{"id":4935,"date":"2014-05-30T15:00:51","date_gmt":"2014-05-30T19:00:51","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=4935"},"modified":"2020-02-26T10:50:58","modified_gmt":"2020-02-26T15:50:58","slug":"simple-rules-kids-social","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/simple-rules-kids-social\/4935\/","title":{"rendered":"Your Child and Social Networks"},"content":{"rendered":"<p>Like it or not, the means of communication our children use have changed drastically over the past decade. They are far less eager to call or meet each other, but are constantly available online in social networks. When it comes to 11 to 14-year-olds, depending on what\u2019s hip in their environment and, to some extent, the local legislation, your son or daughter would want to register a Facebook or Vkontakte account. Yet as a parent, you are the sole bearer of the responsibility over the way your child\u2019s online life goes.<\/p>\n<p style=\"text-align: center;\">\n<\/p><h2>Prohibiting never works<\/h2>\n<p>Some parents would save it for a \u2018special day\u2019 like \u2018sweet 16\u2019 or some other important event when allowing their child to register a social media account. This effort is futile because a teenager will do it when his peers do, not willing to become an outcast. If you impose a iron-clad ban on social networks, your child could do it secretly. You don\u2019t want that. If you can\u2019t fight it, then take the lead.<\/p>\n<h2>Multiscreen mode<\/h2>\n<p>If you have a home PC in the living room, thinking that then your child\u2019s online activity is under supervision, then you have forgotten smartphones, tablets, school PCs, TVs, game consoles, and, maybe, refrigerators. Getting in touch with friends is possible by all of these means. Smartphones, without a doubt, are the primarily communication tool. This fact conceals a number of dangerous things which both you and your child should know about.<\/p>\n<div class=\"pullquote\">The main communication tool for your child is their smartphone. Take this into consideration when setting the rules.<\/div>\n<h2>Taking care of privacy<\/h2>\n<p>When you are looking at your computer monitor, it is hard to imagine that there are billions of people online just a couple of clicks away. Among those people are frauds of all kinds, trolls with any level of bad intention, and even more dangerous individuals like pedophiles. To ensure your child is 100% protected from these types, you much teach him the code of conduct on the internet, which is just as important as road safety. The rules are simple: Do not disclose your name, school, or place of residence and report any disturbing conversations to parents or official representatives straight away. You must then rigorously monitor any content your child posts online. Photos and videos are the most risk-prone types of content: Besides making it possible to include visual clues about the location of the child in the photo, modern smartphones eagerly geo-tag the photos by default. That means this function must be switched off on your child\u2019s mobile device.<\/p>\n<h2>The main rule<\/h2>\n<p>The biggest mistake both adults and children make online is thinking that it is just a game. When one does not see the interlocutor, or scan regular feedback tokens of live conversation (gestures, body language, intonation or facial expressions), it is easy to believe the conversation is not \u2018for real\u2019 and let slip a couple of undesired words. The second biggest mistake is misunderstanding the scope and magnitude attributed to words said online. Many people, both known and unknown, and many robots as well, will see this conversation. That is why the key wisdom each parent has to explain to a teen is <strong>to not say anything online that you would not say in person, publicly. <\/strong>Only those who have apprehended the meaning of this rule are okay to surf the social networks on their own. In simple words, \u201cWritten can be more dangerous than saying,\u201d or \u201cEvery word and action is\u00a0seen by outsiders\u201d.<\/p><blockquote class=\"twitter-pullquote\"><p>Do\u00a0not say anything online that you would not say in person, publicly.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fwu8o&amp;text=Do%C2%A0not+say+anything+online+that+you+would+not+say+in+person%2C+publicly.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<h2>Strike a fair deal<\/h2>\n<p>Even if you are absolutely sure that your child has understood all the rules, as a parent, you should check in from time to time just to see how he\/she is coping. Do not do it discreetly; ideally, you should make a pact with your son or daughter to define how the control is going to be enforced. Would your child be okay with giving you a password from his social media profile? Or adding a parent as a friend? Or succumbing to special <a href=\"https:\/\/www.kaspersky.com\/blog\/?s=parental+control&amp;submit=Search\" target=\"_blank\" rel=\"noopener nofollow\">parental control<\/a>\u00a0software? If used correctly, the latter would be the most comfortable choice. Quality software solutions can raise an alarm only in certain circumstances (for instance, on detecting a keyword in a message chain) without the necessity to dig through the entire correspondence. Besides, it is highly recommended to set all possible administrative measures to influence your child\u2019s online behavior, including blocking the online access on all devices before homework is done or banning the mobile phone entirely for serious misconduct. Of course, you should elaborate a balanced \u2018grounding\u2019 policy and not limit the child\u2019s online freedom when he or she behaves.<\/p>\n<h2>Beware of bullying<\/h2>\n<p>One of the most dangerous things happening to teens on social networks is online bullying by their peers (lately, a special term of \u2018cyber-bullying\u2019 was introduced to define the concept). Unlike usual problems a teen may experience at school, cyber-bullying has two distinctive features: Online harassment does not stop with classes and continues at home and, as we have outlined earlier, with no personal contact the bullies might get carried away, inventing new perverted and ugly forms of bullying. There is a variety of ways this is done including: Discovering a child\u2019s password to post something undesirable on his account, posting a person\u2019s photo online in order to humiliate the victim in the eyes of the classmates, and disclosing someone\u2019s secret to everyone, etc. These types of bullying are not obvious to the parents, yet are very depressing for a teen, so when feeling any doubts about your child\u2019s emotions or seeing him or her distant and strange, make a serious effort \u2013 from a simple talk to as far as parental control \u2013 to find out more about the situation and stop the bullying. Many countries have special organizations which help parents to deal with bullying, but even if there are none, there is a pretty straightforward way to help your child: Go to your child\u2019s school and ask the school counselor for help. In some cases, your child could be the bully.\u00a0Your response should be immediate and on a large scale. You need to explain to your child that bullying can be dangerous and is serious, considering occasions when a victim of bullying committed suicide, while his\/her offenders ended up prosecuted by the court of law.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06043430\/inf_Kids_on_the_Net-7.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-4937\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06043430\/inf_Kids_on_the_Net-7.png\" alt=\"inf_Kids_on_the_Net-7\" width=\"1280\" height=\"1270\"><\/a><\/p>\n<h2>Onboard together<\/h2>\n<p>The best way to conserve the connection to your kid while he\/she starts traveling down the path to the world of the internet is to do something together. Help your child establish an account on Facebook and <a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-privacy-settings-video\/\" target=\"_blank\" rel=\"noopener nofollow\">set an appropriate level of privacy<\/a>. Be aware of and read the industry news (on our website or at our friends\u2019 place, <a href=\"http:\/\/www.threatpost.com\" target=\"_blank\" rel=\"noopener nofollow\">Threatpost<\/a>) to be able to tell your kid that Snapchat photos are not self-eliminated, and SEM advertisements on the web pages <a href=\"https:\/\/www.kaspersky.com\/blog\/what-google-shares-about-you\/\" target=\"_blank\" rel=\"noopener nofollow\">might help to find out what exactly a teen was searching on Google<\/a>. Teens are seriously concerned about their privacy, so when a parent and a child are on a same team, a parent can earn additional points in becoming his child\u2019s best pal.<\/p>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/ADer4Xqw_gI?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span>\n","protected":false},"excerpt":{"rendered":"<p>Teaching your child the essential codes of conduct on the Internet is as important as teaching them road safety.<\/p>\n","protected":false},"author":32,"featured_media":4936,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,9],"tags":[604,288,20,271,364,43,97,211,131,689],"class_list":{"0":"post-4935","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-tips","9":"tag-bullying","10":"tag-children","11":"tag-facebook","12":"tag-infographic","13":"tag-parental-control","14":"tag-privacy","15":"tag-security-2","16":"tag-social-media","17":"tag-tips","18":"tag-vkontakte"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/simple-rules-kids-social\/4935\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/simple-rules-kids-social\/3525\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/simple-rules-kids-social\/3416\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/simple-rules-kids-social\/3844\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/simple-rules-kids-social\/4025\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/simple-rules-kids-social\/4137\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/simple-rules-kids-social\/3809\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/simple-rules-kids-social\/4137\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/simple-rules-kids-social\/4935\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/simple-rules-kids-social\/4935\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4935"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4935\/revisions"}],"predecessor-version":[{"id":33154,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4935\/revisions\/33154"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4936"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}