Does Your Family have a Culture of Security?

There are numerous sources on-line for parents who want to help their children to make the correct decisions while participating in social networks. A couple are:

The FTC’s OnGuardOnLine site covers what you need to know, where to go for more information, and issues to raise with kids about living their lives online. They cover talking with kids to protecting kids privacy.

From the FTC’s ‘Net Cetera’ guide:

Online methods of socializing and communicating can be fulfilling, and yet, they come with certain risks:

Inappropriate conduct

The online world can feel anonymous. Kids sometimes forget that they are still accountable for their actions.

Inappropriate contact

Some people online have bad intentions, including bullies, predators, hackers, and scammers.

Inappropriate content

You may be concerned that your kids could find pornography, violence, or hate speech online. You can reduce these risks by talking to your kids about how they communicate—online and off— and encouraging them to engage in conduct they can be proud of.

Advice for Parents of Kids at Different Ages

Young Kids

When very young children start using a computer, they should be supervised closely by a parent or caregiver. Parents may wish to choose the websites their kids visit early on—and not let them leave those sites on their own. If little kids aren’t supervised online, they may stumble onto sites that could scare or confuse them.

Tweens

During the tween years—ages 8 to 12—children start exploring more on their own, but that doesn’t mean you don’t want—or need—to be close at hand. It’s important to be with them—or at least nearby—when they’re online. For this age group, consider keeping the computer in an area where the child has access to you or another adult. That way, they can be “independent,” but not alone.

Teens

Young tweens are likely to reflect the values of their parents. By the time they age into their teen years, they’re forming their own values and beginning to take on the values of their peers. At the same time, older teens are maturing physically, emotionally, and intellectually, and many are eager to experience more independence from their parents. Teens have more internet access through cell phones, mobile devices, or friends’ computers, as well as more time to themselves. So it isn’t realistic to try to always be in the same room as your teens when they’re online. They need to know that you and other family members can walk in and out of the room any time, and can ask them about what they’re doing online.

Another great source is Marlaine Cover’s Blog ‘Life Skills Report Card‘. She covers Personal Care, Organizational Skills, Respect for Self and Others, Communication, and Social Skills. Her ‘Web-site.

Only you, the parent, can create a Family Culture of Security. Please start today.

Advertisements

About Bruce Demarest

Bruce Demarest is a Identity Theft Protection Specialist. He has designed and taught classes to educate individuals and businesses in identity theft risk management. The individuals have learned how to continuously monitor their financial identities from credit fraud, plus how to monitor their personal identifying information for unauthorized use. His business clients have become compliant with the federal & state privacy laws. He has conducted information security audits to identify their potential problems and has designed security policies, programs, and practices to address those problem areas.
This entry was posted in Child Identity Theft, Identity Theft Protection, Security Culture and tagged , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s