SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
The Risks

Parents’
Guideto
Smart
phone
Safet y
Smartorscary?
Smartphones are essentially little computers,
so you might be a little worried when handing
one over to your child. Take some time to
understand the risks and implement a few
safeguards so that you can help your child
use smartphones safely.

5ways to be smarter
than the Smartphone!

▪▪ Cyberbullying
	 With the constant connectivity of
smartphones, your child may be more
susceptible to cyberbullying or have more
opportunities to cyberbully others.

1.	Be a parent and a resource.
Establish clear guidelines, including time
limits and consequences for inappropriate
behavior, but be open so your child will
come to you with any problems.

▪▪ Geolocation
	 A GPS-enabled smartphone can reveal
your child’s location through online posts
and uploaded photos.

2.	Set up password protection.
This will keep everyone but you and your
child from accessing personal information
stored on the phone.

▪▪ Inappropriate Content
	 With smartphones, your child has mobile
access to content you may consider inappropriate,
such as pornography or violent videos.

3.	Update the operating system.
New versions often contain important
security fixes.

▪▪ Sexting
	 Your child may use the Internet and
social apps to send, receive, or forward
revealing photos.
▪▪ Viruses & Malware
	 Just like a computer, a smartphone is
vulnerable to security attacks if your child
accesses unsecured websites and apps.

About 1 in 4 teens report
owning a smartphone.
Lenhart, Amanda.
Teens, Smartphones & Texting.
Pew Internet & American Life Project,
March 19, 2012.

4.	Approve apps before they are downloaded.
Make sure you understand their capabilities
and approve their content.
5.	Understand location services.
GPS features are useful when using maps,
but you’ll want to disable location-tagging
when your child posts anything online.

For more resources visit NetSmartz.org/TipSheets
Copyright © 2012 National Center for Missing & Exploited Children. All rights reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspace
JanealW
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2
guest0e1ade
 
Safe Internet Usage
Safe Internet UsageSafe Internet Usage
Safe Internet Usage
aazim javed
 
Renfrow Internet Safety
Renfrow Internet SafetyRenfrow Internet Safety
Renfrow Internet Safety
mrenfrow
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
Saskia1234
 
How to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingHow to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When Travelling
Danae Rosville
 

Was ist angesagt? (17)

Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspace
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Safe Internet Usage
Safe Internet UsageSafe Internet Usage
Safe Internet Usage
 
My protection plan
My protection planMy protection plan
My protection plan
 
Security tips
Security tips Security tips
Security tips
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
C Senior Presentation: The Internet
C Senior Presentation: The Internet C Senior Presentation: The Internet
C Senior Presentation: The Internet
 
Renfrow Internet Safety
Renfrow Internet SafetyRenfrow Internet Safety
Renfrow Internet Safety
 
10 rules to be safe on internet
10 rules to be safe on internet10 rules to be safe on internet
10 rules to be safe on internet
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
How to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When TravellingHow to keep Your Gadgets Safe When Travelling
How to keep Your Gadgets Safe When Travelling
 

Ähnlich wie Smartphone safety

Why do parents need apps to control their kids.pdf
Why do parents need apps to control their kids.pdfWhy do parents need apps to control their kids.pdf
Why do parents need apps to control their kids.pdf
onemonitarsoftware
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney
 
Internet security for parents
Internet security for parentsInternet security for parents
Internet security for parents
Shannon Blackerby
 
Internet safety open house 2011
Internet safety open house 2011Internet safety open house 2011
Internet safety open house 2011
Houston ISD
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from Vodaphone
Katherine Lyddon
 

Ähnlich wie Smartphone safety (20)

Smartphone Safety - tips for parents
Smartphone Safety - tips for parentsSmartphone Safety - tips for parents
Smartphone Safety - tips for parents
 
Why do parents need apps to control their kids.pdf
Why do parents need apps to control their kids.pdfWhy do parents need apps to control their kids.pdf
Why do parents need apps to control their kids.pdf
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Rwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptxRwanda - Smartphone Afavantages and Disadvantages.pptx
Rwanda - Smartphone Afavantages and Disadvantages.pptx
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Cyber saftey for parents
Cyber saftey for parentsCyber saftey for parents
Cyber saftey for parents
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Iphone and ipad kids safety
Iphone and ipad kids safetyIphone and ipad kids safety
Iphone and ipad kids safety
 
You Sure That's Secure?
You Sure That's Secure?You Sure That's Secure?
You Sure That's Secure?
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
Internet security for parents
Internet security for parentsInternet security for parents
Internet security for parents
 
Internet safety open house 2011
Internet safety open house 2011Internet safety open house 2011
Internet safety open house 2011
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
 
Safety advice from Vodaphone
Safety advice from VodaphoneSafety advice from Vodaphone
Safety advice from Vodaphone
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 

Mehr von Ernest Staats

Mehr von Ernest Staats (20)

Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
IT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementIT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality Agreement
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Cy safe 2.0_workbook
Cy safe 2.0_workbookCy safe 2.0_workbook
Cy safe 2.0_workbook
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Parenting and the media challenge
Parenting and the media challengeParenting and the media challenge
Parenting and the media challenge
 
How to use technology in ministry & parenting
How to use technology in ministry & parentingHow to use technology in ministry & parenting
How to use technology in ministry & parenting
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only section
 
Data Detox Kit Optimized
Data Detox Kit Optimized Data Detox Kit Optimized
Data Detox Kit Optimized
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
Compter Forensics Intro for Students
Compter Forensics Intro for Students Compter Forensics Intro for Students
Compter Forensics Intro for Students
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Securely Erase your Device
Securely Erase your DeviceSecurely Erase your Device
Securely Erase your Device
 
Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsBorder crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tips
 

Smartphone safety

  • 1. The Risks Parents’ Guideto Smart phone Safet y Smartorscary? Smartphones are essentially little computers, so you might be a little worried when handing one over to your child. Take some time to understand the risks and implement a few safeguards so that you can help your child use smartphones safely. 5ways to be smarter than the Smartphone! ▪▪ Cyberbullying With the constant connectivity of smartphones, your child may be more susceptible to cyberbullying or have more opportunities to cyberbully others. 1. Be a parent and a resource. Establish clear guidelines, including time limits and consequences for inappropriate behavior, but be open so your child will come to you with any problems. ▪▪ Geolocation A GPS-enabled smartphone can reveal your child’s location through online posts and uploaded photos. 2. Set up password protection. This will keep everyone but you and your child from accessing personal information stored on the phone. ▪▪ Inappropriate Content With smartphones, your child has mobile access to content you may consider inappropriate, such as pornography or violent videos. 3. Update the operating system. New versions often contain important security fixes. ▪▪ Sexting Your child may use the Internet and social apps to send, receive, or forward revealing photos. ▪▪ Viruses & Malware Just like a computer, a smartphone is vulnerable to security attacks if your child accesses unsecured websites and apps. About 1 in 4 teens report owning a smartphone. Lenhart, Amanda. Teens, Smartphones & Texting. Pew Internet & American Life Project, March 19, 2012. 4. Approve apps before they are downloaded. Make sure you understand their capabilities and approve their content. 5. Understand location services. GPS features are useful when using maps, but you’ll want to disable location-tagging when your child posts anything online. For more resources visit NetSmartz.org/TipSheets Copyright © 2012 National Center for Missing & Exploited Children. All rights reserved.