Category Archives: media

Protecting your family online (4)

We started these articles with the comment that ‘protecting your family online’ has four components, or steps.  In the first three articles we mentioned the importance of taking inventory of your electronic devices that can access the internet, and installing and configuring three essential tools.  In this article we want to discuss the remaining two steps.  These two are the most difficult and most important.

Step 3: Staying Informed

Staying informed involves more than knowing what our children are doing; it includes knowing what is available to them—what is ‘out there’.  Both of these are parental responsibilities we cannot excuse ourselves from, and which are no different now than in generations past.  Society has changed dramatically over the last decades, however, and with it have our family lives.  More disposable income and time have given increased access to entertainment and opportunity to associate with people who hold other views and values.  Ironically we seem busier than ever.  And also ironically, the more ‘connected’ some people have become via social media and mobile devices, the less in touch they are with their children or know what they are doing.

Staying informed of developments in media and technology can be looked at from two angles, and both are necessary.  First, we can look at individual developments or devices and ask on a per case basis if these are acceptable to buy or use.  Questions guiding such an evaluation might include:

  • How could the new gadget or tool be used wrongly?
  • What was it principally designed for?
  • What sort of influence could it have on those that use it?

Sources for learning about new developments are technology sections of news sites and newspapers, specific websites such as wired.com, gizmodo.com, engadget.com, ted.com (which tend to promote acceptance of new and often useless gadgetry), or (more realistic) browsing your local computer store.

Evaluating new technologies to see if their use is permissible or will present unacceptable influences is not easy.  Virtually all tools can be used for good and bad purposes.  Inventions themselves are not evil, but often they increase our ability to express the evil that is within us, and access that which is around us.  This led many to view bicycles in the 1890’s and automobiles in the 1920’s with much suspicion, expecting them to facilitate all manner of sexual immorality.  It is also nearly impossible to predict what a device will be used for, as one development rapidly leads to another.  A. G. Bell probably did not envision the smart phone, or the designers of ARPANET in the 1960’s the Silk Road and bitcoin.  The engineers at Remington-Rand who made the first computer printer in the 1950’s did not anticipate today’s 3D printing of human organs, guns, and drones.

Second, developments in media and technology should also be viewed thematically.  Individual inventions are part of larger processes and trends.  From a materials point of view, most new technologies serve to automate and complicate machines, and increase our connectivity to and dependence on the internet.   Both of these make us increasingly helpless when our machines fail, or the internet breaks down.  The latter has led to sufficient concern from governments to research the implications of large scale outages of the internet resulting from cyber-warfare or natural calamities such as major solar flares (i.e. “Carrington events”), as such outages could cripple military operations, hospitals, electrical grids and other utilities, our food supply, communications and navigation, etc.  From a moral point of view, many new technologies increase the ability of the evil that resides in each human heart to be expressed.  What people share on their social media sites and blogs, on forums, and in their comments to newspaper articles is often shocking.  The opinions and personal information shared indicate a rapidly decreasing tolerance of Christian values, and that we live in a ‘post-shame age’.  This is true regarding sexual mores, disrespect for authority, worship of self, and desire for instant gratification.  With this in mind, to stay informed means recognizing the ‘big picture’ of what our society as a whole is like and how it is becoming increasingly hostile to those who hold our beliefs and values, and to evaluate how individual technologies and developments will likely be used to further this moral decline.

Step 4: Family Discussions

This is the most important step, and it requires all three of the previous parts: taking inventory; installing tools; and being aware of what your children are doing, what new technologies are available to them, and how society is influencing them.   What is discussed will depend on your family’s situation, and must be age-appropriate.  It is important that our children know the world is a hostile place, particularly so towards Christians, and that evil often comes looking for us, also on the internet.  Our children should be aware there is no privacy on the internet, and that what is posted today can haunt us later when we apply for a job or try to establish relationships.  With this in mind, there is in no reason our children should assume they have the right to keep what they do online or with their mobile devices private or hidden from their parents.  Parents should feel free to monitor their children’s online activities whenever they want to.  The same is true for spouses.

The nature of the conversations should be open and reasonable.  Our children should feel comfortable asking questions as to why certain things are not allowed, and the answers should be based on our values.  If something is wrong, it is wrong because it is sin against God and ruins our soul.  But the baser things presented on the internet can also permanently damage us in this life: they can ruin our ability to have good relations by twisting our views of sexuality and women.  Images “burned on the retina” remain with us for the rest of our lives.  Habitual viewing of violent or immoral materials causes many to progress from one evil to another, as viewing eventually no longer satisfies, and it lowers the threshold towards acting.  In this context may, must we not tell our children from Proverbs 9:18 that the guests of “Mrs. Wanton” are in the depths of hell?

It is often said that our children grow up in a complicated time, complicated in part by today’s unprecedented technological developments.  There is no escaping this; it is the world in which we must live and for which we have to equip our children.  People from many different denominations are struggling with this, and the consensus appears to be that it is far more important to inculcate a sense of right and wrong in our children than to forbid them an endless list of specific activities.  Examples of literature developed to help parents with this are A Guide for those who Guide and (in Dutch) Eigenwijs and Gewetensvorming; these and others are on this website.  Teaching them values will help them determine for themselves what to do when they face situations parents could not have prepared them for, or understand.  This is of huge importance.

Without negating the above, we may not overlook the unspeakable evil that dwells in each human heart and the power and variety of Satan’s temptations.  These remain unchanged, no matter how society and technology evolve.  We are fully inclined to the evils encountered in our everyday lives, regardless of the medium through which these evils present themselves to us, but we still act as free and voluntary agents and are therefore responsible (and accountable) for everything we do, for every decision we make.  Only the true love to God will make us hate sin, and only His restraining grace can prevent us from falling into sin.  How necessary, then, always to ask the Lord for wisdom and grace to recognize and resist temptation, and to enable us to deal with the unprecedented challenges we and our children face (Psalm 127).

Protecting your family online (3)

In our last post we mentioned the first essential tool, internet filtering, members are asked to use to help ‘protect their family online’.   In this article we want to discuss two other tools:

Tool 2: Accountability Reporting Software

Relying on internet filters alone is not enough.  Internet use must also be monitored with accountability reporting software, which often is part of the filter you install (something we’ll come back to later).  Accountability software, when set up properly, keeps a list of all the sites you or another user have visited (or tried to visit) and when you did so, and emails this list to someone on a regular basis.  When these activity logs are reviewed one can tell what each user was trying to access and if the filter is working properly or needs to be reconfigured.  This type of software is much more reliable than your web browser history logs, as the latter can easily be cleared and may be difficult to access if the devices are mobile or inside another user account.

Accountability software should be set up so the reports it generates are sent to an accountability partner–your spouse or another trusted adult.  This is an excellent way for the computer administrator to remain honest especially if the accountability software is robust enough that it cannot be disabled without the partner’s password.  If this step seems somewhat over-the-top, bear in mind that internet misuse is fostered most by the ease and secrecy with which illicit material can be accessed.  Knowing someone may review our online activities is a strong deterrent from doing something inappropriate.   Mikko Hypponen, an internet pioneer and cybersecurity expert, recently remarked that many trust Google with secrets they withhold from their spouse.

NetNanny, iGateWeb, and OpenDNS all provide different levels of accountability reporting.  However, if the filter is disabled or circumvented the accountability report obviously is inaccurate, which is one reason an accountability reporting solution that avoids this should be used.  Some examples of such solutions include: Qustodio http://www.qustodio.com, Covenant Eyes http://www.covenanteyes.com (where the accountability reporting is separate from their filter), and eBlaster Software www.eblaster.com.

It is important you research these (and other) options and choose one.  Many programs offer a trial period allowing you to experiment and see if the software works for you.  Once you have committed to a program, install it on every device in your home (all the devices you listed in the first article).  Like the filter, the accountability report must be configured for each user account to give you an idea of what each user is doing.

Tool 3: Parental Controls

Limiting digital technology use for your children using parental controls and different user accounts is important for more than their moral wellbeing.  Too much screen time has been linked to obesity, sleep and eating disorders, behavioral problems, impaired academic performance, aggression, and insufficient time for active/creative play.  The American Academy of Pediatrics discourages screen time for children under two and recommends limiting daily screen time to one to two hours for older children.  Parental controls are useful tools that allow parents to set specific time limits on the digital devices their children use.  Equally important, this software also allows parents to prevent their children from using specific programs and apps.  Parental controls can be set up using either features built into the operating system or other software programs.

There are too many different operating systems and parental control programs to allow a discussion of all the ways to set them up.  That does not mean setting up parental controls is difficult.  Usually the parental controls (called “Restrictions” on iPhones) can be found in the control panel or in the settings menu.  It is best if you google “Windows parental controls” or “Android restricted profiles” to access one of the many guides detailing how to install parental controls.  Since each user will require different restrictions, a separate user account (or profile) should be created for each user.  For children these accounts should be ‘limited’ or ‘restricted’ to prevent them for installing unwanted software and from having administrator privileges on the device.

Controls on smartphones.  Correctly configuring the parental controls on your child’s smartphone (or tablet, etc.) is very important.  Aside from phone calls and texting, these devices are used to watch movies and access social media (and many other things), so that they often become your child’s main portal to the digital world.  Without having the parental controls or restrictions properly configured, you, as parent, have little or no control over the actual use of the device.  You may have iGateWeb or OpenDNS installed on your home network, but if your child’s device has a data package, or access to an open WiFi connection (available at many locations), they have easy access to open internet.

Apps and default browsers.  When configuring parental controls on smartphones and tablets, it is important to restrict what apps users can access and install, as internet filters are usually unable to filter the content accessed with them.  Another thing to remember when configuring these devices is to block the default browser, because the web filtering usually only works on their provided browser.  Other things you will (or should) want to prevent your child from accessing are sites such as iTunes/App store/Google Play, and from making in-app purchases.  The latter is important to prevent your child from incurring large, unexpected costs on your account.  For iOS devices, the restrictions password should be different from the login password so that children cannot turn off the restrictions. Again, using accountability reporting together with parental controls allows you to see what apps are being accessed.

Some parental control features and app restrictions are also found in software programs such as NetNanny and Qustodio, allowing you to use these programs for several different purposes.  However, we strongly suggest you look into other parental control software options as well, as often one program provides features that are not included in another.  The parental controls built into the operating system are free and we recommend using those along with features provided with programs like NetNanny and Qustodio.

 Questions and comments

Why can’t you just recommend a simple solution – one tool that does everything?  Our common workplace and jobsite tools all have their own specific purpose for which they are best suited; we don’t have a single tool that does it all.  Digital ‘tools’ are similar: each has a purpose for which it is best suited, and although tool functionality often overlaps (e.g. a filter that also allows some parental controls), you are best off with a well-stocked (digital) toolbox.  There are situations where you need more than one tool.  For example, if you need to temporarily turn off your filter to access a site or run a program, your accountability software can be left on if these are separate programs.  The best suggestion we currently have for a single program that filters, does accountability reporting, and allows you to set up parental controls is Qustodio.  This is a good program, but it does not filter as well as NetNanny.

Protecting your family online (2)

In our first post we mentioned the importance of knowing the threats presented by the internet, and how these reach your family.  This is the first step for ‘protecting your family online’.   Here we want to discuss:

Step 2: Installing and Configuring Three Essential Tools

To help protect yourself online, all members are asked to use three tools.  Being tools, they are not solutions or to be trusted as perfect.  Like any other tool, they can be used improperly.  Nor does installing these tools absolve us from our parental responsibilities.

Tool 1: Internet Filters

Internet filters are the most common tool for keeping us from accessing inappropriate material.  There are many different internet filters on the market, and some of them are much more effective than others.  Unfortunately all filters will allow some inappropriate material to pass through, and prevent you from accessing some harmless sites.  This is simply due to the nature of internet–there are hundreds of millions of pages of information on the internet, and millions more are added every day.

Some very important considerations when setting up a filter include the ease with which you can bypass it, override a blocked site, turn it off altogether, or uninstall it.  It is also critical that you set it to an appropriate level.  A suitable filter can also block out categories (e.g. Social Networking, sports, gambling) and prevent access to internet browsers that allow you to turn off safe search.

The ideal filter uses dynamic filtering along with URL and keyword filtering.  URL filtering blocks sites with domain names that have been identified and categorized as objectionable.  Keyword filters use certain words and phrases to block sites.  Dynamic filtering uses a much more complex algorithm and evaluates the sites’ content just before it is displayed on your screen.  While it is not always easy to determine if your filter is using dynamic filtering, we strongly recommend you use a filter that uses this method in addition to the simpler URL/keyword blocking.

Filters can be installed on specific devices (i.e. NetNanny) protecting only that device, or protect your entire network by being proxy or ISP based (i.e. iGateWeb).  The benefit of having your filter installed on specific devices is that your laptop or tablet is filtered when connected to a data package or to Wi-Fi provided by your neighbour or a company (e.g. Starbucks).  The benefit of a filter that is ISP based, or proxy based via your router, is that any devices connected to your internet in the home are filtered – including visitors’ devices.  There is usually no clear answer of which method is best for you, and we strongly recommend you use two different filters so that you have both forms of protection.

Two years ago MTAC evaluated a number of different filters and the results showed a very significant range in filtering performance.  The results can be found in the resources section of our website www.media-aware.net.  Many more filters exist than those that were evaluated, and it is difficult to determine the current relevance of these results as small changes to a filtering algorithm can significantly change a filter’s performance.  However, based on these evaluations the RCNA still requires members to use either iGateWeb and/or NetNanny.  Since many of our devices are mobile and have their own data connections, and since wireless tethering/hotspots are easy to implement, we can no longer recommend using only iGateWeb without device specific filters.

A few other filters: Covenant Eyes www.covenanteyes.com is appealing because the company provides many excellent resources and has a Christian basis (cf NetNanny, which is secular).  Unfortunately, our evaluation indicates the actual performance of the Covenant Eyes filter is poor and that it cannot be recommended instead of NetNanny or iGateWeb.  K9 Web Protection www.k9webprotection.com provides a free filter that appears to be popular (mostly because it is free).  While MTAC has not evaluated this filter, K9 might be a good option to use in conjunction with iGateWeb.  OpenDNS www.opendns.com is also a free filter that is set up on your router to provide filtering for everything on your network.  Again, MTAC has not evaluated this filter and it appears to only use URL based filtering.  However, OpenDNS might be a good option to use in combination with NetNanny.

All internet-capable devices, including mobile devices, owned by you and your family members must have a suitable filter.  This implies that for this step in ‘protecting your family online’ you need to research the different options and decide which filters you intend to use.  We understand this can be a very confusing exercise, which is one reason we strongly recommend using NetNanny as the primary filter on all devices.  (NetNanny provides filtering products for Windows, Mac, Android, and iOS devices).  In addition to NetNanny, we strongly recommend using a network wide filter such as iGateWeb or OpenDNS.

Once you have decided on the filters you plan to use, you need to download and install this software onto each device you identified in the first brochure, and on your network router.  The filtering software must also be properly configured for different age levels.  We recommend starting with the filter set as strict as possible to minimize underblocking.  As you begin using the filter and find that strictest setting is unworkable, the settings can be modified as necessary.  Obviously different settings will result for different age groups and users.

Questions and Comments

Do I need a filter if I already have virus and malware protection on my computer?  Yes.  There is a lot of different “protection” software out there—and they are designed for different purposes and different markets.  McAfee, Norton, and Kaspersky provide good tools for keeping viruses from your computer, and allow you to set up parental controls.  But they are not designed for filtering out porn and other objectionable material.  Filtering software (e.g. NetNanny) may not give much in terms of anti-virus protection.  Since such programs are often (but not always) compatible with each other, you are best served using both.  Put bluntly, antivirus/ malware software aims to protect your physical and virtual possessions; filters aim to keep you from sin.

What is a good setting for my filter?   As restrictive as you can work with.  Avoid “adult”, “mature” and “18+” settings, as these tend to be far too open.  For your younger children you can set it much lower (i.e. when you have multiple user accounts, you can give your younger children the most restrictive settings that block all video and social networking sites), and give older children and yourself less restrictive access.

Filters are too restrictive and slow.  This is a myth–most current filters do not significantly delay the time it takes to access a site, and limit over-blocking by dynamically filtering sites rather than by categorically blocking access to them.

Protecting your family online (1)

Protecting yourself and your family online is easier to discuss than achieve.  While it is important to install internet filtering and accountability reporting on our computers and smartphones, additional steps are necessary to develop online protection.  Your Consistory would like to provide some information to help you do this.  The guidelines proposed are general, and apply to all members, but how you implement them will depend on your particular family—e.g. the age of your children and nature of your work.  An attempt is made to keep the information simple, which means the more tech-savvy reader will find it limited.  However, it is hoped the general guidelines described here will be helpful to those readers also, and help give them some direction as to what the Consistory requires.  The information presented here is not original, and more detailed how-to guides are available on our website, http://media-aware.net/.

Four steps

According to some popular guides, ‘protecting your family online’ has four components, or steps:

  1. Taking inventory of your electronic devices that can access the internet
  2. Installing and configuring three essential tools
  3. Staying informed
  4. Family discussions

We hope to discuss these steps and address some related questions and comments in several short brochures.

Step 1: Taking Inventory

Before you can protect yourself online, you need to know the threats presented by the internet, and know how these reach you and your children.

What is out there? 

Most are aware that the internet, while extremely useful and necessary to our current way of life, can be used to very easily access material that is dangerous to both our material and spiritual wellbeing.  Threats include viewing of porn and violence, being cyberbullied or stalked by online predators, online gaming and gambling, unnecessary trolling for information, watching sports and movies and other objectionable videos, listening to unacceptable music, etc.  One does not need the internet to be exposed to, or do any of this, but the internet has made these things much more accessible, especially for our children.  There is an abundance of information warning about the dangers mentioned above, written by people from many different religious (and secular) persuasions.  Some of this information is available on our website.  Unfortunately not all members appreciate the severity of this threat to our community, but the dangers cannot be overstated.

How do we access this material?

The material mentioned above can be accessed through any device with an internet connection.  These devices include smartphones, home computers, and tablets—those owned by you and your children and those owned by their friends. This easy accessibility means that our young children can access, or involuntarily be exposed to indescribably vulgar and gruesome material.

What devices are in your home, and do your children have access to? 

How can you and your children access the internet, and how do you protect your family from these threats?  For a dyke to be effective it needs to be complete.  In this context this means that, as far as is in your control, all the internet-capable devices in your home and that you access at your work should be filtered.  It might be helpful to make a list of these devices, and behind each one jot down what protection is currently provided, who in your family uses it and when, and where this device is most often used.  It might alarm you if an entry read, “Mom’s smartphone / no filter / all kids, whenever they want it / on the bus, at their after-school jobs, and when they are at friends at night”.

Regarding protection, your checklist should also state if you have parental controls (e.g. child specific user accounts with time limits), and accountability reporting set up.  What happens outside your supervision is obviously much more difficult to control, which we will return to later.  It is not uncommon for children to access objectionable material via un(der)-filtered internet, and to share– through cloud storage, USB’s, etc.–this with others who do have proper filtering at home.  Allowing kids in both homes to watch hours of movies (or worse) weekly.

Taking Inventory–what devices are used by you and your family?

Device (in home, in car, at work)

Type of filter, filter setting

Who uses it?  Where is it used?

Parental Controls set up?  (e.g. time limits)

Accountability tracking activated?

e.g. Home Computer (main) NetNanny.  Child setting for kids, 18+ for parents Everyone in the house (mom, dad, kids);

In the house

Yes, separate user accounts for younger children Yes, for each user account separately
         

Modern Media:
Some Basic Guidelines and how they relate to Media Use (3)

The guidelines we state here are based on those adopted by the 2013 Classis meeting of the RCNA.  These guidelines are well known, apply to all aspects of our lives, and have always been the same.  They are presented in no particular order, are by no means complete, and can be restated in various ways.

Accountability.  All our actions are simple, free choices for which we remain fully responsible, and which inevitably have consequences.  What we do online may seem to be anonymous and unknown to others, but we will be held accountable for them.  And, of course, nothing we do on the internet is truly secure and private, and nothing we post is retrievable.  This is a very good thing to keep in mind before sending a text, sharing a file, uploading personal information about yourself or others, or engaging in improper or other online activities you wouldn’t want others to know about.

Whatever we do must be done out of love, for the glory and honour of God, and to the wellbeing of our neighbour.  This is true for whoever we are, and whenever we do anything.  God’s word and revealed will (Ten Commandments) are to be our guide in life, and they call us to avoid the lust of the flesh, lust of the eyes, and pride of life–three things that sum up what the world offers.  We do well to remember that God is not mocked or deceived, that He requires that which is past, that He will reward each according to his work.  There are very many online activities that do not meet this criteria.

Redeeming time.  Many things that are not harmful to our neighbour (e.g. trolling for information on the web) are however harmful to ourselves, in that we are wasting our time needlessly.  We are called to redeem the time, as the days are evil.  We should ask ourselves periodically when we surf the web or text our friends if we are spending the precious time of grace appropriately?  Most uses of social networking do not pass this test.  Certain sites, such as LinkedIn, ResearchGate or Twitter, and to some extent even Facebook can be used for business purposes, and such uses are often justifiable, but using social networking for chatting with friends and sharing the latest gossip is sinful.

A major use of the internet and our digital devices is simple entertainment.  It is important to relax and refresh ourselves, but surfing the web for simple, frivolous entertainment through Netflix, Vimeo, YouTube, Pinterest, sports sites, etc. is sinful.  One should read the sermons of Edwards, McCheyne, and others on the danger of God’s wrath which the unconverted are under at all times.  Shall we then have mirth? (Ezekiel 21:10).

Conformity.  We are admonished clearly in the Bible that we are not to be conformed to the world, but that we ought to live as strangers and pilgrims.  Not that we ought to adopt a self-righteous, holier-than-thou mentality, but we need to realize the world is full of anti-Christian alluring influences and temptations, and these have strong appeal to our depraved hearts.  We ought to actively avoid the influences of the world as much as we can.  A question–are we willing to make sacrifices, and forego conveniences, to maintain our Reformed identity?  The internet has made many things more convenient, but is that enough warrant to use it for everything we currently use it for.  You see, if you pick up a book, you can usually tell by the cover of what genre it is; you’d be surprised to encounter unacceptable material in a ‘good book’.  But on the internet, even if well-filtered, unacceptable material often is accessed unexpectedly.

Most of the content delivered via the internet has a decided anti-Christian, secular, bias.  The design and purpose of the media is to integrate us with the world, to homogenize, spread ideas and values.  Continual exposure tends to erode the borders of what we find acceptable and lower the thresholds of what we consider morally right.  It is virtually impossible to look at Google News on any given day and not hear about gay rights, or see an article that presupposes evolution, or hear of social unrest and miscarriage of justice?  What does this constant exposure to these issues, always presented from a perspective hostile to the Bible, have on us?  As mentioned at the 2013 Classis and Synod meetings, when we utilize media and communications (or any other) technologies, we should strive to keep “far from all things whereby [God’s] Name is blasphemed and His commandments transgressed.”

Temptation.  The Bible expressly tells us to flee all sin and temptation, to watch and be ‘instant’ in prayer, to depart from evil, and to be aware of the wiles of Satan.  We are to follow the Psalmist, who vowed: “I will set no wicked thing before mine eyes” (Psalm 101:3), and Job, who made a covenant with his eyes that he would not look at things that would lead to sin (Job 31:1).  We cannot do so while using a medium in which God’s name, word, and precepts are mocked and abused.  Read the comments many users make about the Christian faith on news websites, and it becomes apparent what spirit motivates them.  By participating in, or tolerating such things, we can only expect to grieve and quench God’s Spirit, stifle the workings of our conscience, and hinder our prayers.

Sabbath.  The sanctity of the Lord’s Day is increasingly undermined as a result    Whereas 20 years ago most of us would shun using the telephone on the Sunday, today people use their mobile devices while in church and feel the need to send meaningless texts to each other during a sermon.

Parenting.   We are to nurture and raise our children in the fear and admonition of the Lord, instruct them in His ways and precepts, and model a proper Christian life.  Clearly every parent falls short in this.  But surely one duty implied in this it to inform ourselves of what our children are doing, also what they are doing online, what they listen to and watch on their digital devices.  This task is made easier by software that allows accountability reporting.  Another duty is to restrict their access to the internet, both as to content and when they can watch.

Restraint.  As mentioned at the 2013 classis and synod meetings, “The use of modern media and related technologies can only be considered acceptable when … it serves a useful purpose, [and is with] restraint, and … the maximum possible protection from undesirable content, developments and opportunities.”  This also runs counter to the temptation is to buy into the trend to buy the latest media gadgets and follow the latest fad and trend on the web.  This is far removed from the injunction to live temperately and soberly in the world, to use but not abusing it.  Rather it incites covetousness.

Conclusion

 What can be said in conclusion?  We can hope to do no more than raise awareness–the effects of these new developments on our families cannot be reversed or stopped.  Media technology will continue to develop at an increasing pace, making us ever more vulnerable as a society and detached as individuals, and presenting temptations and opportunities for sin and vice in unprecedented, unimaginable ways.  We have no might against this great company, against this flood cast out by the serpent, and may well ask, “What but Thy grace can foil the tempter’s power?”  Though the gates of hell will not prevail against God’s Church, we must be vigilant.  “Watch and pray, that ye enter not into temptation: the spirit indeed is willing, but the flesh is weak.” (Matthew 26:41).  “For as a snare shall [the last temptations] come on all them that dwell on the face of the whole earth. Watch ye therefore, and pray always, that ye may be accounted worthy to escape all these things that shall come to pass, and to stand before the Son of man.” (Luke 21:35-36).

Modern Media:
Reflections on, and Guidelines for Using (2)

Three Basic Principles

Before we go on we should state three basic principles

First, no media or communications technology is inherently wrong, or evil.  They are simply tools used to communicate, obtain and share information, help us with our work, and build and maintain relationships.  Some indeed seem more wrong than others, because they are rarely used for acceptable purposes, but the devices themselves are not evil.  New developments in communications technology can be very useful, and like any other technology can be a great blessing for society.  Missionaries in South Korea use the radio to spread the gospel into North Korea, for example, and the Bible has never been so easy to obtain, and Bible study has never been so easy as with today’s technology.  But any technology can be abused and made into a snare, a curse.  This is equally true for books and smart phones, stone tablets and electronic tablets.  The internet is not inherently evil, but much of what it is used for is.  The same is true for books and newspapers, although the content published in these is under some degree of censorship and government control, and therefore in general not nearly as extreme.

Second, some media is more appropriate for certain messages than others.  Much has been written about this by thinkers such as Postman and McLuhan.  To some extent the medium constrains and shapes the message delivered by it, simply because each medium is limited by what content it can deliver, and in what format it delivers this content.  Different media also give different connotations to the message.  The Bible on your iPhone appears as no more than an app beside many other, very different apps–in book form, on the shelf, it (hopefully) has a more distinguished presence.  A sermon listened to on your iPod will not seem the same as one listened to in Church.  On another note, our communications tools shape more than the message–they shape us.  Our way of life has changed fundamentally with the advent of texting, gaming, virtual worlds, twitter, Craigslist, YouTube, Facebook, Snap Chat, Instagram and Pinterest.

Third, there has always been a battle between the world and the church.  And in this battle the world has always encroached more and more into the church, and with it God’s Spirit has been increasingly grieved and withdrawn Itself.  Modern media developments have, unquestionably, made this process much, much more rapid and pervasive.  Evil influences that were always accessible via books and newspapers and movies are now very much more accessible.  Monitoring what our kids (parents, spouses?) are up to is increasingly difficult.  Put differently, you can say that the main use of many of these new technologies is not to foster a godly, separate life, but to conform and integrate us into the world.  Our continual exposure to secular and anti-Christian lifestyles through the internet and social networking acclimatizes and desensitizes us to sinful practices that we increasingly being to accept as normal, or at least as tolerable and acceptable.  This is a gradual, but continual process of threshold-lowering to what we realize is sinful and harmful to our souls.

Sections to come: “Some Basic Guidelines”, and “Conclusion”.

Modern Media:
Reflections on, and Guidelines for Using (1)

Why this?

Why did we write this document?  We are not writing to be judgemental or legalistic.  Nor do we at all claim to have “the answer” to what is right and wrong.  In fact, we would much appreciate being corrected if we state things that are not accurate, or unclear, or poorly argued.  But our motive is this: There have been many developments in media and communications technology that have completely changed the way of life in our Reformed communities.  The computer was one such device, the mobile phone a second, and the internet a third…  Twenty years ago few of us had, or needed them.  Now most of us (including our pre-teen children) fully depend and cannot imagine life without them.  These devices have become completely engrained in our lifestyles.  We need to step back, therefore, and ask ourselves some hard questions.  Not so much if we should accept these new technological developments–we already have–but to ask what uses of these technologies are acceptable and what uses are not, and how we can determine this.

 Modern Media

What do we mean with “modern media“?  If with a “medium” we understand a device and tool used to communicate with other people, or obtain information, then “old media” would include newspapers, magazines, books, and telephones.  “Modern media” then includes both physical devices such as computers, tablets, and smart phones, but more importantly those technologies that make use of these physical devices–such as the internet and the many programs that are based on the internet.

Sections to come: “Three Basic Principles”, “Some Basic Guidelines”, and “Conclusion”.

Modern Media and Parenting – Resources (1)

Modern media and technology has a huge impact on our family lives.  The digital devices that have been developed in recent years, and that are easily and cheaply available to our children have given rise to many new concerns and problems.  Fortunately there are some excellent resources for parents on how to deal with some of these challenges.  Here we list a number of brochures prepared by CovenantEyes, a Michigan-based company specializing in Internet accountability software.  Each brochure is well researched and clearly written, and is free.   We recommend you download each one and read it carefully.

The first resource, Parenting in the Internet Generation, outlines 7 potential threats posed by the Internet and suggests 7 habits for safe use of this medium.  One of these threats is cyberbullying, and CovenantEyes has prepared a special guide on this topic alone.  When it comes to dealing with internet issues in the home, parents often ask, “Where do I start?”  To help answer this CovenantEyes has prepared a simple guide, protecting your family online, which gives parents some helpful basic advice.

CovenantEyes has also produced four excellent resources on dealing with pornography.   The first are the grim statistics on the prevalence (and lucrativeness) of porn on the internet.  Read the brochure to see the astonishing magnitude and danger of this perversion.   The second, your brain on porn, describes the effects looking at pornography has on the brain.  The third, when your child is looking at porn is a guide outlining what to do if you find out your child is looking at porn.  And the fourth, coming clean is a guide for couples and others who are dealing with porn addiction in their families.  This brochure approaches the accountability issue from a Biblical point of view, and contains valuable suggestions.  Please download and read all these resources to familiarize yourself with some of the dangers presented by the Internet, and things we can (and should) do to minimize them.

Synod 2013

Preamble to the church’s position regarding the use of modern media and related technologies

As with all other aspects of life, modern media and related technologies and their use must be subject to the guidance of God’s Word. This Word calls us to live holily, i.e. separately from the world a.  However, man is by nature inclined to all evil and incapable of doing any good. Still, the requirement continues to apply that we must depart from evil.

Much of the content accessible via modern media and related technologies as they exist today is contrary to God’s Word and commandment. However, we must recognize that the use of many forms of modern media and communication technologies is established in our society and among our people. As modern communication methods these technologies are widely used for economic and social purposes.

Considering the above, the use of modern media and related technologies can only be considered acceptable when the precepts of God’s Word are observed and, additionally, it serves a useful purpose. Such a use will be characterized by overall restraint, and by striving for the maximum possible protection from undesirable content, developments and opportunities.

In addition, when using these technologies we must bear in mind the admonition to not be conformed to this world b, to deny ungodliness and worldly lusts c, to dwell as strangers and pilgrims on earth d, to obey the authorities set over us e, to be the light of the world, and in general to direct our lives to the honour of God’s Name f.  We are to do this while keeping far from all things whereby His Name is blasphemed and His commandments transgressed h,i.

a.1 Pet. 2:5; b. Rom. 12:2; c. Tit. 2:12: d. Hebr. 11:13, 1 Pet. 2:11; e. Rom. 13:1; f. 1 Cor. 10:31, Rom 12:1 ; g. H.C. answer 122; h. Prov. 12:13; i. Matt. 5:14

MTAC Notes:

This Preamble sets the general doctrinal framework for the Church to make pronouncements on the use of modern media and related technologies.  As such it is a fairly high level document that is somewhat open to interpretation and will require further clarification, particularly as developments in media and related technologies are frequent and often unforeseen.  Some of these further clarifications occur in the various Synod decisions listed below, which themselves show an evolution of the Church’s policy to reflect social and technological changes.

Church position regarding the use of modern media and related technologies

The Synod of the Gereformeerde Gemeente in Nederland has made the following decisions regarding internet and modern media usage:

  • Synod 1997. Considering the dangers (“sinful temptations”) presented by open (i.e. unfiltered) internet access, use of unfiltered internet by members is censurable.  A pulpit message is prepared that states that the use of the internet in families and for private purposes is censurable, particularly as the objections raised in the past against the television are at least as applicable to the amusements provided by the internet.  The message also states a serious warning against the use of the computer for entertainment purposes such as playing of games, watching videos, etc.
  • Synod 2001.  Use of the internet is permitted (i.e. “not censurable”) provided use is made of an internet service provider that uses a whitelist (“previously determined sites”) and the use is for business purposes.  Use of email, or internet for either private of business purposes is still discouraged (“dissuaded”).
  • Synod 2007. The official position of the church is reformulated.  ‘Out of concern for the congregations, connecting to the unfiltered internet via computers, cellular phones, or other devices is considered censurable, particularly as it exposes users to sinful temptations and useless wasting of time.  Where the use of Internet is unavoidable (for business or study purposes), access should be to a closed (i.e. whitelisted) internet provider.  If more access is required, access should be through such a filter as provides the best protection against unwanted sites.   The use of Internet for private purposes is strongly discouraged. An Internet provider should be used that enables access to only those functions the user needs (e.g. emailing, internet banking).   The use of computers and similar devices for entertainment purposes such as playing games, watching videos, etc. seriously warning against.
  • Synod 2010. Use of the Internet must be restricted to that which is useful and necessary for study and career purposes, and to remain engaged in social discourse and commerce.  When members unnecessarily use an internet filter less restrictive than that recommended by the Synod (i.e. KlikSafe), church discipline may be applied.
  • Synod 2011. The Church may use the internet if such use is socially or economically necessary (“unavoidable”), and such use is with “necessary restraint”.
  • Synod 2013.   A “Preamble” that sets the general doctrinal framework for the Church to make pronouncements on the use of modern media and related technologies is discussed and approved.  The guidelines and discussions stated in previous Synod decisions (i.e. 1997 – 2011) remain in effect.

Online Safety Presentation for Parents

On Tuesday, February 26, starting at 7:30pm, there is opportunity for parents to attend an online safety presentation by Mr. Bill de Jager of SCSBC in the MCCS gym.

The workshop “Safe Passage: Teaching kids to be safe and responsible online” explores various internet environments, highlights internet safety hazards and offers tips for managing inappropriate content and promoting ethical online behaviour. The workshop also contains information on creating Internet “house rules”. We strongly encourage all parents to attend in these times when media and technology awareness is so important.

MTAC