Protecting Kids in the Evolving Digital Landscape, Patrick Jensen, 3/15/2024
From online bullying to inappropriate content, the internet poses unique risks to children that didn’t exist just a decade ago. While basic safety measures such as avoiding suspicious links and keeping personal details private are still necessary, today’s kids face a more complex threat landscape that demands continuous vigilance from parents.
Let’s take a closer look at some of the top concerns and what proactive steps you can take to shield your family.
In-Game Purchases and Loot Boxes
Many popular games and apps entice kids with in-game currencies and randomized “loot boxes” that can function similarly to gambling. Children can unwittingly spend real money with just a few intuitive taps without understanding its value. While some platforms have added parental controls, enforcement remains inconsistent.
The safest approach to avoiding unexpected in-game spending is to avoid entering payment details altogether and use only gift cards with set balances for your kids’ accounts.
Filtering Across All Devices
With smartphones and tablets in the hands of even the youngest children, they now have constant internet access well beyond the home computer. It’s critical to employ consistent, comprehensive content filters across all devices your family uses, from desktops to mobiles.
Depending on your child’s age and maturity, options range from white-listing only approved websites to selectively blocking categories such as adult content, violence, or social media. While some devices have built-in parental controls, third-party solutions often provide more customization and coverage for multiple connected products in one place.
Monitoring Screen Time, Activity and Mental Well-Being
Both mobile and desktop operating systems offer parental controls to view activity reports and limit when and for how long children can use technology.
You can restrict specific apps, games, and websites, helping guide them toward age-appropriate content and healthy screen habits. Regularly reviewing activity logs ensures tools are properly configured to reflect your family’s needs and values. It also allows the prompt addressing of any concerning online behavior before it negatively impacts their well-being or development.
Educating Children About Internet Safety
Alongside tools, open communication helps kids navigate the online world safely and responsibly. Discuss appropriate ways to interact with others online and how to handle seeing upsetting content or bullying. Explain the potential dangers of oversharing personal details.
Prioritizing Safety Shouldn’t Mean Sacrificing Learning
While online threats have grown more complex, so too have the educational benefits of technology for curious young minds. With the right balance of education and protection, families can experience all the internet has to offer while ensuring their children’s well-being remains the top priority.
Contact us at (651) 456-8655 today or visit our Contact page to discuss a digital solution tailored to your household.
What Happens to Your Data When You Die? Death is a morbid topic most of us try to avoid. Making a will and saying we prefer cremation is the extent of our advance planning. Yet, you may want to also think about what’s going to happen to your data.
Consider your digital footprint. You have photos, files, and emails on your computer and your phone. You’re also documenting your life on social media, and sharing on more than one channel.
Your wearable technology (say an Apple Watch or a Fitbit) may be recording information too. If you have a virtual assistant in your home, it’s recording your search history and saving that data on the cloud.
Yet many of us never think “what will happen to my data after I die?” Do you want it deleted? Are there digital assets you want to share? Perhaps there is tangible value attached to some of your digital assets. At the very least, some photos and videos that may have sentimental value for those who survive you. So, let’s explore advance planning you can do to protect your digital legacy.
Personal Files on Computer or Phone
Your personal devices are password protected. While necessary, this makes it more difficult for your survivors.
Now, they could physically pull the computer or phone apart if needed. But, it’s easier to have a copy of your passwords in a secure place for someone to access in the event of your death. Another option is to use a password manager. You can designate someone as your backup contact. They will be able to gain access to your passwords should you die.
Digital Media Collections
Often, when you click the “Buy” button, you’re not really purchasing that movie or music forever. Your contract with iTunes, for instance, was only for your lifetime. Your rights expire at your death.
Cloud Accounts
Consider the personal and private data you have in the cloud, such as Google or Microsoft’s Outlook. This might include calendars, emails, GPS, documents and financial information.
Google’s Inactive Account Manager lets you make plans for your account. You decide:
When Google should consider your account inactive
What it should do with your data afterwards
Whether to share account access with someone (providing email and phone number)
When or if your account should be deleted.
Microsoft won’t provide your passwords after death. However, via their Next of Kin process someone could be sent a DVD of the data in your outlook.com account.
Other cloud providers ask for proof of death and of legal right to access. In Dropbox’s case for instance, your survivors will need a court order. Even with all this, there’s no guarantee your personal data is completely removed from the cloud. It may exist in other datasets in system backups.
Social Media Accounts
Social media companies do not provide login credentials. Many require proof of identity and a death certificate to deactivate the account. Facebook and Instagram will “memorialize” your accounts. The public can’t see, but Friends or Followers can still view it and post memories. You can assign a legacy contact to look after the account or have it deleted.
You don’t want someone using your social account to send out spam or inappropriate photos. For instance, a sexy spam bot took over a New York Times media columnist’s Twitter after his 2015 death.
Plan ahead to protect your privacy and provide access where necessary. Think of the pain and heartache you can save your survivors by managing your digital legacy now.
How can you make the internet a safer place for your kids? It’s a common concern as all parents want their kids to be protected and happy whenever they go online. It’s relatively easy to supervise and monitor the very young ones as they stare delightedly at the Disney Jr site, but the risks increase greatly as kids get older and more independent.
You’ve probably heard the term ‘cyber safety’ before, but safe internet usage goes beyond reminding them not to talk to strangers. With the evolution of the internet and the way it’s now woven seamlessly into our lives, the focus needs to be on ingrained habits. That means ensuring your children have the tools and predefined responses to online events so that no matter what happens, they’re not placing themselves (or your family) at risk. Setting up these habits is easy, and begins with three basic understandings:
Downloads are a no-go
Most kids can’t tell the difference between a legitimate download and a scam/malicious link. It’s not their fault, the online world is full of things that will trick even the most savvy adult. The difference is that kids tend not to take that extra moment to check exactly where that link is pointing, question whether it’s too good to be true, or even read what they’re agreeing to. They want to get back to what they were doing, and if something pops up, their first instinct is to click ‘yes’ – purely so it goes away. Unfortunately, that single ‘yes’ may have just opened the doors to malware and viruses that will ruin their computer. Set a family rule that they need to ask permission for all downloads (and an adult will check it first), and to never click a popup. When you’re called over to give download permission or check a popup, talk through exactly what you’re checking and why. As your child matures, get them involved in this process so their safe habits extend outside the home.
Critical thinking is a must
Most youngsters think the internet is a magical place and can’t imagine their life without it. To them, the internet is on the same level as oxygen! With that acceptance though, comes unwavering trust that the internet would never lie to them, never trick them and never hurt them. While we adults know better, it’s only because we already view the internet with a certain level of distrust. The best way to keep kids safe is to teach them to approach every aspect of the internet with critical thinking. That includes teaching them to question the motives of other people online. Is that person really a kid? What do they really want? Unfortunately, all kids do need to be aware that predators use the internet to target and lure children. Ensure your children tell you immediately if a stranger makes contact. Along with this stranger danger, teach them to identify what marks something as suspicious, and what they should avoid. If they come across anything inappropriate, they should shut down the computer and come straight to you.
The internet is forever
Kids have an overwhelming drive to contribute to the internet, they don’t think twice about recording a video, jumping in a chat room or onto social media. The world really is their playground! But what they don’t understand until they’ve been burned, is that anything they upload, write or say is on the internet forever. Even if they delete it or use a platform where content self-erases, someone can still screenshot and send it right back out. Many cyber-bullying cases are based around this exact type of blow-back. Once your kids know that everything they post is permanent, they’ll be more likely to pause and think.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments