SlideShare a Scribd company logo
1 of 15
Back to School 2012:
     12 Tips for Cell Phone Safety for Kids

     Marian Merritt
     Norton Internet Safety Advocate

12 Tips for Cell Phone Safety for Kids        1
1. Set a password
• Set a password on the phone to
  lock the keypad and screen when
  not in use
    – Great first line of defense against cyber
      bullying and sexting
    – Unprotected, a phone can be misused
      by others
        • Prevent private information access by others
        • Prevent people looking at private images and
          messages
        • Prevent hacked social networks, emails and
          passwords



           96% of lost phones had their info accessed by finder1

12 Tips for Cell Phone Safety for Kids                                               2
                                                1. Symantec Honey Stick study 2012
2. Tape a recovery phone number to phone

                                         • Put your home or office number on
                                           the back of phone
                                         • Encourages person who finds lost
                  If found,
                 please call
                                           phone to try to return it
                 310 555 8925
                                         • A locked phone makes finding your
                                           info hard, on purpose
                                         • Email address and info about a
                                           reward also helpful


       50% of finders of lost phones attempted to return them2

12 Tips for Cell Phone Safety for Kids                                         3
                                          2. Symantec Honey Stick study 2012
3. Set up emergency contacts


• Parent contact information
  including home, cell, office and
  email
• If you travel, include other
  relatives’ info
• Emergency contacts like a
  neighbor
    – If your child gets locked out, having a
      neighbor to call can be helpful
• Show children where info is
  stored on phone and when they
  should use it
12 Tips for Cell Phone Safety for Kids          4
4. Set up remote locate/lock/wipe software

                                         • Available free on iPhone as
                                           FindMyiPhone; or
                                           Norton Anti-Theft for Android
                                           – Check app store for options
                                         • Find phones left at school, in
                                           car, at the office with ease
                                           – Phone must still be powered and on
                                         • Prevent stolen or lost phones
                                           from being used
                                           – Avoid high mobile bills
                                         • Protect private information from
                                           being accessed and used

12 Tips for Cell Phone Safety for Kids                                        5
5. Install Security Software

• Mobile vulnerabilities up 93%
  in 2011
• Mobile malware on the rise
• Numerous fake and malicious
  apps get on the market
    – Often disguised as games that
      appeal to children
• Security apps, like Norton
  Mobile Security, can block
  malware, phishing attacks,
  dangerous links and
  unwanted calls and texts


12 Tips for Cell Phone Safety for Kids   6
6. Turn Off Geo-Tagging
Except for mapping, security services
                                         • Don’t share location via photos and
                                           videos
                                           – Check settings on photo and video
                                             share services
                                         • Don’t “sign in” via social networking
                                           unless an adult
                                         • Used those location-based coupons?
                                           Turn off after you’re done
                                         • Check phone for apps that use
                                           location and remove them
                                           – i.e. social and flirtation apps are a bad
                                             idea for children
                                         • Talk to your child about using good
                                           sense about when and where to
                                           share your location.


12 Tips for Cell Phone Safety for Kids                                                   7
7. Review School Cell Phone and Mobile Device Policy

• Some ban mobile phones on
  campus
• Some welcome them into the
  classroom and include in
  curriculum
• Ask about school rules AND
  teacher’s preferences
• Discuss consequences w/ your
  child
• Support school policy and/or
  join to refine it

12 Tips for Cell Phone Safety for Kids                 8
8. Review Your Contract Together

                                         • Set limits and consequences
                                           for extra fees
                                         • Show children how to check
                                           current spending so they feel a
                                           sense of ownership
                                         • Look at cell phone settings to
                                           turn off unnecessary services




12 Tips for Cell Phone Safety for Kids                                      9
9. Set up nightly charging station in kitchen or den
 • Prevent late night texting,
   gaming, music playing
 • Improve kid’s sleep and school
   performance
 • Prevent unnecessary exposure
   to cell phone radiation
      – when kids put phone under pillow
 • You can also set time limits on
   phone use
      – Via service provider website or
      – On device


12 Tips for Cell Phone Safety for Kids                 10
10. Teach Kids Not to Reply To Unknown Senders or
Callers

                                         • Scams abound via online
                                           quizzes, SMS spam
                                         • SMS phishing = smishing
                                         • A reply can lead to premium
                                           charges
                                           – or a hacked account




12 Tips for Cell Phone Safety for Kids                                   11
11. Set rules for new apps and games
 • Choose well-tested and
   reviewed apps and games
      – Don’t be an early adopter and get
        tricked into downloading malware
 • Find out if the app is free or
   just a trial before you install it
 • Set a budget for apps and
   games
 • Remove apps no longer in use
   – they may still access your
   data


12 Tips for Cell Phone Safety for Kids      12
12. Discuss Cyber Bullying, Sexting and Other Risks if
You Don’t Guard Your Phone

                                         • Cyber bullying –someone can
                                           send emails and SMS as “you”
                                         • Camera and voice recorder
                                           can be accessed
                                         • Sexting – You are responsible
                                           for the images you create,
                                           send AND receive
                                         • Private images and messages
                                           can be viewed and shared
                                           without permission
                                         • Keep phone secured, locked
                                           and with you

12 Tips for Cell Phone Safety for Kids                                 13
Summary                                  • Remember, a cell phone is a mobile
                                           computer
                                         • Your data is only secure if the phone
                                           is managed with care
                                         • Your children can learn to use this
                                           powerful technology safely if you
                                           educate them
                                         • Take your time, don’t overwhelm
                                           them with too many warnings or
                                           too much information
                                         • ConnectSafely.org/SafeKids.com:
                                           http://www.safekids.com/cell-phone-safe
                                         • CommonSenseMedia.org:
                                           http://www.commonsensemedia.org/adv




12 Tips for Cell Phone Safety for Kids                                      14
What did I miss?
                        Please send your suggestions to Marian@Norton.com

     Thank you!
     Marian Merritt
     Norton Internet Safety Advocate
     marian@norton.com
     @marianmerritt

     Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
     the U.S. and other countries. Other names may be trademarks of their respective owners.

     This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
     are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


12 Tips for Cell Phone Safety for Kids                                                                                                                                                       15

More Related Content

Similar to 12 tips for cell phone safety for kids

Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Lo1 405 moochies_presentation
Lo1 405 moochies_presentationLo1 405 moochies_presentation
Lo1 405 moochies_presentationkauepgarcia
 
My Mobile Watchdog
My Mobile WatchdogMy Mobile Watchdog
My Mobile Watchdogbcdlee
 
Company presentation, january 2010
Company presentation, january 2010Company presentation, january 2010
Company presentation, january 2010Bipper
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Scott Burnett
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014- Mark - Fullbright
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossWireless Solutions NY
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policytseda
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 
Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Scott Burnett
 
What really happens when you lose your phone? - Symantec
What really happens when you lose your phone? - SymantecWhat really happens when you lose your phone? - Symantec
What really happens when you lose your phone? - SymantecCheapest SSLs
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationScott Burnett
 

Similar to 12 tips for cell phone safety for kids (20)

Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Lo1 405 moochies_presentation
Lo1 405 moochies_presentationLo1 405 moochies_presentation
Lo1 405 moochies_presentation
 
My Mobile Watchdog
My Mobile WatchdogMy Mobile Watchdog
My Mobile Watchdog
 
Company presentation, january 2010
Company presentation, january 2010Company presentation, january 2010
Company presentation, january 2010
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Smartphone Safety - tips for parents
Smartphone Safety - tips for parentsSmartphone Safety - tips for parents
Smartphone Safety - tips for parents
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking
 
Assessment parent
Assessment parentAssessment parent
Assessment parent
 
report writing
report writing report writing
report writing
 
What really happens when you lose your phone? - Symantec
What really happens when you lose your phone? - SymantecWhat really happens when you lose your phone? - Symantec
What really happens when you lose your phone? - Symantec
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentation
 

More from Marian Merritt

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyMarian Merritt
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013Marian Merritt
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesMarian Merritt
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceMarian Merritt
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime reportMarian Merritt
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 

More from Marian Merritt (10)

Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the Workplace
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime report
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
School presentation
School presentationSchool presentation
School presentation
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

12 tips for cell phone safety for kids

  • 1. Back to School 2012: 12 Tips for Cell Phone Safety for Kids Marian Merritt Norton Internet Safety Advocate 12 Tips for Cell Phone Safety for Kids 1
  • 2. 1. Set a password • Set a password on the phone to lock the keypad and screen when not in use – Great first line of defense against cyber bullying and sexting – Unprotected, a phone can be misused by others • Prevent private information access by others • Prevent people looking at private images and messages • Prevent hacked social networks, emails and passwords 96% of lost phones had their info accessed by finder1 12 Tips for Cell Phone Safety for Kids 2 1. Symantec Honey Stick study 2012
  • 3. 2. Tape a recovery phone number to phone • Put your home or office number on the back of phone • Encourages person who finds lost If found, please call phone to try to return it 310 555 8925 • A locked phone makes finding your info hard, on purpose • Email address and info about a reward also helpful 50% of finders of lost phones attempted to return them2 12 Tips for Cell Phone Safety for Kids 3 2. Symantec Honey Stick study 2012
  • 4. 3. Set up emergency contacts • Parent contact information including home, cell, office and email • If you travel, include other relatives’ info • Emergency contacts like a neighbor – If your child gets locked out, having a neighbor to call can be helpful • Show children where info is stored on phone and when they should use it 12 Tips for Cell Phone Safety for Kids 4
  • 5. 4. Set up remote locate/lock/wipe software • Available free on iPhone as FindMyiPhone; or Norton Anti-Theft for Android – Check app store for options • Find phones left at school, in car, at the office with ease – Phone must still be powered and on • Prevent stolen or lost phones from being used – Avoid high mobile bills • Protect private information from being accessed and used 12 Tips for Cell Phone Safety for Kids 5
  • 6. 5. Install Security Software • Mobile vulnerabilities up 93% in 2011 • Mobile malware on the rise • Numerous fake and malicious apps get on the market – Often disguised as games that appeal to children • Security apps, like Norton Mobile Security, can block malware, phishing attacks, dangerous links and unwanted calls and texts 12 Tips for Cell Phone Safety for Kids 6
  • 7. 6. Turn Off Geo-Tagging Except for mapping, security services • Don’t share location via photos and videos – Check settings on photo and video share services • Don’t “sign in” via social networking unless an adult • Used those location-based coupons? Turn off after you’re done • Check phone for apps that use location and remove them – i.e. social and flirtation apps are a bad idea for children • Talk to your child about using good sense about when and where to share your location. 12 Tips for Cell Phone Safety for Kids 7
  • 8. 7. Review School Cell Phone and Mobile Device Policy • Some ban mobile phones on campus • Some welcome them into the classroom and include in curriculum • Ask about school rules AND teacher’s preferences • Discuss consequences w/ your child • Support school policy and/or join to refine it 12 Tips for Cell Phone Safety for Kids 8
  • 9. 8. Review Your Contract Together • Set limits and consequences for extra fees • Show children how to check current spending so they feel a sense of ownership • Look at cell phone settings to turn off unnecessary services 12 Tips for Cell Phone Safety for Kids 9
  • 10. 9. Set up nightly charging station in kitchen or den • Prevent late night texting, gaming, music playing • Improve kid’s sleep and school performance • Prevent unnecessary exposure to cell phone radiation – when kids put phone under pillow • You can also set time limits on phone use – Via service provider website or – On device 12 Tips for Cell Phone Safety for Kids 10
  • 11. 10. Teach Kids Not to Reply To Unknown Senders or Callers • Scams abound via online quizzes, SMS spam • SMS phishing = smishing • A reply can lead to premium charges – or a hacked account 12 Tips for Cell Phone Safety for Kids 11
  • 12. 11. Set rules for new apps and games • Choose well-tested and reviewed apps and games – Don’t be an early adopter and get tricked into downloading malware • Find out if the app is free or just a trial before you install it • Set a budget for apps and games • Remove apps no longer in use – they may still access your data 12 Tips for Cell Phone Safety for Kids 12
  • 13. 12. Discuss Cyber Bullying, Sexting and Other Risks if You Don’t Guard Your Phone • Cyber bullying –someone can send emails and SMS as “you” • Camera and voice recorder can be accessed • Sexting – You are responsible for the images you create, send AND receive • Private images and messages can be viewed and shared without permission • Keep phone secured, locked and with you 12 Tips for Cell Phone Safety for Kids 13
  • 14. Summary • Remember, a cell phone is a mobile computer • Your data is only secure if the phone is managed with care • Your children can learn to use this powerful technology safely if you educate them • Take your time, don’t overwhelm them with too many warnings or too much information • ConnectSafely.org/SafeKids.com: http://www.safekids.com/cell-phone-safe • CommonSenseMedia.org: http://www.commonsensemedia.org/adv 12 Tips for Cell Phone Safety for Kids 14
  • 15. What did I miss? Please send your suggestions to Marian@Norton.com Thank you! Marian Merritt Norton Internet Safety Advocate marian@norton.com @marianmerritt Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 12 Tips for Cell Phone Safety for Kids 15