Families
- 10 Rules For Safe Family Cell Phone Use
- Key Internet Safety Tips
- Computer Protection
- Social Networking
- Cyberbullying
- Cyber Predators
10 Rules For Safe Family Cell Phone Use
The following basic cell phone safety rules apply to all members of a family — parents as well as kids
- Have a conversation about when it’s OK and not OK to use the phone for talking, texting, apps and other functions. This should include both time and place. Talk about rules for cell phone use during dinner, at social events and in public places like movie theaters and restaurants.
- Consider having a centralized resting place for the phones to charge up while family members are sleeping. There are lots of reasons why phones shouldn’t be used or sending out audible alerts after bedtime. Just because your phone may also be an alarm clock doesn’t mean it necessarily should be sitting on your or your kids’ nightstand.
- Talk about the polite use of the phone, such as not talking in a loud voice (people think it’s necessary but it usually isn’t) and not talking or texting in a way that will disturb others or violate your privacy.
- Never text, send email, use apps or configure the phone’s GPS while driving, riding a bicycle or on a skateboard. There have even been “texting while walking” accidents, so be sure that you don’t hurt yourself and others.
- Kids need to know that phones can cost a lot of money to replace (sometimes far more than the subsidized price you might have bought it for). Be careful around water and be gentle with the screen. Consider getting insurance to cover loss and damage.
- Consider software that not only provides some security but also helps avoid loss. Products like Apple’s free “Find my iPhone” and Lookout.com’s free security app for Android can send a loud alert if the phone is missing, can wipe the phone’s data if it’s lost or stolen and can actually show you — on a map — where the phone is as long as the phone is on and the battery is not dead. Because these apps can locate the phone, they can also locate the family member.
- Be sure that all family members understand the appropriate use of the phone’s camera. Avoid taking and sharing pictures that may be inappropriate or that could embarrass you or get you into trouble. And consider other people’s privacy when taking and pictures of those around you.
- Be careful about any apps you download and install. While most apps are fine, there are some that pose security and privacy risks. Read the reviews and make sure that the app is from a legitimate source.
- Make sure that anything you post using social networking apps or websites is appropriate. And be aware that smartphones have web browsers so whatever rules apply to Internet use at home should also apply to browsing on smartphones.
- Make sure all family members understand the cost of using their phone. That includes any charges for calls, text and data as well as the purchasing and use of apps and in-app purchases.
And parents, one more thing: What you do is more important than what you say so be sure to be a good role model and don’t let your kids see you violating these rules. Thank you to www.safekids.com
Key Internet Safety Tips
- Spend time having fun with your parents online and helping them understand technology!
- Never post your personal information, such as a cell phone number, home number, home address, or your location on any social networking site or through mobile apps like Snapchat or Instagram.
- Never meet in person with anyone you first “met” on the internet. If someone asks to meet you, tell your parents or guardian right away. Some people may not be who they say they are.
- Check with your parents before you post pictures of yourself or others online. Do not post inappropriate pictures of anyone.
- Never respond to mean or rude texts, messages, and e-mails. Delete any unwanted messages. You may need to delete friends who continuously bother you or post things that are not appropriate.
- Never share your password with anyone, including your best friend. The only people who should know your password are your parents or guardian.
- If you wouldn’t say something to another person’s face, don’t text it or post it online.
- Do not download or install software or anything on your computer or cell phone before checking with your parents or guardian.
- Use the privacy settings of social networking sites.
- If anything makes you feel uncomfortable online, while gaming or when using your cell phone, talk with your parents or guardian right away.
Source: Netwsmartz.org and safekids.com.
For Parents
- Since you may not always be able to watch everything your child does on the computer, most experts recommend installing monitoring software to ensure that you know exactly what your children are doing online.
- Place the computer in a common area. It is suggested that your child not have computer in his or her room, or at least no Internet access.
- Learn to use the Internet yourself. Experience cyberspace with your child and learn how to check the computer‘s “History” to see what websites your child is visiting.
- Spend time with your child on the Internet to demonstrate to his/her proper use.
- Monitor your child’s computer use and Internet “History.”
- Establish rules for your child’s Internet use.
- Never give personal information to someone you do not know.
- Report any suspected cyber child sexual exploitation to the NCMEC CyberTipline.
- Be careful of any information you post online, including photos, which will be available for anyone to view, forever.
- Beware of cyber predators!
Online Behaviors Against the Law
Many view piracy and plagiarism as stealing. Illegal downloading of movies and music can have serious consequences. Just as stealing a CD or DVD from a store is wrong, so is stealing online.
There is an area of the law called Intellectual Properties. Learn about it. Copying information from the Internet can be illegal and there are risks.
Computer Protection
Is Your Computer Protected?
What do you do with email from unknown sources?
Opening an email from an unknown source, particularly if there is an attachment, may introduce a virus that could permanently damage your computer.
Do you post your email on public sites?
Spammers can find your email on the Internet and use it send you junk email.
Does it have anti-virus software installed?
Protect your files and computer from virus attacks that can prove disastrous.
Do you have a firewall?
One of the best ways to protect your computer from the ravages of hackers is to install a firewall.
Do you know the dangers of file sharing?
Someone could infect your computer with a virus or access information from your hard drive. This could be particularly devastating if financial information is stored on the computer.
Do you forward emails from unknown sources?
You may think you are being helpful, but by forwarding the email, but you have just provided your friend’s email address to an unknown source. And, if there is an attachment, you may have forwarded a virus.
Do you disconnect the Internet when it’s not in use?
This is the best way to prevent anyone from using the Internet’s “two-way street” to get into your computer.
Protecting Your Computer
- Emails from unknown sources may contain attachments that introduce viruses that permanently damage your computer. Forwarding emails from unknown sources can reveal your friend’s email address to the sender and possibly infect your friend’s computer with a virus.
- File sharing can lead to a virus or provide access to information contained on your hard drive.
- Installing a firewall can help protect your computer from the problems created by hackers.
- Anti-Virus software can help protect your files.
- Disconnecting your Internet when not in use is the best way to prevent anyone from using the Internet’s “two way street” to get into your computer.
- Posting your email address on public sites allows spammers to find it and send you junk mail.
Remember: Your first and best line of defense is self-defense in cyberspace.
Note to Parents: There are many organizations and activities in which your child may be involved that post information online in public locations. It is extremely important for you to pre-approve any information about your child that will be posted for the world to see. Remember, cyber predators are looking, too.
Social Networking
If you have a profile on a social networking site:
- Set up profile to Private or Friends Only – otherwise private information can be spread very quickly to known and unknown people.
- Only add people to your friends list that you already know.
- Protect your personal information as well as personal information about your friends.
- If you are too young to be on a site, don’t lie about your age to join.
- Delete mean or embarrassing comments.
- Beware of invitations through comments or bulletins to view videos or click on links. They may be attempts to capture your password and introduce a virus.
Social networking sites include: FaceBook, Twitter, Instagram, Snapchat, etc.
Parents Guide To Facebook
“A Parent’s Guide to Facebook”, written by ConnectSafely.org’s Larry Magid and Anne Collier. As Facebook continues to change, the authors have updated the parent guide’s content to reflect the most recent features and policies on Facebook.
Cyberbullying
For the most part, cyberbullying is pretty similar to in-person bullying, but there are some differences between in-person and online communications that can change (not necessarily worsen) its nature and impact.
Communicating online takes on different dimensions from in-person relationships including the fact that “Talking digitally can make you feel uninhibited and lead you to say things you might not say anywhere else” and “Texting or posting back and forth about a feeling can cause that feeling to escalate and can make the situation worse.”
Other differences between in-person and online is that a negative online comment can stick around for a long time and be seen by a lot of people. And, unlike a physical confrontation or verbal abuse at school, bullying via text message, email or social networking can follow children home and haunt them after school on weekends and during school breaks. Depending a lot on individual factors including the nature of the incident and the child’s resilience and psychological state-of-mind, the impact of cyberbullying can range from mildly annoying to devastating.It’s impossible to generalize and — even when something tragic follows an episode of cyberbullying, it’s not always possible to assign a single cause for what happened.
Not all unpleasant online interactions are cyberbullying. Having an online argument isn’t necessarily cyberbullying. In fact, the U.S. government’s StopBullying.gov website’s definition of youth bullying (endorsed by most experts) is “unwanted, aggressive behavior among school-aged children that involves a real or perceived power imbalance. The behavior is repeated, or has the potential to be repeated, over time.” A single mean, rude or insensitive comment in an email or on a social networking site — however hurtful it might be — doesn’t, by itself, constitute bullying. If it did, the cyberbullying rate among both kids and adults would probably be close to 100%.
Tips for parents and teens ConnectSafely.org’s new cyberbullying booklet answers parents’ top five questions and provides tips for both parents and young people.
- Remember that “it’s not your fault”
- Save the evidence don't respond or retaliate
- Reach out for help.
- Use available tech tools to block the person.
- Take action if someone you know is being bullied.
Tips for Youth to Stop Cyber-Bullying
- Don’t initiate, respond or forward harmful messages
- Think first! If something mean is posted or texted about you, don’t respond immediately.
Take a break and give yourself time to think through your next step.
- Think about your reputation--would you want your grandma, teacher, future employer or someone you don’t know, to see your post?
- Trust your gut. If you feel uncomfortable, save the message and tell an adult.
Tips for Parents Regarding Cyber-Bullying
- Ask your children questions. Maintain an open dialogue.
- Keep the computer in a common room.
- Talk about your expectations regarding acceptable online/phone behavior before they receive the privilege. Behavior online should be the same as what you would do in person or in front of someone you respect.
- Make agreements and set boundaries about accepted use and behavior for online/phone communication. Often youth don’t tell parents because they fear losing their technology privileges.
- Help your child think through how the information they put online reflects on them.
- Inform youth about legal and future consequences of harmful posing online or by phone.
- Ask your child to teach you about programs or technologies you don’t understand or of which you don’t have familiarity.
- Model the behaviors you want to see around phone and internet use.
Cyber Predators
Remember that anyone can lie online. A stranger could be a cyber predator if:
- The stranger asks for your picture.
- The stranger invites you to view their web cam.
- The stranger asks if you are alone.
- The stranger talks about sexual matters.
- The stranger wants to meet you in person.
If you are thinking about posting your pictures on a public site, think about this:
- Once you have placed your picture on a public Internet site, it’s out there forever and there is no taking it back.
- Software manipulation of photographs makes it possible for that photo to be altered and put back on the Internet or traded among child pornographers.
- Be anonymous: Don’t give away personal information in your user name or screen name. Don’t use passwords that are easy to guess (i.e., the name of your pet).
Reporting a Predator
If you suspect that your child has been contacted by predator:
Notify law enforcement
OR
File a complaint online at the National Center for Missing and Exploited Children
Reporting Child Sexual Exploitation: If an incident occurs in which you feel your child is a victim of online solicitation for sexual acts, sextortion, or child pornography, PLEASE report the incident to the National Center for Missing & Exploited Children® (NCMEC).
The NCMEC’s CyberTipline is operated in partnership with the FBI, Immigration and Customs Enforcement, U.S. Postal Inspection Service, U.S. Secret Service, military criminal investigative organizations, U.S. Department of Justice, Internet Crimes Against Children Task Force program, as well as other state and local law enforcement agencies. Reports to the CyberTipline are made by the public and Electronic Service Providers (ESP). ESPs are required by law to report apparent child pornography to law enforcement via the CyberTipline (18 U.S.C. § 2258A).
Reports are continuously triaged to help ensure that children in imminent danger get first priority. Analysts review reports and:
- Examine and evaluate the content.
- Add related information that may be useful to law enforcement.
- Use publicly available search tools to determine the geographic location of the apparent criminal act.
- Provide all information to the appropriate law enforcement agency for potential investigation.
The CyberTipline reporting mechanism assists law enforcement and prosecutors in their detection, investigation and prosecution of child sexual exploitation crimes. The CyberTipline helps make law enforcement’s efforts more efficient and maximizes the limited resources available in the fight against child sexual exploitation. The value of the CyberTipline as a source of leads for law enforcement has been greatly enhanced by collaboration with ESPs.
In addition to referring CyberTipline reports to law enforcement for potential investigation, the NCMEC engages with the Internet industry on voluntary initiatives to reduce child sexual exploitation online.