{"id":109,"date":"2015-07-20T07:57:57","date_gmt":"2015-07-20T14:57:57","guid":{"rendered":"http:\/\/www.media-aware.net\/news\/?p=109"},"modified":"2015-07-20T07:57:57","modified_gmt":"2015-07-20T14:57:57","slug":"protecting-your-family-online-1","status":"publish","type":"post","link":"https:\/\/www.media-aware.net\/news\/?p=109","title":{"rendered":"Protecting your family online (1)"},"content":{"rendered":"<div>\n<p>Protecting yourself and your family online is easier to discuss than achieve.\u00a0 While it is important to install internet filtering and accountability reporting on our computers and smartphones, additional steps are necessary to develop online protection. \u00a0Your Consistory would like to provide some information to help you do this.\u00a0 The guidelines proposed are general, and apply to all members, but how you implement them will depend on your particular family\u2014e.g. the age of your children and nature of your work.\u00a0 An attempt is made to keep the information simple, which means the more tech-savvy reader will find it limited.\u00a0 However, it is hoped the general guidelines described here will be helpful to those readers also, and help give them some direction as to what the Consistory requires.\u00a0 The information presented here is not original, and more detailed how-to guides are available on our website, http:\/\/media-aware.net\/.<\/p>\n<p><b>Four steps<\/b><\/p>\n<p>According to some popular guides, &#8216;protecting your family online&#8217; has four components, or steps:<\/p>\n<ol>\n<li>Taking inventory of your electronic devices that can access the internet<\/li>\n<li>Installing and configuring three essential tools<\/li>\n<li>Staying informed<\/li>\n<li>Family discussions<\/li>\n<\/ol>\n<p>We hope to discuss these steps and address some related questions and comments in several short brochures.<\/p>\n<p><b>Step 1: Taking Inventory<\/b><\/p>\n<p>Before you can protect yourself online, you need to know the threats presented by the internet, and know how these reach you and your children.<\/p>\n<p><b><i>What is out there?<\/i><\/b><b>\u00a0 <\/b><\/p>\n<p>Most are aware that the internet, while extremely useful and necessary to our current way of life, can be used to very easily access material that is dangerous to both our material and spiritual wellbeing.\u00a0 Threats include viewing of porn and violence, being cyberbullied or stalked by online predators, online gaming and gambling, unnecessary trolling for information, watching sports and movies and other objectionable videos, listening to unacceptable music, etc.\u00a0 One does not need the internet to be exposed to, or do any of this, but the internet has made these things much more accessible, especially for our children.\u00a0 There is an abundance of information warning about the dangers mentioned above, written by people from many different religious (and secular) persuasions.\u00a0 Some of this information is available on our website.\u00a0 Unfortunately not all members appreciate the severity of this threat to our community, but the dangers cannot be overstated.<\/p>\n<p><b><i>How do we access this material?<\/i><\/b><\/p>\n<p>The material mentioned above can be accessed through any device with an internet connection.\u00a0 These devices include smartphones, home computers, and tablets\u2014those owned by you and your children and those owned by their friends. This easy accessibility means that our young children can access, or involuntarily be exposed to indescribably vulgar and gruesome material.<\/p>\n<p><b><i>What devices are in your home, and do your children have access to?\u00a0 <\/i><\/b><\/p>\n<p>How can you and your children access the internet, and how do you protect your family from these threats?\u00a0 For a dyke to be effective it needs to be complete.\u00a0 In this context this means that, as far as is in your control, all the internet-capable devices in your home and that you access at your work should be filtered.\u00a0 It might be helpful to make a list of these devices, and behind each one jot down what protection is currently provided, who in your family uses it and when, and where this device is most often used.\u00a0 It might alarm you if an entry read, \u201cMom\u2019s smartphone \/ no filter \/ all kids, whenever they want it \/ on the bus, at their after-school jobs, and when they are at friends at night\u201d.<\/p>\n<p>Regarding protection, your checklist should also state if you have parental controls (e.g. child specific user accounts with time limits), and accountability reporting set up.\u00a0 What happens outside your supervision is obviously much more difficult to control, which we will return to later.\u00a0 It is not uncommon for children to access objectionable material via un(der)-filtered internet, and to share&#8211; through cloud storage, USB\u2019s, etc.&#8211;this with others who do have proper filtering at home.\u00a0 Allowing kids in both homes to watch hours of movies (or worse) weekly.<\/p>\n<p><b>Taking Inventory&#8211;what devices are used by you and your family?<\/b><\/p>\n<div align=\"center\">\n<table width=\"697\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"129\">\n<p align=\"center\"><strong>Device (in home, in car, at work)<\/strong><\/p>\n<\/td>\n<td valign=\"top\" width=\"133\">\n<p align=\"center\"><strong>Type of filter, filter setting<\/strong><\/p>\n<\/td>\n<td valign=\"top\" width=\"141\">\n<p align=\"center\"><strong>Who uses it?\u00a0 Where is it used?<\/strong><\/p>\n<\/td>\n<td valign=\"top\" width=\"152\">\n<p align=\"center\"><strong>Parental Controls set up?\u00a0 (e.g. time limits)<\/strong><\/p>\n<\/td>\n<td valign=\"top\" width=\"142\">\n<p align=\"center\"><strong>Accountability tracking activated?<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"129\"><i>e.g. Home Computer (main)<\/i><\/td>\n<td width=\"133\"><i>NetNanny.\u00a0 Child setting for kids, 18+ for parents<\/i><\/td>\n<td width=\"141\"><i>Everyone in the house (mom, dad, kids); <\/i><\/p>\n<p><i>In the house<\/i><\/td>\n<td width=\"152\"><i>Yes, separate user accounts for younger children<\/i><\/td>\n<td width=\"142\"><i>Yes, for each user account separately <\/i><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"129\"><b>\u00a0<\/b><\/td>\n<td valign=\"top\" width=\"133\"><b>\u00a0<\/b><\/td>\n<td valign=\"top\" width=\"141\"><b>\u00a0<\/b><\/td>\n<td valign=\"top\" width=\"152\"><b>\u00a0<\/b><\/td>\n<td valign=\"top\" width=\"142\"><b>\u00a0<\/b><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Protecting yourself and your family online is easier to discuss than achieve.\u00a0 While it is important to install internet filtering and accountability reporting on our computers and smartphones, additional steps are necessary to develop online protection. \u00a0Your Consistory would like to provide some information to help you do this.\u00a0 The guidelines proposed are general, and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-109","post","type-post","status-publish","format-standard","hentry","category-media"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.media-aware.net\/news\/index.php?rest_route=\/wp\/v2\/posts\/109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.media-aware.net\/news\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.media-aware.net\/news\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.media-aware.net\/news\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.media-aware.net\/news\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=109"}],"version-history":[{"count":12,"href":"https:\/\/www.media-aware.net\/news\/index.php?rest_route=\/wp\/v2\/posts\/109\/revisions"}],"predecessor-version":[{"id":121,"href":"https:\/\/www.media-aware.net\/news\/index.php?rest_route=\/wp\/v2\/posts\/109\/revisions\/121"}],"wp:attachment":[{"href":"https:\/\/www.media-aware.net\/news\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.media-aware.net\/news\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.media-aware.net\/news\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}