Cyber Smart Parents & Educators


MOULDING A CYBER SMART GENERATION

Dear Parents & Teachers

The online population is a mixed bag of the good, bad and ugly, hence it becomes equally important to monitor and supervise the activities of your ward online. Children by virtue of their nature enjoy exploring and experimenting, with the curiosity and ignorance come greater risks and need for supervision. They are easily vulnerable to online perpetuators and can even lead to hampering your personal data and pc. The better educated you are about online risks, the greater you can contribute towards the online safety of your ward. Hence it is required that parents and teachers equip themselves to mould a Cyber Smart generation. .

1. Awareness
The Internet is highly dynamic and as parents it is important that you stay updated with the developments and trends of the cyber world. Online perpetuators discover new ways of afflicting crime into the net every day. As a responsible parent it is vital that you remain aware of the various crimes as well as the tools and software to ensure safety.

2. Communication
We live in a world where children tend to spend more time on the net than with their parents. As parents it is essential that you develop a healthy communication with your ward on a daily basis. Encourage your child to share his/her online experiences. Be vigilant about the Internet environments in which your child interacts. React constructively when your child complaints of any online discomfort. Give them the assurance of being there for them no matter how bad the situation gets.

3. Clean System
Always ensure you have a security suite installed on your PC that includes antivirus, anti spyware and firewall. Make sure that they update automatically. Currently Internet Service Providers have inbuilt controls which help you monitor your child's online activity. The sites visited, the duration spent on each website etc can be tracked using these controls. Ensure the effective use of these parental controls.

4. Social networking sites & safety
Today children as young as 10 sign up for social networking sites. With such a young audience at the receiving end, parents should be cautious regarding the way the child conducts himself online. Involve positively in the online activities of your child. All social networking sites come with privacy setting preference. Collectively decide and discuss the most suited option. Teach your child about the threats of disclosing sensitive information. Ensure that your child does not go out for a face to face meeting with online acquaintances.

5. Explain the hazards
For most children the Internet is a fantasy world and hence they tend to overlook their own security and risks. Teach them to distinguish between the right and wrong on the net. Instruct them not to share photos and pictures with online acquaintances. Instruct them not to post any information that is embarrassing or hurtful to the people he/she is addressing. Inculcate the habit of respecting the views and ideas of other people online.

6. Support
In case your child complaints of any unusual activity online deal with it constructively and positively. Assure them of your constant help and support. Work with them on strategies in case they come across online predators such as cyber bullies, paedophiles or any online disturbances.

AN INSIGHT INTO REALITY

Most parents take pride in the fact that their ward is computer literate. But do you think your ward is literate and aware about the potential risks of inappropriate usage of the Internet?? Above all are you fully aware of what your child is doing on the Internet??Are you equipped enough to guide them??

Here is an insight into some of the most used Internet commodities and their fact file.

1. Social networking sites

benefits

  • A Social networking site is a common platform where millions of people across the globe share common interests, link with old friends and bond with new ones.
  • It is a wonderful source of entertainment and a wonder tool to catch up with friends
  • It provides a stage to showcase one's real life virtually
  • Various social networking sites have different tools for privacy and security.
  • Breeding grounds for cyber crimes as kids can be easily victimised.
  • disadvantages

  • Cyber bullying and cyber abuse being the most common forms.
  • Disclosing personal information can prove dangerous
  • Impact
    Excessive use of social networking sites can lead to addiction which is very commonly seen among children.
    This in turn leads to lack of focus in studies and deviation from their main stream goals.

    2. Chat rooms

    They are tools which enable chatting and exchange of photos and videos. Chat rooms can have people of different ages, different types and different kinds.

    Benefits
    They form cheap means of communication.
    They bridge the gap created by distance and geography

    Disadvantage
    Cyber criminals can dupe young children by posing as friends of their age.
    Paedophiles [sexually attracted to children] find this to be the easiest medium in locating their prey.
    Lack of caution and awareness can lead to severe consequences.

    Impact
    Excessive usage without proper caution can lead to ultimate exploitation of children

    3. Online gaming sites

    Currently there are plenty of sites which provide with online gaming options.

    Benefits
    Gaming made available at finger tips
    Source of entertainment for kids

    Risks
    Excessive gaming leads to addiction
    Inappropriate and fake gaming sites can inject virus into your computer

    4. Downloading music and movies
    Children love downloading their favourite music and movies from the Internet. Some websites offer free download while others charge for the downloaded content

    Benefits

  • music and movies made available at the click of a mouse
  • Risks

  • Downloading music from fake websites can lead to transfer of virus
  • Phishing websites can dupe children
  • Online Generation Gap

    Your concern and protection as a parent necessarily need not seem the same from your child's point of view. Most of the teens hate their parents viewing their web history and entrusting them with a whole list of do's and dont's when it comes to using the net. This persistent difference in ideas and concepts gives way to an online generation gap.

    CYBER BULLYING & HARASSMENT

    Cyber Bullying- refers to the deliberate use of Internet for repeatedly harassing or intimidating an individual or group of individuals. Cyber bullying has been defined by The National Crime Prevention Council as follows "When the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person." Cyber Bullying is one crime which can be extensively seen among teenagers and young adults.

    Identifying cyber bullying

    Cyber bullying is propagated by two methods namely:

  • Cyber bully through repeated harm and intent
  • Cyber bully through cyber stalking, harassment and impersonation.
  • Protection against Cyber Bullying

    1. Limit personal data
    Explain to your child the importance of limiting personal and sensitive information. This reduces the chance of being bullied and prevents impersonation to a large extent.

    2. Avoid sharp reaction
    Bullies largely thrive on the reactions of their victim. Do not instigate them with hostile behaviour or rude replies as this shall lead to the escalation of the situation. Instruct your child to ignore the bully. Currently all social networking sites have an inbuilt option for blocking people. If your child is a victim of cyber bullying via mail consider changing the email id. In case the bullying still persist sort to strict legal action.

    3. Record the statements
    In case your child confronts with a cyber bully record and document all the messages received with date and time. This can prove extremely handy in case you plan to take it up legally.

    4. Reporting cyber bully
    If you or your child is being persistently cyber bullied take up the case with local authorities. Every country has its own legal provision to deal with cyber crimes.

    WARNING SIGNS OF A CYBER VICTIM
    The below given signs are indications that your child/student just might be victimised.

    1. Spending long hours on the Internet especially during nights
    2. A general reluctance towards family and friends
    3. Constant calls from strangers

    INTERNET SAFETY TIPS FOR PARENTS

    1. Place the computer in a common area

    2. Insist that they don't disclose any personal information such as address or telephone numbers online.

    3. Supervise kids when they work online for long hours at home

    4. Tell your child not to share their passwords even with friends.

    5. Discuss the consequence of posting sensitive information online.

    6. Enable filters that are inbuilt in web browsers and ensure the efficient use of parental controls

    7. In case your child complains of any uncomfortable online exchange, take it seriously

    8. Talk to your child about Internet safety today. It is never too late.

    A contract that can protect lives ………………..

    Download This Contract in PDF Format

    SOFTWARE PIRACY & THE LAW

    Software piracy refers to the unauthorized copy or use of copyrighted software. It is simply the illegitimate possession of somebody else’s property.

    RISKS

    Software piracy is a crime be it copying or using such software. The firm whose software is being copied can sue the user by a fortune

    Though pirated software comes cheap it comes with the ultimate hallmark of being malicious. With the source being unknown there is no authority or body against whom you could complain rather your image gets tarnished as it is a punishable offence

    PREVENTION

    The children of cyber era are true Internet experts in their own capacity. Downloading comes easy to them rather than purchasing the legitimate software. Create awareness in your child regarding software piracy and it’s risks. Encourage the use of authentic software among children. Be a role model to them by installing only authentic software in your pc/laptop.

    PARENTAL CONTROLS

    The Internet is a very wonderful way of enhancing your child’s knowledge. On the other hand today the Internet is proving to be the breeding ground of cyber menace with young children being victimized. Such malice can be easily avoided by using parental controls effectively. Parental controls refer to the various software and tools that help you monitor your child’s online activity.

    Here are a couple of essential aspects of parental controls

    1. Auto Alert. Can be programmed to send automatic e-mail alerts triggered by specific events, such as viewing an inappropriate web page or IM message.
    2. Block Private Information. Can be configured to blocks the transmission of private information such as name, phone number, etc. via IM and e-mail.
    3. Contact Management. Control over who can contact children via IM, E-mail, and social networks.
    4. E-mail Block and Monitor. Ability to block or monitor e-mail for a user through an e-mail program such as Outlook, as well as web based e-mail such as Hotmail.
    5. Game Rating Management. Allows the enforcement of gaming ratings systems, such as ESRB on games played on a computer.
    6. IM Block and Monitor. Allows the blocking or monitoring of instant Messaging programs, such as Windows Live IM, Yahoo IM, AOL, etc.
    7. Multi Profile. Allows for the creation of multiple user profiles with different levels of filtering, blocking, and monitoring.
    8. P2P Block. Blocks the downloading, installation and use of peer to-peer file sharing software.
    9. Safe Search control. Allows for the safe search setting of popular search engines such as Bing and Google to be locked in place.
    10. “Keyword” refers to the ability to block certain keywords from being entered in all search engines, rather than enforcing search engine Settings.
    11. Screen Capture. Ability to record screen captures of all Internet activity
    12. Social Network Monitor. Ability to record all activity conducted on social network sites, such as uploading photos, sending e-mail, etc.
    13. Time Management. Ability to limit Internet and/or computer use to preset times.
    14. Web Filter List. Contains a pre-selected list of categorized websites for blocking, rather than simply the ability to block web.

    Norton Online Family
    K9 Web Protection
    Google
    Microsoft
    Youtube
    Facebook