Safe internet use for your children
The technology timeline for kids and teens is far from straightforward. Not every kid/teenager uses the same technology. Factors such as the child’s maturity level; parents’ view; and access to devices at home, school and friend’s houses come into play.
With this in mind, we are sharing an ‘essentials’ checklist for parents of children of any age, which highlights the actions you should take for your whole family.
These are by no means definitive lists (the tech world moves far too quickly to be able to promise that!) but they are a good starting point. We hope you find them useful.
Quick ‘Essentials’ checklist
THINK about how you guide your family in the real world and do the same in the digital world. Don’t be afraid to set boundaries and rules for your child from a young age.
MAKE the most of tools like Parental Controls on computers, mobiles and games consoles; privacy features on social networking sites; and safety options on Google and other search engines.
HAVE a go at some of the technology your son or daughter enjoys. Play on them together or ask them to help set you up on Facebook if you’re not already a member.
TRY not to use technology as a babysitter too often. We all do it sometimes but it’s important to know what your child is doing.
MAKE digital issues part of everyday conversation. Show your child that you understand how important technology is to them and talk about all its amazing benefits, but don’t shy away from difficult subjects like responsible online behaviour, bullying and pornography.
SET specific internet guidelines for your children to live by and consistently enforce consequences if they are not being followed. Manage your children’s time on the internet.
UNDERSTAND Internet Privacy Policies as they apply to your child. Parents should be aware of these for protecting their children’s privacy on the web. Find out more here: http://www.ftc.gov/privacy/privacyinitiatives/childrens.html
Parental Control Tools
Facebook Privacy Controls
BlackBerry® Parental Controls
Xbox 360 Parental Controls
Other Free Software that can be accessed:
www.k9webprotection.com - Free, enterprise-class security software designed for home computers
https://www.qustodio.com/ - a simple, web-based dashboard that gives info at a glance. Whether kids use family computer, personal laptop, tablet, or mobile phone.
For more details visit our website
Tips for safe internet use for children and young adults
- Create strong passwords for different websites using a good mix of alphabets, numbers and special characters and make sure that you do not disclose your passwords to anyone (except your parents).
- Don’t reveal personal information like name, address, date of birth, school details, passport number, credit card numbers, telephone numbers or family members’ names, or location details/whereabouts on social websites (especially when you are alone at home).
- Don’t befriend strangers. Ensure that your group involves only people known to you in person (such as friends and family). If someone approaches you, ensure that you are escorted with a responsible elder/parent and meet only in public places where many people are around.
- Restrict the viewership of your social account/site to only those who are well known to you. Always use security and privacy settings of websites to access and manage your profile information from time to time.
- If anyone bothers you or is unfriendly, use ‘block’ or ‘unfriend’ tools available on social sites. Should you receive any strange/unfriendly/abusive request or communication, immediately bring it to the notice of parents/elders in the family.
- Keep police and emergency numbers saved in your mobile contacts.
- Don’t over-share pictures of home, yourself or your family on the internet. Never share your personal pictures or information without first checking with your parents/responsible elder.
- Pay specific attention to the language you use online and think before you post your pictures/videos/updates. Avoid posting information when you are angry or emotionally disturbed.
- Make sure that you log in/sign in and log out/sign out of your accounts.
- Before downloading/installing any app or software on your computer/mobile phone, it is good to first check with your parents or responsible elder to avoid damage to your device or jeopardize privacy.
- Don’t say or do anything that would hurt other people’s feelings or, that is against the law and puts you in bad light.
- Disclose your correct age when signing up on websites to ensure safe use of the internet. Visit only those websites that are relevant for your age. If you inadvertently click any website that displays adult content or any offensive/abusive content, close such websites immediately and keep your parents/responsible elder informed.
- Make sure that your computer/tablet/mobile phone has up-to-date security software as well as parental control software installed for safe internet use.
- Fix scheduled timings with your parents to access social sites and adhere to them. Meet your friends in person and play with them outdoors.
- Be aware of certain activities that are treated as cybercrimes by law:
Cyber stalking – where someone is repeatedly and persistently followed and pursued online by email or other electronic means.
Cyber bullying – where someone harasses, embarrasses, taunts, insults or uses threatening behaviour by using internet, email or other electronic means.
Child pornography – where someone captures/displays/sends images or videos of child/children (below 18 years) in an obscene or indecent (i.e. sexually explicit) manner.
Pornography – where someone captures/displays/sends images or videos of the private body parts of any person without his/her consent.
Hacking – where someone accesses or uses the computer/laptop/mobile or email or social sites’ accounts of another person without authorization/consent of that person (such as Gmail, Facebook, Twitter and other such social networking sites). This includes destroying or deleting or altering any information residing on such devices/websites.
Identity theft – where someone uses the password or any other unique identification feature of another person without authorization/consent of that person.
Cyber terrorism – where someone attempts to gain access to a computer/laptop/mobile without authorization/consent or causes denial of access to that person who is authorized to access that computer/laptop/mobile.
Offensive communication – where someone sends any grossly offensive information of another person which is known to be false for the purpose of annoying, inconveniencing, insulting, deceiving, or taking vengeance.