T.I.L. INTERNET SAFETY
In the past twenty years, technology has given us many wonderful products and solutions, including the Internet. While the Internet can enhance our lives, if we don’t use it with respect, it can lead to undesired and unsafe circumstances. There are
tools that can help you stay safe online, but this booklet is intended to help you understand the variety of risks associated with technology and the Internet. You’ll also find tips and resources to help you navigate those risks.
TABLE OF CONTENTS
1. INTERNET SLANG 2. WIFI BASICS 3. PASSWORD MANAGEMENT Christine Jones is the former Executive Vice President, General Counsel & Corporate Secretary for Go Daddy Operating Company LLC. Christine made it a priority to establish Go Daddy as a leader in the fight to make the Internet better and safer for users, particularly children. She has testified numerous times before U.S. Congressional Committees in Washington, D.C. about various issues related to the Internet. She also helped drive federal
Internet-related legislation, including laws to keep the Web safe from child predators and rogue online pharmacies. For example, she helped push through bills such as the Ryan Haight Online Pharmacy Consumer Protection Act, the Protect Our Children Act, and the Keeping the Internet Devoid of Sexual Predators Act. These bills were signed into law by President Bush in October, 2008 and have been used by law enforcement and others to shut down illegal online drug sellers and to prosecute online child predators.
4. TAKE CONTROL OF THE DATA YOU SHARE ONLINE 5. BAD CONTENT 6. KEEPING YOUR KIDS SAFE ONLINE
1
INTERNET SLANG
DM/PM
Direct message / private message. Used on social media to tell someone to message them privately.
HASHTAG
(On social media sites such as Twitter and Facebook) a word or phrase preceded by a hash or pound sign (#) and used to identify and link messages on a specific topic.
ICYMI
In case you missed it
IMO
In my opinion
IRL
In real life
LULZ
Fun, laughter, or amusement, especially that derived at another’s expense.
NSFW
Not safe for work
PAW
Parents are watching
SELFIE
a photograph that one has taken of oneself, typically a photo taken with a smartphone or webcam and shared via social media.
TIL
Today I learned
TL;DR
Too long; didn’t read
TROLL
Someone online who purposefully tries to disrupt or hijack the comment sections of an article or video by saying inflammatory or off-subject things.
YOLO
You only live once
Many of us use wireless networking (WiFi) to connect to the Internet. WiFi has many advantages - it’s easy to set up, inexpensive, and makes connecting to the Internet fast and efficient. You can have WiFi at home and in public. However, there are some risks associated with using WiFi. Unsecured networks can allow hackers
2
WIFI BASICS
to position themselves between you and the connection point (also known as a hotspot). When you send information to the hotspot, you’re actually sending your information to the hacker. They can also use unsecured WiFi to plant malware on your computer.
YOU CAN PREVENT THESE RISKS BY TAKING CERTAIN STEPS TO KEEP YOUR INFORMATION SAFE WHEN USING A HOME OR PUBLIC WIRELESS NETWORK:
Change the default password to connect to the WiFi.
Use at least WPA2 for encryption.
Provide a guest network for visitors, with a password that is separate from your normal WiFi name (if you provide guest access at all).
Don’t make the WiFi name your family name, pick something random.
A STRONG PASSWORD IS YOUR FIRST LINE OF DEFENSE AGAINST IDENTITY THEFT. FOLLOW THESE SIMPLE GUIDELINES TO ENSURE THE SECURITY OF YOUR PASSWORDS:
3
PASSWORD MANAGEMENT
Don’t use the same password on different websites.
Longer is better (9+ characters).
Use a password manager to keep track of all your passwords. (LastPass, 1Password, etc are great).
Don’t use dictionary words.
Use 2 factor authentication where possible (For example: use both your phone AND password).
4
TAKE CONTROL OF THE DATA YOU SHARE ONLINE
A. BE AWARE OF THE SOURCES OF YOUR ONLINE DATA
It is a common (almost universal) business practice for Internet providers and companies to store certain amounts and types of information about you. This can be used to help provide you with a smoother, faster, or more customized and relevant online experience.
mediums for staying in touch with people, groups, and companies you want to follow. It can be an important tool for sharing important information with family and friends. Unfortunately, it can be hard to remove information you do not want to share.
Social media sites, such as Facebook, Twitter, and Instagram, are important
+
Adjust privacy settings to limit who can view your content on all social media sites to keep information and photos away from strangers. You can do this under settings.
+
In addition, certain web browsers now have options or extra features (usually free) that tell websites not to put information on your computer that could be used to track you, such as cookies or certain ads.
B. CUT OFF DATA BROKERS
Online data brokers compile detailed data profiles about you from as many sources as they can (mainly public records databases and social media accounts), and sell these profiles to anyone who will pay.
To obtain a list of data brokers and a link to their privacy policies or opt-out pages, visit the Privacy Rights Clearinghouse. Resources: Privacy Rights Clearinghouse: https://www.privacyrights.org/onlineinformation-brokers-list
PHISHING IS THE ACTIVITY OF DEFRAUDING AN ONLINE ACCOUNT HOLDER OF THEIR PERSONAL INFORMATION BY POSING AS A LEGITIMATE COMPANY. TO AVOID BEING DEFRAUDED THROUGH PHISHING ATTEMPTS:
5
BAD CONTENT
Beware of links and attachments in emails.
Log into your bank website directly, not via a link.
Don’t click links in emails you are not expecting.
Verify the website and security before entering any account details.
Use your favorite search engine or other online resource to validate a new website.
Report any phishing-related content to http://www.antiphishing.org or https://www.us-cert.gov/reportphishing.
MALWARE IS MALICIOUS SOFTWARE INTENDED TO HARM OR INFECT YOUR COMPUTER AND OR NETWORK. TO AVOID MALWARE:
Only use secured networks (no open WiFi).
Always use anti-malware software. Free anti-virus software such as Microsoft Security Essentials and Sophos AV for OSX will not stop all the bad things, but will serve as a baseline level of protection from malware.
CSE (CHILD SEXUAL EXPLOITATION) IS A TYPE OF SEXUAL ABUSE IN WHICH CHILDREN ARE SEXUALLY EXPLOITED FOR MONEY, POWER OR STATUS. IF YOU ENCOUNTER ANY ACTIVITY, IMAGES, OR OTHER CONTENT ONLINE THAT MIGHT BE CSE:
Keep your system and software updated. Report discovered content to your local law enforcement agency.
Report malware content to http://www.anti-malvertising.com/ report-malware or https://www.uscert.gov/report.
If the content is discovered on a service you trust, report it to their abuse services.
If the content is discovered on a questionable service report it to the Cyber Tipline, at https://report. cybertip.org.
A. COMMUNICATION IS KEY
6
KEEPING YOUR KIDS SAFE ONLINE
Experts agree that the most effective way to keep your kids safe online is a combination of approaches that all center on open and honest communication with them.
+
Talk early and often.
+
Start early – begin as soon as, or even before, your kids begin to access the Internet.
Talk to them about issues you have had with being exposed to unsafe or unwanted content.
Initiate conversations - Find ways to bring up the subject (i.e., commercials with someone using a cell phone or news stories).
+
Create an honest, open environment. Listen and take into account their feelings. Help them understand that they will not be punished for coming to you with concerns.
Be upfront about your values and how they apply in an online context.
Help them identify other trusted adults they can talk to if they are uncomfortable talking to you, or you are not available.
+
Help them see the good things that the Internet can help them with.
+
Talk to them about their “digital identity”. Things that get posted online tend to stay around for a very long time, and can pop up later in life. Think about what you post and how it can affect them later in life. You can’t necessarily trust that the person on the other side of an online conversation is who they say they are.
+
Make sure they know that it’s okay to say no… In person and especially online. If they know you will support and protect them, and you have talked about appropriate boundaries in their communications with others, they will be much more likely to stop a potential problem before it starts.
+
Use available resources: NCMEC publishes resources and provides age-appropriate workshops called NetSmartz and KidSmartz. Get informed at http://www.missingkids. org/Safety. Discussion guides are also available at http:// www.missingkids.org/ behereforkids.
B. APPS AND SOCIAL MEDIA 101 Engaging your child in conversation about the latest trending app will show them that you are curious about and aware of what is going on in “their world”. In fact,
download an app yourself and have your child teach you about how they use it - you might just find a new way to connect with one another!
Beyond a search of the app stores, other resources exist to learn more about the apps your child is using:
+ +
Gaggle.net > Resources: Updated list of social networks and apps with the app/website’s main function. Your favorite search engine (Google.com, Yahoo.com, etc.) plus the terms “Top apps” or “trending apps”.
+
Netsmartz411.org: “Parents’ and guardian’s premier online resources for answering questions about Internet safety, computers, and the Web”. Includes a forum of topics about social media sites and online apps, as well as the ability to ask an expert. Also in Spanish.
C. CREATE GROUND RULES FOR USE OF APPS & SOCIAL MEDIA
D. CYBERBULLYING
This will be dependent on your family’s rules, but some good rules of thumb are:
To prevent cyberbullying:
+ + + +
Do not share home address or phone number.
+
Do not share your location. Do not share inappropriate pictures.
+
Only accept friend requests, or communications from people you know.
Realize that sharing too much information across a variety of social media can, together, provide more details about you then you really wanted people to know. Make them aware of the permanence of the online world and the impact inappropriate messages or images could have if a future college administrator or employer were to stumble upon them. What goes online stays online.
ONLINE SOCIAL MEDIA USAGE
60% MOBILE 40% DESKTOP
+ + +
Tell your kids you may review their online communications, and do so if there is cause for concern. Install parental control filtering software or monitoring programs if necessary. Have a sense of what your kids do online and in texts. Learn about and use the sites and apps that they use. Use the same devices they do. “Friend” and “follow” your kids on any social media that they use.
+ + +
Require kids to give you their passwords, to use in cases of emergency or if you have cause for concern. Encourage kids to tell you immediately if they, or someone they know, is being cyberbullied. Use available resources: www.stopbullying.gov www.cyberbullying.org www.stopcyberbullying.org www.netsmartz.org
RESOURCES
E. KNOW YOUR CHILD’S ONLINE HABITS 1. WIFI BASICS
+ + +
Be aware of the kinds of sites they are frequenting and the people they are associating with. You get to know their friends from school and their after-school activities -- their online friends shouldn’t be any different.
Check what they are posting, and who they are following.
+
Know the social networks your child is using, and know how to use them yourself.
http://www.labnol.org/internet/secure-your-wireless-wifi-network/10549/ http://www.wikihow.com/Secure-Your-Wireless-Home-Network http://www.whoisonmywifi.com/How_To_Make_A_Wireless_Network_Secure.pdf
2. PASSWORD MANAGEMENT
+
Knowing how a certain site or app functions, and its capabilities, will help you better understand what your child is using it for, and how they could use it.
Stay current with online trends and memes, it can help to understand certain posts or images that may be somewhat perplexing at first glance.
http://lifehacker.com/5529133/five-best-password-managers http://krebsonsecurity.com/password-dos-and-donts/
3. TAKE CONTROL OF THE DATA YOU SHARE ONLINE Free online tutorials: https://techboomers.com/p/internet-privacy https://techboomers.com/c/social-websites https://techboomers.com/t/changing-facebook-privacy-settings https://techboomers.com/t/twitter-privacy https://techboomers.com/t/instagram-privacy https://techboomers.com/t/snapchat-safety-and-privacy Website tracker blocker: https://www.ghostery.com/our-solutions/ghostery-browserextension/ Adblocker: https://adblockplus.org/
5C. CREATE GROUND RULES FOR USE OF APPS AND SOCIAL MEDIA http://www.netsmartz.org/Parents https://www.fosi.org/ http://www.webmd.com/parenting/features/social-media-and-tweens-teens?page=3 http://knowyourmeme.com/memes https://www.fosi.org/good-digital-parenting/what-parents-dont-get-about-snapchat/
F. PARENTAL CONTROLS Parental controls are features included on electronic devices which constrain the use of the devices, such as placing timelimits on usage or forbidding certain types
5F. PARENTAL CONTROLS
of usage, enforcing the use of certain software, and device monitoring to track location and activity.
https://support.apple.com/kb/PH18571?locale=en_US - OSX http://windows.microsoft.com/en-us/windows/set-parental-controls#1TC=windows-7 Windows https://support.apple.com/en-us/HT201304 - iOS http://www.pcadvisor.co.uk/how-to/google-android/parental-control-on-androidimage-3461359/ - Android