All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
ONLINE SAFETY conference for Parents in Escuela Americana - What every parent should know about impact of new technologies on their children - www.ideaworks.la - @rokensa
Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
The TeenSafe Parenting Guide to Tech SafetyTeenSafe
The TeenSafe Digital Manifesto covers everything a parent needs to know to keep their child safe online; from the dangers they face, to how to teach appropriate online behavior and supervise your child's digital life - just like you would on the playground! To learn more, visit TeenSafe.com
Youth are getting exposed to high‐tech devices such assmart phones and internet at earlier ages. While there are many benefits of these devices,they have opened up opportunities for others to negatively exploit users. This workshopwill educate educators and youth about these predatory activities, ways to avoid them, andwhat to do when you or others encounter them.
ONLINE SAFETY conference for Parents in Escuela Americana - What every parent should know about impact of new technologies on their children - www.ideaworks.la - @rokensa
Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
The TeenSafe Parenting Guide to Tech SafetyTeenSafe
The TeenSafe Digital Manifesto covers everything a parent needs to know to keep their child safe online; from the dangers they face, to how to teach appropriate online behavior and supervise your child's digital life - just like you would on the playground! To learn more, visit TeenSafe.com
Youth are getting exposed to high‐tech devices such assmart phones and internet at earlier ages. While there are many benefits of these devices,they have opened up opportunities for others to negatively exploit users. This workshopwill educate educators and youth about these predatory activities, ways to avoid them, andwhat to do when you or others encounter them.
This presentation was prepared for a high school Parent Teacher Organization to inform parents of the social media apps and sites local teens are using in spring 2014. The presentation includes an overview of particular apps and sites, as well as their terms of service and appropriateness for teen users. Parents are also given tips about helping teens develop a good digital footprint and referred to resources that will help them make social media decisions for their own teens.
A comprehensive guide on cyberbullying for parents, teachers & children.
You can also read this on our website here: https://homeguides.co.uk/cyberbullying/
Designed for community leaders, Parenting the Net Generation addresses family interests and concerns on issues that arise when young people go online. The workshop touches briefly on many key Internet issues including safety, privacy, marketing, ethics and cyberbullying, and evaluation of online information.
Technology & Mental Health Parents Seminar: Sophie LiningtonCranleigh School
Our seminar for parents, held in partnership with the Charlie Waller Memorial Trust, explored issues around technology and the mental health of children and teenagers.
The aim of our seminar was to bring together parents with experts in neuroscience, parenting, mental health and the impact of technology on all of these areas. We shared ideas and experiences, learned from pioneering work in the field and will continue with similar events to ensure that provide the best possible environment in which pupils may thrive.
One in three internet users globally is a child. This proportion is likely to be even higher in the global South.
Organizations working to advance children’s rights and promote well-being need to understand how to reduce the risk of harm children face online while maximizing their opportunities for learning, participation and creativity.
The PPT covers digital safety for children.
This report solely belongs to Symantec. Credit is due to all original authors and no financial gain was made from the report, Simply sharing for educational purposes,
The FBI is the lead federal agency for investigating malicious cyber activity by criminals, nation-state adversaries, and terrorists. To fulfill this mission, the FBI often develops resources to enhance operations and collaboration. One such resource is the FBI’s Internet Crime Complaint Center (IC3) which provides the public with a trustworthy and convenient mechanism for reporting information concerning suspected Internet-facilitated criminal activity. At the end of every year, the IC3 collates information collected into an annual report.
Credit is due to all original authors and no financial gain was made from the blog, Simply sharing an interesting story for educational purposes,
This guide aims to help journalists understand their rights at protests and avoid arrest when reporting on these events. It summarizes the legal landscape and provides strategies and tools to help journalists avoid incidents with police and navigate them successfully should they arise. Credit RCFP.Org
Credit is due to all original authors and no financial gain was made from the blog, Simply sharing an interesting story for educational purposes,
Verizon Publishes 2020 Data Breach Investigation Report (DBIR) With Insights From Thousands of Confirmed Breaches. Verizon's 2020 Data Breach Investigations Report (DBIR) is the most extensive yet, with 81 contributing organizations, and more than 32,000 incidents analyzed (of which 3,950 were confirmed breaches). Credit:Verizon
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
A Resource Guide to theU.S. Foreign Corrupt Practices Act
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
The FTC takes in reports from consumers about problems they experience in the marketplace. The reportsare stored in the Consumer Sentinel Network (Sentinel), a secure online database available only to lawenforcement. While the FTC does not intervene in individual consumer disputes, its law enforcementpartners – whether they are down the street, across the nation, or around the world – can use informationin the database to spot trends, identify questionable business practices and targets, and enforce the law.
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
Below is a list of consumer reporting companies updated for 2019.1 Consumer reporting companies collect information and provide reports to other companies about you. These companies use these reports to inform decisions about providing you with credit, employment, residential rental housing, insurance, and in other decision making situations. The list below includes the three nationwide consumer reporting companies and several other reporting companies that focus on certain market areas and consumer segments. The list gives you tips so you can determine which of these companies may be important to you. It also makes it easier for you to take advantage of your legal rights to (1) obtain the information in your consumer reports, and (2) dispute suspected inaccuracies in your reports with companies as needed.
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
Transnational criminal organizations (TCOs), foreign fentanyl suppliers, and Internet purchasers located in the United States engage in the trafficking of fentanyl, fentanyl analogues, and other synthetic opioids and the subsequent laundering of the proceeds from such illegal sales.
The mission of the IC3 is to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity, and to develop effective alliances with industry partners. Information is analyzed and disseminated for investigative and intelligence purposes, for law enforcement, and for public awareness.
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
This report is built upon analysis of 41,686 security incidents, of which 2,013 were confirmed data breaches. We will take a look at how results are changing (or not) over the years as well as digging into the overall threat landscape and the actors, actions, and assets that are present in breaches. Windows into the most common pairs of threat actions and affected assets also are provided.
The Federal Trade Commission (FTC or Commission) is an independent U.S. law enforcement agency charged with protecting consumers and enhancing competition across broad sectors of the economy. The FTC’s primary legal authority comes from Section 5 of the Federal Trade Commission Act, which prohibits unfair or deceptive practices in the marketplace. The FTC also has authority to enforce a variety of sector specific laws, including the Truth in Lending Act, the CAN-SPAM Act, the Children’s Online Privacy Protection Act, the Equal Credit Opportunity Act, the Fair Credit Reporting Act, the Fair Debt Collection Practices Act, and the Telemarketing and Consumer Fraud and Abuse Prevention Act. This broad authority allows the Commission
to address a wide array of practices affecting consumers, including those that emerge with the development of new technologies and business models.
Sentinel sorts consumer reports into 29 top categories. Appendices B1 – B3 describe the categories,providing details, and three year figures. To reflect marketplace changes, new categories or subcategories are created or deleted over time.The Consumer Sentinel Network Data Book excludes the National Do Not Call Registry. A separate report about these complaint statistics is available at: https://www.ftc.gov/reports/national-do-not-call-registry-data-book-fiscal-year-2018. The Sentinel Data Book also excludes reports about unsolicited commercial email.Consumers can report as much or as little detail as they wish when they file a report. For the Sentinel Data Book graphics, percentages are based on the total number of Sentinel fraud, identity theft, and other report types in 2018 in which consumers provided the information displayed on each chart.Reports to Sentinel sometimes indicate money was lost, and sometimes indicate no money was lost.Often, people make these reports after they experience something problematic in the marketplace,avoid losing any money, and wish to alert others. Except where otherwise stated, numbers are based on reports both from people who indicated a loss and people who did not.Calculations of dollar amounts lost are based on reports in which consumers indicated they lost between $1 and $999,999. Prior to 2017, reported “amount paid” included values of $0 to $999,999.States and Metropolitan Areas are ranked based on the number of reports per 100,000 population.State rankings are based on 2017 U.S. Census population estimates (Annual Estimates of the Resident Population: April 1, 2010 to July 1, 2017). Metropolitan Area rankings are based on 2016 U.S. Census population estimates (Annual Estimates of the Resident Population: April 1, 2010 to July 1, 2016).This Sentinel Data Book identifies Metropolitan Areas (Metropolitan and Micropolitan Statistical Areas)with a population of 100,000 or more except where otherwise noted. Metropolitan areas are defined by Office of Management and Budget Bulletin No. 15-01, “Revised Delineations of Metropolitan Statistical Areas, Micropolitan Statistical Areas, and Combined Statistical Areas, and Guidance on Uses of the Delineations of These Areas” (July 15, 2015). Numbers change over time. The Sentinel Data Book sorts consumer reports by year, based on the date of the consumer’s report. Some data contributors transfer their complaints to Sentinel after the end of the calendar year, and new data providers often contribute reports from prior years. As a result, the total number of reports for 2018 will likely change during the next few months, and totals from previous years may differ from prior Consumer Sentinel Network Data Books. The most up to date information can be found online at ftc.gov/data
A credit score is a three -digit number that predicts how likely you are to pay back a loan on time, based on information from your credit reports.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only. - Medical identity theft has existed in various forms for decades, but it was in 2006 that World Privacy Forum published the first major report about the crime. The report called for medical data breach notification laws and more research about medical identity theft and its impacts. Since that time, medical data breach notification laws have been enacted, and other progress has been made, particularly in the quality of consumer complaint datasets gathered around identity theft, including medical forms of the crime. This report uses new data arising from consumer medical identity theft complaint reporting and medical data breach reporting to analyze and document the geography of medical identity theft and its growth patterns. The report also discusses new aspects of consumer harm resulting from the crime that the data has brought to light
The FTC takes in reports from consumers about problems they experience in the marketplace. The reports are stored in the Consumer Sentinel Network (Sentinel), a secure online database available only to law enforcement. While the FTC does not intervene in individual consumer disputes, its law enforcement partners – whether they are down the street, across the nation, or around the world – can use information in the database to spot trends, identify questionable business practices and targets, and enforce the law.
Since 1997, Sentinel has collected tens of millions of reports from consumers about fraud, identity theft, and other consumer protection topics. During 2017, Sentinel received nearly 2.7 million consumer reports, which the FTC has sorted into 30 top categories. The 2017 Consumer Sentinel Network Data Book (Sentinel Data Book) has a vibrant new look, and a lot more information about what consumers told us last year. You'll know more about how much money people lost in the aggregate, the median amount they paid, and what frauds were most costly. And you'll know much more about complaints of identity theft, fraud, and other types of problems in each state, too. The Sentinel Data Book is based on unverified reports filed by consumers. The data is not based on a consumer survey. Sentinel has a five-year data retention policy, with reports older than five years purged biannually.
This guide addresses the steps to take once a
breach has occured. For advice on implementing a
plan to protect consumers’ personal information, to
prevent breaches and unauthorized access, check
out the FTC’s Protecting Personal Information: A
Guide for Business and Start with Security: A Guide
for Business.
*Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
FTC Consumer Sentinel Network Law enforcement's source for consumer complaints.
All information, data, and material contained, presented, or provided on is for educational purposes only.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners.
It is not to be construed or intended as providing legal advice.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
7. Guidance for Different Ages
Young kids
Close, hands-on supervision
Tweens
Guided exploration
8. Guidance at Different Ages
Teens
Independent, with mobile access
Important messages:
• Information credibility
• Once it’s posted, you can’t take it back
• Treat people the way you’d like to be treated
9. Net Cetera: What Else?
Other subjects in Net Cetera:
Social networking
Cyberbullying
Sexting
Mobile applications
Social mapping
Protecting your computer
10. Net Cetera: Spread the Word!
Please pass it on:
Clubs, teams, PTAs, school districts, classes…
Put a button or text on your website:
OnGuardOnline.gov
Order more: http://bulkorder.ftc.gov
It’s FREE (and available en español)
13. Socializing Online
Socializing is socializing – online or off
Reminders:
Online actions have real-world consequences
Careful when posting – you can’t take it back
Tell kids to trust their gut if they’re suspicious
Help kids understand what info should stay private
14. Cyberbullying
Harassment that happens online
Talk to your kids:
Encourage them to tell you if an online message or
image makes them feel threatened or hurt
Tell your kids they can’t hide behind what they post
15. Cyberbullying
If your kid has a problem with a bully,
don’t react to the bully
Encourage your kid to talk with you about what’s up
Save the evidence
Block the bully online
Have any bogus profiles taken down
Encourage your kid to help stop cyberbullying –
by not passing on other messages and telling the
bully to stop.
16. Mobile Phones
More and more kids go online from their phones
Develop cell phone rules: when and where they
can use their phones
Set an example by what you do
Use their manners on cell phones, too
Treat people the way they’d like to be treated
17. Mobile Phones
Think about privacy and safety
Photo- and video-sharing on the go
Filters on home computers don’t apply on phones
Talk to kids about using good sense when social
networking on their phone
18. Mobile Phones
Choose the right options and features for your
kid’s phone
Find out about social mapping
Is your kid’s phone GPS-enabled?
Talk to kids about using features only with friends they
know and trust.
Editor's Notes
[Introduction: who you are, where you’re from.]
Today I’d like to talk about some things we can do to help keep kids safer online. I’m highlighting suggestions from this publication, Net Cetera, which we have available for you today.
Let’s start with a few questions: How many of you have school-aged kids? Or know a kid? What ages? Do they spend time online or on a cell phone?
[NOTE TO PRESENTER: This is intended to be a 10-minute presentation if you use just the basic slides. You can lengthen it by adding discussion of any of the specific topics included under ADDITIONAL SLIDES.]
Most of us – and probably most kids – do all kinds of things online.
We may socialize via email, IM, phone over web, or social networks
Many of us post and share pictures and videos
We may have profiles on social networks, sharing information with friends
and
Sometimes we create avatars to represent us in online spaces.
These activities come with some risks:
Inappropriate Conduct: it’s anonymous online, and people – especially kids – can forget that their online actions can have real-world consequences.
Inappropriate Contact: there are people online who have bad intentions – including bullies, predators, hackers, and scammers.
Inappropriate Content: you may worry about what younger kids may run across – or what older kids might seek out.
So keeping in mind these risks, the Federal Trade Commission wrote a guide for parents called Net Cetera.
It’s based on the idea that the first step to protecting kids online is more about talking than technology. When kids want important information, they turn to their parents. This guide can help parents talk with their kids about being safe online.
We often heard from parents – especially those with tech-savvy kids – that they didn’t know where to start. So, for parents who wonder where to begin, here are some tips:
Start early: Even toddlers see their parents using communications tools. What toddler doesn’t want to get little hands on a cell phone? As soon as these kids use a computer or phone themselves, it’s time to talk with them about safety.
If your kids are already going online:
Create an honest, open environment: Listen to what kids have to say, and be supportive.
Initiate conversations: Don’t wait for kids to come to you. Use everyday chances to talk with kids: news stories about cyberbullying, a storyline on TV – both can be the start of a worthwhile conversation.
Communicate your values – and how they apply online: You’re the only one in a position to guide your kids this way. Be very clear with kids about this. It’ll help them make smarter decisions when they’re faced with tricky situations.
Be patient: Most kids need small bits of information repeated – and often – for it to really sink in. Keep talking; chances are it’ll pay off.
Kids need different levels of attention and guidance at different ages – and it’s really up to you to decide where your own kids fit.
Starting with very young kids, it’s a good idea to supervise them while they’re online – maybe even choosing the sites they can visit. As they’re ready to explore a little more, consider limiting their exploration to sites you’ve already checked out and that you think are OK for their educational and entertainment value.
Moving on to tweens, aged 8-12, who usually are ready to explore a bit more on their own – it’s still a good idea to be close by. Having the computer in a family area is a good idea. Parents also may want to talk about how much time their tween can spend online.
By the time kids are teenagers, many are ready for more independence from their parents. They’re starting to form their own values and reflecting those of their friends. But that doesn’t mean there’s no point in talking with them.
Teens have access to the internet through their mobile devices, phones, their computers and their friends computers, so it’s really hard to watch what they do. It doesn’t hurt to reinforce ‘good citizenship’ messages with teens, along with three important messages that many need to hear:
Not all information is credible: just because it’s posted, doesn’t mean it’s so.
Once they post something, there’s no taking it back. It’s out there in the world.
No matter how impersonal it seems, screen names, profiles and avatars belong to people with real feelings. Treat them the way you’d like to be treated.
The booklet is called Net Cetera for a reason: it covers other subjects you might want to talk about with kids:
safe social networking
how to handle cyberbullying
what to do about sexting (which boils down to “don’t do it”)
managing mobile applications
understanding social mapping (a kind of GPS in mobile phones that lets people know where you are), and
protecting your computer.
Net Cetera also talks about phishing, parental controls, file sharing, cell phone etiquette – those subjects parents need to know to talk with their kids about being safe online.
In case you’d like more copies, or if you belong to any groups that might be able to use copies, please feel free to pass it on! There are a few ways you can do that:
Net Cetera is posted at OnGuardOnline.gov, the federal government’s online safety website. You’ll find the full document there, as well as a button you can grab and post on your own website. [eventually…] You can also copy sections of the guide to use in newsletters, blogs – however you can use it. The booklet is in the public domain.
You also may want to order free copies at the FTC’s bulk order site: bulkorder.ftc.gov. They’re free, and they’re available in both English and Spanish.
[NOTE TO PRESENTER: The first section is a basic presentation lasting about 10-15 minutes. If you’d like to add any of these topics, simply copy these slides before Slide #9. We suggest you still finish with Slides # 10-11.]
Adults often see socializing online and offline as separate activities, each with its own rules. Kids see it all as socializing, whether it’s online or off – and it’s good to talk with them about how they act online. Even the most tech-savvy kids can use some reminders about their online behavior:
What they do online can have real-world consequences – the words they use and what they post can have a big impact on others, and on themselves.
Remind kids that, once they post something, they can’t take it back. It’s a message that’s worth repeating, especially since the colleges and jobs kids may eventually want to get into will be checking their social networking profiles.
While most kids are good at just deleting things they think are annoying or creepy, tell kids to trust their gut if they’re suspicious about anything – and to tell you about it. You can help them report it to the police and the social networking site.
It’s a good idea to remind kids to keep personal information private. Kids should avoid posting things like where they go to school, their address or phone number.
Cyberbullying is harassment or bullying that happens online, and it can happen on social networking sites, in IMs, emails, text messages, and in games. Recent research shows that this is the online safety issue that kids are most worried about.
Again, the advice is to talk to your kids.
Ask them to tell you if an online message makes them feel threatened or hurt. The same goes for images. Keep an open channel of communication with your child and hopefully he or she will come to you.
Tell your kids that they can’t hide behind the worlds they type or the images they post. None of us want to think that our kid might be bullying other kids. Still, remind your child that hurtful messages can make the sender look bad, and sometimes even bring punishment from the authorities.
If your child has a problem with a bully, tell him or her not to react. Bullies are looking for a response, so don’t give them one.
Encourage your kid to talk with you about what’s going on, and to help you save the evidence. If the bullying keeps up, share the record with the school or the police. If you ever fear for your child’s safety, immediately contact the police.
Block the bully online: remove him or her from “friend” or “buddy” lists, and block the email address.
If your child’s social networking profile has been changed or created without his permission, get in touch with the company that runs the site to have it taken down.
Tell your kid that she can help stop cyberbullying by telling the bully to stop, and by not passing on mean messages.
As communications have gone mobile, so has kids’ ability to constantly stay in touch. The fundamentals of common sense and common courtesy apply, regardless of where communications take place.
Establish rules about when and where it’s appropriate to use their cell phones. Can they text at the dinner table? Do they have to give you their phone when they’re supposed to be doing homework or sleeping?
Consider the example you’re setting: do you do the things you forbid your kids to do? Remember that it’s illegal to text, surf, or talk on the phone while driving in many states – and it’s dangerous in all of them. And your kids are watching.
Talk to your kids about using their manners on cell phones and online (since many of them get online through their phones). Remind them to treat people the way they’d like to be treated.
Talk with your kids about privacy and safety. Most mobile phones allow photo- and video-sharing, which can be fun and creative – but can also cause issues about personal privacy and reputation.
Encourage kids to think about their privacy – and that of others – before posting a picture or video. With mobile phones, it’s easy to post a picture without the OK of the person in the picture, but that can be embarrassing and even unsafe. Better to think first than do damage control later.
Smart phones let kids check and update their social networking pages on the go. Remember that any filters you’ve set up on the home computer don’t apply on the phone. Encourage your child to use good sense when social networking from their phone.
The phone itself, as well as the mobile carrier, should give you some options about privacy settings and child safety controls. You often can turn off things like web access, downloading, or texting. Other phones let you set the number of minutes used, limit internet access, and provide number privacy. Ask your carrier what tools are available on your plan and your phone, and find out what they cost. (There may be extra charges for these features.)
Do you know about social mapping? It’s GPS technology that’s in many cell phones now, and kids can use it to pinpoint where their friends are – or be pinpointed by their friends. Tell your kids to use this feature only with friends they know in person and trust – and not to broadcast their location to the world.
You might want to check: some carriers have GPS services that let parents map their kid’s location.