SlideShare a Scribd company logo
SOCIAL MEDIA CONTRACT FOR PARENTS AND TEENS
Brought to you by www.YourBrandingPower.com 1
This contract is to help our family create ground rules and consequences for social media usage by
<INSERT CHILD’S NAME>. By signing this agreement, <CHILD> agrees to the following rules for safe social
media usage.
SOCIAL MEDIA RULES
1. <CHILD> is allowed to use the following social media accounts:
Social network Log-in Password
<INSERT NETWORK>
<INSERT NETWORK>
<INSERT NETWORK>
2. <CHILD> agrees to not change the log-in or password for any social media account without
parental permission.
3. <CHILD> promises to only follow or friend people through social media that he or she personally
knows.
4. <CHILD> agrees that his/her parent(s) can and will follow his/her social media accounts and
promises to not unfriend , unfollow or block his/her parents in any way.
5. Privacy settings will be established together, and <CHILD> cannot change his/her privacy
settings without parental permission.
6. By participating in social media, <CHILD> understands that his/her parent(s) can and will check
all social media activity, unannounced and at random times. This includes reviewing social
media activity on a computer, smartphone and/or tablet.
7. <CHILD> agrees to never reveal personal information, including physical address, phone number
and email address, in a public forum.
8. <CHILD> promises to not tag friends in his/her pictures. Instead, allow your friends to tag
themselves.
9. <CHILD> agrees to not tag his/her pictures on someone else’s social media account without first
understanding the other person’s privacy settings.
10. <CHILD> agrees to not check into places through Facebook, Google, Foursquare or any other
location-based social network.
11. Before joining a group on a social network (such as a Facebook group), <CHILD> must first have
parental permission.
12. <CHILD> agrees to discuss friending/following teachers, school staff members, coaches and
other authority figures before engaging with them on social media.
13. <CHILD> promises to follow the following rules about posting content:
The Golden Rule: “If I don’t want my principal or parent to see it, I won’t post it on social
media.”
SOCIAL MEDIA CONTRACT FOR PARENTS AND TEENS
Brought to you by www.YourBrandingPower.com 2
Don’t hide behind the computer screen: “I won’t post anything on social media that I
wouldn’t say to someone’s face.”
Zero tolerance for cyberbullying: “I promise to never cyberbully, and I will report any
cyberbullying to my parent and/or appropriate school staff member.”
CONSEQUENCES
If <CHILD> breaks any of the rules listed in this social media contract, here are the consequences
<CHILD> will face:
First offense:
Second offense:
Third offense:
REVIEW OF CONTRACT
This social media contract will be reviewed <INSERT TIME FRAME OR DATE> and can be amended at that
time.
SIGNATURES
By signing this social media contract, <CHILD> agrees to all rules, consequences and contract review
terms without exception.
__________________________________________ _______________________
CHILD’S SIGNATURE DATE
_________________________________________ _______________________
PARENT’S SIGNATURE DATE
_________________________________________ _______________________
PARENT’S SIGNATURE DATE

More Related Content

Similar to Social media contract for parents and teens

Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
lhurd01
 
Facebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth KandeepanFacebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth Kandeepan
prasanthkandeepan
 
Making social media safe for kids
Making social media safe for kidsMaking social media safe for kids
Making social media safe for kids
Raising Arizona Kids magazine
 
Facebook Online Policy Primer
Facebook Online Policy PrimerFacebook Online Policy Primer
Facebook Online Policy Primer
mark mclaine
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
Loreto Normanurst
 
11 things you should know about facebook
11 things you should know about facebook11 things you should know about facebook
11 things you should know about facebook
Your eKavach
 
The good, bad & ugly of social media
The good, bad  & ugly of social media The good, bad  & ugly of social media
The good, bad & ugly of social media
Tuiki George
 
BDO Warns Residents About Information Sharing with WhatsApp
BDO Warns Residents About Information Sharing with WhatsAppBDO Warns Residents About Information Sharing with WhatsApp
BDO Warns Residents About Information Sharing with WhatsApp
Ryan Geluk
 
Social networking for kids
Social networking for kidsSocial networking for kids
Social networking for kids
Marsha Harris
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
Katherine Lyddon
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
myra14
 
Colorful Social Media Online Behaviors Technology Presentation (1).pptx
Colorful Social Media Online Behaviors Technology Presentation (1).pptxColorful Social Media Online Behaviors Technology Presentation (1).pptx
Colorful Social Media Online Behaviors Technology Presentation (1).pptx
JeanBayson1
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
Holly Solomon
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
ner1eje
 
Digital Citizenship Unit 3 Lesson 3
Digital Citizenship Unit 3 Lesson 3Digital Citizenship Unit 3 Lesson 3
Digital Citizenship Unit 3 Lesson 3
Chele Marceau-Burch
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011
Loreto Normanurst
 
Internet Contract
Internet ContractInternet Contract
Internet Contract
yasha15
 
presentation_facebook.ppt_1454696027_172321 (2).pptx
presentation_facebook.ppt_1454696027_172321 (2).pptxpresentation_facebook.ppt_1454696027_172321 (2).pptx
presentation_facebook.ppt_1454696027_172321 (2).pptx
kanurukarthikeya
 
Facebook
FacebookFacebook
Facebook
Gulfam Hussain
 
Project
ProjectProject
Project
adrienewton
 

Similar to Social media contract for parents and teens (20)

Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
 
Facebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth KandeepanFacebook Policy Primer by Prasanth Kandeepan
Facebook Policy Primer by Prasanth Kandeepan
 
Making social media safe for kids
Making social media safe for kidsMaking social media safe for kids
Making social media safe for kids
 
Facebook Online Policy Primer
Facebook Online Policy PrimerFacebook Online Policy Primer
Facebook Online Policy Primer
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
11 things you should know about facebook
11 things you should know about facebook11 things you should know about facebook
11 things you should know about facebook
 
The good, bad & ugly of social media
The good, bad  & ugly of social media The good, bad  & ugly of social media
The good, bad & ugly of social media
 
BDO Warns Residents About Information Sharing with WhatsApp
BDO Warns Residents About Information Sharing with WhatsAppBDO Warns Residents About Information Sharing with WhatsApp
BDO Warns Residents About Information Sharing with WhatsApp
 
Social networking for kids
Social networking for kidsSocial networking for kids
Social networking for kids
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
 
Colorful Social Media Online Behaviors Technology Presentation (1).pptx
Colorful Social Media Online Behaviors Technology Presentation (1).pptxColorful Social Media Online Behaviors Technology Presentation (1).pptx
Colorful Social Media Online Behaviors Technology Presentation (1).pptx
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Digital Citizenship Unit 3 Lesson 3
Digital Citizenship Unit 3 Lesson 3Digital Citizenship Unit 3 Lesson 3
Digital Citizenship Unit 3 Lesson 3
 
PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011PPT Year 9 Parent Presentation Evening Feb 2011
PPT Year 9 Parent Presentation Evening Feb 2011
 
Internet Contract
Internet ContractInternet Contract
Internet Contract
 
presentation_facebook.ppt_1454696027_172321 (2).pptx
presentation_facebook.ppt_1454696027_172321 (2).pptxpresentation_facebook.ppt_1454696027_172321 (2).pptx
presentation_facebook.ppt_1454696027_172321 (2).pptx
 
Facebook
FacebookFacebook
Facebook
 
Project
ProjectProject
Project
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Social media contract for parents and teens

  • 1. SOCIAL MEDIA CONTRACT FOR PARENTS AND TEENS Brought to you by www.YourBrandingPower.com 1 This contract is to help our family create ground rules and consequences for social media usage by <INSERT CHILD’S NAME>. By signing this agreement, <CHILD> agrees to the following rules for safe social media usage. SOCIAL MEDIA RULES 1. <CHILD> is allowed to use the following social media accounts: Social network Log-in Password <INSERT NETWORK> <INSERT NETWORK> <INSERT NETWORK> 2. <CHILD> agrees to not change the log-in or password for any social media account without parental permission. 3. <CHILD> promises to only follow or friend people through social media that he or she personally knows. 4. <CHILD> agrees that his/her parent(s) can and will follow his/her social media accounts and promises to not unfriend , unfollow or block his/her parents in any way. 5. Privacy settings will be established together, and <CHILD> cannot change his/her privacy settings without parental permission. 6. By participating in social media, <CHILD> understands that his/her parent(s) can and will check all social media activity, unannounced and at random times. This includes reviewing social media activity on a computer, smartphone and/or tablet. 7. <CHILD> agrees to never reveal personal information, including physical address, phone number and email address, in a public forum. 8. <CHILD> promises to not tag friends in his/her pictures. Instead, allow your friends to tag themselves. 9. <CHILD> agrees to not tag his/her pictures on someone else’s social media account without first understanding the other person’s privacy settings. 10. <CHILD> agrees to not check into places through Facebook, Google, Foursquare or any other location-based social network. 11. Before joining a group on a social network (such as a Facebook group), <CHILD> must first have parental permission. 12. <CHILD> agrees to discuss friending/following teachers, school staff members, coaches and other authority figures before engaging with them on social media. 13. <CHILD> promises to follow the following rules about posting content: The Golden Rule: “If I don’t want my principal or parent to see it, I won’t post it on social media.”
  • 2. SOCIAL MEDIA CONTRACT FOR PARENTS AND TEENS Brought to you by www.YourBrandingPower.com 2 Don’t hide behind the computer screen: “I won’t post anything on social media that I wouldn’t say to someone’s face.” Zero tolerance for cyberbullying: “I promise to never cyberbully, and I will report any cyberbullying to my parent and/or appropriate school staff member.” CONSEQUENCES If <CHILD> breaks any of the rules listed in this social media contract, here are the consequences <CHILD> will face: First offense: Second offense: Third offense: REVIEW OF CONTRACT This social media contract will be reviewed <INSERT TIME FRAME OR DATE> and can be amended at that time. SIGNATURES By signing this social media contract, <CHILD> agrees to all rules, consequences and contract review terms without exception. __________________________________________ _______________________ CHILD’S SIGNATURE DATE _________________________________________ _______________________ PARENT’S SIGNATURE DATE _________________________________________ _______________________ PARENT’S SIGNATURE DATE