What is a "Digital Footprint"?
A "digital footprint" is the trail an individual leaves behind on the internet and on any form of digital communication. One of the most basic ways you can keep your children safe is to occasionally check his/her "digital footprint". Doing so will help you see what information about your children is available to the public.
Are your children posting too much information on social media and possibly jeopardizing their safety? Are your children making poor decisions about what they post that could possible jeopardize their future? Find out by Goggling their name below.
Are your children posting too much information on social media and possibly jeopardizing their safety? Are your children making poor decisions about what they post that could possible jeopardize their future? Find out by Goggling their name below.
Tips for Keeping your Children Safe Online
From NetSmartz.org and the National Center for Missing and Exploited Children
Basic Internet Safety
The Internet has drastically changed the way that children interact with the world. They have access to in-depth knowledge, tools to express their creativity, and people from all over the world. Yet along with offering a fascinating, new way to connect with the world, the Internet also offers new risks
- Cyberbullying
- Exposure to inappropriate material
- Online predators
- Revealing too much personal information
Cell Phones
When you think about your children’s online activities, do you consider their cell phones? They have evolved from simple communication devices to mobile, miniature computers. For example, smartphones have operating systems similar to that of computers which allow users to download programs or “apps.” These apps help users do things like access e-mail and play games. Also, most cell phones allow users to download and upload content from the Internet just as they would on a computer. However, cell phones can be more difficult to monitor than a computer, and children often use them without adult supervision. Make sure to review your family’s Internet safety rules with your children and become aware of the following risks before allowing them to own cell phones
Making Cyberbullying More Painful
Cell phones make it easy for children to communicate with their friends, but they also make them vulnerable to cyberbullying. Cell phones can be used at anytime and anywhere, giving cyberbullies unlimited access to their victims. Children may send and receive mean-spirited phone calls, texts, and pictures at any hour.
Playing a Role in Grooming
Predators also know and take advantage of the fact that cell phones let them talk with their victims at any time. They are also aware that parents and guardians often forget to monitor children’s cell phones. Predators may send children cell phones and ask them to keep the phones a secret. They can then talk to and exchange text messages and pictures with children without close monitoring by parents and guardians. Others may ask children for their cell phone numbers after meeting them online or try to connect with willing children by sending texts to random numbers.
Sexting Made Easy
“Sexting” is a term used to describe the sending of sexually explicit text messages or pictures of minors by minors. What most young people do not realize is that the production, possession, and distribution of explicit photos of minors, even if they are self-produced, may be illegal. Furthermore, if these explicit photos end up on the Internet, children may be taunted by their peers and jeopardize scholastic, athletic, and employment opportunities.
Unintentional Sharing of Geolocation Data
Most smartphones have GPS technology which allows the user’s precise location to be pinpointed by apps and on websites. Social networking sites such as FourSquare, GoWalla, and Facebook take advantage of this technology by encouraging their users to “check-in” or share their locations. A “check-in” can be shared with a list of friends, so make sure you know who is on your child’s friends list before allowing them to use this type of technology. Children also may share their locations unintentionally through pictures taken with their smartphones; these photos often have geolocation data embedded in them. Consider disabling the location services on smartphones before allowing children to post photos online.
Making Cyberbullying More Painful
Cell phones make it easy for children to communicate with their friends, but they also make them vulnerable to cyberbullying. Cell phones can be used at anytime and anywhere, giving cyberbullies unlimited access to their victims. Children may send and receive mean-spirited phone calls, texts, and pictures at any hour.
Playing a Role in Grooming
Predators also know and take advantage of the fact that cell phones let them talk with their victims at any time. They are also aware that parents and guardians often forget to monitor children’s cell phones. Predators may send children cell phones and ask them to keep the phones a secret. They can then talk to and exchange text messages and pictures with children without close monitoring by parents and guardians. Others may ask children for their cell phone numbers after meeting them online or try to connect with willing children by sending texts to random numbers.
Sexting Made Easy
“Sexting” is a term used to describe the sending of sexually explicit text messages or pictures of minors by minors. What most young people do not realize is that the production, possession, and distribution of explicit photos of minors, even if they are self-produced, may be illegal. Furthermore, if these explicit photos end up on the Internet, children may be taunted by their peers and jeopardize scholastic, athletic, and employment opportunities.
Unintentional Sharing of Geolocation Data
Most smartphones have GPS technology which allows the user’s precise location to be pinpointed by apps and on websites. Social networking sites such as FourSquare, GoWalla, and Facebook take advantage of this technology by encouraging their users to “check-in” or share their locations. A “check-in” can be shared with a list of friends, so make sure you know who is on your child’s friends list before allowing them to use this type of technology. Children also may share their locations unintentionally through pictures taken with their smartphones; these photos often have geolocation data embedded in them. Consider disabling the location services on smartphones before allowing children to post photos online.
Children as Victims
In order to help protect children from online sexual predators, it is important that parents and guardians understand how children’s vulnerabilities may make them susceptible to manipulation by these predators.
Curiosity
Children are naturally curious about sex. By acting as guides, predators can exploit this curiosity and gradually lure children into sexual activity. Adolescents questioning their sexuality are even more at risk, as they may go online with the intent of finding support and companionship. Instead, they may find adults looking to take advantage of this vulnerability.
Need for Attention
Even if children receive ample attention from their families, they still crave it from others, especially those they perceive as older and more mature. Predators may offer children affection and flattery in order to coerce them into sexual acts.
Rebellion
Children may become rebellious when they reach adolescence, and predators can use this to their advantage. A child who is victimized while disobeying parental rules may be reluctant to admit it for fear of being punished.
Respect for Adults
Because children are taught to obey and respect adults, they may be less likely to disobey directions given by an adult, even those which make them uncomfortable. An adult looking to harm children can exploit this to influence a child’s behavior.
Curiosity
Children are naturally curious about sex. By acting as guides, predators can exploit this curiosity and gradually lure children into sexual activity. Adolescents questioning their sexuality are even more at risk, as they may go online with the intent of finding support and companionship. Instead, they may find adults looking to take advantage of this vulnerability.
Need for Attention
Even if children receive ample attention from their families, they still crave it from others, especially those they perceive as older and more mature. Predators may offer children affection and flattery in order to coerce them into sexual acts.
Rebellion
Children may become rebellious when they reach adolescence, and predators can use this to their advantage. A child who is victimized while disobeying parental rules may be reluctant to admit it for fear of being punished.
Respect for Adults
Because children are taught to obey and respect adults, they may be less likely to disobey directions given by an adult, even those which make them uncomfortable. An adult looking to harm children can exploit this to influence a child’s behavior.
Cyberbullying
Cyberbullying is just what it sounds like - bullying through Internet applications and technologies such as instant messaging (IM), social networking sites, and cell phones. It can start easily—with a rumor, a photo, or a forwarded message—and just as easily spiral out of control. An embarrassing video posted to a social networking site by someone in Kansas tonight may be watched by someone in Japan tomorrow. Cyberbullying victims may be targeted anywhere, at any time.
Common Forms of Cyberbullying
Common Forms of Cyberbullying
- Flaming and Trolling – sending or posting hostile messages intended to “inflame” the emotions of others
- Happy-Slapping – recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing
- Identity Theft/Impersonation – stealing someone’s password and/or hijacking their online accounts to send or post incriminating or humiliating pictures, videos, or information
- Photoshopping – doctoring digital images so that the main subject is placed in a compromising or embarrassing situation
- Physical Threats – sending messages that involve threats to a person’s physical safety
- Rumor Spreading – spreading gossip through e-mail, text messaging, or social networking sites
- Avoids the computer, cell phone, and other technological devices or appears stressed when receiving an e-mail, instant message, or text
- Withdraws from family and friends or acts reluctant to attend school and social events
- Avoids conversations about computer use
- Exhibits signs of low self-esteem including depression and/or fear
- Has declining grades
- Has poor eating or sleeping habits
Email, Text, and Chat Rooms
A study from the Pew Internet & American Life Project shows that teens (ages 12-17) use text messaging to communicate with their friends more than e-mail or instant messaging (IM). However, these online communication services, along with chat rooms, continue to be an important part of children’s online interactions. E-mail accounts, for example, are often necessary to join social networking sites, online games, and virtual worlds. Social networking sites, like Facebook, often have IM and e-mail components.
E-mail, IM, and chat room programs let children communicate with friends and family members. They can also allow children to connect with people that they have never met in person, making them vulnerable to online predators, cyberbullies, and scam artists. Knowing a little about each of these communication services, and the associated risks, can help parents, guardians, and other trusted adults keep children safer while online.
E-mail
Through e-mail, users can easily send and receive messages. These messages may also have text, audio, and picture files attached. Signing up for an e-mail account is simple, as most services offer them for free and do not check the identities of users. This allows cyberbullies or scam artists to anonymously send harassing messages or spam. Sometimes these messages contain viruses, scams, or other inappropriate content, so trusted adults should warn children to be wary of e-mails from unknown people.
Instant Messaging (Texting)
Instant messaging programs allow users to exchange real-time messages with people from a list of contacts, also known as a “buddy” list. Children may not know the true identities of their buddies, as IM accounts can be acquired anonymously. Trusted adults should review children’s buddy lists for unknown contacts, and talk to them about the identities of the people on the lists. Trusted adults should also learn some of the chat acronyms, such as POS (parent over shoulder) and A/S/L (age/sex/location), which children use to communicate over IM. This will help you be aware of anyone saying anything inappropriate to your child.
Chat Rooms
Chat rooms are online hang-out spots where anyone can talk about anything—current events, books, and other common interests. Users often do not know each other in real life, so it is important that trusted adults keep a close eye on the content of any conversations.
Chat rooms offer features which allow users to chat through private, one-on-one messages. Predators may use this to entice children into conversations about sex and offline meetings. Parents and guardians should be aware of secretive behavior, such as a child minimizing the screen when an adult enters the room.
E-mail, IM, and chat room programs let children communicate with friends and family members. They can also allow children to connect with people that they have never met in person, making them vulnerable to online predators, cyberbullies, and scam artists. Knowing a little about each of these communication services, and the associated risks, can help parents, guardians, and other trusted adults keep children safer while online.
Through e-mail, users can easily send and receive messages. These messages may also have text, audio, and picture files attached. Signing up for an e-mail account is simple, as most services offer them for free and do not check the identities of users. This allows cyberbullies or scam artists to anonymously send harassing messages or spam. Sometimes these messages contain viruses, scams, or other inappropriate content, so trusted adults should warn children to be wary of e-mails from unknown people.
Instant Messaging (Texting)
Instant messaging programs allow users to exchange real-time messages with people from a list of contacts, also known as a “buddy” list. Children may not know the true identities of their buddies, as IM accounts can be acquired anonymously. Trusted adults should review children’s buddy lists for unknown contacts, and talk to them about the identities of the people on the lists. Trusted adults should also learn some of the chat acronyms, such as POS (parent over shoulder) and A/S/L (age/sex/location), which children use to communicate over IM. This will help you be aware of anyone saying anything inappropriate to your child.
Chat Rooms
Chat rooms are online hang-out spots where anyone can talk about anything—current events, books, and other common interests. Users often do not know each other in real life, so it is important that trusted adults keep a close eye on the content of any conversations.
Chat rooms offer features which allow users to chat through private, one-on-one messages. Predators may use this to entice children into conversations about sex and offline meetings. Parents and guardians should be aware of secretive behavior, such as a child minimizing the screen when an adult enters the room.
Inappropriate Content
In many ways the Internet is like a gigantic library; both have content to teach and entertain. And similar to the content in a library, not all Internet content is appropriate for children. Libraries create children’s and young adults’ sections in order to help youths (and their parents) identify which materials are appropriate for them. On the Internet, however, all of the content may be equally accessible; websites about ponies and websites featuring pornography are both a click away.
Sexually Explicit Material
Sexually explicit material, such as legal adult pornography and illegal child pornography, are readily available online. Consequently, many young people are learning about sex from the Internet, media, or their peers. According to developmental pediatrician Dr. Sharon Cooper, “The more often a person is exposed to potentially harmful materials, the more normal it seems and the more desensitized the person becomes.”[1] Without the counsel of parents and guardians, children may develop flawed views and opinions of their self-image and sexuality, which could affect their development.
Other Inappropriate Content
In addition to sexual content, children may be exposed to materials which glorify risky and illegal behaviors, making teens think it is “cool” to copy these activities. For example, some sites offer text or video instructions on anything from picking locks to playing alcoholic drinking games to making bombs. Other sites encourage dangerous behaviors such as cutting, anorexia, and suicide and may even have tips about how to hide the behaviors from family and friends.
Children do not have to look hard to find inappropriate content; it is as easy as typing a word into the search bar on Google. Even blocking, filtering, and monitoring software can be overcome by a determined child. A child may also accidently click the wrong link or misspell a Web address and be led to websites with inappropriate content. That is why when it comes to dealing with inappropriate material, adult guidance and supervision are key.
Sexually Explicit Material
Sexually explicit material, such as legal adult pornography and illegal child pornography, are readily available online. Consequently, many young people are learning about sex from the Internet, media, or their peers. According to developmental pediatrician Dr. Sharon Cooper, “The more often a person is exposed to potentially harmful materials, the more normal it seems and the more desensitized the person becomes.”[1] Without the counsel of parents and guardians, children may develop flawed views and opinions of their self-image and sexuality, which could affect their development.
Other Inappropriate Content
In addition to sexual content, children may be exposed to materials which glorify risky and illegal behaviors, making teens think it is “cool” to copy these activities. For example, some sites offer text or video instructions on anything from picking locks to playing alcoholic drinking games to making bombs. Other sites encourage dangerous behaviors such as cutting, anorexia, and suicide and may even have tips about how to hide the behaviors from family and friends.
Children do not have to look hard to find inappropriate content; it is as easy as typing a word into the search bar on Google. Even blocking, filtering, and monitoring software can be overcome by a determined child. A child may also accidently click the wrong link or misspell a Web address and be led to websites with inappropriate content. That is why when it comes to dealing with inappropriate material, adult guidance and supervision are key.
Personal Information
Web 2.0 lets users share information online as easily as they download it. Unfortunately, people of all ages often reveal too much. Children can be made especially vulnerable by sharing personal information, such as home addresses and phone numbers, private thoughts and feelings, and pictures. In order to keep your children from posting information and images they may end up regretting, remind them who may see the information they reveal while online.
Predators
Predators are always looking to collect information about their child victims. This information may be used to identify, connect with, or manipulate children. For example, if a child blogs about being misunderstood, a predator might provide a sympathetic ear in order to create trust and form a relationship. Predators may also try to encourage children into a sexual relationship by talking about sex, so children should avoid talking about provocative subjects with people they do not know.
Cyberbullies
Cyberbullies take their targets’ personal information and use it against them. They may copy and alter photos; share private e-mail or instant message conversations; and taunt their victims with emotional insecurities revealed in blogs.
Scammers
Scammers want to use children’s personal information to manipulate them. Children who post e-mail addresses and phone numbers may be the targets of spam, telemarketers, and e-mail scams.
It is also becoming more common for coaches, college admissions officers, and employers to screen applicants by checking their online profiles and postings. An admissions officer’s decisions may be negatively influenced by a teen’s posts - for example, rude comments about teachers or inappropriate photos.
Predators
Predators are always looking to collect information about their child victims. This information may be used to identify, connect with, or manipulate children. For example, if a child blogs about being misunderstood, a predator might provide a sympathetic ear in order to create trust and form a relationship. Predators may also try to encourage children into a sexual relationship by talking about sex, so children should avoid talking about provocative subjects with people they do not know.
Cyberbullies
Cyberbullies take their targets’ personal information and use it against them. They may copy and alter photos; share private e-mail or instant message conversations; and taunt their victims with emotional insecurities revealed in blogs.
Scammers
Scammers want to use children’s personal information to manipulate them. Children who post e-mail addresses and phone numbers may be the targets of spam, telemarketers, and e-mail scams.
It is also becoming more common for coaches, college admissions officers, and employers to screen applicants by checking their online profiles and postings. An admissions officer’s decisions may be negatively influenced by a teen’s posts - for example, rude comments about teachers or inappropriate photos.