Sie sind auf Seite 1von 45

1

On line Tips for parents While on-line computer exploration opens a world of possibilities for children, expanding their horizons and exposing them to different cultures and ways of life, they can be exposed to dangers as they hit the road exploring the information highway. There are individuals who attempt to sexually exploit children through the use of on-line services and the Internet. The Internet is a wonderful marketplace of ideas, so most parents don't want to pull the plug on computer services. However, parents do want to protect their kids from the seamier side of the Net. It is important for parents to understand that children can be indirectly victimized through conversation, i.e. "chat," as well as the transfer of sexually explicit information and material. Computersex offenders may also be evaluating children they come in on-line contact with for future face-to-face contact and direct victimization. Parents and children should remember that a computer-sex offender can be any age or gender. Signs that your child might be at risk of falling prey to cyberporn or other objectionable stuff on the Net:1. Your child spends large amounts of time on-line, especially at night. 2. You find pornography on your child's computer. 3. Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize. 4. Your child receives mail, gifts, or packages from someone you don't know. 5. Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room. 6. Your child becomes withdrawn from the family. Here are a few suggestions and tips for parents to ensure the safety of their kids from the evil of online pornography:1. Keep the Computer in the Family Area If you have a computer in your home that has access to the internet, consider placing it in a family room or lobby rather than in a closed room. This will increase the chances of catching sight of inappropriate

material that your child might encounter online. It also draws in the whole family,which can make the internet a lot more valuable to all concerned.Infact it is a good idea to ask your kid to teach you about online computing as this will generate confidence in him/her. 2. Use blocking features provided by your ISP. Many commercial services have mechanisms to restrict access to areas inappropriate for children. Check into these when you register with these services. 3. Block cyber porn with software. There are special software that can screen and block areas that children may try to investigate. For example Surf Watch is a software program that automatically blocks access to the approximately 1000 sexual hot spots on the Internet. Net Nanny is a program that allows a parent or guardian to monitor everything that passes through the computer. If it detects an offending phrase in an online chat room, the program automatically disconnects the computer. 4. Create a children's checklist. Make sure your child knows the do's and don'ts of online computing. Never give out personal information (address, phone number). Never arrange a face-to-face meeting. Always remember that the person online may not be what he or she claims to be. Do not let your children have online profiles, so they will not be listed in directories and are less likely to be approached in children's chat rooms, where pedophiles often search for prey. Also, do not allow your children to post, send or receive pictures online 5. Establish Rules for on-line Use Without rules and guidelines, children may feel compelled to try new things; even things they may know are not in keeping with your beliefs. Establish a set of guidelines that reflects your family values. Make sure your child understands these guidelines and agrees to respect them while online. 6. Educate Yourself

Become more computer literate and Internet savvy yourself so that you understand what your child is doing on the computer. It would also do you well to know about the basics of a web browser and its functioning so that you may be able to easily keep a check on the sites visited by your kids. Keep checking the 'Temporary Internet Files" and "History" folders on your computer on a regular basis to get an idea of the kind of websites your children are accessing. and Finally.... 7. Teach your children well Help your children understand that the computer is a tool for educational purposes and for positive communication. Used as such, they can learn and grow and have a lot of fun. At the same time, help them understand that this wonderful tool can sometimes be used by an undesirable element for malicious purposes.

Keeping Children Safe Online


Children present unique security risks when they use a computernot only do you have to keep them safe, you have to protect the data on your computer. By taking some simple steps, you can dramatically reduce the threats. What unique risks are associated with children? When a child is using your computer, normal safeguards and security practices may not be sufficient. Children present additional challenges because of their natural characteristics: innocence, curiosity, desire for independence, and fear of punishment. You need to consider these characteristics when determining how to protect your data and the child. You may think that because the child is only playing a game, or researching a term paper, or typing a homework assignment, he or she can't cause any harm. But what if, when saving her paper, the child deletes a necessary program file? Or what if she unintentionally visits a malicious web page that infects your computer with a virus? These are just two possible scenarios. Mistakes happen, but the child may not realize what she's done or may not tell you what happened because she's afraid

of getting punished. Online predators present another significant threat, particularly to children. Because the nature of the internet is so anonymous, it is easy for people to misrepresent themselves and manipulate or trick other users (see Avoiding Social Engineering and Phishing Attacks Adults often fall victim to these ploys, and children, who are usually much more open and trusting, are even easier targets. The threat is even greater if a child has access to email or instant messaging programs, visits chat rooms, and/or uses social networking sites (see and Chat Rooms Safely more information). What can you do?

Supplementing Passwords
Passwords are a common form of protecting information, but passwords alone may not provide adequate security. For the best protection, look for sites that have additional ways to verify your identity. Why aren't passwords sufficient? Passwords are beneficial as a first layer of protection, but they are susceptible to being guessed or intercepted by attackers. You can increase the effectiveness of your passwords by using tactics such as avoiding passwords that are based on personal information or words found in the dictionary; using a combination of numbers, special characters, and lowercase and capital letters; and not sharing your passwords with anyone else (see Choosing and Protecting Passwords for more information). However, despite your best attempts, an attacker may be able to obtain your password. If there are no additional security measures in place, the attacker may be able to access your personal, financial, or medical information. What additional levels of security are being used? Many organizations are beginning to use other forms of verification in addition to passwords. The following practices are becoming more and more common:

two-factor authentication - With two-factor authentication, you use your password in conjunction with an additional piece of information. An attacker who has managed to obtain your password can't do anything without the second component. The theory is similar to requiring two forms of identification or two keys to open a safe deposit box. However, in this case, the second component is commonly a "one use" password that is voided as soon as you use it. Even if an attacker is able to intercept the exchange, he or she will still not be able to gain access because that specific combination will not be valid again. personal web certificates - Unlike the certificates used to identify web sites (see Understanding Web Site Certificates for more information), personal web certificates are used to identify individual users. A web site that uses personal web certificates relies on these certificates and the authentication process of the corresponding public/private keys to verify that you are who you claim to be (see Understanding Digital Signatures and Understanding Encryption for more information). Because information identifying you is

7 embedded within the certificate, an additional password is unnecessary. However, you should have a password to protect your private key so that attackers can't gain access to your key and represent themselves as you. This process is similar to two-factor authentication, but it differs because the password protecting your private key is used to decrypt the information on your computer and is never sent over the network. What if you lose your password or certificate? You may find yourself in a situation where you've forgotten your password or you've reformatted your computer and lost your personal web certificate. Most organizations have specific procedures for giving you access to your information in these situations. In the case of certificates, you may need to request that the organization issue you a new one. In the case of passwords, you may just need a reminder. No matter what happened, the organization needs a way to verify your identity. To do this, many organizations rely on "secret questions." When you open a new account (email, credit card, etc.), some organizations will prompt you to provide them with the answer to a question. They may ask you this question if you contact them about forgetting your password or you request information about your account over the phone. If your answer matches the answer they have on file, they will assume that they are actually communicating with you. While the theory behind the secret question has merit, the questions commonly used ask for personal information such as mother's maiden name, social security number, date of birth, or pet's name. Because so much personal information is now available online or through other public sources, attackers may be able to discover the answers to these questions without much effort. Realize that the secret question is really just an additional password when setting it up, you don't have to supply the actual information as your answer. In fact, when you are asked in advance to provide an answer to this type of question that will be used to confirm your identity, dishonesty may be the best policy. Choose your answer as you would choose any other good password, store it in a secure location, and don't share it with other people (see Choosing and Protecting Passwords for more information). While the additional security practices do offer you more protection than a password alone, there is no guarantee that they are completely effective. Attackers may still be able to access your information, but increasing the level of security does make it more difficult. Be aware of these practices

when choosing a bank, credit card company, or other organization that will have access to your personal information. Don't be afraid to ask what kind of security practices the organization uses. Authors: Mindi McDowell, Chad Dougherty, Jason Rafail

Online Safety Guide

Keeping children safe on the Internet is everyone's job.


Parents need to stay in close touch with their kids as they explore the Internet. Teachers need to help students use the Internet appropriately and safely. Community groups, including libraries, after-school programs, and others should help educate the public about safe surfing. Kids and teens need to learn to take responsibility for their own behavior -- with guidance from their families and communities. It's not at all uncommon for kids to know more about the Internet and computers than their parents or teachers. If that's the case in your home or classroom, don't despair. You can use this as an opportunity to turn the tables by having your child teach you a thing or two about the Internet. Ask her where she likes to go on the Internet and what she thinks you might enjoy on the Net. Get your child to talk with you about what's good and not so good about his Internet experience. Also, no matter how Web-literate your kid is, you should still provide guidance. You can't automate good parenting.

A little perspective from a parent who's been there


Just as adults need to help kids stay safe, they also need to learn not to overreact when they find out a child or teenager has been exposed to inappropriate material or strayed from a rule. Whatever you do, don't blame or punish your child if he tells you about an uncomfortable online encounter. Your best strategy is to work with him, so you both can learn from what happened and figure out how to keep it from happening again. The challenges posed by the Internet can be positive. Learning to make good choices on the Internet can serve young people well by helping them to think critically about the choices they will face. Today it's the Internet; tomorrow it may be deciding whether it's safe to get into the car of someone a teen meets at a party. Later it will be deciding whether a commercial offer really is "too good to be true" or whether it really makes sense to vote for a certain candidate or follow a spiritual guru. Learning how to make good choices is a skill that will last a lifetime.

Guide to Online Privacy

9 While kids are often more computer savvy than their parents -- they can easily sign up for a game or subscribe to a chat room service -- they don't understand the consequences of revealing personal information to strangers. As a rule, children should not reveal personal information about themselves online without a parent's permission. This includes their name, email address, postal address, phone number, photo, school address, etc. Teach your children about some of the risks involved if they reveal their name, address, telephone number and/or email address online and print out some of these general rules for your children to follow as they surf online. You can help children protect their privacy and themselves if you teach them to be privacy-wise. Learn more about how to teach your kids to keep their personal information to themselves online by visiting the kids privacy section of GetNetWise.

Safety Tips for Kids


Here are some Safety Tips to help kids online. Talk about these tips with your family. You might have one or two of your own to add!

Don't give out information about yourself like your last name, your phone number, where you live, or where you go to school - without asking your parents first. Never e-mail a picture of yourself to strangers. If somebody says something to you, sends you something, or you see something that makes you uncomfortable, don't look around or explore; get your parents instead - they know what to do. Making plans to meet your Internet buddies in real life is usually a really bad idea - how people are in real life can be very different from how they are online. If you decide to do it anyway, have your Mom or Dad help make the plans and go with you. Don't open up e-mails, files, or Web pages that you get from people you don't really know or trust. Don't ever give out your password, except to responsible adults in your family. Always follow your family's rules for the Internet - they're there to make sure you have fun and stay safe online. Don't ever do anything that could cost your family money unless your parents are there to help you do it.

For additional resources, check out SafeKids.Com's Kids' Rules.

Safety Tips for Teens

Tips by Teens for Teens

Remember - A million times before you've heard that honesty is the best policy. Most people don't believe that, though. So when you're out there in cyberspace,

10 watch yourself. You never know when 5'6", blond and female could actually mean 6'3", hairy and male. Don't believe everything you see online. Be leery of those who want to know too much. There's no rule that says you have to tell them where you live, what your last name is, or anything else personal. Your business is your business. Let them stick to theirs. And trust your instincts. If someone makes you feel uncomfortable, leave. We all remember the "buddy system" from kindergarten. Sure, you're no longer in kindergarten, but the system still works. If you're planning on meeting up with somebody you met online, bring a friend, or even your parents, along with you and encourage your online acquaintance to bring theirs, too. It sounds stupid, but it's definitely the smart idea. At the very least, make sure your real friends know what you're doing. Before you take a running leap at the streets and a hard-knock life, let somebody know how you're feeling. Try talking to an understanding relative or friend, or call the National Runaway Switchboard at 1-800-621-4000. They are a better, more trustworthy resource than a stranger in a chat room. If you get suspicious e-mails, files, or pictures from someone you don't know and trust, trash them just like any other junk mail. You could have a lot to lose by trusting someone you've never even met. The same goes for clicking links or URLs that look suspicious - just don't do it. Avoid chat rooms or discussion areas that look sketchy or provocative, and don't let people online trick you into thinking of them as real-life friends if you've never met them in person. Just the same, don't let people goad you into online fights. If you go looking for trouble on the Internet, you'll find it, and things can get out of control really fast.

Safety Tips for Families


Here are some Safety Tips to help you think about online safety for your family. We encourage you to read the rest of the Safety Guide for more detailed information.

Use the Internet with your kids. While you're spending time with them, you can help them to be safe and responsible online. Learn about the technology together, ask lots of questions, and don't be intimidated if it seems like your kids have a better understanding of the technology than you. Remember, it's your family, and you have the power and responsibility to keep an eye on what your kids are doing. Teach kids never to give their personal information to people they meet online, especially in chat rooms and on bulletin boards. If you have a family web site with your children's pictures up, don't include information like where they go to school, where you live, your phone number, or any other personally identifiable information -- that's giving personal information out every bit as much as sending an e-mail or talking to someone in a chat room. Instruct your child never to plan a face-to-face meeting with online acquaintances, and to notify you if they are approached for an offline meeting.

11

Establish clear ground rules for Internet use for your family. Think about signing a Contract with your children that reflects those rules. Learn about the different parental control tools, protective software, and controlled access options that are available, and decide which, if any, are best for your needs. Tell your children not to respond if they receive offensive or dangerous e-mail, chat requests, or other communications, and to leave if they go to a web site that makes them uncomfortable. Also tell them to show you anything they receive that makes them uncomfortable. Assuring them that you won't be angry with them and that they are not to blame can help you to develop a trusting, open relationship. If you become worried that your child or another child is in danger, don't hesitate to contact the authorities.

For additional resources, check out SafeKids.Com Parents' Guidelines and The Children's Partnership Keeping Kids Safe Online: Tips & Tools.

Safety By Age

2 to about 4:
This is the age of "lapware," when children start interacting with the computer in the presence of a parent or sibling. There are numerous activities and sites that are likely to be appropriate for this age group but, in most cases, it makes sense for the parent and child to be exploring together. This is not just a safety issue, but also a way to assure that the child has a pleasant experience, and to help build bonds between the child and the older person who is surfing the Internet with them. Starting at about age 3, some children can benefit by having a bit more independence so that they can explore, experience discoveries, and make mistakes on their own. That doesn't mean that they should be given free access. It's probably best for parents to choose the Web sites they visit and not let them leave those sites on their own. You don't necessarily need to stand over them or sit with them the entire time that they're in a known safe site.

Safety By Age

4 to about 7:
Children begin to explore on their own, but it's still important for parents to be in very close touch with their children as they explore the Net. When your child's at this age you should consider restricting her access only to sites that you have visited and feel are appropriate. For help with this matter, you can consider using one of the pre-screened Web sites in GetNetWise, as well as child-safe search engines.

12 At this age it's important that kids experience positive results from sites that can enhance their discovery. The issue here isn't so much avoiding dangerous sites, but making sure they are visiting sites that don't frustrate them or lead them down blind alleys.

7 to about 10:
During this period, children begin looking outside the family for social validation and information. This is when peer pressure begins to become an issue for many kids. It's also a time when kids are looking for more independence from parents, according to psychologist Richard Toft. During these years, children should be encouraged to do a bit more exploring on their own, but that doesn't mean that the parents shouldn't be close at hand. Just as you wouldn't send children at this age to a movie by themselves, it's important to be with them -- or at least nearby -- when they explore the Net. For this age group, consider putting the computer in a kitchen area, family room, den, or other areas where the child has access to Mom or Dad while using the computer. That way, they can be "independent" but not alone. Also, consider using a filtering program or restricting them to sites that you locate via a child-safe search engine. Another option for this age group is a child-friendly browser. When your child is at this stage, you need to be concerned not so much about what he's doing online and with the PC as how long he's spending on the PC. Be sure that his time on the computer and the Internet doesn't take away from all his other activities. Kids need variety, and it's not a good idea for them to be spending all of their time on any single activity, even reading books. One way to deal with this might be through the use of a software time-limiting tool. It's even important to be sure that they are varying what they do online. Encourage them to explore a variety of Web sites, not just one or two of their favorites.

Safety By Age

10 to about 12:
During this pre-teen period, many kids want to experience even more independence. If children aren't already doing so, this is a time when they should start using the Internet to help with schoolwork and, perhaps, discover resources for their hobbies, sports activities, and other interests. This is also an age when you have to be concerned not just about what kids see and do on the Internet, but how long they are online. Your job is to help them manage their independence. Set limits on how often and how long kids can be online, and be sure that they are engaged in other activities such as sports, music, and book-reading. At about age 12 children begin to hone their abstract reasoning skills. With these enhanced skills, they begin to form more of their own values and begin to take on the values of their peers. Before that they're more likely to reflect the values of their parents. It's important at this age to begin to emphasize the concept of credibility. Kids need to

13 understand that not everything they see on the Internet is true or valuable, just as not all advice they get from their peers is valuable. A good way to illustrate this is for them to do a search for sites on subjects they know a lot about -- favorite athletes or musicians, subjects they love in school, etc.

Safety By Age

12 to about 14:
This is the time when many kids become very social and when they are most likely to be interested in online chat. Go over the basic privacy rules with your kids to be sure they understand never to give out information about themselves or to get together with anyone they meet online without first checking with their parents. Also, emphasize the importance of never exchanging photographs with people they don't know. At this age they need to understand clearly the fact that people on the Internet may not be who they appear to be. This is also an age where many children start expressing interest in sexual matters. It is natural for them to be curious about the opposite (or even same) sex and not unheard of for them to want to look at photos and explore sexual subjects. During this early exploratory period, it is especially important for kids to know that their parents are around and aware of what they are doing. You may not need to be in the same room as your kids the entire time they're on the Net, but they do need to know that you and other family members can walk in and out of the room at any time, and will ask them about what they are doing online. Don't be alarmed if they are interested in exploring sexual material. How you manage this, of course, depends on your own view of such material. It's important, however, to be aware that some of the materials they might find on the Internet are different -- and more explicit -- than some of the magazines that may have been around when you were that age. If kids search hard enough, they can probably find Web sites and newsgroups that explore sexual fantasies that they -- and even you -- might find disturbing or even frightening. This is probably the strongest argument for Internet filters but it's also an argument for close parental involvement, reinforcing your family's values, and creating a climate of trust and openness between parents and children. Children at this age are likely to be interested in games that they can download from the Internet to play either online or offline. Some of these games may have content that parents feel is inappropriate, so it's important to be aware of what your kids are doing on the computer, even when they're not connected to the Internet. Monitoring software may help you in this effort. This is also a period when many parents choose to speak with their children about sexual matters. It may be a good idea to think about how you might react if you discover that your child has visited places on the Internet that you feel are inappropriate.

14 You can use filtering and monitoring software at this age, but you may start to run into some resistance. What's important is that you are honest with your kids and that they know what you are doing and why you are doing it. If you use filtering software, for example, you need to explain to them that you are doing it to protect them from material that you consider to be harmful. Just as you might not let them go to certain places in your community, you are exercising your parental right to keep them from surfing to certain types of places in cyberspace.

Safety By Age

14 to about 17:
This can be one of the most exciting and challenging periods of a child's (and parent's) life. Your teen is beginning to mature physically, emotionally, and intellectually and is anxious to experience increasing independence from parents. To some extent that means loosening up on the reins, but by no means does it mean abandoning your parenting role. Teens are complicated in that they demand both independence and guidance at the same time. Teens are also more likely to engage in risky behavior both online and offline. While the likelihood of a teen being abducted by someone he meets in a chat room is extremely low, there is always the possibility that he will meet someone online who makes him feel good and makes him want to strike up an in-person relationship. It is extremely important that teens understand that people they meet online are not necessarily who they seem to be. Although it's sometimes difficult to indoctrinate teens with safety information, they can often understand the need to be on guard against those who might exploit them. Teens need to understand that to be in control of themselves means being vigilant, on the alert for people who might hurt them. The greatest danger is that a teen will get together offline with someone she meets online. If she does meet someone she wants to get together with, it's important that she not go alone and that she meet that person in a public place. It's important for parents to remember what it was like when they were teenagers. Set reasonable expectations and don't overreact if and when you find out that your teen has done something online that you don't approve of. That doesn't mean that you shouldn't take it seriously and exercise appropriate control and discipline, but pick your battles and try to look at the bigger picture. If your teen confides in you about something scary or inappropriate that he encountered online, your first response shouldn't be to take away his Internet privileges. Try to be supportive and work with your teen to help prevent this from happening in the future. And remember that your teen will soon be an adult and needs to know not just how to

15 behave but how to exercise judgment, reaching her own conclusions on how to explore the Net and life in general in a safe and productive manner.

Tips

Use a unique e-mail address - Pick an address that is hard for spammers to guess and easy for you to remember. Also, if chatting online, use a unique screen name that is not associated with your e-mail address. More Information. Use multiple e-mail addresses - Consider creating separate addresses or accounts that can be used for online purchases, chat rooms and other public postings. You can also use a free forwarding address. More Information. "Mask" your e-mail address - If you post your e-mail address online consider masking your address. There are several ways to correctly mask your address and thwart spammers. More Information. Check the privacy policy when you submit your address to a Web site Always be familiar with a Web site's privacy policy before submitting any information. Learn more about how to read a privacy policy. If it sounds too good to be true, - it probably is. Fraudsters, scammers, and crooks take advantage of people via unwanted e-mail. More Information Learn more about "pop up spam" - recently a new form of spam has developed via the Microsoft Windows operating system feature Messenger Service. It is a stream of "pop up" messages that stop you from using your home computer until you close them. If this is a common problem that you are experiencing learn how to make it stop. Use tools to help prevent spam - Learn about tools that can filter or tag spam before it fills your e-mail inbox.

Your Place for Answers

Here's how to handle online safety Q: Whats my digital reputation?


Your digital reputation is how people see you based on what you post and share online including blog entries, comments, photos, and social networking profiles. Even people who know you personally like friends, teachers, or family members may find out new things about you based on what you post online. Thats why its important to keep your digital reputation in good standing.

Q: How do I get a good digital reputation?


Think about what you post or share online. If its not something youd share with everyone from your teachers to your friends, dont put it out there. This includes

16 inappropriate pictures, negative comments, and extremely personal information about yourself and others. Do you want a college admissions officer to see that one picture of you at your friends party? What about sharing a revealing photo of you from Halloween with your future boss? Another way to help keep a good digital reputation is to be nice (and pass it on). Be respectful online and treat people the way youd want to be treated. And remember not to say anything to someone online that you wouldnt say to their face.

Q: How do I choose a good online ID?


Since your ID is how the online community will identify you, its important to choose one that represents you, but doesnt give away private information. You don't want strangers to know too much about you just from seeing your ID. For example, if you choose the name "49erfan" as your ID, it will communicate to the world that you are apparently fond of the 49ers. Fine. There's little risk of someone being able to distinguish one fan of butterflies from the millions of others out there in the world. On the other hand, the name "Butterflies4Jane" goes a little further. It provides someone with a name, which they could use as both a conversation starter and to feign a sense of familiarity. Remember to have fun choosing your ID. If its an inside joke between you and your friends, thats fine. But always leave out the following personal information:

First and last name Address Phone numbers School name The names of parents and siblings

Instead, try one similar to these examples:


Colors shadesofgrey, purplepassion Animals leapinglizard, liontamer Musicians rihannarox, jayzbaby Sports soccerchamp, fieldhockey23 Games ps3isthebest, yourguitarhero

17

What should I keep private?


Internet conversations let you keep in touch with friends, but keeping those conversations (and your user names/profiles) free of personal information like your password, full name, or even the name of your school is important. Its also very important to protect your identity by not posting personal information online. Personal details such as last name, address, phone numbers, school name, and date of birth can be used to identify you in real life. Its also a good idea to learn about the role of websites Privacy Policies. You can review the Yahoo! Privacy Policy here.

What can I do to keep personal information private?


Never give your password out. If someone gains access to your password they can read your mail, buy stuff with your credit card information, and obtain personal and identifiable information. They can change your profile, play pranks using your name, and possibly get you kicked off your service. They can also change your password and lock you out of your account! Choose a password that is easy for you to remember but cannot be easily guessed. You may want to change your password frequently, even once a month (but make sure you remember it!). Be careful if someone is watching you enter your password they could look over your shoulder and steal it. Its important to know the difference between real-life friends and online friends. Chatting with your best friend from school is very different from chatting with someone you only know online. An online friend may not be someone you can trust. So be smart when you talk with people you dont know in real life -- never give out information that will allow them to find you offline. Information such as the school you attend, the teams you are on, the place where you work, your address, your telephone number, or your detailed description when linked with other information can help someone find you if they are looking very hard. Be careful where else you put information that is publicly accessible. Think before you post personal information on school websites, friends' websites, profiles, and digital registries.

What can I post online?


As long as its not abusive, you can post pretty much anything online. You can post blog entries about your favorite music, sports, movies, or television shows. Post short videos of your friends and family. Post pictures from summer vacation, a link to a news story, or a review of the movie you saw last week.

18

What shouldnt I post?


Since what you post will almost always be linked to you, dont post revealing personal information like your name, address, or passwords. Dont post stuff that will reflect negatively on you if its something you wouldnt want your parents or teachers to see, it shouldnt go online. Remember that once something is posted online, you can quickly loose control of it. Its easy for other people to take it, share it, edit it, and post it in other places. Always think before you post!

What about my mobile device?


All safety advice applies to mobile devices too! Maybe even more so, because you have your mobile device with you everywhere. For more about Yahoo! Mobile and how to use your devices safely, check out the Yahoo! Mobile Safety Guide.

What are my rights online?


You have the right to enjoy your time online. You have the right to feel safe, to feel free to explore the wealth of content and community that is available through a variety of online services. You have the right to not respond to email or other messages that are inappropriate or make you feel scared. Harassing, threatening, posting obscene or otherwise objectionable content on Yahoo! is not allowed and is considered abuse. If you get a message that you dont feel right about, that creeps you out, or that makes you feel angry, bad, or sad, dont respond. Instead, show it to your parents, guardians, or another trusted adult. And whether you tell an adult about it, or not, make sure that you report the incident to the service provider by clicking on the Report Abuse link. This way, we can address the abuse ourselves. These reports are kept confidential.

How can I get involved with online safety?


There are several ways to learn more about online safety. Visit the Get Involved page to find out about groups you can join, get tips to share with your friends, and hear from other teenagers who are online safety leaders.

Stranger danger: What should I watch out for?


When chatting online, playing games, or posting messages, keep in mind that you dont always know the people you are communicating with. Always use caution when approached by someone unknown, just as you would in real life. Reject invitations from unknown users and never respond to email or instant messages that make you feel uncomfortable. Tell a parent or guardian about any personal or sexual questions or comments from a stranger online. Many Yahoo! services also allow you to block or ignore specific users. Choose a specific service to learn how to set up this blocking. And

19 remember, you can always report abuse to Yahoo! if you receive a message that makes you uncomfortable. You should never arrange a face-to-face meeting with an online-only acquaintance without involving a parent or guardian. The Internet can be a great way to chat with people who have similar interests, but unfortunately, people are not always who they seem or say they are.

If I get approached by a stranger, what should I do? If I see content that makes me uncomfortable, who can I tell?
If you are ever harassed or mistreated online, or if you come across offensive or illegal pictures, videos, or text, click on the Report Abuse link most often located at bottom of the page where the abuse has occurred and let us know about it. If you get a message that you dont feel right about, that creeps you out, or that makes you feel angry, bad, or sad, dont respond. Instead, show it to your parents, guardians, or another trusted adult. And whether you tell an adult about it, or not, make sure that you report the incident to the service provider by clicking on the Report Abuse link. This way, we can address the abuse ourselves. These reports are kept confidential.

What happens when I report abuse?


The website will review the report and determine whether the users actions really were abuse as outlined in the websites Terms of Service (TOS). If the website finds that the actions were against the TOS, then it will take appropriate action, which may include giving the user a warning, removing the users ID from their site or if bad enough, even reporting the actions to law enforcement. These consequences are kept confidential.

What is cyberbullying?
You know what bullying is you see kids pick on other kids in the lunchroom or you hear one friend say something nasty about another friend behind her back in class. Cyberbullying is no different. You might receive mean or insulting text or instant messages from someone you thought was your friend. Or a classmate might pretend to be you and post false information or unflattering photos on a website.This is cyberbullying. Cyberbullying is defined as any cyber-communication posted or sent by a minor that is intended to frighten, embarrass, harass, or otherwise target another minor. If there arent minors on both sides of the communication, it is considered cyberharassment, but the two terms mean pretty much the same thing.

Someones cyberbullying me. What can I do?


If someone is being disrespectful or bullying you, try to ignore them and click on Report Abuse, because their actions are most likely not allowed by the website. Also, you can

20 use privacy tools to block them from viewing your full profile and contacting you. If it doesnt stop, tell a trusted adult that you are being cyberbullied.

What is Yahoo! Safely Parents?


Yahoo! Safely Parents is for parents only (but we dont mind if teenagers sneak in). We designed it to help parents and guardians:

Keep their children safe on the Internet. Navigate the bewildering world of technology for children and families. Open the dialogue between parents and teens about online safety.

Our library contains dozens of articles and resources about online safety and ways to get involved from leading organizations.

What online activities should I share with my parents?


Talking with your parents or guardians doesnt mean giving up your privacy. Everyone benefits when youre on the same page when it comes to online activities, including when you can go online, how long you can stay online, and what activities you can do online.

What is a family pledge for online safety?


The pledge is a way for family members to talk about how they are spending their time online. By talking with your parents or guardians, you can agree to not give out personal information, to not set up offline meetings, and more. Its a simple way to stay

U
When vendors become aware of vulnerabilities in their products, they often issue patches to fix the problem. Make sure to apply relevant patches to your computer as soon as possible so that your system is protected. What are patches? Similar to the way fabric patches are used to repair holes in clothing, software patches repair holes in software programs. Patches are updates that fix a particular problem or vulnerability within a program. Sometimes, instead of just releasing a patch, vendors will release an upgraded version of their software, although they may refer to the

21

upgrade as a patch. How do you find out what patches you need to install? When patches are available, vendors usually put them on their websites for users to download. It is important to install a patch as soon as possible to protect your computer from attackers who would take advantage of the vulnerability. Attackers may target vulnerabilities for months or even years after patches are available. Some software will automatically check for updates, and many vendors offer users the option to receive automatic notification of updates through a mailing list. If these automatic options are available, we recommend that you take advantage of them. If they are not available, check your vendors' websites periodically for updates. Make sure that you only download software or patches from websites that you trust. Do not trust a link in an email messageattackers have used email messages to direct users to malicious websites where users install viruses disguised as patches. Also, beware of email messages that claim that they have attached the patch to the messagethese attachments are often viruses (see Attachments Both the National Cyber Security Alliance and US-CERT have identified this topic as one of the top tips for home users. Author: Mindi McDowell Copyright 2004, 2009 Carnegie Mellon University.

Recognizing and Avoiding Spyware


Because of its popularity, the internet has become an ideal target for advertising. As a result, spyware, or adware, has become increasingly prevalent. When troubleshooting problems with your computer, you may discover that the source of the problem is spyware software that has been installed on your machine without your knowledge. What is spyware? Despite its name, the term "spyware" doesn't refer to something used by undercover operatives, but rather by the advertising industry. In fact, spyware is also known as "adware." It refers to a category of software that,

22 when installed on your computer, may send you pop-up ads, redirect your browser to certain web sites, or monitor the web sites that you visit. Some extreme, invasive versions of spyware may track exactly what keys you type. Attackers may also use spyware for malicious purposes. Because of the extra processing, spyware may cause your computer to become slow or sluggish. There are also privacy implications:

What information is being gathered? Who is receiving it? How is it being used?

How do you know if there is spyware on your computer? The following symptoms may indicate that spyware is installed on your computer:

you are subjected to endless pop-up windows you are redirected to web sites other than the one you typed into your browser new, unexpected toolbars appear in your web browser new, unexpected icons appear in the task tray at the bottom of your screen your browser's home page suddenly changed the search engine your browser opens when you click "search" has been changed certain keys fail to work in your browser (e.g., the tab key doesn't work when you are moving to the next field within a form) random Windows error messages begin to appear your computer suddenly seems very slow when opening programs or processing tasks (saving files, etc.)

How can you prevent spyware from installing on your computer? To avoid unintentionally installing it yourself, follow these good security practices:

Don't click on links within pop-up windows - Because pop-up windows are often a product of spyware, clicking on the window may install spyware software on your computer. To close the pop-up window, click on the "X" icon in the titlebar instead of a "close" link within the window. Choose "no" when asked unexpected questions - Be wary of unexpected dialog boxes asking whether you want to run a particular program or perform another type of task. Always select "no" or

23 "cancel," or close the dialog box by clicking the "X" icon in the titlebar. Be wary of free downloadable software - There are many sites that offer customized toolbars or other features that appeal to users. Don't download programs from sites you don't trust, and realize that you may be exposing your computer to spyware by downloading some of these programs. Don't follow email links claiming to offer anti-spyware software Like email viruses, the links may serve the opposite purpose and actually install the spyware it claims to be eliminating.

As an additional good security practice, especially if you are concerned that you might have spyware on your machine and want to minimize the impact, consider taking the following action:

Adjust your browser preferences to limit pop-up windows and cookies - Pop-up windows are often generated by some kind of scripting or active content. Adjusting the settings within your browser to reduce or prevent scripting or active content may reduce the number of pop-up windows that appear. Some browsers offer a specific option to block or limit pop-up windows. Certain types of cookies are sometimes considered spyware because they reveal what web pages you have visited. You can adjust your privacy settings to only allow cookies for the web site you are visiting (see Browsing Safely: Understanding Active Content and Cookies and Evaluating Your Web Browser's Security Settings for more information).

How do you remove spyware?

Run a full scan on your computer with your anti-virus software Some anti-virus software will find and remove spyware, but it may not find the spyware when it is monitoring your computer in real time. Set your anti-virus software to prompt you to run a full scan periodically (see Understanding Anti-Virus Software for more information). Run a legitimate product specifically designed to remove spyware - Many vendors offer products that will scan your computer for spyware and remove any spyware software. Popular products include Lavasoft's Ad-Aware, Microsoft's Window Defender, Webroot's SpySweeper, and Spybot Search and Destroy. Make sure that your anti-virus and anti-spyware software are compatible - Take a phased approach to installing the software to ensure that you don't unintentionally introduce problems (see

24 Coordinating Virus and Spyware Defense for more information). Authors: Mindi McDowell, Matt Lytle Copyright 2004 Carnegie Mellon University. Terms of use

Understanding Firewalls
When anyone or anything can access your computer at any time, your computer is more susceptible to being attacked. You can restrict outside access to your computer and the information on it with a firewall. What do firewalls do? Firewalls provide protection against outside attackers by shielding your computer or network from malicious or unnecessary Internet traffic. Firewalls can be configured to block data from certain locations while allowing the relevant and necessary data through (see Understanding Denial-of-Service Attacks and Understanding Hidden Threats: Rootkits and Botnets for more information). They are especially important for users who rely on "always on" connections such as cable or DSL modems. What type of firewall is best? Firewalls are offered in two forms: hardware (external) and software (internal). While both have their advantages and disadvantages, the decision to use a firewall is far more important than deciding which type you use.

Hardware - Typically called network firewalls, these external devices are positioned between your computer or network and your cable or DSL modem. Many vendors and some Internet service providers (ISPs) offer devices called "routers" that also include firewall features. Hardware-based firewalls are particularly useful for protecting multiple computers but also offer a high degree of protection for a single computer. If you only have one computer behind the firewall, or if you are certain that all of the other computers on the network are up to date on patches and are free from viruses, worms, or other malicious code, you may not need the extra protection of a software firewall. Hardware-based firewalls have the advantage of being separate devices running their own operating systems, so they

25

provide an additional line of defense against attacks. Their major drawback is cost, but many products are available for less than $100 (and there are even some for less than $50). Software - Some operating systems include a built-in firewall; if yours does, consider enabling it to add another layer of protection even if you have an external firewall. If you don't have a built-in firewall, you can obtain a software firewall for relatively little or no cost from your local computer store, software vendors, or ISP. Because of the risks associated with downloading software from the Internet onto an unprotected computer, it is best to install the firewall from a CD or DVD. If you do download software from the Internet, make sure it is a reputable, secure website (see Understanding Web Site Certificates for more information). Although relying on a software firewall alone does provide some protection, realize that having the firewall on the same computer as the information you're trying to protect may hinder the firewall's ability to catch malicious traffic before it enters your system.

How do you know what configuration settings to apply? Most commercially available firewall products, both hardware- and software-based, come configured in a manner that is acceptably secure for most users. Since each firewall is different, you'll need to read and understand the documentation that comes with it to determine whether or not the default settings on your firewall are sufficient for your needs. Additional assistance may be available from your firewall vendor or your ISP (either from tech support or a website). Also, alerts about current viruses or worms (such as US-CERT's Cyber Security Alerts) sometimes include information about restrictions you can implement through your firewall. Unfortunately, while properly configured firewalls may be effective at blocking some attacks, don't be lulled into a false sense of security. Although they do offer a certain amount of protection, firewalls do not guarantee that your computer will not be attacked. In particular, a firewall offers little to no protection against viruses that work by having you run the infected program on your computer, as many email-borne viruses do. However, using a firewall in conjunction with other protective measures (such as anti-virus software and "safe" computing practices) will strengthen your resistance to attacks (see Understanding Anti-Virus Software and other security tips for more information). Both the National Cyber Security Alliance and US-CERT have identified

26 this topic as one of the top tips for home users. Authors: Mindi McDowell, Allen Householder Copyright 2004 Carnegie Mellon University. Terms of use

Safeguarding Your Data


When there are multiple people using your computer and/or you store sensitive personal and work-related data on your computer, it is especially important to take extra security precautions. Why isn't "more" better? Maybe there is an extra software program included with a program you bought. Or perhaps you found a free download online. You may be tempted to install the programs just because you can, or because you think you might use them later. However, even if the source and the software are legitimate, there may be hidden risks. And if other people use your computer, there are additional risks. These risks become especially important if you use your computer to manage your personal finances (banking, taxes, online bill payment, etc.), store sensitive personal data, or perform work-related activities away from the office. However, there are steps you can take to protect yourself. How can you protect both your personal and work-related data?

Use and maintain anti-virus software and a firewall - Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall (see Understanding Anti-Virus Software and Understanding Firewalls for more information). Make sure to keep your virus definitions up to date. Regularly scan your computer for spyware - Spyware or adware hidden in software programs may affect the performance of your computer and give attackers access to your data. Use a legitimate anti-spyware program to scan your computer and remove any of these files (see Recognizing and Avoiding Spyware for more information). Many anti-virus products have incorporated spyware detection.

27 Keep software up to date - Install software patches so that attackers cannot take advantage of known problems or vulnerabilities (see Understanding Patches for more information). Many operating systems offer automatic updates. If this option is available, you should turn it on. Evaluate your software's settings - The default settings of most software enable all available functionality. However, attackers may be able to take advantage of this functionality to access your computer. It is especially important to check the settings for software that connects to the internet (browsers, email clients, etc.). Apply the highest level of security available that still gives you the functionality you need. Avoid unused software programs - Do not clutter your computer with unnecessary software programs. If you have programs on your computer that you do not use, consider uninstalling them. In addition to consuming system resources, these programs may contain vulnerabilities that, if not patched, may allow an attacker to access your computer. Consider creating separate user accounts - If there are other people using your computer, you may be worried that someone else may accidentally access, modify, and/or delete your files. Most operating systems (including Windows XP and Vista, Mac OS X, and Linux) give you the option of creating a different user account for each user, and you can set the amount of access and privileges for each account. You may also choose to have separate accounts for your work and personal purposes. While this approach will not completely isolate each area, it does offer some additional protection. However, it will not protect your computer against vulnerabilities that give an attacker administrative privileges. Ideally, you will have separate computers for work and personal use; this will offer a different type of protection. Establish guidelines for computer use - If there are multiple people using your computer, especially children, make sure they understand how to use the computer and internet safely. Setting boundaries and guidelines will help to protect your data (see Keeping Children Safe Online for more information). Use passwords and encrypt sensitive files - Passwords and other security features add layers of protection if used appropriately (see Choosing and Protecting Passwords and Supplementing Passwords for more information). By encrypting files, you ensure that unauthorized people can't view data even if they can physically access it. You may also want to consider options for full disk encryption, which prevents a thief from even starting your laptop without a passphrase. When you use encryption, it is important to remember your passwords and passphrases; if you forget or lose

28 them, you may lose your data. Follow corporate policies for handling and storing work-related information - If you use your computer for work-related purposes, make sure to follow any corporate policies for handling and storing the information. These policies were likely established to protect proprietary information and customer data, as well as to protect you and the company from liability. Even if it is not explicitly stated in your corporate policy, you should avoid allowing other people, including family members, to use a computer that contains corporate data. Dispose of sensitive information properly - Simply deleting a file does not completely erase it. To ensure that an attacker cannot access these files, make sure that you adequately erase sensitive files (see Effectively Erasing Files for more information). Follow good security habits - Review other security tips for ways to protect yourself and your data.

Author: Mindi McDowell

Don't rely on a program to do your job! Filtering and blocking programs can be a part of your Internet safety plan at home, but they don't take the place of an informed and involved parent. Be Pro-Active Attend our free online classes and spend some time listening to and speaking with other concerned parents. Participate with your child online Get to know the services and programs your child uses - ask them to show you how their favorite chatroom works, or the online gaming that they participate in. Make a promise and keep it! Promise your children that you won't get angry if they come to you with a problem about an online situation. Stay calm and remember that your child trusted you to help when they came to you - don't let them down! Plan ahead Talk to your children about the things that they may encounter online. You don't have to scare them, but teach them that your values offline match your values online. Spend time using search engines with your children - and showing them how to be a discriminating surfer. Encourage their other interests Children shouldn't spend excessive amount of time online - it's just not healthy for them. Encourage them in their offline activities. Think "Mall" You wouldn't drop your child off alone in a mall, so don't "drop them off" online either. Keep an eye on them! Set an Example If you download pirated MP3 files, don't be surprised when your child's teacher calls you in for a conference about plagiarised homework. A time and place for everything Keep your computer in a "common" room where you can keep an eye on it! You wouldn't allow a stranger in the bedroom with your child, don't allow them in via computer either. Grant your children

29 Internet access only when you are at home and awake. If they can't hang out at the park at 2:00 a.m., they shouldn't be surfing then either!

Be fearless Don't be afraid of your computer or the Internet, they are wonderful tools that can enrich the lives of every member of your family. Trust your instincts and jump right in. The more you know, the better you can protect your family.

Some Recent Online Risks India Incidents in that Children Face Exposure to Inappropriate Material Due to the free availability of information on a Internet, a major risk that a child boy be exposed to is A 15 year old girl courts a 16 year old boy throughthepopular Internet chat website. The may runs away from inappropriate material, out that the girl was in fact nature, or encourages activities that are dangerous home to Mumbai only to find sexual, hateful, or violent in a 30 year old man. The man sexually abuses the or illeg boy, steals his money and severely beats him up. Gambling and Other unsuitable behaviour A 14-year-old boy raked up bills of thousands of rupees on his fathers credit card after he got addicted to viewing pornographic websites. flooding the Internet. It is unsuitable for children to view such sites. Most online ga Online gambling sites are A 13 year-old girl creates a virus by credit card. This poses a potential threat to the from the Internet. of the famil sites require a person to use a downloading a free Virus Development Kit financial well being A class 10 student, who was taunted by his classmates for having a pockmarked face, puts up a pornographic well. website and displays nude "morphed" other Dangers Drugs, Alcohol, Tobacco and images of his classmates and teachers.

The number of incidents as well asnewsgroups promote the use of drugs, tobacco or alcohol. Some websites even teach how Some web sites and the seriousness of the acts taking place due to the usage of the Internet by children could be far more damaging. download Virus Development Kits. make bombs or

Physical Harm To tackle this abuse of children through the misuse of modern technology, Asian School of Cyber Laws has launched FACT (Freedom from Abuse of Children through Technology). Paedophiles seeking children as targets have used E-mail and chat rooms to gain a childs confidence and the arrange a face-to-face meeting. Once the childs confidence has been won and a meeting arranged, the child i FACT is a five-pronged programme that includes: great danger of physical harm and permanent psychological scarring. Persecuting Messages 1. Educating the children on the perils of surfing the Internet and how they could safeguard themselves. 2. Educating the parents on how to monitor the Internet activities of their children to prevent any untoward A child might encounter E-mail or chat/bulletin board messages that are harassing, demeaning, or belligerent incidents. Information sent to your child could also have a the requisite impact on your child. 3. Schools awareness program to equip the schools withpsychologicaltools to inculcate in their curriculum, Legal and Financial Problems awareness programs on the dangers of the Internet. 4. Creating Media awareness by way of assisting the media and providing vital information to them, which would There is also the riskthe message could do somethingInternet. negative legal or financial consequences such a be helpful to spread that a child of the perils of the that has out a parents credit card number or committing a cyber crime. Legal issues aside, children should be taught g "netiquette" which means to avoid being rude or inconsiderate while online. 5. Establishing a FACT Help Line to assist and advise students and parents facing a cyber threat and providing counselling to victims of cyber crimes. We can be emailed at: fact@asianlaws.org Intrusion of Privacy

A childs privacy is vital but is most vulnerable on the Internet. No one has a right to a childs personal inform without due authorization from its guardians. Such information includes name, age, name of the school and d about the childs family. Disclosing such information on the Internet may expose the child to substantial threa Wasting a Childs Potential

By being online for unlimited number of hours, a child ends up wasting a lot of valuable constructive time tha

30

have been utilised for creative purposes. A childs development may suffer a great deal because of this. Reasons for Concern There are a number of signs that parents whose children venture online should watch out for. You know your child better than anyone else; so follow your instincts! Screen Switching If your children quickly change screens or turn off the monitor when you come into the room, it is likely they are viewing something they don't want you to see. Be calm and ask them to share what they are viewing with you. If the content is inappropriate tell them politely that they should not view the material. Do not reprimand the child without first talking to him/her. Phone Calls If your child suddenly starts receiving phone calls from strange adults (or even other children) you may have a problem on your hands. Install a caller ID program to determine where the calls are coming from and ask your child to explain them. Odd Hours of the Night If your child is up typing away in the wee hours of the night he may be chatting online. This activity should be reserved for times and places that are supervised. A child or teenager's excessive use of online services or the Internet, especially late at night could be a cause for concern. Prosperity If your child suddenly has unaccounted cash or gifts, or unfamiliar clothing, there may be something for you to worry about. Offenders seeking to harm children often spend a great deal of money cultivating a relationship / friendship with a child in order to gain their confidence and trust. Withdrawal Symptoms If you notice that your child has of late been keeping away from friends and family especially after the use of the Internet then you should be a little careful. Paedophiles and other offenders looking to target children work very hard to drive a wedge between children and the people who support and care for them. The larger the gap between the child and his family, the easier it is for a predator to create a relationship. Visiting Friends If you sense that your child has been acting strange of late and that his/her friends do not visit that often, make the attempt to speak to his/her friends and ask them if anything is wrong. Do not interfere too much though. Sometimes your childs friend could also visit quite often, be wary if the purpose of the visit is to view inappropriate material online. However, you must also respect the privacy of your child. Be tactful in handling any situation. These are a few signs that should concern you as a parent. Getting hysterical or making accusations will not help the situation though.

31 It is your job as the adult to remain calm and to try to figure out what has gone wrong and find a solution to the problem too! Child pornography or any other illegal activities directed at children may be reported to the nearest police station. You may also contact the ASCL FACT helpline at: fact@asianlaws.org

Guidelines for Parents Do not rely on a program to do your job! Filtering and blocking programs can be a part of your Internet safety plan at home, but they don't take the place of a caring and concerned parent. Be Proactive Spend some time listening to and speaking with other concerned parents. Think of ways and means to communicate with your child and inform them of the dangers of Internet surfing. Its never too early to speak to your child. Be Vigilant Look for graphic files downloaded files ending in .jpg, .gif, .bmp, .tif, and .pcx format. Files with these extensions may be inappropriate material from the Internet. Do your research on Blocking, Filtering, and Rating Programs There are now services that rate web sites for content as well as filtering programs and browsers that empower parents to block the types of sites they consider to be inappropriate. These programs work in different ways. Some block sites that are known to contain objectionable material. Some prevent users from entering certain types of information such as their name and address. Other programs keep your kids away from chat rooms or restrict their ability to send or read E-mail. Participate with your Child Online Get to know the services and programs your child uses ask them to show you how their favourite chatroom works, or the online games that they participate in. Make a Promise and Keep it! Promise your children that you won't get angry if they come to you with a problem about an online situation. Stay calm and remember that your children trusted you to help them when they came to you - don't let them down! Plan Ahead Talk to your children about the things that they may encounter online. You don't have to scare them, but teach them that your values offline match your values online. Encourage their Other Interests

32

Children shouldn't spend too much time online - it's just not healthy for them. Encourage them in their other activities such as outdoor sports. Be a Role Model If you download pirated software or other copyrighted material, don't be surprised when your child's teacher calls you in for a conference about plagiarised homework! A Time and Place for Everything Keep your computer in a "common" room - where you can keep an eye on it! You wouldn't allow a stranger in the bedroom with your child, don't allow them in via a computer either. Grant your children Internet access only when you are at home and awake. If they cant stay out till late at night, they shouldn't be surfing then either! Dont be Afraid to Use your Computer Don't be afraid of your computer or the Internet, they are wonderful tools that can enrich the lives of every member of the family. Trust your instincts and jump right in. The more you know, the better you can protect your family. By taking responsibility for your children's online computer use, you can greatly minimize any potential risks of being online. Make it a rule to:

Never give out identifying information: Home address, school name, or telephone number should not be given to strangers. Get to know the services your child uses: If you don't know how to log on, get your child to show you. Find out what types of information it offers and whether there are ways for parents to block out objectionable material. Never allow a child to arrange a meeting: A face-to-face meeting with another computer user without parental permission is a definite no-no. If a meeting is arranged, make the first one in a public spot, and be sure to accompany your child. Never respond to messages: Bulletin board items that are suggestive, obscene, belligerent, threatening, or make you feel uncomfortable should not evoke any response from you. Encourage your children to tell you if they encounter such messages. If you or your child receives a message that is harassing, of a sexual nature, or threatening, forward a copy of the message to the police and ask for their assistance. You may contact ASCL FACT helpline at fact@asianlaws.org for any assistance.

Report abuses: Should you become aware of the transmission, use, or viewing of child pornography while online, immediately report this to the nearest police station. You may also notify us if you feel the need to do so. Strangers Online

33

People online may not be who they seem. Because you can't see or even hear the person it would be easy for someone to misrepresent him or herself. Thus, someone indicating that "she" is a "12-year-old girl" could in reality be a 40-year-old man. Content Online Everything you read online may not be true. Any offer that seems to be "too good to be true" probably is. Be very careful about any offers that involve your coming to a meeting or having someone visit your house. Set Reasonable Rules and Guidelines You should lay down guidelines and rules for computer use by your children. Discuss these rules with your child first and then post them near the computer as a reminder. Monitor Compliance Monitor your childs compliance with these rules, especially when it comes to the amount of time your children spend on the computer. A child or teenager's excessive use of online services or bulletin boards, especially late at night, may point to a potential problem just waiting to happen. Family Activity Consider keeping the computer in a family room rather than the child's bedroom. Get to know their "online friends" just as you get to know all of their other friends.

Tips for Children Never give out personal information Personal information includes your name, the names of friends or family, your address, phone number, school name. It also includes pictures of yourself and your e-mail address. Don't believe everything you read You can't tell when a male pretends to be a female online or a 50 year old pretends to be a 12 year old online. People online may not send their own photographs either. Do not be fooled by pictures that your so-called online friends send you. Passwords should be kept secret Never tell anyone your password except your parents or guardians. Your password is for your own protection, giving strangers your password could be really harmful. If someone calls and says theyre with an online service or your Internet Service Provider and need your password, get their name and number and e-mail address. Call the service and ask if such a person works there and whether they allow employees to ask for passwords.

34 Do your research on Blocking, Filtering, and Rating Programs There are now services that rate web sites for content as well as filtering programs and browsers that empower parents to block the types of sites they consider to be inappropriate. These programs work in different ways. Some block sites that are known to contain objectionable material. Some prevent users from entering certain types of information such as their name and address. Other programs keep your kids away from chat rooms or restrict their ability to send or read E-mail. Use Netiquette Be polite to others online just as you would offline. If someone treats you rudely or meanly - do not respond. Online bullies are just like offline ones - they WANT you to answer (don't give them the satisfaction). Never open strange emails Delete strange e-mails. DO NOT open e-mails from strangers. E-mails from strangers could contain malicious codes (Viruses, Worms, Trojans etc.) that would be harmful to your computer. If in doubt, ask your parents, guardian or another adult. It's okay to talk about what you view While surfing the Internet, if you find something that you don't like, that makes you feel uncomfortable or scares you, turn off the computer and talk about it to an adult. Take breaks Give yourself a break; dont stay online for too long. Spend time with your family and friends off line. Read website contracts The contracts and user policies on websites are aimed at laying down guidelines for your use of the website. Read the same with your parents and ask them to explain the implications of those contracts to you. This will help you and your parents understand issues of safety on the Internet. Copying is not cool Do not copy things from websites to use for anything, unless you have the Webmasters permission. Protect yourself Never arrange to meet with someone you met online unless your parents go with you. If you are meeting them make sure it is in a public place and you are accompanied by your parents or a guardian. Content Online

35

Everything you read online may not be true. Any offer that seems to be "too good to be true" probably is. Be very careful about any offers that involve your coming to a meeting or having someone visit your house. Teach your Parents Spend time teaching your parents about your online activities show them your favourite sites let them watch you use the Internet. Keep them involved in your online activities. They may feel happy to know that you are secure while using the Internet. Be careful Some sites that offer free virus development kits and "Trojans" actually cause harm to your computer by planting a virus or Trojan in your computer. Never visit these sites and also discourage your friends from doing the same.

Safe Internet Surfing Tips for Parents and Kids


Tips for Parents
1. Place the computer in a well-trafficked area in the home where the whole family can use it, rather than out of sight in a bedroom. The computer should be set up where it is easy for parents to see the screen and monitor behavior. 2. Talk with your children to agree what kind of sites they are allowed to visit. Then check to make sure that they stay within these agreed limits. 3. Keep your children out of unmonitored chat rooms, or at lease monitor where they go. The best Internet filtering software blocks access to all chat to keep children safe from the threat of dangerous persons. Often times adults befriend children by masquerading as kids. 4. Become familiar with the quality family-friendly and kid-friendly sites on the Web. Load your computer with bookmarks to those sites. 5. Chat sites are a great way to meet people online and can be lots of fun. But they are open to misuse, so make sure your children are as cautious of strangers online as they would be in the outside world. Tell your children if they receive any obscene, abusive or threatening messages, they shouldn't respond, but to let you know, and you should consider telling your Internet service provider. 6. Inform your child that whatever they are told online may or may not be true.

36 7. Take advantage of the filtering software readily available in the marketplace. It can help block access to inappropriate sites related to sex, drugs/alcohol, hate/violence, gambling etc and even chat. 8. Find out what computer safeguards are utilized by your child's school, the public library, and at the homes of your child's friends. These are all places, outside your normal supervision, where your child could encounter an online predator. 9. Know your child's e-mail password and tell them to inform you immediately about troubling, unsolicited e-mail. Make sure they understand it is not necessarily their fault if such e-mail arrives. 10. Let your child know that you are there to talk anytime, about anything they come across that may cause discomfort. 11. Instruct your child to never do any of the following without your permission: o Never to arrange a face-to-face meeting with someone they meet online. If you do give permission, be sure that the meeting is in a public place and that you or another responsible adult accompany your child. o Never to give out personal information such as their name, age, home address, school name or location, telephone numbers or financial information. o Never to download pictures from an unknown source, as there is a good chance there could be sexually explicit images. o Never to upload pictures of themselves on to the Internet or online service to people they do not know personally.

Tips for Kids


Chat rooms and messaging can be great fun, but it is important to remember that you never really know who you are talking to online. It could be someone trying to trick you, some kind of weirdo, or someone really dangerous. Here are some tips to help you keep safe: 1. Do not use your real name in chat rooms - pick an online nickname. 2. Do not tell anyone personal things about yourself or your family - like names, addresses, telephone numbers, clubs you belong to, financial information, age, school name or location. 3. Never send a picture or anything else without first checking with your parents. 4. Never agree to get together with someone that you meet online without first checking with your parents. If your parents agree to the meeting, be sure that it is in a public place and take your mother or father along with you. 5. Never respond to nasty or rude messages. It is not your fault if you get a message like that. If you do, tell your parents right away so they can contact the Internet service provider. 6. Be careful of any email attachments or links, as they can contain nasty images or computer viruses that can ruin the PC. If you receive an email and do not know who it is from, do not open it.

37 7. Talk with your parents so that you can set up rules for going online. You should decide the time of day you can be online, the length of time you can be online and appropriate sites that you can visit.

Internet Addiction
The World Wide Web is informative, convenient, and fun. There are varying opinions on the subject of Internet addiction. Some say that the Internet can be addicting, to the point that it disturbs one's life and the lives of those around him. Others say that there is no such thing as Internet Addiction Disorder-- getting pleasure out of a computer is not the same as getting pleasure from cocaine or any other drug. Whether there is or is not a bona fide disorder, the Internet is disrupting many people's lives.

Symptoms of Internet Addiction :


1) Using the online services everyday without any skipping. 2) Loosing track of time after making a connection. 3) Goes out less and less. 4) Spending less and less time on meals at home or at work, and eats in front of the monitor. 5) Denying spending too much time on the Net. 6) Others complaining of your too much time in front of the monitor. 7) Checking on your mailbox too many times a day. 8) You think you have got the greatest web site in the world and dying to give people your URL. 9) Logging onto the Net while already busy at work. 10) Sneaking online when spouse or family members not at home, with a sense of relief.

SAFETY TIPS FOR CHILDREN Some useful tips to follow while using the internet

38

HEY KIDS, DONT CHAT WITH STRANGERS !

Your say DON'T TALK TO STRANGERS. As far as possible NEVER talk with strangers in chat rooms. You really don't know who the person is that you are chatting with. Because you can't see or even hear the person it would be mislead you.

ASK YOUR PARENTS AND SURF

If a web site looks suspicious or has a warning page about you being underage, leave immediately. sites are not meant for kids Do not go exploring. across a site that you aren't sure about ask your parents. download any applications from the internet that are from questionable sites. have viruses which come free with the downloads ! So be very careful with downloads. than sorry.

39

Passwords are a secret so don't give out your passwords to anyone. Do not fill any online forms without asking your parents. Never put your email password on any website while registering. E-MAIL SAFETY Never open up any e-mail or attachments that you receive from people you don't know. Ask your parents to look at it first. Sometimes e-mails may contain viruses which could harm your computer. Ask your parents to install the latest anti-virus programmers. KEEP A WATCH If someone is sending you e-mails you don't like tell your parents. Never reply to e-mails from strangers. If you have got an e-mail attachment even from a known person, do a virus scan before opening. CHILD SAFE BROWSERS Ask your parents to install child-safe browsers meant for children. These browsers are colorful and fun. These browsers help & guide you to visit good and safe sites and automatically protect you from the bad ones.

SET YOUR TIME

40

Don't spend all your time online. Set a time limit on your computer use. Keep your parents informed about sites you visits.

Sponsors: Directi foundation We wish you happy and safe surfing :-) Author. M.Hemdev www.indianchild.com Designed By Napoleon Edward

www.allapplabs.com

Copyright Indianchild.com.2000 - 2004. All rights reserved. No Content from our pages can be do

SAFE SURFING TIPS FOR CHILDREN.

Just like you wouldn't want to surf in real water when you don't know how to swim, you don't want to enter the Internet without knowing the rules of safety, would you?. Here are some tips to follow while surfing the net.
1) DONT CHAT WITH STRANGERS- Your Parents are RIGHT when they say DON'T TALK TO STRANGERS. As far as possible NEVER talk with strangers in ADULT chat rooms. You really don't know who the person is that you are chatting with. Because you can't see or even hear the person it would be very easy for someone to mislead you. People on the Internet can pretend to be anyone or anything they want.

Remember that people online may not be who they say they are. Don't let them fool you. If you like to chat, make sure that your parents know that you are chatting, where you're chatting, with whom you're chatting, and what information you are giving people. Never use bad language & don't get into arguments with or answer anyone

41

who uses bad language.

If you still chat, use a fun name when you're online, not your real name (not even your real first name). Don't ever give them your phone number or address. YES. Never give your name, address, phone number, credit card information to anyone. This is very important.

People can track you down through the telephone directory, so be careful.

Never talk to anyone you met online over the phone, send them anything or accept anything from them or agree to meet with them unless your parents agree and are with you.

Never show your picture online to someone without your parents' consent.
2) E-MAIL SAFETY- Never open up any e-mail or attached files or web pages that you receive from people you don't know. If it looks suspicious or odd, delete it without opening it. Or ask your parents to look at it first. Sometimes e mails may contain viruses which could harm your computer. Remember the famous pokeman virus which came disguised as a cute animation in e mails but which was actually a virus.

....Pokeman
Ask your parents to install the latest anti-virus programmes. If someone is sending you e mails you don't like tell your parents. Never reply to e mails from strangers. 3)ASK AND SURF. Only surf where your parents have given you permission. There's a reason why they restrict your surfing area and you should listen to them. If a web site looks suspicious or has a warning page about you being underage, leave immediately. Some sites are not meant for kids Do not go exploring.

If you come across a site that you aren't sure about ask your parents. Don't download any applications from the internet that are from questionable sites. Some sites have viruses which come free with the downloads ! So be very careful with downloads. Better be safe

42

than sorry.

4)PASSWORDS. Passwords are a secret so don't give out your passwords to anyone. Keep it with you like you would keep a secret of your friend. 5)BE PROTECTED-Ask your parents to install child-safe browsers meant for children. These browsers help & guide you to visit good and safe sites and automatically protect you from the bad ones. To know more about these browsers click here.

6)SET YOUR TIME- Don't spend all your time online. Set a time limit on your computer use.

7)FUN TO LEARN-INTERNET SAFETY SITES- There are some sites on the internet which make internet safety really fun to learn. Visit them with your parents and learn safe surfing with them. They are really colorful and fun to visit.

So, with a little care & understanding, we can all make this internet a safe & better place.

43

We wish you happy and safe surfing :-)

BACK TO FUN TO LEARN WEB SAFETY PARENTS ZONE HOME

, , , , , , . 11 , .

44 1. . 2. , . . 3. . , , . 4. - , .

5. , . 6. . 7. . 8. , 2020

45 . . 9. . 10. 11. 2015 .