REFUSE requests for personal information
RESPOND assertively if you are ever in an uncomfortable situation online. Exit the program, log off turn off the computer, tell a trusted adult, or call the police.
REPORT to a trusted adult any suspicious or dangerous contact that makes you feel uncomfortable.
Most studies agree that over 77 million people are on the internet within the day. Almost as many students as there are things to do online. The internet has many possibilities, and it is easy to get lost. You must protect yourself from the pitfalls lurking online. To help you feel safe while using the internet please follow a few of these tips listed below:
Children today will be the first generation to grow up with the internet. Technology changes the advantages our children have, it doesn’t change the way you parent. The rules on the internet change daily, but ultimately you are the one still making them. If you are Internet illiterate or computer savvy, the tips listed will help protect your children and are easy to understand, follow, and implement:
A new danger for our children is spreading quickly and it grows with just the click of the mouse. Sites like myspace.com, facebook.com, etc are cyber sites that many children today keep a secret from their parents. Children do not take the time to realize that everyone including sexual predators that go on the Internet today will see the pictures and personal information that they post. Sergeant Brian Donnelly of the Greenville County Sheriff’s Office has seen the dangers that cyber sites provide to your children. Mr. Donnelly says “To keep our children safe, we must discourage them from posting any personal information. Simply telling our children to not post personal information and to refrain from talking to strangers is not enough. Parents should teach their child that relationships with adults are both illegal and will lead to failure. Many parents may feel as if though looking on their child’s cyber site is violating their personal space, but this is not the case as parents we must view this material to ensure that our kids are staying safe at all times.
Social Networking sites are easy targets for predators. If a predator has access to the internet they can and will find your child’s profile and messenger information with the simple click of a button. If your child wants to have any cyber sites it is important that you tell them you must have their password and username at all times. We can tell our children not to do certain things on the internet until we are blue in the face, but if their friends think that it is cool they will probably try to do it behind your back. It is important that parents monitor their child’s internet activity daily.
In order to keep your child safe online follow these simple six steps listed below:
Internet Safety Programs and Monitoring Software are two programs that will help keep your child safe from Predators. We would like to take the time to recommend a few of these programs.
Internet Safety Programs
Monitoring Software
Parents Guide to Cyberbullies
A cyberbully is someone who uses technology to harass, embarrass, intimidate, or stalk someone else. The methods used can include emails, instant messaging, text messages sent via cell phones, digital photos and all other means of electronic communications.
The methods a cyberbully could use to harass the victim include the following:
If your child exhibits the following, it may be a warning sign:
Retaliation may only escalate the problem. If you feel the need to respond to the cyberbully, help your child develop an appropriate response, asking the cyberbully to stop the behavior. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If the harassment continues, then you can change your child’s email address, Internet account, and username(s).
If none of these steps are successful, you may need to take additional action as follows:
REMEMBER IT IS OUR DUTY AS PARENTS AND EDUCATORS TO MONITOR OUR CHILDRENS ACTIVITIES ON THE COMPUTER. WE DON’T WANT OUR CHILDREN TO BECOME AN INNOCENT VICTIM OF PREDATORS.