{"id":70,"date":"2009-11-03T01:29:23","date_gmt":"2009-11-03T05:29:23","guid":{"rendered":"http:\/\/internetsafety.trendmicro.com\/?p=70"},"modified":"2009-11-03T01:32:07","modified_gmt":"2009-11-03T05:32:07","slug":"you-are-what-you-dont-post","status":"publish","type":"post","link":"https:\/\/www.trendmicro.com\/internet-safety\/blog\/you-are-what-you-dont-post\/","title":{"rendered":"You Are What You (Don&#8217;t) Post"},"content":{"rendered":"<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-76\" title=\"Blog3b\" src=\"\/internet-safety\/wp-content\/uploads\/2009\/11\/Blog3b-150x150.jpg\" alt=\"Blog3b\" width=\"150\" height=\"150\" \/>by Lynette T. Owens<\/strong><\/p>\n<p>A couple of weeks ago, I decided to search my daughter\u2019s name on Google.\u00a0 I was curious to see what the results might be for someone who has not yet established an online presence.\u00a0 I was amazed, worried, and amused all at once.\u00a0 She shared her namesake with the owner of an arts and crafts company, a dating service professional, and someone who spent 7 years in jail.\u00a0 Some of these people had profiles on MySpace, Twitter, Facebook.\u00a0 Some wanted to make the world a better place, others wanted the world to know everything about them.\u00a0<\/p>\n<p>I did the search after I read about the term \u2018cybertwin\u2019: someone who shares your name and possibly other characteristics like age, place of residence, or career, but is in fact not you.\u00a0 The article advised people to find out if you have any cybertwins so you can explain if you ever needed to.<\/p>\n<p>My kids\u2019 reputation, and that of anyone under 18, will be partly defined by what they do online.\u00a0 Managing their online personal information deftly and knowing how they might be perceived online is an important life skill.\u00a0 Kids should be given basic guidance on sharing personal information online, for their safety and their reputation.\u00a0\u00a0 And perhaps some of the best advice comes from the generation that was born with the Internet already in their lives.<\/p>\n<p>\u201cOn Facebook and other sites, I do not share significant personal information like my address,\u201d says Aaron Schild, a senior at The Bishop\u2019s School in La Jolla, CA and a volunteer at Teen-Senior Connect, a community-based volunteer high school group which assists seniors with computer and technology needs.\u00a0 \u201cI set the privacy settings almost as high as possible to make sure that no one who doesn\u2019t know me can find any of my personal information.\u201d\u00a0<\/p>\n<p>Schild says that he has seen instances of people posting inappropriate photos or comments, which can be a reputation spoiler.\u00a0 There are technologies that can block the world from seeing or knowing too much about you, but learning to think before posting is the best skill to avoiding future harm or embarrassment.\u00a0 Even if kids use the highest privacy settings, someone whom they allow to have access to their information could still share it with others.<\/p>\n<p>Additionally, university admission officers are increasingly looking at social networking profiles in their consideration of potential students.\u00a0 A recent study by Kaplan, the industry leader in the U.S. of test preparation services and materials for college-bound students, showed that 21% (up from 16% a year ago) of universities are now considering policies to guide how they will use an applicant\u2019s online profile in the admissions process. \u00a0\u00a0<\/p>\n<p>Schild says that the college counselors at his school have advised students to minimize their online presence for the purposes of college admission, unless they have done anything truly significant online to highlight.\u00a0<\/p>\n<p>His advice to kids starting to build an online presence?\u00a0 \u201cDon\u2019t spend too much time on social networking sites, as there are many more productive things to do online and in the real world. Also, make sure that you set the privacy settings so that no person outside of your inner circle can access your personal information.\u201d<\/p>\n<p>Here are a few basic things you can do to make sure your kids are sharing only the things they need to share online:\u00a0<\/p>\n<ol>\n<li><strong>Do as you say.<\/strong>\u00a0 What better way to advise kids then to have a profile yourself?\u00a0 Understand what you can post and where, how privacy settings can be used to carefully control access, and pass on best practices and advice to kids.<\/li>\n<li><strong>Choose real estate wisely<\/strong>.\u00a0 Limit the number of sites you or your kids use, and understand what they are designed for.\u00a0 Some sites are designed for personal sharing, others for professional networking, others for sharing common interests such as an online gaming.\u00a0 Each time you use one of these, you are putting more of yourself online, so be selective.<\/li>\n<li><strong>Understand permanence and privacy.<\/strong>\u00a0 Advise your kids to be cautious about what they post.\u00a0 After that, make sure they use settings to limit who sees the information they want them to see.\u00a0 Once they post something, it is out there forever and anyone they gave the privilege to see it could share it.<\/li>\n<li><strong>Ask your kids to connect.\u00a0 <\/strong>If necessary, ask your kids to add you as a contact to their social networking sites.\u00a0 For younger kids, this can be especially helpful for both of you to ensure they are using the sites safely and smartly.<\/li>\n<li><strong>Use reputable, up-to-date security software.\u00a0 <\/strong>Hackers and cyber-criminals are very attracted to social networking sites because of the sheer number of people using them.\u00a0 And their tactics for fooling people into divulging personal information or downloading malicious software have become increasingly sophisticated, so be sure to have a good security program on any device you or your kids use to manage your online information.<\/li>\n<\/ol>\n<p>Who our kids are online is a reflection of who they are.\u00a0 Who they are is a reflection of us.\u00a0\u00a0 Don\u2019t just tell them but show them how they can use the Internet in a positive and safe way.\u00a0 And if you haven\u2019t looked up your cybertwin yet, perhaps you should.<\/p>\n<p>For more information on how to keep your kids safe online, go to <a href=\"http:\/\/www.trendmicro.com\/go\/safety\">www.trendmicro.com\/go\/safety<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A couple of weeks ago, I decided to search my daughter\u2019s name on Google.  I was curious to see what the results might be for someone who has not yet established an online presence.  I was amazed, worried, and amused all at once&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-70","post","type-post","status-publish","format-standard","hentry","category-for-parents","category-for-teachers","wpautop"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/70","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/comments?post=70"}],"version-history":[{"count":0,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/70\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media?parent=70"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/categories?post=70"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/tags?post=70"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}