Children internet safety
What tools and conversations keep my kids safe from online predators and content?
Projekt-Plan
{{whyLabel}}: Understanding the psychological shift from a play-based to a phone-based childhood is crucial for setting effective boundaries.
{{howLabel}}:
- Focus on the 'Four Norms': No smartphones before high school, no social media before 16, phone-free schools, and more unsupervised real-world play.
- Take notes on how these principles apply to your specific family dynamic.
- Identify the 'why' behind your new rules to explain them clearly to your children.
{{doneWhenLabel}}: Key takeaways are summarized for the upcoming family meeting.
{{whyLabel}}: Clear, written expectations prevent arguments and ensure everyone knows the consequences of breaking digital rules.
{{howLabel}}:
- Include specific 'Tech-Free Zones' (e.g., dining table, bedrooms).
- Define 'Tech-Free Times' (e.g., one hour before bed).
- List mandatory safety behaviors, such as 'Never share your real name or location with strangers.'
- Add a 'No-Shame Clause': Promise that if they come to you with a mistake or something scary, they won't lose their device immediately.
{{doneWhenLabel}}: A physical document is drafted and ready for signatures.
{{whyLabel}}: Collaboration increases compliance; kids need to feel like partners in their safety, not just subjects of surveillance.
{{howLabel}}:
- Present the Family Media Contract as a way to keep everyone safe, not as a punishment.
- Ask your children what they enjoy most online and what makes them feel uncomfortable.
- Explain the 'Grandma Rule': Never post anything you wouldn't want your grandmother to see.
{{doneWhenLabel}}: The contract is signed by all family members and posted on the fridge.
{{whyLabel}}: Children need a simple, actionable script for when they encounter predators or inappropriate content.
{{howLabel}}:
- STOP: Immediately close the app or turn over the device if something feels 'weird' or scary.
- BLOCK: Show them how to use the block and report buttons on their favorite platforms.
- TELL: Emphasize that they must tell a trusted adult immediately, no matter what the stranger said.
{{doneWhenLabel}}: The child can successfully demonstrate how to block a user on their most-used app.
{{whyLabel}}: This acts as a first line of defense by blocking adult content for every device connected to your home Wi-Fi.
{{howLabel}}:
- Access your router's admin panel (usually 192.168.1.1 or 192.168.0.1).
- Locate the DNS settings.
- Replace the existing DNS addresses with a free family-safe service like OpenDNS FamilyShield (208.67.222.123 and 208.67.220.123).
- Save and restart the router.
{{doneWhenLabel}}: A test search for adult content on a Wi-Fi-connected device is blocked.
{{whyLabel}}: Operating system controls allow you to manage screen time, approve app downloads, and track location.
{{howLabel}}:
- For Android: Install and set up 'Google Family Link'.
- For iOS: Go to Settings > Screen Time and set up 'Family Sharing'.
- Set 'App Limits' for social media and games (e.g., 60 mins/day).
- Enable 'Ask to Buy' so no apps can be installed without your notification.
{{doneWhenLabel}}: You receive a notification on your phone when the child tries to download a new app.
{{whyLabel}}: Most online grooming and cyberbullying occur late at night in the privacy of a bedroom.
{{howLabel}}:
- Designate a common area (like the kitchen) for all devices to be stored overnight.
- Purchase a multi-port USB charging hub to keep cables organized.
- Set a 'Digital Sunset' time (e.g., 8:00 PM) when all devices must be plugged in.
{{doneWhenLabel}}: All family devices are charging in the common area by the designated time.
{{whyLabel}}: Many apps default to sharing exact GPS coordinates, which can be used by predators to track a child's routine.
{{howLabel}}:
- Open 'Settings' on the child's device.
- Navigate to 'Privacy' > 'Location Services'.
- Turn off 'Precise Location' for all apps except essential navigation.
- Specifically disable location for Camera, Snapchat (Ghost Mode), and Instagram.
{{doneWhenLabel}}: The location settings for all non-essential apps are set to 'Never' or 'While Using' without precise tracking.
{{whyLabel}}: Reducing the 'attack surface' by removing unnecessary or high-risk apps is the simplest way to increase safety.
{{howLabel}}:
- Go through every app on the child's device together.
- Delete apps that allow anonymous chatting (e.g., Omegle-style clones) or have poor age ratings.
- Check for 'Vault' apps that look like calculators but hide photos/videos.
{{doneWhenLabel}}: Only age-appropriate, parent-approved apps remain on the device.
{{whyLabel}}: Online gaming lobbies are frequent sites for verbal abuse and predatory 'grooming' through voice chat.
{{howLabel}}:
- On PlayStation/Xbox/Switch, go to 'Account Settings' > 'Privacy'.
- Set 'Communication with Others' to 'Friends Only' or 'Off'.
- Disable the ability for strangers to see the child's real name or profile details.
- Set spending limits to $0 to prevent unauthorized in-game purchases.
{{doneWhenLabel}}: The console profile is set to 'Private' and voice chat is restricted.
{{whyLabel}}: YouTube's algorithm can quickly lead children from innocent videos to disturbing or inappropriate content.
{{howLabel}}:
- Open the YouTube app and tap the profile icon.
- Go to 'Settings' > 'General'.
- Toggle 'Restricted Mode' to ON.
- For younger children, install 'YouTube Kids' and set the content level to their specific age group.
{{doneWhenLabel}}: YouTube search results filter out mature content.
{{whyLabel}}: Technical tools can be bypassed; internal 'gut feeling' is the child's ultimate defense.
{{howLabel}}:
- Explain 'Love Bombing': Strangers giving excessive compliments or virtual gifts (skins, currency).
- Explain 'Secrecy': Anyone asking them to 'Keep this our little secret' or 'Don't tell your parents' is a danger.
- Explain 'Isolation': Predators often try to turn kids against their parents by acting like the only ones who 'truly understand' them.
{{doneWhenLabel}}: The child can identify at least two red flags of a predatory interaction.
{{whyLabel}}: In 2025/2026, AI-generated content and voice cloning are major risks for extortion and misinformation.
{{howLabel}}:
- Show examples of AI-generated images (use a generic AI image generator) to demonstrate that 'seeing is no longer believing.'
- Establish a 'Family Emergency Password'—a secret word used only in real emergencies to verify identity over the phone.
- Discuss why they should never send photos or videos to anyone, as these can be manipulated by AI.
{{doneWhenLabel}}: A family emergency password is created and memorized.
{{whyLabel}}: Safety is a process, not a one-time setup. Regular reviews keep the dialogue open.
{{howLabel}}:
- Set a recurring calendar event for the first Sunday of every month.
- Use the time to review app permissions, update passwords, and talk about any new apps the child wants to try.
- Ask: 'What was the weirdest thing you saw online this month?' to keep communication casual and non-judgmental.
{{doneWhenLabel}}: A recurring event is visible in the family's digital calendar.