SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
UtahWomens Conference
Keeping kids Safe Online
Amy Iverson Natalie Wardel
aiverson@ksl.com nwardel@ksl.com
@amy_iverson @nataliewardel
The problems with kids and
access to tech
 Cyber Bullying
 Sexting
 Access to pornography
 Identity theft via messaging scams, or your
teen giving their information away
 Relationships forming with people with
malicious intent
 And more.
-Summit County Sheriff’s Department
1 in 3 have viewed some kind of pornography in the last week
Utah High School Student Statistics
1 in 4 have participated in sexting in the last week
However.
This isn’t new.
We just need to be ready.
There isn’t a need to fear, there
is a need to be aware.
Remember when we played MASH on paper. Now teens
play it on their phones. Same game. Different method.
The do’s and don’ts of
parenting and social media
Do:
Communicate and know what social networks
your child is using
Have access to the accounts
Treat new friends and followers like you would
guests in your home.
Train your children on social etiquette so they
will be socially savvy when they leave the home
Don’t
Rely on your children to tell you everything
Comment on every picture, post, etc.
Stalk your children endlessly without
communicating with them.
73%
27%
Teens: Do you have at least one social networking profile?
Yes!
Nope
12-17 year olds
- Pew Research 2010
The apps your teens are using
right now. And what to do.
Check out
who they
Friend
Facebook
Set their
Account to
private
Twitter
Don’t let a
false sense of
security fool
you
Snapchat
Hot center
for cyber
bullying.
Monitor.
Ask.Fm
Account set
to private;
turn off
location
check-in
Instagram
What to tell your kids
Do not give
out personal
information
Tell someone if you come
across information that makes
you uncomfortable then block
Do not use hashtags
or check into locations
that identifies your
school or home
address.
Never share
passwords or
click on
pop-ups
Everything
you post
online lives
forever
Prepare your children now so
they are good citizens of
the social world.

Weitere ähnliche Inhalte

Was ist angesagt?

Digital valentinesteensonlinedating
Digital valentinesteensonlinedatingDigital valentinesteensonlinedating
Digital valentinesteensonlinedatingTeenSafe
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Digital Citizens: It Takes a Village
Digital Citizens: It Takes a VillageDigital Citizens: It Takes a Village
Digital Citizens: It Takes a VillageMartin Cisneros
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetyccapozzoli
 
Cyberbulling - TIC
Cyberbulling - TICCyberbulling - TIC
Cyberbulling - TICsanticomolli
 
Sexting powerpoint
Sexting powerpoint Sexting powerpoint
Sexting powerpoint dee12
 
What Is Cyberstalking / Cyberbullying What Does the Law Say About It?
What Is Cyberstalking / Cyberbullying What Does the Law Say About It?What Is Cyberstalking / Cyberbullying What Does the Law Say About It?
What Is Cyberstalking / Cyberbullying What Does the Law Say About It?jhon Smith
 
Cyber-Bullying
Cyber-BullyingCyber-Bullying
Cyber-Bullyingk27fits
 
Cyber Bullying & Sexting
Cyber Bullying & SextingCyber Bullying & Sexting
Cyber Bullying & SextingKBryant
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measureskanika sharma
 
Cyberbullying: The Stats
Cyberbullying: The StatsCyberbullying: The Stats
Cyberbullying: The StatsEmily Thompson
 
Young marketers 5+1 + Lê Hồng Phong
Young marketers 5+1 + Lê Hồng PhongYoung marketers 5+1 + Lê Hồng Phong
Young marketers 5+1 + Lê Hồng PhongHong Phong Le
 

Was ist angesagt? (18)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Digital valentinesteensonlinedating
Digital valentinesteensonlinedatingDigital valentinesteensonlinedating
Digital valentinesteensonlinedating
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Digital Citizens: It Takes a Village
Digital Citizens: It Takes a VillageDigital Citizens: It Takes a Village
Digital Citizens: It Takes a Village
 
Kids and the Screen World
Kids and the Screen World Kids and the Screen World
Kids and the Screen World
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Sexting
SextingSexting
Sexting
 
Cyberbulling - TIC
Cyberbulling - TICCyberbulling - TIC
Cyberbulling - TIC
 
Sexting powerpoint
Sexting powerpoint Sexting powerpoint
Sexting powerpoint
 
Nico santi y tomy
Nico santi y tomyNico santi y tomy
Nico santi y tomy
 
What Is Cyberstalking / Cyberbullying What Does the Law Say About It?
What Is Cyberstalking / Cyberbullying What Does the Law Say About It?What Is Cyberstalking / Cyberbullying What Does the Law Say About It?
What Is Cyberstalking / Cyberbullying What Does the Law Say About It?
 
Cyber-Bullying
Cyber-BullyingCyber-Bullying
Cyber-Bullying
 
Cyber Bullying & Sexting
Cyber Bullying & SextingCyber Bullying & Sexting
Cyber Bullying & Sexting
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
Cyberbullying: The Stats
Cyberbullying: The StatsCyberbullying: The Stats
Cyberbullying: The Stats
 
Young marketers 5+1 + Lê Hồng Phong
Young marketers 5+1 + Lê Hồng PhongYoung marketers 5+1 + Lê Hồng Phong
Young marketers 5+1 + Lê Hồng Phong
 

Andere mochten auch

Social Media 101, tailored to Thomas Jefferson School of Law
Social Media 101, tailored to Thomas Jefferson School of LawSocial Media 101, tailored to Thomas Jefferson School of Law
Social Media 101, tailored to Thomas Jefferson School of LawNatalie Andrews
 
A brief history of math
A brief history of mathA brief history of math
A brief history of mathFadli Dly
 
Topic1 equations student
Topic1 equations studentTopic1 equations student
Topic1 equations studentmramithnair
 
Topic2 basic statistics_student
Topic2 basic statistics_studentTopic2 basic statistics_student
Topic2 basic statistics_studentmramithnair
 
Condensed resiliency slides and script
Condensed resiliency slides and scriptCondensed resiliency slides and script
Condensed resiliency slides and scripterickson208
 
Social Media for Public Information Officers
Social Media for Public Information OfficersSocial Media for Public Information Officers
Social Media for Public Information OfficersNatalie Andrews
 

Andere mochten auch (9)

Charts
ChartsCharts
Charts
 
Social Media 101, tailored to Thomas Jefferson School of Law
Social Media 101, tailored to Thomas Jefferson School of LawSocial Media 101, tailored to Thomas Jefferson School of Law
Social Media 101, tailored to Thomas Jefferson School of Law
 
A brief history of math
A brief history of mathA brief history of math
A brief history of math
 
Status of the field
Status of the fieldStatus of the field
Status of the field
 
Comp intro
Comp introComp intro
Comp intro
 
Topic1 equations student
Topic1 equations studentTopic1 equations student
Topic1 equations student
 
Topic2 basic statistics_student
Topic2 basic statistics_studentTopic2 basic statistics_student
Topic2 basic statistics_student
 
Condensed resiliency slides and script
Condensed resiliency slides and scriptCondensed resiliency slides and script
Condensed resiliency slides and script
 
Social Media for Public Information Officers
Social Media for Public Information OfficersSocial Media for Public Information Officers
Social Media for Public Information Officers
 

Ähnlich wie Keep Kids Safe Online: Tips for Parenting in a Digital Age

Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and CyberbullyingRaleigh ISSA
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting NewRandy Rodgers
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 

Ähnlich wie Keep Kids Safe Online: Tips for Parenting in a Digital Age (20)

Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
102009
102009102009
102009
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying
 
Presentation1
Presentation1Presentation1
Presentation1
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Bullying in the digital age
Bullying in the digital ageBullying in the digital age
Bullying in the digital age
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting New
 
022010
022010022010
022010
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Keep Kids Safe Online: Tips for Parenting in a Digital Age

  • 1. UtahWomens Conference Keeping kids Safe Online Amy Iverson Natalie Wardel aiverson@ksl.com nwardel@ksl.com @amy_iverson @nataliewardel
  • 2. The problems with kids and access to tech  Cyber Bullying  Sexting  Access to pornography  Identity theft via messaging scams, or your teen giving their information away  Relationships forming with people with malicious intent  And more.
  • 3. -Summit County Sheriff’s Department 1 in 3 have viewed some kind of pornography in the last week Utah High School Student Statistics 1 in 4 have participated in sexting in the last week
  • 4. However. This isn’t new. We just need to be ready.
  • 5. There isn’t a need to fear, there is a need to be aware. Remember when we played MASH on paper. Now teens play it on their phones. Same game. Different method.
  • 6. The do’s and don’ts of parenting and social media Do: Communicate and know what social networks your child is using Have access to the accounts Treat new friends and followers like you would guests in your home. Train your children on social etiquette so they will be socially savvy when they leave the home Don’t Rely on your children to tell you everything Comment on every picture, post, etc. Stalk your children endlessly without communicating with them.
  • 7. 73% 27% Teens: Do you have at least one social networking profile? Yes! Nope 12-17 year olds - Pew Research 2010
  • 8. The apps your teens are using right now. And what to do. Check out who they Friend Facebook Set their Account to private Twitter Don’t let a false sense of security fool you Snapchat Hot center for cyber bullying. Monitor. Ask.Fm Account set to private; turn off location check-in Instagram
  • 9. What to tell your kids Do not give out personal information Tell someone if you come across information that makes you uncomfortable then block Do not use hashtags or check into locations that identifies your school or home address. Never share passwords or click on pop-ups Everything you post online lives forever
  • 10. Prepare your children now so they are good citizens of the social world.