Thursday, June 11, 2009

Sue Scheff: Plug In - Protect - Parenting - Online


First and foremost, as a parent, we want to protect our kids. Years ago we never even considered about this new concern of Internet Safety and where our kids surf online. Our protection was usually limited to our neighborhood, who are they talking on the landline phone with, and keeping their bikes safe. Today - we have cell phones, cars, laptops, IPods and so much more! What are they listening to, where are they going online, and where are they driving to and who are they meeting?! It can be overwhelming and extremely challenging for parents.

I recently discovered a new device that may help us to protect our kids online - since it offers a free 30 day trial, it seems it would be a great idea to see if this can help your protect and be aware of where your children are traveling in cyberspace.


PG Key - Plug in. Protect. Parent. Learn More: http://www.pgkey.com/


or anyone worried about the dangers kids face online.peace of mind that the children they care about are protected.

It’s so easy to use, that any parent or grandparent can just plug it in, and in seconds, have

What is PG Key and how does it protect my kids from online dangers?

Parenting experts and law enforcement have made specific recommendations to keep kids safe online.

PG Key is a new, simple to use, all in one solution that lets parents follow the best advice from the experts. It’s a key. Just plug it into a USB port of your kids or family computer and PG Key provides 3 areas of protection.


1) PG Key puts parents in control. It allows parents to control when their kids use the computer – and for how long! Remove the key and the computer can’t be used. Hours can be set on PG Key much like a cell phone.
2) PG Key engages our Safe Search content filtering. The approach of “white list” site blocking is too restrictive, and normally becomes so inconvenient and frustrating that parents disable it – PG Key Safe Search content filtering allows the freedom to search the web, but prevents most of the unwanted and dangerous content from showing up. Parents also have the ability to block certain websites from showing up.
3) PG Key creates accountability. Once kids know that their parents are no longer excluded from their “online lives” their behavior changes. That’s why the law enforcement and parenting experts recommend parental involvement as the best way to reduce on-line dangers. PG Key implements 10 parental control and notification features so that kids know they need to behave like they would in any other part of their life - where there are consequences to inappropriate behavior.

How was PG Key created?

PG Key was created by a design and development team that includes industry experts with years of experience in creating powerful yet easy to use software applications. In addition to the experienced technical members, the team also includes representatives from law enforcement (an FBI agent that specializes in cyber crimes), education (a PHD that currently serves as a district superintendent), the medical community (an MD and current member of the American Board of Pediatrics) and many others … including ordinary, non-technical, but concerned parents.

Is PG Key easy to install and use?

PG key can be installed in just a few seconds. Just plug it into any USB port and when prompted enter a secure password. That’s it! After you have installed, an instructional video will launch and give you more detailed information about how to use PG Key. The video and FAQ’s can also be accessed any time by selecting help from the taskbar.

How does PG Key block unwanted content?

We’ve all had this happen. An innocent search on a subject results in embarrassing and unwanted websites and images. Google is the undisputed industry leader when it comes to innovative and powerful internet search technology. PG Key has partnered it’s technology with Google’s very effective filtering features and created the PG Key Safe Search home page that will ensure that innocent searches don’t result in unwanted images and content. While PG Key is in - Safe Search is on.

It’s highly recommended, but not required, that you use Internet Explorer version 7 or higher. This will set the search bar at the top of the page to use the PG Key safe search settings. It’s also recommended that other toolbars are removed. If you need assistance with any of these settings, our tech support staff is standing by to help.

Does PG Key block unwanted websites?

Yes. PG Key starts by referencing a universal black list of sites that are known to host damaging spyware or other unwanted content. Parents can add sites to this list from www.pgkey.com as they see fit. These settings are available from your private user account. If your child or teen visits a site that you don’t feel is appropriate, you’ll know about it, and you can easily make sure it doesn’t happen again. More important, PG key reminds kids that you, the parent, are informed of their online activities. If they wouldn’t do it with you over their shoulder, they likely won’t do it while PG Key is in.

What does PG Key record?

PG Key records up to 60 hours of all computer activity - Web activity, chat sessions, games, homework sessions, online or off. PG Key only records when activity takes place. It will stop recording when the computer is not being used.

PG Key will record the most recent 60 hours, the oldest recording is dropped off the as the newest gets added. For an average amount of computer activity this should give you months of information.

How does PG Key keep me in the loop?

Once you’ve activated your PG Key, you can set it to notify you via e-mail or to your cell phone when key words or phrases are used by your child or teen. It will also send periodic updates with information on weekly time used and other data.

Why is a device like PG Key better than some of the software or other solutions I hear about?

PG Key’s patent pending technology is the only solution that combines the best advice from the experts into a simple device that anyone can install and use in just a few minutes. And since it’s a key, kids can’t get around it.

My teens know a lot about computers, can they get around PG Key?

PG Key relies on the AES encryption standard, the same encrypted password and security protection used by government agencies. Any attempt to disable PG Key or even look for information online will be recorded. You can add the word “pg key” to your notification list so you’ll get an e-mail or text message if they look for any way around it.

We have more than 1 computer in our house.. Do I need a 2nd PG Key?

You will need 1 key per computer in your house that needs to be protected.

What happens if my PG Key is lost or damaged?

You can override with your secure password to use the computer, then, contact our support department. If you’ve activated your PG Key and are a registered user, we will ship you a new PG Key for only $10.00 plus s/h.

How do I learn more?
Our support department will gladly answer any questions you may have. You can send an e-mail to sales@pgkey.com or call at 1- 800-301-8698. Our office hours are M-F 8 to 5pm MST.

Thursday, May 28, 2009

Sue Scheff: Teens, Texting, Bullying, Sexting and more


THE ISSUE:Every year over 3 million children are victims of violence and almost 1.8million are abducted. Nearly 600,000 children live in foster care. Every day1 out of 7 kids and teens are approached online by predators, 1 out of 4kids are bullied and 42% of kids are cyberbullied.


THE SOLUTION: PREVENTION! Getting to the root of the cause through education and changing behaviorsand attitudes. Loving and nurturing children. Stopping Violence BEFORE itstarts — creating happy and healthy children … Keeping Children Safe


CELL PHONE AND TEXT MESSAGING SAFTEY



Are You a Potential Victim of Cell Phone Danger?


Who is text messaging you? If your friends, family and parents are the only ones sending you text messages — than that’s cool! They should be the only people who are texting you!


To be safe, you should not give anyone but your close friends and family your cell number. Do not give out personal identifiable information, such as real full name, addresses, phone numbers, photos, descriptive information from which this information could easily be found (like a picture of you in front of a recognizable place, or a photo referring to your sports team by name or by wearing something with identifying information in a photo.)


If you text message people other than your family and close friends, you could be texting people who can cause you harm.


And, it’s not uncommon for bullies to use cell phones to harass other kids and, tragically, it’s not unheard of for kids to be contacted on their cell phone by adult predators.
You wouldn’t text a stranger and give them all of your information and let them know what school you go to — would you?


By using common sense and maintaining your privacy when using your cell phone and text messaging you stay safe from online predators and cyber bullies.
What To Do If Strangers Or Bullies Text You?


REPORT IT immediately! To your parents, a trusted teacher and the police!
No one has the right to bully you! And no stranger has the right to text you!
For more information click to read:



Through The Eyes Of A Victim



Friday, April 17, 2009

Sue Scheff: Teens and Sexting


Today’s parents seem to constantly have to keep up with the new concerns with teens today. “Sexting” is a growing and disturbing issue with many parents of teenagers today. What these kids are not realizing is what goes online, stays online and spreads like a virus. Teens today don’t think about college admissions or potential employers 2-4 years from now. In an instant, a not so flattering photo can arrive in thousands of mailboxes! That is, email boxes. Take the time to talk to your kids about the ramifications this can potentially have on their future.



Sex easily and quickly integrated itself into the digital age; and now the teen trend of “sexting” — where a user sends sexually explicit images or messages via text on a cell phone — has parents struggling for a way to address the situation.


“We’re seeing 14, 15 and 16-year-olds and up are very commonly sharing naked pictures or sexual pictures of themselves,” said Internet safety expert Parry Aftab, of Wired Safety. “We’re talking about kids who are too young to wear bras who are posing in them, and then topless and then actually engaged in sex or even in masturbation. So we are seeing a lot of kids who are sexually active.”


There’s nothing coy about this 21st century amorous pursuit. Children as young as 12, who aren’t sexually active, are sending explicit, provocative and even pornographic images to their peers.


Wednesday, April 15, 2009

Sue Scheff: Reputation Defender Blog - Tweet, Tweet - You're Fired!




MSNBC and other mainstream media outlets have picked up on the Cisco Fatty story that involves a woman getting fired for her twitter post.


Quoting from the page:


Why waste valuable social networking hours getting yourself “Facebook fired,” when Twitter allows you to humiliate yourself quickly, and in 140 characters or less?


A recent tweet by one would-be Cisco employee proves that when it comes to placing a permanent black mark on your resume via the Internet, Twitter is now the tool of choice. To illustrate, here’s the tweet the now Web-infamous “theconnor” shared with the world:
“Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work.”


It wasn’t long before Tim Levad, a “channel partner advocate” for Cisco Alert, shared this open response:


“Who is the hiring manager. I’m sure they would love to know that you will hate the work. We here at Cisco are versed in the web.”


Was “theconnor’s” job offer rescinded? Nosy netizens have yet to suss that out — but they’re doing their darndest to make “theconnor’s” life miserable in the meantime. It didn’t matter that “theconnor” almost immediately set his Twitter account to private and deleted all information from a home page. It was already too late.


Twitter is a great tool to connect people and ReputationDefender supports the emergeant micro-blogging platform. Users should be aware that potential employees are viewing online messages and that the material they post online can both help and hurt their online reputation.

Sunday, March 29, 2009

Face.com Launches Untagged Photo Face Finder Application




If you thought that untagged photos of you on Facebook were not going to affect your online reputation, you’ve got another thing coming. According to the New York Times, a new application utilizes facial recognition software to find public, untagged photos online.
From the page:


This one is kinda scary because of how well it works. Face.com’s new Photo Finder application for Facebook helps you automatically discover public photos that you and your friends may have forgotten to tag — and it also lets you track untagged photos of your friends.


Face-recognition technology is itself not new, but Photo Finder’s twist is how it makes use of Facebook’s interface. The social network only shows you photos of yourself containing tags about you — your name and profiled, associated with you in a given photo. Up until now, untagging a photo is how you hide a photo from your Facebook friends — the other option is to use more advanced privacy settings that restrict photo viewing to specific friends, but I’m not sure how many people use that feature.


With Face.com, your friends can bypass such social engineering to directly stalk you, or visa versa as the case may be.
[SNIP]

Wednesday, March 4, 2009

Sue Scheff: The Danger of Internet Addiction


It’s clear that, for teenagers, spending too much time online can really deter social and educational development. The Internet world is such that there is always something new to do and to distract one from one’s responsibilities. We all do it- take ten minutes here or there to explore our favorite gossip or sports site. There is nothing wrong with using the Internet as a tool for research, news, and even entertainment. After all, the World Wide Web is the world’s most accurate, up to date resource for almost any type of information.


But as the Internet evolves and becomes more tailored to the individual, it grows increasingly easier to develop a dependency on it. This is especially true for teens- a group that tends to be susceptible to flashy graphics and easily enticed by the popularity of social networks. In a sense, the Internet is the new video game or TV show. It used to be that adolescents would sit in front of the TV for hours on end operating a remote, shooting people and racing cars. Now they surf the web. Teens are impressionable and can at times be improperly equipped to handle certain situations with a degree of reason and rationality. And although they may have good intentions, they might be at risk of coming across something inappropriate and even dangerous.
Learn more: click here.

Monday, February 16, 2009

Sue Scheff: Teens, Parents, Social Networking and Facebook


Today more and more teens are joining Facebook as well as the other Social Network - however Facebook seems to be growing. Why? I honestly don’t know, but I do know parents are enjoying Facebook as much as many kids are. Recently I stumbled over an article on Tangerine Times written by a parent helping us navigate our way through the Social Cyberspace. This topic is critical - as keeping your child’s privacy is important for many reasons. Help your kids stay safe with Social Networking - read this valuable article.



How to Help Your Teen Use Privacy Settings on Facebook


Many parents tell me they are frustrated with their teens’ use of Facebook. Here are some of the comments I hear frequently from parents:


“They know more than I do about how to use it and set it up, so how can I control it?”


“My kids are using it when I am not around, so how can I possibly know what they are doing, who they are talking to and if they are being safe with their information?”


“I feel this has gotten out of control, and I don’t really know what to do to get it back under control”


“I am afraid there are predators.”


“I give up. I just hope they aren’t doing anything stupid because I haven’t a clue what they are doing online.”


What I see are parents who over control (they deny their kids use of Facebook entirely) or parents who are completely “hands off”. And some of these are parents who normally wouldn’t dream of sending their child into an unknown situation without a little research. Crazy huh? I’ve decided to begin a campaign to de-mystify Facebook for those parents who feel they are not comfortable enough to set boundaries for their teens. It’s not rocket science but I completely understand their frustration in trying to understand it all.


Here are some tips about privacy settings on Facebook. It is never too late to ask your teenager about their privacy settings, even if they have had their account for years.

Thursday, February 12, 2009

Sue Scheff: What is Google Saying About You?

Source: Portfolio.com

Forget your references, your ­résumé, and the degree on your wall. “Whatever’s in the top 10 ­results of a search for your name on Google—that’s your [professional] image,” says Chris Martin, founder of the small internet company Reputation Hawk, which is one of several outfits that focus on keeping that top 10 clean for their clients.

For victims of cyber-slurs, cleanup doesn’t necessarily mean removing bad press. Companies like eVisibility, Converseon, and 360i concentrate on generating ­positive content—but not too much at one time. If Google detects a ­sudden flood of suspicious Web postings, it will assign them low trust scores, preventing them from rising to the top of search results.

Nino Kader, CEO of International Reputation Management, uses a positive-content approach, calling its strategy a mix of “old-school PR and high tech.” The firm builds social profiles (on MySpace or Facebook) for clients and promotes them to blogs; it also drafts news releases and solicits coverage from traditional press outlets. Scrubbers generally work on retainer and charge anywhere from $500 to $10,000 a month.

A handful of scrubbers do try to actually remove negative content, using coercion, compromise, and occasionally cash. A first step is to contact the website and ask that the harmful post be removed. “For us to pay the site for removal is very uncommon, but less than 1 percent of the time, we have to do it,” says ReputationDefender CEO Michael Fertik, whose company charges a monthly fee and $30 for each item they persuade a website to remove. If a site refuses to erase an offending post, the next step is to negotiate a compromise. Ask the site administrator to substitute a screenshot for the actual text of the harmful post (a screenshot is an image, so the words no longer register as text to Google and won’t come up in a search).

When it comes to your online image, these companies argue that no one can afford to shrug off a slight. As Fertik says, “The people who are reading stuff about you on the internet don’t have to believe what they read about you beyond a reasonable doubt.” They just have to believe it enough to not hire you.

Friday, February 6, 2009

Sue Scheff: Hate Websites


Source: Connect with Kids

“Hate, unfortunately – it’s a virus. There’s been racism, anti-Semitism. There’s been discrimination against people throughout the ages. The Internet just provides an instant tool and access to it.”

– Deborah Lauter, Anti-Defamation League

By some estimates, 70 million kids are logging onto the Internet every day, and many are viewing sites that are increasingly disturbing.

Jesse Granger, 15, says, “I’ve come across hate websites. There was one about the Ku Klux Klan, and it had a lot of pictures of recent parades and marches.”

Sixteen-year-old Quincy Kelly saw a web site that “was talking about how slaves should be happy that they got brought over to America from Africa.”

Deborah Lauter of the Anti-Defamation League has been monitoring these sites for years. “Hate, unfortunately – it’s a virus,” she says. “There’s been racism, anti-Semitism. There’s been discrimination against people throughout the ages. The Internet just provides an instant tool and access to it.”

It’s also a sophisticated tool, especially in terms of attracting young web surfers.

Lauter says, “Some of the [hate] websites actually have games for children. The websites are attractive visually. There are puzzles, word games – it’s pretty sick when you look at them.”

And kids don’t even have to be looking for them to inadvertently access them.

“A perfect example would be a student doing Internet research and they plug in something as simple as ‘Martin Luther King,’ which is a very typical one. And some of these racist websites will be accessed and a kid could go on and start researching and think what’s there is fact,” says Lauter.

That’s where parents come in, she says, to make sure their kids are aware.

“[Children] need to understand to look at things critically,” says Lauter. “They need to understand that not everything on the Internet or everything they read is the truth.”

And as kids become more sophisticated and Internet savvy, they will learn to weed out fiction from fact.

Matthew Burnett, 14, agrees. “If you use your common sense you can see through most of it,” he says.

And 15-year-olds Kelly Raines and Rebecca Turner say, “I think that if people are going to put that on, they’re going to put that on. And it’s just a matter of whether you take it, or like, just be like, ‘that’s stupid.’ I’m not going to worry about that.”


Tips for Parents

The Internet has opened the door to a wealth of information at our fingertips. But it has also brought instant accessibility to illegal drugs, pornography, hate websites and more. It’s important to set guidelines regarding your child’s Internet usage. Consider these important steps from the University of Oklahoma police department:

Learn about the Internet – If you are just starting out, see what information and classes are offered by your local library, community center, schools or newspaper.

Get Involved – Spend time online with your child — at home, at the library or at a computer center in your community. Your involvement in your child’s life includes his/her online life. Your participation and guidance is important to help ensure your child’s Internet safety.

Stay Informed – Learn about the latest parental control tools that can help you keep your child safe online. Stay abreast of what’s in the news about kids and web sites.

Become an Advocate for Kids – If you see online material or practices you do not like, contact your Internet Service Provider (the company that provides you with a connection to the Internet) or the company that created the material. Take advantage of this unique opportunity to help this growing medium develop in positive ways for kids.

According to SafeKids.com, there are steps you can take to help prevent your child from seeing inappropriate content on the Internet. Consider the following suggestions:

In an online public area such as a chat room or bulletin board, never give out identifying information, including name, home address, school name or telephone number.

In an email, do not give out identifying information unless you are certain you are giving it to someone both you and your child know and trust. Think carefully before revealing any personal information such as age, marital status or financial information. Consider using a pseudonym or unlisting your child’s name if your service allows it.

Get to know the sites and services your child uses. If you don’t know how to log on, have your child show you. Find out what types of information the services and websites offer, how trustworthy the information is and if parents can block objectionable material.
Never allow a child to arrange a face-to-face meeting with another computer user without parental permission.

Never respond to messages or bulletin board items that are suggestive, obscene, belligerent, threatening or make you feel uncomfortable. Encourage your children to tell you if they encounter such messages. If you or your child receives a message that is harassing or threatening, forward a copy of the message to your service provider and ask for their assistance.
Remember that people online may not be who they seem. Because you can’t see or even hear people over the Internet, it is easy for them to misrepresent themselves. For example, someone who says he/she is an expert in a certain field may actually be a biased individual with an agenda or someone with harmful intentions.
Not everything you read online is true. Be wary of any offers that require you to come to a meeting or have someone visit your house. Also, research several different sources of information before referring to something you read on the Internet as “fact.”

Set reasonable rules and guidelines for computer use. Discuss these rules and post them near the computer as a reminder. Remember to monitor your kids’ compliance with these rules, especially when it comes to the amount of time your children spend on the computer. A child’s or teenager’s excessive use of online services or bulletin boards, especially late at night, may indicate a potential problem. Remember that personal computers and online services should not be used as electronic babysitters.

Make computers a family activity. Consider keeping the computer in a family room rather than the child’s bedroom. Get to know your children’s “online friends” just as you do their other friends.

References
Federal Bureau of Investigation
National Center for Health Statistics
SafeKids.com
Smart Parent
The Police Notebook
The University of Illinois

Thursday, January 29, 2009

Sue Scheff: Prevent CyberBullying


Vanessa Van Petten continues to bring valuable information for parents with today’s teens. This week she has dedicated to helping prevent cyberbullying.



Thank you to everyone who is already offered to join and spread the word about our anti-cyberbullying campaign here at On Teens Today:

Friday, January 23, 2009

Sue Scheff: Don't Hit Send Just to Fit In by Danielle Tiano


Don t Hit Send Just to Fit In teaches kids and parents about just how easy it is to become a cyber bully, or to be bullied online. Studies say that almost all kids are affected by bullying, but today the bully has a new playground....computers, cell phones and social networking sites. Don t Hit Send Just to Fit In tells the story of a group of good kids who are affected by not only bullies but also by their own behavior as they become bullies themselves.


Through the help of positive adults and a magical keyboard, they learn better ways to be liked and to fit in. The Temptation Series tackles tough topics relating to tweens and technology such as Internet pornography, cell phone use and abuse, and cyber bullying. The series offers parents information and tools for raising their children to become more emotionally and socially healthy.
For more information and to purchase the book, type the title in the Amazon Box on the sidebar.

Wednesday, January 7, 2009

Sue Scheff - Parenting Teens for their Online Future


As a parent advocate, I encourage parents to learn more about online safety. A great place to start is Reputation Defender! Remember, your child may be a “child” today, but soon they will be applying to college and filling out employment applications. Will their online profile be acceptable?


Take a moment to learn more!


What is MyChild?
MyChild by ReputationDefender scours the Internet for all references to your child or teen - by name, photography, screen name, or social network profiles - and packages it to you in an easy-to-understand report. Worried about bullies? Concerned that your teens’ friends and peers are posting inappropriate materials online? MyChild searches every corner of the Internet for traces of your kids. If you want to help your teen manage their online reputation, but have felt powerless to do so, ReputationDefender is your answer!

Sunday, January 4, 2009

Sue Scheff Keeping Teens Safe Online


2009 will be here, as parents, making a resolution to learn more how to keep your child safe online should be a priority. With the ever expanding cyberworld - social networking - texting etc. the time is now to learn more.



You don't have to be a computer expert to keep your child safe online.As parents, we want our children to be safe and responsible while using technology. We will have succeeded when each child can recognize and minimize the three main risks associated with all connected technology (i.e., iPods, instant messaging, chat, computer games, game consoles, cell phones, text messaging, webcams). Read More


For more information: