CyberSafety Guide for Parents

 

Embed or link this publication

Popular Pages


p. 1

cyber safety guide from time warner cable and cyberangels a complimentary guide to safe internet use for parents

[close]

p. 2

table of contents a note to parents common uses of the internet · surfing · chat rooms · e-mail · instant messaging · downloading/file sharing · social networking · gaming · online child solicitation · cyberbullying harassment and stalking 3 4­11 4 4­5 6 6­7 7 8 9 10 10­11 when to worry tips for parents guardian angels/cyberangels time warner cable of ny nj additional resources 12 13 14 15 back cover a spanish language version available online at timewarnercable.com/nynj © the alliance of guardian angels inc 2007 all rights reserved.

[close]

p. 3

time warner cable and cyberangels your partners in internet safety children today are communicating over the internet through a multitude of ways myspace xanga and facebook are just some of the more than 200 social networking websites add in instant messaging chat rooms blogging and the challenge for parents to keep up is overwhelming that s why time warner cable your internet service provider and cyberangels a program of the acclaimed guardian angels organization have united to help you keep your child safe the internet is a powerful tool but it s important to practice some safety measures and common sense we are taking the initiative to provide a framework for you for teaching responsible internet use to your children understanding the responsibility that comes with technology is key to safety it s unlikely that you would send your child out to cross the street without first giving a lesson in safe crossing nor would you hand over the keys to your car to your teen before learning how to drive and earning a driver s license and the ramifications of an error in judgment online can be just as serious and long lasting through this guide we want to empower both you and your family to use the internet and enjoy all the positive benefits it offers this practical guide simplifies the complex lingo and activities that have become a phenomenon with young people here you can find everything from common acronyms to e-mail safety tips and security safeguards also included are suggested topics to discuss with your child and signs of potential problems as well as a reference list of resources for further information and guidance get helpful hints on how to monitor your child s internet behavior establish boundaries and ensure that the experience is enjoyable informative and all that it should be we encourage you to keep this guide within easy reach and refer to it often as you and your family continue to navigate this vast platform after all parenting your child is an ongoing effort time warner cable cyber safety guide 3

[close]

p. 4

common uses of the internet surfing reading documents and visiting websites online is commonly referred to as surfing or browsing visiting virtual museums accessing public government documents reading complete books and viewing short films are just a few examples of the many ways in which you can use the internet be aware however that unmonitored computers can give your child access to material that is inappropriate what parents should know cookies each time you visit a website a cookie is created cookies are simple text files that contain information about your travels on the web because the data contained in a cookie may reveal personal information about you you should learn to set the proper security controls on your browser software visit www.cyberangels.org for more information on managing and securing your browser chat rooms chatting online has become a favorite way for people to connect online in a group a chat room to share similar interests chatting is like talking except that you type words rather than speak them typically more than one conversation goes on simultaneously at a given time or chat room there are two types of chat rooms moderated and unmoderated a chat room moderator enforces rules about what is acceptable to discuss in a given chat space we recommend children be allowed to visit only moderated chat rooms that have been approved by you 4 visit cyberangels for more information cyberangels.org

[close]

p. 5

talk to your child about nicknames and profiles avoid choosing provocative or identifiable nicknames keep personal information out of your online profile receiving files if you are accepting files from someone you do not know or even from a friend be aware that files can carry a virus that may corrupt or delete data from your computer strangers teach your child not to chat with online strangers etiquette good etiquette should be used on the internet as you would in person while chatting refrain from making comments that would be considered inappropriate or offensive in verbal conversation acronyms parents should know afk bak away from keyboard back at keyboard morf male or female f2f face to face sorg straight or gay wrn what s your real name 121 one-to-one lmirl let s meet in real life wuf where are you from asl age sex location tdtm talk dirty to me 53x sex pa pal pos p911 parent alert/parents are listening parents over shoulder parent alert adr address cyber cybersex sex over the computer nifoc naked in front of computer wycm will you call me wtgp want to go private time warner cable cyber safety guide 5

[close]

p. 6

e-mail e-mail is one of the most commonly used features of computers with internet connections e-mail can be used effectively in a variety of ways by children to write to family members and friends communicate with teachers even contact famous people and experts in various fields e-mail safety tips select smart passwords choose a password that is not easy for a hacker to guess preferably one that includes upper and lower case letters as well as one or two numbers don t share the password with anyone don t open suspicious attachments never download or open attachments from people you don t know be careful opening attachments from people you do know the message may be spoofed the return address may be fake or it may be that your friend s computer is infected with a virus spam do not respond to spam unwanted e-mails many e-mails include an unsubscribe link that will actually verify your address to spammers resulting in even more spam log out if you are using a public computer and a web-based mail system such as yahoo aol or hotmail always be sure to log out of your account when you are finished just directing the browser to a new page doesn t log you out and leaves your account accessible to anyone else who sits down at that terminal instant messaging an instant message im allows two or more people to talk by typing back and forth in real time im programs usually appear on screen as boxes of some kind a split screen or small screen where the typed messages are passed back and forth some of these programs allow you to see what the person is writing as they are writing it 6 visit cyberangels for more information cyberangels.org

[close]

p. 7

they are usually free easy to download and fairly simple to operate many im programs also allow you to transfer files such as photos or music files eg mp3 files did you know some parental control software programs can filter outgoing information and actually prevent certain words or phrases from being typed this type of blocking can keep your last name your street school or phone number from being sent out online road runner and many other internet service providers offer blocking and filtering tools to find out more information about how to access these features please visit roadrunner.com downloading/file sharing file sharing is another activity for many teens file sharing is accomplished through easily obtainable programs that allow users to connect directly to other computers and copy share music files movies and other programs or files this use of the internet is a security risk because the files can be infected and also may violate copyright protections be aware security risks there is a very real security risk to every user who chooses to use p2p peer-topeer file-sharing software p2p software leaves your computer open to other users and the files you download could be infected with trojans worms or viruses potentially leaving your computer vulnerable to attack or misuse legal implications individuals who share personal copies of films television or music files on the internet are at risk for lawsuits time warner cable cyber safety guide 7

[close]

p. 8

social networking blogging and other online diaries children are no longer restricted to playgrounds sports teams or malls to meet new people the world around them has become digital and very accessible students can set up a free e-mail address web pages and online photo albums within minutes blogs short for web logs are like online journals and allow people to share their most intimate thoughts with a worldwide audience many children have discovered that myspace facebook livejournal and many other social networking sites are a great way to communicate with friends all over the globe they are able to post messages photos and list all their favorite things about themselves what children don t always understand is how public this information really is as parents the best way to keep your children safe is to remind them that having an online personality places them at potential risk information posted online means exposure to the entire world social networking safety topics to discuss with your child · assume everyone has access to your site and always will · think carefully before posting information or photos · assume that predators are looking at everything you write and post 8 visit cyberangels for more information cyberangels.org

[close]

p. 9

gaming gaming is another option for young people and gaming online can be very exciting the thrill of competition the ease of access to new games and excellent graphic effects make this activity fun for kids but because of the ability to also chat with other players safety issues should be discussed in the same manner as chat and im concerns tips for parents of gamers educate yourself · carefully read the game ratings for age recommendations · read the privacy policies of each site · review the acceptable use terms with your child this may also be referred to as the code of conduct set limits suggested rules include limiting play time and never chatting with strangers or giving out any personal information including the child s real name or where he or she lives monitor your child read his/her chat logs and discuss language and behavior that may be inappropriate point out examples within the logs and role-play ways to handle potentially unsafe situations help choose safe nicknames encourage your child to choose non-gender specific nicknames and be sure that profiles do not include personally identifiable information protect the password tell your child to never share a password with a friend or allow someone else to access their account join the game ask your children to teach you how to play the game this exercise encourages your child to be the teacher and allows you to identify possible safety issues while playing with your child time warner cable cyber safety guide 9

[close]

p. 10

online child solicitation the most serious danger for children online is the risk of becoming a victim of a sexual predator unsupervised children may find their way into chat rooms or forums which are proven venues that pedophiles use to lure victims if you suspect that your child has been approached online by a predator save any and all computer and/or phone communications and report it to the national center for missing exploited children s cybertipline at www.cybertipline.com contact your local police department if you suspect your child is in immediate danger cyberbullying harassment and stalking the feeling of anonymity on the web makes it a perfect playground for students to engage in cruel behavior a 2007 study from the national crime prevention council ncpc indicates that 43 percent of teens reported being victims of cyberbullying cyberbullying can consist of spreading lies and rumors about a person insulting and targeting a student s sexuality or physical appearance deceiving students into revealing personal information and then publishing it and posting personally identifiable information or photos without the victim s consent technology used may include cell phones instant message programs chat rooms e-mail websites polls and blogs 10 visit cyberangels for more information cyberangels.org

[close]

p. 11

tips for dealing with cyberbullying tell the person harassing you in straightforward terms leave me alone stop harassing me do not contact me again do not reply to anything else the harasser says don t reply to e-mails taunts or lies log all chats and ims and print a copy as evidence save all e-mails and text messages as well as voice mails or voice messages take screen shots as well print all evidence but keep the files on your hard drive in the case of e-mail harassment you need to contact the harasser s isp internet service provider and register a complaint if an offending website has been posted about you contact the web hosting service if there are posts on a forum or bulletin board contact the moderators keep in mind that some types of bullying threats to your child or exposing them to danger may be illegal report such actions to local law enforcement along with copies of the materials that you have collected time warner cable cyber safety guide 11

[close]

p. 12

when to worry there are a number of signs that may signal trouble you know your child better than anyone else so follow your instincts screen switching if your child quickly changes screens or turns off the monitor when you come into the room it is likely he/she is viewing something they don t want you to see be calm and ask them to move so that you can view the screen odd phone calls if your child suddenly begins receiving phone calls from strange adults or even other children you may have a problem install a caller id program to determine where the calls are coming from and ask your child to explain them odd hours of the night if your child is up typing away in the wee hours of the night he/she may be chatting online this activity should be reserved for times and places that are supervised sudden influx of cash if your child suddenly has more cash than can be accounted for or shows up in unfamiliar clothing or with gifts that you can t explain this may be a sign of questionable activity a pedophile often spends a great deal of money cultivating a relationship with a child unusually upset at an internet interruption it is not normal to cry or to become overly upset when the internet goes down for an hour or two this type of behavior should raise a red flag and prompt frank discussions with your child withdrawal from family or friends pedophiles work very hard to drive a wedge between children and the people who support and care for them the larger the gap between the child and his /her family the easier it is for a predator to create a relationship 12 visit cyberangels for more information cyberangels.org

[close]

p. 13

tips for parents­talk to your child don t rely on software to do your job filtering and blocking programs can be a part of your internet safety plan at home but they don t take the place of an informed and involved parent be proactive attend cyber safety classes and spend some time listening to and speaking with other concerned parents participate with your child online familiarize yourself with the services and programs your child uses plan ahead talk to your child about the things that could be encountered online and what he/she can do encourage their other interests children shouldn t spend an excessive amount of time online encourage them to participate in other types of activities too think mall you wouldn t drop your young child off alone in a mall so don t drop them off online either remember to keep an eye on them a time and place for everything keep your computer in a common room­ where you can keep an eye on it grant your child internet access only when you are at home and awake explore the internet take the time to explore the use of your computer and the internet they are valuable tools that can enrich the lives of every member of your family the more you know the better you can protect your family time warner cable cyber safety guide 13

[close]

p. 14

guardian angels beyond the streets the red beret of the guardian angels has become an icon for safety around the world founded in 1979 by curtis sliwa the guardian angels began as a group of 13 dedicated volunteers who patrolled the subways streets and neighborhoods of new york city to combat and deter crime the organization has evolved into today s global network of angels volunteers from all walks of life respected by law enforcement welcomed by citizens and applauded by governments as part of its move beyond the streets the guardian angels responded to citizens calls for protection from online threats with the launch of cyberangels in 1995 the volunteer-based cyberangels is one of the oldest and most respected online safety education programs in the world this non-profit organization offers information workshops seminars lesson plans and a website to promote safeguards for children s online activities with selfless dedication and passionate community service spanning nearly three decades the guardian angels stands today as a leading violence prevention and safety education organization whether you are a parent educator or even a victim cyberangels makes many resource tools free tutorials and more in-depth information or assistance available at their website cyberangels.org including · software for securing your computer · tips on how and where to report online crime · ways to encourage the best use of the internet · internet 101-learn the basics of using your home computer · online seminars for parents · specialized sections for victims educators and families · educational video segments · examples of cyber crime signs of cyber crime and what to do · information about phishing 14 visit cyberangels for more information cyberangels.org

[close]

p. 15

time warner cable­beyond television time warner cable understands the responsibility it has to its customers beyond offering the latest in technological equipment and service the company provides resources and tools that allow you and your family to use and enjoy its services with all intended positive benefits the complexities of the world we live in today prompted us to create this cyber safety guide for you the internet is a powerful tool that carries the potential to go beyond its practical uses for research entertainment and communication in addition to security filters and firewalls parental monitoring and an awareness of the risks associated with the world wide web we want to help you recognize and respond to the signs of possible internet misuse time warner cable also offers two free on demand channels that feature brief lessons on cyber safety cyberbullying safe social networking surfing the internet gaming and downloading tune to channel 100 for answers on demand and channel 1111 for local on demand to view these programs this guide is one example of time warner cable s commitment to education which includes scholarships and grants free high-speed internet access and video service to public schools internship and trainee programs complimentary teacher resource guides and workshops for educators for more information about our educational initiatives please visit timewarnercable.com/nynj time warner cable cyber safety guide 15

[close]

Comments

no comments yet