Peruvian Net against Child Pornography

The Peruvian Net against Child Pornography is a non-profit organisation that works against Child Pornography, Child Sexual Abuse, Child Smuggling and Trafficking in Persons and especially aganist Commercial Sexual Exploitation of Children in Peru and Latin America. We are working and liaising with institutions that aim the same objectives.

Sunday, September 24, 2006

TOOLS GUIDELINES FOR INTERNET SAFETY

A) Install monitoring or keystroke capture devices software to help manage where children go online. Monitoring software gives parents and guardians the ability to view activity on the Internet and identify their child's online buddies. These programs give parents and guardians a better understanding of what their child is doing online, where they are going, and empowers parents and guardians to set online boundaries for their children.
.
Over half (51%) of parents either do not have or do not know if they have software on their computer(s) that monitors where their teenager(s) go online and with whom they interact (Ketchum Global Research Network. Parents' Internet Monitoring Study. National Center for Missing & Exploited Children and Cox Communications, 2005).
.
B) Exercise Parental Control: Implement Filtering tools. Parental control tools are provided by some Internet Service Providers (ISP) or are available for purchase and download as separate software packages. These tools allow parents and guardians to restrict websites a child can view from their home computer. Settings are password-protected. Remember that no filter is a substitute for parental supervision.
.
More than 11 million teens regularly view porn online ("Protecting Kids Online." Editorial. The Washington Post. 1 July 2004, A22).
.
C) Restrict Access: Use privacy settings to restrict access to the child's website. Social networking sites provide a variety of privacy settings that limit who can view the child's website. By using these privacy tools, parents and guardians may be able to approve which friends from school, clubs, teams, and community groups are able to view a child's profile or blog, and block unknown individuals from accessing a child's information. On most social networking websites, you can access and change your child's privacy settings by clicking on "account settings." Remember that no one can detect a disguised predator. Predators can still penetrate 'youth only' spaces.
.
Authorities say teens are finding trouble in the social networking environment where millions of people, can in seconds, find out where they go to school, learn their interests, download their pictures and instantly send them messages ("Teens Putting Themselves at Risk Online." Associated Press. USA Today 5 February 2006).
.
D) Check the history to see what sites your kids are visiting. Also, check your kids' computers for LimeWire, Kazaa, or other peer-to-peer file sharing systems. Delete them immediately.
.
E) Get Educated About Technology: Secure the family computer by regularly updating the operating system and installing a firewall, and up-to-date anti-virus and anti-spyware software. The instant a computer is connected to the Internet or an "always on" broadband connection, hackers and thieves can attempt to gain access to the family's financial and personal information. By securing your computer, you can help protect against these Internet intruders and the malicious programs they can download onto your computer.
.

RULES GUIDELINES FOR INTERNET SAFETY

1) Teach your children to never give personal information over the Internet, such as real name, birthday, address, telephone number, password, parents' names, the name of any club or team he/she is involved in, name of his/her school, or after school job.
.
2) Teach them to avoid all personal identifiers and avoid postings about parties, events, or activities where a stranger could find them. Screen names should be gender neutral.
.
(In January of 2005 in Lafayette, Louisiana, a 16-year-old girl was attacked by a 37-year-old man who read her profile on a popular social networking site and tracked her down at her after-school job).
.
3) Pay Attention to Online Photos: Know the type of photos your child is posting online. It is wisest to encourage your child not to post any photos online. Children use various forms of technology to post information and photos online, such as videos and web cams. Photos from camera phones can also be uploaded. Parents and guardians should be aware of the imagery their children post on the Web--these images may pose a risk to their children, exposing them to online predators and people they don't know. Even innocent photos can attract a predator. Check with your child's school to see if students' projects, artwork, or photos are being put on school websites. Schools need to be reminded of the risk and encouraged to allow access to student activities posted on the school's website by password only or posted on the school's Intranet. Webcams should only be used under close parental supervision and sent only to trusted friends and family.
.
Even innocent pictures of school activity on a school Web site have attracted the attention of one predator who became obsessed and kidnapped a child from his school (Burkey, Martin. "Martin Says Child Exploitation is 'Epidemic'." The Decatur Daily News 23 May 2006).
.
4) Supervise Computer Use: Keep your child's computer in an open area of your home and find out what other computers and Internet-enabled mobile devices (cell phones and PDA's) children may be using outside of the home. Placing the computer in an area, such as the kitchen or family room, gives parents and guardians the ability to supervise a child's online navigation.
.
30% of parents allow their teenagers to use the computer in private areas of the house such as a bedroom or a home office. Parents say they are more vigilant about where their teen(s) go online if the computer is in a public area of the household (Ketchum Global Research Network. Parents' Internet Monitoring Study. National Center for Missing & Exploited Children and Cox Communications, 2005).
.
5) Keep the Lines of Communication Open: Spend time on the Internet alongside your child and establish an atmosphere of trust. This provides an opportunity for parents and guardians to engage in dialogue about websites their children visit and programs they are using. Parents and guardians should be open to learning about technology so they can keep up with their children. Understanding how children use the Internet will give parents and guardians a better idea of the risks they may face, and how they can better safeguard their children.
.
65% of all parents and 64% of all teens say that teens do things online that they wouldn't want their parents to know about (Family, Friends & Community: Protecting Teens Online, Amanda Lenhart. March 17, 2005. Pew Internet & American Life Project. December 12, 2005).
.
6) Know your kids' online activities and friends. Know each of your child's passwords, screen names, and all account information. Regularly ask your kids about who they are communicating with online and their activities. Be Proactive. Role-play with your child the various dangerous scenarios they could encounter online, and remind them that the people they meet online are not their "friends." Children should be cautioned to only communicate online with people they know by sight and who have been approved by you.
.
Almost one in eight youth ages 8-18 discovered that someone they were communicating with online was an adult pretending to be much younger (Internet safety: Realistic Strategies & Messages for Kids Taking More and More Risks Online. December 21, 2005. Polly Klaas Foundation. February 17, 2006)

7) Instruct your child never to plan a face-to-face meeting. Children should also be advised to come to you if anyone makes them feel scared, uncomfortable, or confused or suggests meeting them.
.
One-third of youth ages 8-18 have talked about meeting someone they have only met through the Internet (Omnibuzz.Research. Nationwide Poll of Teens and Tweens. Polly Klaas Foundation, December 21, 2005).
.
8) Talk to your children about chat rooms. Recognize that chat rooms are the playground of today's sexual predator. EIE strongly urges parents to disallow chat rooms because it's impossible for a parent, child, or technology tool to recognize a disguised predator.
.
30% of teenage girls polled by the Girl Scout Research Institute said they had been sexually harassed in a chat room. Only 7% told their parent because they were worried that their parents would ban them from going online (Girl Scout Research Institute. The Net Effect: Girls and New Media. 2002).

9) Limit your child's Instant Messaging to a parental or guardian-approved buddy list. Regularly check your child's buddy list to ensure that it has not been altered.
.
42% of parents do not review the content of what their teenager(s) read and/or type in chat rooms or via instant messaging (Ketchum Global Research Network. Parents' Internet Monitoring Study. National Center for Missing & Exploited Children and Cox Communications, 2005).
.
10) Limit and monitor the amount of time your child spends on the Internet, and at what times of day. Excessive time online, especially at night, may indicate a problem. Remind your child that Internet use is a privilege, not a right.
.
23% of youth reported being "very" or "extremely upset" by exposures to sexual material (The Victimization of Children: Emerging Issues. Ed. J.L. Mullings, J.W. Marquart, and D.J. Hartley. New York: Haworth Maltreatment &Trauma Press, 2003).
.
11) Establish online rules (see Youth Internet Safety Contract) and an agreement with your child about Internet use at home and outside of the home (i.e., at a friend's house, at school, at the library, etc.).
.
77% of parents do not have rules about what their kids can do on the computer, such as restricting the amount of time their kids spend on the computer (Generation M: Media in the Lives of 8-18 Year-Olds. Kaiser Family Foundation Study, March 2005).

12) Virtual Parenting: Set-up the family's Internet service accounts. Parents should take an active role in setting up Internet service accounts, including any online community services children may join. Parents should regularly monitor accounts to supervise online friends, chat areas and blogs. It is safest to block all chat rooms and limit instant messaging to a parent-approved buddy list.
.
One third of Internet users ages 10-17 were exposed to unwanted sexual material (University of New Hampshire. Online Victimization of Youth: Five Years Later. National Center for Missing and Exploited Children. August, 2006).
.
13) Think Like the Child: Search blog sites children visit to see what information they are posting. To ensure that children are not engaging in risky online behavior, we recommend that parents and guardians do a simple online search. Parents and guardians can type in their child's name, nickname, school, hobbies, grade, or residence to determine information availability. Supervise blogs and be aware of not only what your child is posting, but what other kids are posting about your child.
.
86% of the girls polled said they could chat online without their parents' knowledge, 57% could read their parents' e-mail, and 54% could conduct a cyber relationship (Girl Scout Research Institute. The Net Effect: Girls and New Media. 2002).

14) Report any content or activity that you suspect as illegal or criminal to local law enforcement and to the National Center for Missing & Exploited Children at www.cybertipline.com or at 1-800-843-5678.
.