Keep the computer(s) used by everyone under the legal age in a room frequently used by everyone in the household with the screen in a position where it can be seen from most areas of the room. This is to avoid the situation where the child or young adult will be more tempted to comply with an online request for ‘keeping our friendship a secret’.

Refer to the section about Cyberstalking , Maintain the most current anti-virus software program and install updates for your system. Assign this task to someone on a regular basis.After downloading and before installing, run your anti-virus software program.

Maintain the most current security updates and patches for each operating system and every program installed even if it is not used. Assign this task to someone on a regular basis.

Keep back-up copies of your information on removable media instead of your hard drive.

When you are not using your home computer, unplug it. Try not to leave the telecommunications cable and the electric cord attached at the same time when the computer is not in use.

Close, disable or disconnect any features of all installed operating systems and software programs that are not used. Use a firewall to make unauthorized entry into your computer much more difficult.

Shopping

Be as careful with online purchases as you are in a store. Review the <a href=”/shop.htm” Internet  Shopping Guidelines.  Print a copy of your online order with the company’s confirmation number, date, and total amount. Dedicate one account to online purchases. With checking or debit card accounts, deposit funds as needed.

E-Mail

Do not include your social security number, tax identification number, password, address, telephone number, occupation, income, school/employer name, address, and telephone number, or any information used to install your internet service. (Legitimate companies, charities and internet service providers do not ask for personal information through email.

Know that if you do not use encryption software, any third party can potentially read your email.

Save email attachments as a file to run through your anti-virus software before opening.  Do not open any attachments unless you confirm with the sender they actually sent the attachment.

For further prevention, print the list of <a href=”/vir/vattach.htm”>infectious       email attachments</a> and <a href=”/vir/vsubject.htm”>subjects</a> and keep it available by your computer.

Parents

Show a genuine interest about your child’s online activities. Apply the same parental rules you use with everyday situations towards the internet. A filtering software program is like having a babysitter. You trust your child with them for a limited period of time. Although the filtering software program is doing its’ job, nothing can replace your parental interest, concern, and protection. You wouldn’t let your child meet a stranger unsupervised or roam alone in the &quot;bad&quot; section of town. So, why would you let your child unknowingly stumble into a potentially dangerous internet situation

Suggestion: make it a family affair where once a week or day everyone shares their online       activities – where they went, who they met, what they learned, etc. Any variation from their personal pattern deserves private questioning. If they did encounter an uncomfortable, threatening, or       harassing situation, tell them that this is the situation where they must be rude online by immediately going offline without any further conversation or communication with the person. (They can always get back online.) Also, tell them to tell you as soon as possible about any future incidents. Do not criticize or punish your child for letting themselves       get into the situation. It is not their fault. But rather, praise them for having told you immediately. Refer to the article about Cyberstalking and the Children’s Section. If you are concerned about a particular website collecting information from your child, write to the Federal Trade Commission.

Young Adults & Kids Be sure to tell only your age, username, and email address online. Do not  email or tell anyone online your school name, your real name, address,  city, or your parents’ occupation, income, or credit card numbers. Chances  are that your email &quot;friend&quot; is who they say they are, even though many people do exaggerate online their good points, possessions,  and abilities. If they send you a picture of themselves, do not send a picture back. However, you can be corresponding with someone, even for a considerable period of time, and trust them now because they have been  consistent in how and what they have said. Unfortunately, since you have  not met this person, you (including adults) really have no way of being sure that your friend is not an experienced man or woman mascarading online as someone your age looking to cause you harm or even death. Chat rooms (for kids, teens, or adults) are a very effective tool for the person with bad intentions. Refer to the article about Cyberstalking.

Internet safety, like everyday safety precautions, are necessary. Have a wonderful time using the tool of the internet, get done what you set  out to do, but be cautious and avoid potentially harmful situations.

Related Websites

ByteCrime.org
CyberAngels.org
FTC’s OnGuard Online.gov
i-SAFE
Internet Keep Safe Coalition
National Cyber Security Alliance
Stay Safe
US National Strategy to Secure Cyberspace


Avaya J179 Gigabit IP Phone Color (700513569) new buttons, defaulted, A stock picture

Avaya J179 Gigabit IP Phone Color (700513569) new buttons, defaulted, A stock

$95.00



Avaya J129 IP Phone (700513638) Global No Power Supply Product picture

Avaya J129 IP Phone (700513638) Global No Power Supply Product

$20.57



Avaya MM717 DCP Media Module HV7 24-Port Digital Communications Protocol picture

Avaya MM717 DCP Media Module HV7 24-Port Digital Communications Protocol

$119.99



Avaya J179 8 Line gigabit VoIP Business Phone 700513569 NO AC ADAPTER picture

Avaya J179 8 Line gigabit VoIP Business Phone 700513569 NO AC ADAPTER

$90.00



Lot Of 4 Avaya J169 IP Phone (700513634) -New Open Box J179D01B-1015 RED picture

Lot Of 4 Avaya J169 IP Phone (700513634) -New Open Box J179D01B-1015 RED

$79.00



Avaya J159 Gigabit IP Phone, VOIP, 700512394 #SH0 AA11 picture

Avaya J159 Gigabit IP Phone, VOIP, 700512394 #SH0 AA11

$70.00



Avaya J100/ K100 Wireless Module 700512402 JWIFI01A NEW picture

Avaya J100/ K100 Wireless Module 700512402 JWIFI01A NEW

$49.99



Avaya 9650 VoIP Digital IP Business Office Desk Phone with Stand (Lot of 10) picture

Avaya 9650 VoIP Digital IP Business Office Desk Phone with Stand (Lot of 10)

$60.00



Avaya J179 8 line gigabit VoIP Business Phone black  P/N: 700513569 picture

Avaya J179 8 line gigabit VoIP Business Phone black P/N: 700513569

$79.27



Lot of 10 Avaya 9611G 8-Line Internet Office IP Phone with Stand and Handset picture

Lot of 10 Avaya 9611G 8-Line Internet Office IP Phone with Stand and Handset

$85.00