Today’s children are online at school, at home, and while out with friends. Adults can help them learn how to avoid situations of exploitation, Internet fraud, and computer viruses. Consider the following tips and use the linked articles to educate yourself about safer online policies and practices for everyone.
I want to
Provide good policies for safer online experiences
The following tips come from local and federal law enforcement groups interested in keeping people safe while browsing online. Because it is challenging to decide what level of privacy adults might grant to children, this list is a suggested way to get started with rules and policies for computer use.
Monitor use of the Internet. Keep the computer in a well-traveled area (family or living room)
Instruct to never give out personal information, such as name, location, pictures, passwords, phone numbers, etc.
Use parental-control software settings
Instruct to write to, or chat with, only people that you know
Encourage communication about awkward or uncomfortable online situations
Instruct to not respond to unexpected or unwanted emails
Almost nothing posted on the Internet is completely private
The following articles have information about avoiding fraud, and instructions about parent-control settings in Microsoft Windows:
Not sure what version of Windows is running on your computer?
Chat with parents, educators, experts, and families
The Internet is an exciting arena of learning, but also a place in which opportunists seek the unwitting and innocent. The blogs on the following link are a great place to look at the top questions people are asking and to chat with industry experts. Connect with like-minded people, a community interested in keeping informed, and helping create a safe environment of exploration for children, students, the elderly, and you.
Avoid viruses: email-attachments and macro security
Email attachments are a primary way for hackers to infect your computer with a virus, steal your data, or use your computer without your knowledge or consent. The articles in the following links can instruct you on how to work with attachments in emails.