3. What are the risks?
Kids may:
Reveal personal information
Encounter inappropriate material
Download malicious software
Others may expose kids’ information
4. Internet safety
for young kids:
1. Pay attention to kids’ activities online
2. Set clear rules
3. Put technology to work
3 steps
6. Pay attention to
kids’ activities online
Join the fun
Evaluate websites and devices beforehand
Locate consoles and computers centrally
Watch for changes in behavior
8. Set clear rules
Keep personal information private
Respect others
Use computers safely
9. Set clear rules:
Keep personal info private
Ask before sharing personal info
Choose safe online names and addresses
Create strong passwords
Keep passwords secret
Slide 5: Step 1 Pay attention to kids’ activities onlineTALKING POINTSThe first step may be the most familiar to you—paying attention to what kids are doing on the web. [click]
Slide 6: Step 1 Pay attention to kids’ activities onlineTALKING POINTSJoin. Just as you’d start in the pool with the littlest ones, regularly sit with young ones while they play online. Or—even more fun--play with them! Let them show you what they’re doing and who they’re interacting with. [click]Evaluate. Visit the websites your children want to visit and, if you can, test the games they want to play. Evaluate the devices children want to use before they use them—preferably before you even buy them.Experiment to make sure you’re comfortable with their features. Restrict any functionality your child isn’t yet ready for. Some examples of features to explore:GPS on mobile phones—this is the phone’s ability to pinpoint where you are at any given time and mark (or “tag”) the location of photos.Internet access on mobile phones.Computer webcams for use with video calls like Skype.The ability to send unfiltered images or download applications (apps). [click]Locate. Put Internet-connected game consoles and computers—especially those with webcams—in central family spaces, and explain why you’re doing this. Make video calls there, too. This helps you watch over kids more comfortably. [click]Watch. As your little ones begin to navigate the web on their own, keep on the lookout for changes in behavior that may be signs of cyberbullying or other issues—for example, if children show an uncharacteristic reluctance to go online or to go to school, unusual secretiveness, or they seem to be spending too much time online. [click]
Slide 7: Step 2 Set clear rulesTALKING POINTSThe second step is setting clear rules. Every young swimmer learns the rules for safe swimming: Never swim alone. Don’t go in the deep end until you’re ready. Don’t push others into the water. It’s the same for learning to use the Internet.Studies show a positive impact on kids when parents clearly define the rules about computer, game, and mobile phone use. [click]
Slide 8: Step 2 Set clear rulesTALKING POINTSAs children begin to go online, these three rules offer supportive guidance with room to grow. Set the stage by discussing with kids …the kinds of sites that are off limits,what information shouldn’t be shared, andthe boundaries for communicating respectfully.Explain that the rules are to protect, not to control, them.Let’s take a closer look at each rule. [click]
Slide 9: Step 2 Set clear rules: Keep personal info privateTALKING POINTSPersonal info. Explain to kids what “personal information” means and teach them to keep it private. Of course, if you’re a parent, you will be the ultimate judge of how to explain this because it will depend on the age and maturity level of your child.Here are some examples of personal information: passwords, age, phone numbers, full name, school, favorite playground, interests, photos (particularly photos that give away where the child lives or goes to school), home and email addresses, even feelings. Stress the value of personal information to those who may want to exploit it—bullies, predators, and identity thieves. [click]Train kids to ask you before sharing personal information about themselves, friends, or family in texts, email, or on social sites. [click]Safe names. Help kids create email addresses, screen names, and gamer tags that don’t reveal anything personal, aren’t suggestive, and don’t make them easy to locate. For example, avoid names like Bobby12, FoxyFrancesca, or JoeyHealyDubuque. Instead, use names like MyDogRover or SoccerFan.Also make sure that the email or instant messages they send don’t show their real names. In the brochure I’ll pass out at the end, there’s a link to step-by-step instructions that explain how to do this. (aka.ms/hide-name) [click]Strong passwords. Help children create strong passwords. Strong passwords are long phrases or sentences that mix capital and lowercase letters, numbers, and symbols. Again, the brochure will have a link to a page with lots more detail. (aka.ms/passwords-create.) [click]Keep them secret. It’s also important to emphasize that kids should not share passwords with anyone but parents or a trusted adult—not even best friends. For example, kids may be impersonated on their own phones because they gave the password to a friend. [click]
Slide 10: Step 2 Set clear rules: Respect othersTALKING POINTSJust as you may need to remind kids not to splash or jump on others in the pool, it’s a good idea to remind them to treat others online as they would like to be treated. [click]Be clear with children that it is never okay to post mean comments, send unkind instant or text messages, or bully others online. Make sure to explain what online bullying is (known as cyberbullying): using the Internet for repeated unwanted or cruel behavior against someone. (And because it’s online, cyberbullying can be virtually invisible to parents and other adults.) [click]You also want kids to be honest online. Of course they know that stealing is wrong. Explain that online, that includes stealing from other players in games, and that downloading music, games, and other copyrighted material without permission or paying for it is stealing, too, so it’s illegal. [click]
Slide 11: Step 2 Set clear rules: Use the computer safelyTALKING POINTSJust as it takes getting used to the water when you’re learning to swim, there’s a lot for kids to get comfortable with when they go online. [click]A good overall rule of thumb to tell kids is: be cautious. Not everything they see online is true, attachments may not be what they seem, nor is everyone who they say they are. Here are three things children can do to put that advice into practice: [click] No matter how splashy or enticing, kids shouldn’t open attachments or click links with free offers in ads, contests, games, or email or IM (even from friends). This might release malicious software. [click] Kids should be choosy about accepting new friends on phones and social sites or in games. Make sure you both know everyone on their contact lists. [click]Teach little ones to say “NO” to and stop contact with anyone who wants to have a secret friendship. They also should not respond to bullies. Ask your children to tell you if this happens. [click]
Slide 12: Step 3 Put technology to workTALKING POINTSSwimmers use technology to make swimming safer—flotation devices for beginners, goggles to protect the eyes, ropes and buoys to indicate the depth of the water. Of course, online you can use technology, too. [click]
Slide 13: Step 3 Put technology to workTALKING POINTSOur third step explains four ways you can use technology to bolster kids’ safety online. [click]You can use family safety tools (built into many programs) to help you block harmful content and sharing of personal information, manage the sites children visit, monitor their contacts and time online, and watch for behavior like cyberbullying. Microsoft, for example, offers free safety features in many of its programs including Windows® 7, Windows Vista®, and Xbox®.However, if you use these tools, tell your kids. Explain what you are watching for and why—and that you are doing it to help keep them safe while they learn. [click]Mobile phones:Lock the phone with a PIN to keep anyone from using it to call, text, or get personal info. Just as with passwords, teach your child never to share the PIN. Use the GPS in mobile phones cautiously. If you use a family location service to monitor your kids’ whereabouts, make sure others can’t locate them. Otherwise, consider disabling this feature on your child’s phone. At the very least, turn it off for the phone’s camera. [click]Boost your computer’s defenses. These are the best all ‘round things you can do to help secure your computer against Internet threats. Start by keeping all software (including your web browser) current with automatic updating. Install legitimate antivirus and antispyware software from source that you trust, like Microsoft Security Essentials. Never turn off your firewall. (Sometimes games suggest doing this.) A firewall puts a protective barrier between your PC and the Internet, and turning it off even for a minute increases risk. (Microsoft can help you do these three things. There will be a link to that information in the brochure.)Protect your wireless router with a password. Find out how from the company that provides your router.Use flash drives cautiously to minimize the chance that you’ll infect your computer. [click]Be the administrator of home computers. Learn to create different user accounts so you can manage your child’s settings: aka.ms/childsafety. (You’ll have to scroll down on the page to find these instructions under “Create different user accounts.”) [click][Note to speaker: Consider distributing the brochure at this point. Point out the links in this section, as well as the one for creating strong passwords under “Teach kids to keep personal information private.”]
Slides 14: What to do if there is a problemTALKING POINTSMost of the time spent on the Internet is safe and fun. But sometimes children may run into problems. [click]
Slides 15: What to do if there is a problemTALKING POINTSThe most fundamental advice is to teach children to pay attention to their instincts and to trust those instincts—just as young swimmers pay attention if they feel short of breath while under water. If something feels uncomfortable or alarms them, that’s a good warning sign. Let kids know they can come to you and that you will help solve the problem. [click] Agree that you won’t take away their phone or curtail privileges because of someone else’s actions. [click] Immediately report:Physical threats, persistent cyberbullying, or any form of exploitation to the police and the web service or phone carrier. (Also consider blocking the person.) Inappropriate behavior to the school (if it involves another student) and to the phone carrier or web service. For example, in Microsoft services or software, look for the Report Abuse link.Also, note that in the United States, it is illegal to collect personal information on anyone under age 13 without express parental consent. If you see this happening, report it tothe site immediately and to the FTC at www.ftccomplaintassistant.gov. Or you can call (877) 382-4357 (toll free) to submit your complaint to a live operator.Let’s recap the three things you can do to help protect kids online. [click]
Slide 16: Pay attention to kids onlineTALKING POINTSRegularly sit with young children while they play online (or play with them). Let them show you what they’re doing and who they’re interacting with. Make sure to evaluate the devices kids want to use, the websites they want to visit, and the games they want to play. [click]
Slide 17: Set clear rulesTALKING POINTSThere are three basic rules you can teach children to use the Internet more safely: keep personal information private, respect others, and use computers safely. [click]
Slide 18: Put technology to workTALKING POINTSYour first line of defense is to strengthen your computer’s defenses against Internet threats. You can also help protect kids on computers by using family safety tools and keep them on mobile phones with PINs and the cautious use of GPS. [click]
Slide 19: More helpful infoTALKING POINTS[Note to speaker: If you haven’t done so already, pass out the brochure. To easily find the links in the brochure, simply scan for the bold text.]To learn how to do some of the things I’ve talked about today—for example, build strong passwords or boost your computer’s defenses—let’s review the links on the inside. On the back, you’ll find links to more helpful information. Get the latest information on defending your computer, safeguarding your information, and protecting your family online with regular visits to Microsoft’s Safety & Security Center. Any comments or questions? [click][Note to speaker: Round out your presentation with a discussion among audience members so they can share their experiences. Or try a question-and-answer session if you feel comfortable answering questions on online safety. If you don’t feel comfortable, but questions come up, solicit answers from the audience.]
Slide 20: Microsoft slideTALKING POINTSThanks for your time and for your questions and comments.