net

NOTICE : You do not have the right to reprint or sell this guide. You do not have the right to edit this guide in any way. DISCLAIMER AND/OR LEGAL NOTICES: The information presented herein represents the view of the author as of the date of publication. Because of the rate with which conditions change, the author reserves the right to alter and update his opinion based on the new conditions. The report is for informational purposes only. While every attempt has been made to verify the information provided in this report, neither the author nor his affiliates/partners assume any responsibility for errors, inaccuracies or omissions. Any slights of people or organizations are unintentional. If advice concerning legal or related matters is needed, the services of a fully qualified professional should be sought. This report is not intended for use as a source of legal or accounting advice. You should be aware of any laws which govern business transactions or other business practices in your country and state. Any reference to any person or business whether living or dead is purely coincidental.

iSafetyOnline – http://www.isafetyonline.com
2

Tracking Kid's Activities Online – Yes This is The Best Way

Introduction
There’s no doubt about it. We’ve become a technology-driven society. Everything from home appliances to municipal infrastructures is controlled to some extent through computer access. Even the most basic tasks involved in living one’s life either require, or are made easier by, the use of computers and the internet. We shop online. We manage our finances and pay our bills without picking up a pen or stamping an envelope. Recipes, photographs and home videos are stored in a virtual filing cabinet. We stay in touch with family and friends through email, conduct business the same way, and rely on the availability of nearly any piece of information with a few clicks of the mouse. Think back to the last time the power went out during a storm or your computer was in for repairs if you doubt the significance of technology – life almost comes to a standstill without it! As good parents, we naturally want to make sure our children have every opportunity to prepare for the future. These days, that absolutely includes at least a working knowledge of all things computers, including the internet. Most schools, where budgets permit, have computers either in the classroom

iSafetyOnline – http://www.isafetyonline.com
3

Tracking Kid's Activities Online – Yes This is The Best Way

or in a computer lab, and students begin using them as a regular part of the curriculum, as early as kindergarten in many instances. Statistics vary, but it is estimated that 165 million people in the United States regularly access the internet, and the top five websites worldwide are USbased. Seventy-three percent of American homes own at least one computer, and usage figures are rising exponentially. What does all this mean to the parents of budding young minds? Several things. First, our children are benefiting from a world of opportunities that were not available in any previous generation. In addition to the computer skills children are acquiring at a very young age, they are learning more in less time and gaining a deeper understanding of the world around them through the ease and availability of the internet as a research tool and the wealth of information it puts at their fingertips. Second, it means their cognitive abilities are growing in new and unexpected ways. Research suggests that certain computer-related activities actually aid in the development of neural pathways that enable sharper critical thinking skills, multitasking ability, and creativity, similar to the influence of early exposure to music and language. Third, early computer use serves as hands-on training for later life, regardless iSafetyOnline – http://www.isafetyonline.com
4

and. as reported at the website of Parental Control Products. teaching children the skills to avoid harm. as in all areas of life.com 5 .isafetyonline. New Opportunities Bring New Dangers Statistics on internet-related risks. And finally. iSafetyOnline – http://www. nearly every field capitalizes on the increased efficiency that computers allow.Tracking Kid's Activities Online – Yes This is The Best Way of what career path a child chooses. one in 17 will be harassed or threatened. From handheld devices to the most advanced and specialized processors in use today. are frightening. but new risks as well. one in five will receive a sexual proposition. Their website reports that one in four children will be exposed to sexually explicit graphics. Part of a parent’s responsibility in this environment is knowing where the potential for danger exists. providing the structure and limits that will keep children safe until they are mature enough to do so themselves. the presence of this technology in a child’s life means not only new and better opportunities.

these risks are actually much more likely to occur and can have negative consequences for the entire family. also overshadow users of the net.Tracking Kid's Activities Online – Yes This is The Best Way and one in 33 will be aggressively pursued by sexual predators. Unauthorized downloads can clog a computer with adware and spyware. Unsupervised or without clear. Viruses can infect your system through innocent looking email. son.com 6 . The family email account can be bombarded with spam if the address is used to request information from the wrong individual or website. Merchandise can be ordered online by anyone with access to a credit card number. which might be stumbled upon by others. Though far less terrifying than the possibility of child abduction or sexual abuse. a smart child can put himself and his family in an unpleasant or damaging position. specific guidelines about internet use. daughter loves Internet or surfing on the net? Did you know that your child or teen is vulnerable to attacks from Online Predators while innocently going about their activities online? Did you know that all of their activities online leaves footprints which can be traced back. albeit less horrific. rendering it virtually unusable.isafetyonline. Your kid. including online predators? iSafetyOnline – http://www. teen. Other dangers.

isafetyonline. at least to a large extent. It is an altogether different scenario in the online world. what and how of your teen's activities.Tracking Kid's Activities Online – Yes This is The Best Way Take a look at the following * 42% of kids reports of being bullied online * 35% of kids reports of being threatened online * 21% of kids reports of having received mean or threatening email * 58% of kids reports of having being told mean or hurtful things online * 53% of kids admits of having said mean or hurtful things to another person online * 58% of kids have not informed their parents about hurtful experience online *As per study conducted by isafe. It is indeed an altogether different world from the one we know. it becomes near impossible to know the where.com 7 . it is more or less possible. Not that your teen will do anything deliberately. And then there are those places visited by teens which parents have not even heard of. to keep a tab on your child's activities.org In the real world. with so many social networks available. It is said that the experiences during childhood or adolescence shapes the iSafetyOnline – http://www. but their seemingly friendly interactions with others might turn out to be due to false or assumed identity by others.

Tracking Kid's Activities Online – Yes This is The Best Way future of the child.com 8 . but has extended to portable internet enabled computers and devices. The scar could last a lifetime. As parents there cannot be anything more important than keeping our kids safe and secure. it has become very easy to share information and spread it instantly. emotionally in the online world is very real. In this age of cyberworld. This has now come to include the experiences online too. The damage or hurt which could be inflicted on our children mentally. it has become a top priority now for parents to take steps to keep them safe and secure. due to unawareness on the part of parents. Tracking their kid's activities online with an aim to keep them safe and secure is something not thought of. while many successful people has had a history of supportive parents and a well balanced life. Your child's security and privacy is of utmost importance. With so many children suffering as a result of some happenings online. the online world does not only pertain to internet at home anymore. With their widespread use. mobile phones etc.isafetyonline. Many criminals are found to have had a history of very disturbed childhood. even iSafetyOnline – http://www. Like most things else. of such a possibility. whether offline or online. along with the usefulness comes along the harmful side of it too.

don't even hesitate in spending wherever and whenever necessary to keep our children more safe. action and consequences which has made it to the news. Kids naturally are inquisitive and their curiosity to explore things further when surfing online. so it does in the online world too. why should it be any different in the online world too. In this world we do everything in our hands to keep our kids safe. which might compromise their safety.com 9 . It is understandable that the majority would not even be aware of the iSafetyOnline – http://www. We cannot afford to ignore this. You need very efficient tracking system. We cannot ignore the fact that just as in the physical world where both good and evil resides. Like in this world where you can always ask around and gather information of your teen's activities. or can lead them to innocently try out some new seemingly interesting activities online. which is simply not possible for most people. same cannot be applied to the online world.isafetyonline. can very easily lead them to 'unwanted' sites. where the possibility of getting hurt with deep scar is very real? There has already been a number of cases of extreme hurt.Tracking Kid's Activities Online – Yes This is The Best Way lead to extreme actions. We don't want any of such things to happen to our children.

iSafetyOnline – http://www. Such a content getting leaked could lead to unwelcome sexual solicitations or bullying.com 10 .. It may not seem like it but this can hurt quickly and very badly. which can be in the form of text. Making friends online has never been easier. which further could lead to disastrous consequences ..more on cyberbullying. Your teen's future depends on their whole well being now.isafetyonline.Tracking Kid's Activities Online – Yes This is The Best Way possibility to keep a track on their kid's activities online with the intention of keeping them safe only. Cyberbullying : It obviously means act of bullying online.more on sexting.. By the time this is realized. There has been stories in the news of children or teens who had been driven to violent crimes or even suicide as a result of being bullied online . In reality a so called friend can turn out to be a person with assumed identity with not so friendly intentions. Online Friends : The internet has facilitated interactions and sharing of information with strangers and acquaintances easy. Because the words has not spread far and wide yet. Nothing should stop you in ensuring that. The following are some of the activities online where your child can be at risks of being attacked from online predators.. photos or videos among others. and their safety and security now during their most tender years. Sexting : This refers to the sending of sexually explicit messages.

. pornography and all kinds of inappropriate content. emails...more on internet addiction.Tracking Kid's Activities Online – Yes This is The Best Way they would already have access to personal information which can be used for causing tremendous harm .. websites. It becomes easy for your kid to even if inadvertently. iSafetyOnline – http://www. Bad Content Online : And of course there is the bad content online.more on bad content online. This is believed to mask depression. or employment. pop ups or spams. The harmful effects of this includes psychological and social problems for teens.com 11 .more on online friends... Online Photos & Videos : These are media made available on the net via blogs.. videos or contents uploaded by your child or someone else might be misused by online predators . internet addiction and phobias . Internet Addiction : This refers to uncontrollable use of the internet resulting in damage in regards to relationships. low self-esteem.isafetyonline. or schoolwork. in the form of materials which can negatively influence kids and teenagers. Obviously inappropriate content your child may be viewing via all these might include violence. come across negative content through search engines. The photos.more on online photos & videos. could also lead to isolation. The user is not exercising the required activities in terms of their minds and bodies .. social networking sites etc. social anxiety etc.

.isafetyonline.more on teens & mobile phones. especially during adolescence years can haunt for years to come. Teens & Mobile Phones : This has come to be included due to the enhanced functionality and usage now possible using mobile phones. Online Reputation : Like any reputation. Along with the usefulness.. educational and career prospects .Tracking Kid's Activities Online – Yes This is The Best Way Kids & Online Commerce : This is about kids carrying out monetary transactions online. getting scammed... The focus of concern here is that some children having possession of a video shot at a party of other children recording some private scene.com 12 . facilitating gossip and other social activity at school . The damage to the image of the children involved can well be imagined . The harmful effects includes overspending.. and of course their widespread use. uploads the video online which gets passed around the net. this has also facilitated harassing others. online reputation is very real and damage to this. iSafetyOnline – http://www.more on online reputation. purchasing prohibited items and damaging the card holder's credit score ..more on kids & online commerce. A bad online reputation not only affects self esteem but has an impact on the social. Video Sharing : As the name suggest this involves sharing videos online which is usually passed around..more on video sharing..

and activities.isafetyonline. Create a family contract regarding Internet use. Make a Pact. The 101 Internet Safety Tips For Kids 1. Boundaries can be set based on a child’s age and maturity level. In addition to the Internet predators that many parents are aware of. When allowing children to use the Internet. program use. children are also at risk for stalking. the Internet is essential for communication. and can include site restrictions. This could be school-related or just for entertainment. bullying. legal consequences and other on-line dangers. Determine what your child needs to use the computer for. parents should use the tips listed below to ensure that all members of the family can enjoy a safe and fun on-line environment. education and fun. Basic templates can be found on-line. However. Make sure your child knows what he or she is and is not allowed to do on the computer. the advances in real-time information sharing can pose serious threats to children. and iSafetyOnline – http://www. Set Rules. addiction.com 13 . 2.Tracking Kid's Activities Online – Yes This is The Best Way Using the Internet has become a way of life for this century's kids. As technology continues to advance. Establish consequences for breaking the rules. This document can contain house rules about on-line conduct.

3.isafetyonline. 4. suggest they take one of the quizzes to show you what they know. One child using the Internet more than others can also result in jealousy and arguments. While the Internet can be fun and useful. Outside of homework research. no more than an hour on-line daily could be a good rule of thumb.Create a Schedule. After discussing Internet safety with your child. Have children read and sign the contract. Make a schedule with fair time limits to allow all family members to have access to the Internet when necessary. 5. Many Internet safety websites offer on-line multiple choice quizzes that children can take to test their knowledge about being safe on-line. children should be involved in activities outside of using a computer.Tracking Kid's Activities Online – Yes This is The Best Way you can modify the document to include your childrenís input when preparing a final draft.com 14 . Determine time limits based on how much Internet use is necessary for homework and other activities.Computer Area. iSafetyOnline – http://www. You may also want to include facts and statistics about on-line safety to remind children of the dangers. Take the Quiz. and post it near the computer area for easy reference.

Home Alone. Be sure that personal computers and laptops are equipped with virus detection software that scans and updates on a regular basis. Until you are confident that rules can be followed. A good program will also monitor spyware and alert you of any threats. If there are multiple computers in your home. as well as minimize the chances of children viewing offensive material. This will allow for cleaner web surfing. do not let children use the Internet unless a parent is home to monitor activity. Set the Internet browser to block pop-up websites and advertisements. family area instead of in a child's bedroom.com 15 .Tracking Kid's Activities Online – Yes This is The Best Way Keep the computer in an open. 8. This will make it easier to keep an eye on their activities. Passwords to block access to the computer can be used to enforce this practice.Block Pop-ups. 6.isafetyonline. consider designating one as a family computer and password restricting access to the others. 9. 7.Block Viruses. iSafetyOnline – http://www.Limit Browser Functionalities.

protect the wireless network connection with a password and firewall to keep unwanted users out. Consider Kid-Geared Browsers.Tracking Kid's Activities Online – Yes This is The Best Way Modify Internet browser settings so they do not automatically save website information. 11. like user names and passwords. Show your child how to access the bookmark menu to view the sites.isafetyonline. If wireless Internet access is used. Good suggestions include the websites for your child's favorite educational television programs. Suggest Family-Friendly Websites. Find educational and wholesome websites for your child to visit. and add them to a bookmark list. 12. Protect Wireless Networks. Browsers like Glubble and Buddy Browser include features to disable external chat and encourage media sharing and social interactions with family and other people the child already knows.com 16 . These Internet browsers feature built-in filtering capabilities to protect young eyes from unwanted and explicit material. Clear cookies and temporary Internet files on a weekly basis. government-sponsored educational websites. 10. iSafetyOnline – http://www. Several companies have created browsers made specifically for younger users.

as well the ability to add or delete users. iSafetyOnline – http://www. Teach children to create passwords that are easy for them to remember but difficult for others to guess. 14. it may be a good idea to give a unique log-on identifier to each user. Strong passwords will include numbers and letters.Tracking Kid's Activities Online – Yes This is The Best Way and school or community websites. Get in the habit of changing password for computer access and websites on a regular basis. This can help minimize the risk of important files or folders being accidentally deleted by kids. and show them how to make sure that the Caps Lock is not engaged if the password is case-sensitive. 13. Create Separate User Accounts. If a home computer is used by all family members. 15. Be sure that all family members update passwords by scheduling a day when everyone makes their changes.com 17 .) Teach children how to enter their password when logging in. Parents' user accounts should have full rights to view and change all files saved on the computer. Create Solid Passwords. and should not be obvious (like a name and birth date. every 60 days or so.isafetyonline. Change Passwords Regularly.

Their passwords should be known only by them and their parents. Knowing what is being installed on the computer and where it came from can prevent risk of virus infection. Program Installation. 17. Have them change their password if it is discovered by someone else. Make sure they give you're their new password if they change it. If you need help understanding how certain iSafetyOnline – http://www. Learn from Kids. Since Internet use is so prevalent in schools. Teach children not to share their user names or passwords with friends and strangers. This is useful for monitoring their activity and reminding them of a password when it is forgotten. Know Your Kids' Passwords. Don't allow kids to install new programs unless supervised. children might know more about the technology than parents do. Keep a list of websites your child uses and the user names and passwords for each. 18. Adult installation of new programs will also ensure that new programs are installed correctly. Protect Passwords.com 18 .isafetyonline. 19.Tracking Kid's Activities Online – Yes This is The Best Way 16.

the computer will run more smoothly and be less susceptible to hackers and viruses. 22. Secure Sites.isafetyonline. Keep software and hardware up to date. Teach children to avoid sites when a security warning is displayed. Most browsers will display a warning when a website's security certificate is inconsistent or expired.com 19 . Officially logging off is secure. When latest technologies are used. and it ensures that private information does not remain viewable to hackers or third-parties. 20. Many browsers also display a padlock or green address bar when a site is secured. 21. kids are always proud to share their knowledge. Close Browser Windows Correctly. 23. Update. Explain Risks. Teach children to log off of sites that require a user name and password instead of simply closing the browser window.Tracking Kid's Activities Online – Yes This is The Best Way sites or programs work. iSafetyOnline – http://www. Teach children to recognize secure sites by looking for the "https" prefix.

As in real life.com 20 . 24. like sexual predators and cyberstalkers. Internet predators are known for posing as children in chat rooms to lure real kids into conversations. Children are naturally trusting and will talk online with anyone who seems friendly or nice. contact police with the user's screen name and any other given information. If children are approached by strangers in a chat room. remind children not to talk in a chat room or via e-mail with anyone they do not know.Tracking Kid's Activities Online – Yes This is The Best Way Teach children about on-line dangers. Instruct children to always be cautious about anyone they meet on-line. but intended to protect them from harm. This tactic often results in children exposing more personal information than they would to an adult stranger. 26. 25. Don't Talk to Strangers. If a child is being stalked or threatened on-line. If a child is bullied on-line by a iSafetyOnline – http://www. Don't Take Anyone at Face Value. Know Who to Call.isafetyonline. instruct them not to respond and to tell you about the encounter immediately. Children will have a better appreciation for the family Internet usage rules if they understand that the rules are not created to keep them from having fun.

accompany your child and meet in a public place. especially if they feel they "know" the person from multiple on-line conversations. 29. This practice will make your kids feel more comfortable if the time comes when they need to deal with the real thing. 28. and false charities. Practice what to say and not sharing personal information.isafetyonline. If they insist on meeting an on-line friend. Educate children on how to avoid Internet scams. contact the bully's parents.Tracking Kid's Activities Online – Yes This is The Best Way classmate. Use role playing to reinforce how children should act when approached on-line by someone they do not know. If parental control software is not working correctly. like moneymaking schemes. Teach them to feel comfortable ignoring strangers or exiting chat rooms when approached. Do not allow children to meet on-line friends in person. Children can be naive to these ploys and iSafetyOnline – http://www. 27. chain emails. Also review how they should handle cyberbullies. In-Person Meetings.com 21 . Too Good to Be True. contact the manufacturer's technical support department for assistance. This can be difficult for young children to understand. Role Play.

This will help to maintain your child's trust that they can tell you about things that happen to them on-line. Do not get angry at them for seeing something they shouldn't have seen. especially when the stranger specifically says not to tell parents. 32. Express Discomfort.com 22 .No Secrets. Let children know that they can tell you if anything they saw on-line made them feel uncomfortable. This can include photos or conversations in chat rooms. Instead. Explain that there is no reason to keep a promise with a stranger.Tracking Kid's Activities Online – Yes This is The Best Way often get taken advantage of.isafetyonline.Be Fair. thank them for bringing it to your attention. iSafetyOnline – http://www. Photo Sharing. it probably isn't. Only enforce consequences for actions that your child actually does. If it's too good to be true. 33. 31. Tell children to let you know if anyone on-line asked them to engage in a conversation or activity that was to be kept secret. Don't punish children for their friends' bad on-line behavior. 30.

phone number. age. Explain that when strangers learn more information about a kid's appearance. or school name. hometown. ensure that the photos do not contain identifiers. Photo Safety.com 23 . If this information is required for registration with a website. like house numbers or car license plate numbers. 35. Don't give children credit card numbers to use for on-line purchases or website iSafetyOnline – http://www.Tracking Kid's Activities Online – Yes This is The Best Way Tell children never to send a photo of themselves to anyone they do not know. This includes their last name. Tell children not to share personal information on-line. Cost Containment. predators can use information form a collection of photos to determine a child's home or school location. 36. If children post photos to their website or social network page. kids should check with parents first before supplying the information. Although a single photo may not seem harmful. Maintain Privacy. address. it can make it easy to find children and hurt them. 34.isafetyonline. etc.

If internet access on a smartphone is too much freedom. disable the service or install a parental control application. Children can sign up and bid on items without realizing that they are entering a contractual obligation to purchase. do not require credit card information to establish an account. An adult should always supervise any financial transaction online to ensure that the website is legitimate and secure. 37. 38. be sure that they understand that the same Internet rules apply. like eBay. but the cost of multiple applications can result in a shocking expense on the monthly phone bill.com 24 . 40. Not only could the app's content be inappropriate. Smartphones.Tracking Kid's Activities Online – Yes This is The Best Way registrations. Apps Add Up.isafetyonline. Consider Parental Controls. iSafetyOnline – http://www. 39. On-line Auctions. whether on the pc or on a handheld device. If your child has a phone or music player with on-line capabilities. Require parental approval before children download applications to their smartphones. On-line auction sites.

com 25 .isafetyonline. Be sure to pick a strong password that your children won't figure out. These programs generally block pornography and violence. Ask your child to show you his or her favorite sites and explain why he or she likes them. Be Involved. there are other websites that children should not be exposed to. but can also be customized to block specific websites or website categories. 43. Learn Chat Room Abbreviations. 41. Spend time together looking at websites on the Internet and finding new appropriate sites to visit. 42.Tracking Kid's Activities Online – Yes This is The Best Way Software is available to block unwanted content from the Internet. While parents may immediately think of blocking access to pornography. Depending on age and maturity level. Don't forget to restrict access to sites depicting dangerous activities. Less Obvious Sites. Know what websites your child visits and be involved in his or her online activities. and hate. iSafetyOnline – http://www. you may also want to block shopping websites. Adults can use a password to access all sites. drug use. Keep in mind that kids may be so familiar with the Internet that they can find ways around parental controls.

completing a url with . 45. Some predatory websites purposely choose close spelling variations of legitimate websites just to expose children to explicit material. Get to know your child's chat room and social networking friends just like you iSafetyOnline – http://www.com 26 . Do not allow random web surfing. don't let him or her use it until the purpose is explained. or you can ask your child to teach you what those letters mean. This often leads to children visiting inappropriate sites that were linked from another site or found from a web search.com will lead to a completely different website than the one intended. Have a Purpose. Type Carefully. If your child can not describe exactly what he or she needs to use the Internet for. Get to know the acronyms used in chat rooms and instant messaging so you can tell just what they are talking about.Tracking Kid's Activities Online – Yes This is The Best Way The abbreviations kids use when chatting can seem like a foreign language to parents.net instead of . 44. Make sure that children use care when typing a url into the browser's address bar. Know Your Child's Friends. Research on-line can help you decipher the meanings of many abbreviations. Children should also mind the various extensions.isafetyonline. 46.

Know the Source. Young children may have difficulty separating on-line life from life in the real world. and how your child met them.Tracking Kid's Activities Online – Yes This is The Best Way would learn about his or her real life friends. Content is not regulated. Be Skeptical. Teach children not to believe everything they see on-line.org. 47. Being involved in your child's social circle will help you to recognize any unusual signs as early as possible. how old they are. Know the Difference. and .com 27 . Encourage use of reputable sources for homework assignments. attachments or links that come from anyone they do not know.edu.isafetyonline. so nearly anyone can post information regardless of whether or not it is true. This can be especially confusing when the child is involved in roleplaying games with avatars. . Find out which ones are on-line only friends. Remind children not to open up emails.gov suffix. 49. iSafetyOnline – http://www. they should delete the message without reading it. including sites with the . If they do not know the person who sent the email. 48. Maintain a healthy balance of real life and Internet use to reinforce the separation.

52. 53. If children use chat rooms. encourage them to stay in the public chat area instead of engaging in private chat. Chat Room Safety. There is safety in numbers. Most websites require that registered users be older than 13 years old. Use parental control software to block these sites if necessary.com 28 . they are there for a reason.isafetyonline. iSafetyOnline – http://www. Create an e-mail address that all family members can share instead of giving young children their own e-mail address.Tracking Kid's Activities Online – Yes This is The Best Way 50. and in a public chat area (as in the real world) a Good Samaritan is likely to jump in if someone is being targeted or threatened. Curious teens may want to view pornographic photos or videos. Sites that are geared towards teens and adults may include photos or language inappropriate for young children. Follow Age Limits. Follow these limits. This will allow parental monitoring of e-mails as the child learns more about how to use the Internet. Family E-mail. Pornography. 51. Talk to them about their interest and explain to them about why they should not visit those websites.

com 29 . 55. Kids Social Sites. If your child uses an adult social networking site.Tracking Kid's Activities Online – Yes This is The Best Way Pornographic websites and websites for tobacco companies often require that visitors be over age 18. 56. These sites offer gaming and a social atmosphere in a kids-only environment. teach your child how to use the privacy features so they can keep personal information private. This will allow you to keep an eye on what they do. he or she will not be able to view any of the details of your child's page. They also have built in privacy features. Create an account on the same social networking site that you child uses and become one of their friends. suggest those specifically designed for kids. If your child wants to join a social networking site.isafetyonline. 54. Social Networking Privacy. Unless someone is a confirmed friend. iSafetyOnline – http://www. as well as monitor the activity of their friends. Set up their pages so friends can only be added with their consent. and alcohol manufacturer websites require visitors be older than 21 years of age. "Friend" Your Kids. like Webkinz or Club Penguin. like use of an avatar instead of a profile photo.

When a child iSafetyOnline – http://www. 58. Time Limits. Protect Your Child's Friends. which will eliminate messages from unknown users. If Internet use becomes excessive or replaces normal socialization and activities. 60. His or her status will remain invisible to strangers.isafetyonline. Programs that enforce time limitations can be found on-line.com 30 . and many parental control software programs include time limit features. Follow Website Policies. Instant Messaging Privacy. Help your child set up an instant messaging profile that only allows people from a buddy list to see when he or she is online. install a program that sets limits on time spent on-line and blocks access during specified hours. Review websites and blogs that belong to your child's school friends to ensure that they too are protecting their own privacy. 59.Tracking Kid's Activities Online – Yes This is The Best Way 57. Most websites include a terms and conditions page that may include rules of conduct in discussion boards or use of copyrighted materials. Let the friends' parents know if you notice any postings or activity that could pose risks.

Instead.isafetyonline. Most e-mail programs have spam filters that will automatically delete pornographic or bulk advertising messages.com 31 . Check both incoming and outgoing messages for anything unusual.Tracking Kid's Activities Online – Yes This is The Best Way registers with a website. a parent should initiate the communication. Avoid E-mail Spam. 63. 64. 62. Also teach children not to reply to junk e-mails. Email Preview. When iSafetyOnline – http://www. Set email preferences so messages do not display unless clicked on. Check Their E-mail. Log in to your child's email account from time to time to ensure they are following the house rules of Internet conduct. Reduce e-mail spam by limiting the websites your child registers for using an e-mail address. read these policies together to ensure your child understands the expectations. Although children may like to browse for sale/wanted ads on Backpage or Craigslist. do not allow them to respond to the ad directly. 61. Beware Classified Ads.

at the library. Be Wary of Strange Messages. 68. your child may see explicit photos or messages that they had no control over receiving. Be sure that the name does not contain too much personal information and that it does not include slang or references that are inappropriate for a child. Research Safeguards.com 32 . chat rooms. Photo Downloads. and on-line games. 66. Require parental approval of children's nicknames for websites. Hackers and e-mail viruses can operate under recognized identities. Although they may be labeled innocently. 67. or at friend's houses. also ensure that it is tasteful and age-appropriate. Tell children not to download pictures or videos from unknown sources. including at school.Tracking Kid's Activities Online – Yes This is The Best Way the content of e-mail messages displays automatically. 65. Learn about the filtering programs and protections used anywhere your child accesses the Internet. these files could contain viruses or display pornographic materials. so teach iSafetyOnline – http://www. User Names. If an avatar is used for certain websites.isafetyonline.

Search Engine Filter. Using a filtering program can help eliminate inappropriate results from a web search. Without a filter. 70. do not allow children to let social networking sites scan their e-mail address book. have children type the url directly into the address bar or use a bookmark.isafetyonline.Tracking Kid's Activities Online – Yes This is The Best Way children to be aware of any strange e-mails. Protect Others' Email Addresses. Teach children to operate under the assumption that everything they post on- iSafetyOnline – http://www. 72. 71. To avoid sharing away e-mail addresses of friends and family. Treat these messages as they would ones from unknown senders.com 33 . a web search can bring up material that children should not see. 69. Examples of strange messages include attachments with odd file extensions or incoherent words in the message body. Assume Permanence. Go Direct. even if the sender's name is familiar. This will eliminate the possibility of offensive or unrelated sites being accessed from a web search. Instead of using a search engine to access sites.

Review Their Posts. Blog Privacy. 74. this will reduce spam and negative or offensive feedback.com 34 . Screen your child's writing or photos before they are posted on-line to ensure that they do not include too much personal information. television show. like school mascot names and names of friends. While social networking pages and websites can be deleted. Positive Examples. 73. find a site that allows private and password-secured blogs. Find content-appropriate blogs made by other children as an example for your child to model his or hers after. iSafetyOnline – http://www. or hobby. 75. people who know how to find it can still access the information.isafetyonline. Blogs with privacy protection will ensure that your child's personal profile is not revealed. Good examples may be blogs centered on a favorite sports team. If your child wants to write in a blog or web diary. Modify the blog settings so comments can not be added to posts.Tracking Kid's Activities Online – Yes This is The Best Way line is permanent and can be found by predators or hackers even after deletion. Watch out for less obvious identifiers.

79. 78. Vulnerability. Watch for signs of obsession. but they could be signs of emotional stresses and troubles that your child is not comfortable iSafetyOnline – http://www. Perform occasional web searches for your child's name. including constantly wanting to check for new messages or frustration when not able to access the sites.Tracking Kid's Activities Online – Yes This is The Best Way 76. Blog and diary content can include very personal topics. Watch for Obsessive Behavior. do not post. Protect Emotions. E-mail and social networking can become an addiction for adults and children. Be aware of blog posts or discussion board comments that show emotional vulnerability. If he or she is not sure. Ask your child if he or she is comfortable sharing the content with strangers before they post it. Not only are these what Internet predators look for.isafetyonline. This research can also help you determine if your child started a website or blog without your knowledge. Be a Detective. 77. address and other identifying factors to see if they have posted any personal information on a website.com 35 .

iSafetyOnline – http://www. 80. the same rules of conduct and respect should apply. 81. teach them to use privacy controls to hide information and not answer questions that make them feel uncomfortable or would require them to reveal personal information. Even though the interactions are not in-person. Bullies no longer exist only in the classroom. Golden Rule. Do not allow your children to pretend that they are someone else online.isafetyonline. 83. Instead of lying. Look for signs of cyberbullying. the same child who bullies a child in person will begin to bully on-line through chat or instant messages. like a child becoming upset when online or a not wanting to go to school. Piracy. 82.com 36 . This includes not listing their actual age on social networking sites. Cyberbullying. Don't allow your child to bully or gossip about others on-line. Oftentimes. Have disciplinary consequences for not treating others kindly.Tracking Kid's Activities Online – Yes This is The Best Way sharing with you. Honesty.

Explain that it is stealing and there are serious legal consequences.com 37 . Block File-Sharing. 85. they follow the same rules as in a text chat room and do not divulge personal information to strangers. with or without your knowledge. Be sure that if children participate. use of pirated software and music is still illegal. Knowing everyone personally creates the safest environment for iSafetyOnline – http://www. Even if your child is not distributing the material further. or duplicate copyrighted software or music without paying. Use Voice Chat With Care. Keep in mind that predators may disguise their voices to sound like children even though they are adults. The unknown source of the download creates privacy and virus risks. 86. Some on-line video games allow for voice chatting. Encourage Playing with Friends. Many file sharing software programs also place a file on your computer that allows others to receive files from you. Recommend that your child play on-line games and chat with friends from school and other activities instead of exclusively communicating with on-line only friends. share. 84.isafetyonline.Tracking Kid's Activities Online – Yes This is The Best Way Do not allow children to download. File-sharing network sites often distribute copyrighted material.

Playing games with your kids is a good way to get involved in their on-line activities without appearing too intrusive.isafetyonline. content. Even though it's not real money. Minimize Fees. Always stay with young kids while they are on-line to answer questions and eliminate the iSafetyOnline – http://www. Supervise. Many on-line video games have monthly service fees that children may not know about until parents receive the bill.Tracking Kid's Activities Online – Yes This is The Best Way on-line play. Remind your children that it is illegal for minors to gamble on-line. 90.com 38 . Know the Games. Understand the rules. and average player age. 87. Become aware of the games your child plays on-line. 88. 89. as they still operate around a wagering system that can lead to actual gambling in the future. discourage use of non-monetary casino gambling games (like free poker and blackjack). Prohibit Gambling. Young children should not use the Internet without supervision. Steer your kids towards free games that do not require submission of personal credit card information.

and chat rooms. Confront them with indiscretions or questions you have about their web browsing activities. All members of the family members should act as positive role models for children who are just beginning to use the Internet. Discourage teens from using websites to meet potential boyfriends or girlfriends. 92.Tracking Kid's Activities Online – Yes This is The Best Way possibility of wandering onto an inappropriate site. Take a look at the history of sites visited to see where your child went on-line and what they did. 91. iSafetyOnline – http://www. and many have niches that may not be appropriate for anyone younger than 18 years old. Review Browser History. Parents especially should practice what they preach with regard to software piracy. Role Model. These sites are intended for adults. 93. and these romance sites are a haven for Internet predators. Cyberdating.isafetyonline. pornography.com 39 . people are not always what they seem. Everyone should follow the same rules of conduct with respect to safety concerning the sharing of personal information. In addition.

Tracking Kid's Activities Online – Yes This is The Best Way 94. Children should avoid video chat with strangers because of the physical recognition factor. 97. Children rarely hide good behavior.isafetyonline. Sexting.com 40 . Explain the dangers and legal consequences of children and teens sending each other nude or partially nude photos via the Internet. Remind them that once something is posted on-line it can travel quickly and be seen by many people. Find out what is going on and discipline accordingly. Once the photo is sent by the originator. he or she has no control over what other people decide to do with it. and teachers. 95. While webcams can be useful for video chat with friends or long distance relatives. 96. including family. Webcams. it is often a sign that he or she is not following the rules. Plagiarism. Review your child's videos before they are posted or distributed to others. iSafetyOnline – http://www. Look for Signs of Misconduct. ensure that children use the device appropriately. friends. If a child or teen quickly closes a browsing window when you enter the room or you find that browsing history has been deleted.

Explain to your teens that iSafetyOnline – http://www. Younger children often look up to older siblings and are comfortable learning the ropes from them.Tracking Kid's Activities Online – Yes This is The Best Way When a child uses on-line resources for homework assignments. Respect Others' Privacy. or e-mail rumors to people who don't want to receive them. This also goes for forwarding jokes.com 41 . chain letters.isafetyonline. Teen Identity Theft. Teach older children to protect younger brothers and sisters on-line and to tell parents if they are engaging in any potentially harmful activities. several free plagiarism-detections services exist on-line. 99. Sibling Enforcement. Teach children to respect the privacy of others by not reading e-mails intended for other people. 100. Also teach kids not to add someone to a mass-mailing e-mail distribution list without asking first. be sure that they do not copy other people's ideas as if they were their own. Teens may not realize that they are candidates for identity theft because they usually do not have bank accounts and credit cards. If you suspect that your child has used someone else's content. 98. Explain plagiarism and the consequences it will have at school.

isafetyonline. Block Outgoing Content. software programs are available to block users' outgoing content. not to avoid loss of current assets. If children are not mature enough to follow rules about not providing information to websites. 101.com 42 . but to protect their credit from other people opening accounts in their name. These programs would allow children view-only access to websites.Tracking Kid's Activities Online – Yes This is The Best Way they still need to safeguard their personal information. iSafetyOnline – http://www.