The 18 Point Deal One Mom Made Before Handing Her Son A Cell Phone

Greg Hoffman is a kid who just got an iPhone from his parents. His mom, Janell Hoffman, wrote these [slightly edited] rules for its use:


1. It is my phone. I bought it. I pay for it. I am loaning it to you. Aren’t I the greatest?

2. I will always know the password.

3. If it rings, answer it. It is a phone. Say hello, use your manners. Do not ever ignore a phone call if the screen reads “Mom” or “Dad”. Not ever.

4. Hand the phone to one of your parents promptly at 7:30pm every school night & every weekend night at 9:00pm. It will be shut off for the night and turned on again at 7:30am. If you would not make a call to someone’s land line, wherein their parents may answer first, then do not call or text. Listen to those instincts and respect other families like we would like to be respected.

5. It does not go to school with you. Have a conversation with the people you text in person. It’s a life skill.

6. If it falls into the toilet, smashes on the ground, or vanishes into thin air, you are responsible for the replacement costs or repairs.

7. Do not use this technology to lie, fool, or deceive another human being. Do not involve yourself in conversations that are hurtful to others. Be a good friend first or stay the hell out of the crossfire.

8-9. Do not text, email, or say anything through this device you would not say in person.

10. No porn.

11. Turn it off, silence it, put it away in public. Especially in a restaurant, at the movies, or while speaking with another human being. You are not a rude person; do not allow the iPhone to change that.

12. Do not send or receive pictures of your private parts or anyone else’s private parts. Don’t laugh. Someday you will be tempted to do this despite your high intelligence. It is risky and could ruin your teenage/college/adult life. It is always a bad idea. Cyberspace is vast and more powerful than you. And it is hard to make anything of this magnitude disappear — including a bad reputation.

13. Don’t take a zillion pictures and videos. There is no need to document everything. Live your experiences. They will be stored in your memory for eternity.

14. Leave your phone home sometimes and feel safe and secure in that decision. It is not alive or an extension of you. Learn to live without it. Be bigger and more powerful than FOMO — fear of missing out.

15. Download music that is new or classic or different than the millions of your peers that listen to the same exact stuff. Your generation has access to music like never before in history. Take advantage of that gift. Expand your horizons.

16. Play a game with words or puzzles or brain teasers every now and then.

17. Keep your eyes up. See the world happening around you. Stare out a window. Listen to the birds. Take a walk. Talk to a stranger. Wonder without googling.

18. You will mess up. I will take away your phone. We will sit down and talk about it. We will start over again. You & I, we are always learning. I am on your team. We are in this together.

Credits – Facebook

6 Ways A Mom Can Keep Her Tween Daughter Safe Online

Potential harm on the Internet isn’t limited to your preteen children. Adults are at risk for some of the same dangers, but the difference is one of gullibility. Children are taught to trust adults, or at least adults they know. This good intention can have catastrophic results when familiarity from a cyber chat room or social site is confused with real, tangible and trusted acquaintances in their lives.

A second issue involved in Internet dangers is tweens’ misconception that one symbol of their growing maturity and independence is freedom of expression and freedom from parental supervision.

Minimizing Online Dangers to Your Tween

Early communication and discussions about cyber bullying, sexual predators and identity theft need to be regular conversations in your household.

As your daughter grows and begins to ask how old she must be before she’s allowed to wear make-up, date or obtain her driver’s license, you should question how old she must be before she can have her own email address or social media account.

These Internet-related activities can expose your daughter to far more danger than wearing lip gloss at 12, and must be discussed as a privilege and not a right.

Tips to Protect Your Daughter from Internet Threats

  • Insist that all Internet activity take place in an open area, such as the kitchen table, dining room or the den. Often, a quick glance at a laptop can indicate whether your child should be on that site or not. Never allow your teens to take their computers into their bedroom. Having a desktop sitting in your teens room allows them to venture to sites they wouldn’t normally go if they were in a public area.
  • Know your tween’s login name and password for her email address and any social sites. If you allow her to be on Facebook, insist that she add you as a friend and monitor her privacy settings to ensure that she’s not hiding activity from you.
  • Review beforehand and approve of any screen name your daughter might use in chat rooms or gaming sites. Obviously, “SweetBaby12” would not be an appropriate screen name.
  • Personally know her friends or telephone contacts and how she came to know them. Phones can serve as cameras too, so be sure to make sure he or she isn’t sending any inappropriate pictures. Does your daughter really need a phone with all the bells and whistles? A basic emergency phone which allows her to make phone calls is all she needs. Be the mom that allows her daughter to have girlfriends over to the house. This gives you the upper hand knowing what your daughter is up to, and what she is into, and what her friends are like.
  • Explain the reasons behind the rules regarding her Internet use and the length of time you will monitor her activity. Relate it to another maturity marker such as driving, for example. “You’ll be allowed to go online without supervision when….
  • Monitor who she converses with on Skype or iPhone Face Time. Who people present themselves as online can be a far cry from who they turn out to be in real time.

Logging Off

Raising a teen often seems like trying to swim through shark-infested waters, especially when it comes to the anonymity of the Internet.

These tips might not work for every family, but they should help you get started with keeping your tween safe online. In the same way you make clear your expectations about underage drinking, drugs, driving under the influence and dating, set limits on internet activity and explain why.

Mobile Phones

What is less widely known is that the same dangers can take place when children use mobile phones. A mobile phone is as much an Internet surfing device as a computer. Minors are often “sexted” by adults on their mobile phones or make calls to strangers who seem attractive but turn out to be sexual predators.

It CAN happen. 37-year-old Stefanie Dickinson was charged with sexting a 14-year-old boy who was the friend of her own son. Later she was arrested again for sexually assaulting another child. This is only one of a disturbing number of such incidents.

How does one protect one’s child against these kinds of threats?

Software For Parents

An app called Mobiflock can be used to keep children safe on mobile phones. Parents can use it to get alerted in the case of potentially dangerous cellphone activity. They can see who is calling their children and sending them messages, what websites they are visiting on the phone and even the last place where the device was located.

  • With this app, designated individuals can be blocked from making contact with or being contacted by the child over their phones.
  • Mobiflock can be used to establish VIP contacts who can always be reached, especially in case of an emergency. Parents can view a report on how the child has been using the phone and adjust the security settings according the the age and personality of that particular child.
  • This includes blocking whole categories of websites and making sure that the web searches are safe.
  • The smartphone can be deactivated at certain times to prevent children from using it late at night and not getting enough sleep. Email and SMS alerts can be sent to the parents if the child is engaging in an activity that seems to be especially dangerous.

Here are some important rules that children should be asked to follow when using cellphones include the following:

  • Avoid making calls in public as much as possible.
  • Keep the phone hidden when not using it.
  • Never let strangers use it.
  • Restrict access to the phone by setting up a password or PIN.
  • Avoid using the phone in poorly lit areas.

Picture Credit – Pixabay


Internet Privacy

Five Tools To Protect Your Privacy Online

By Simon Black Sovereign Man

Reporting from the 6th Region, Central Chile

We’ve discussed many times before – hardly a month goes by without some major action against Internet users… from Obama’s ‘kill switch’, to ACTA, SOPA and PIPA, to stasi tactics against people like Kim Dotcom.

Online privacy is becoming more important by the day. And nobody is going to give it to you, you have to take steps yourself to secure it.

Below are five different tools and services that will get you started:

1. Tor Browser

Tor is a great weapon in the fight for online anonymity as it allows you to surf the web without giving up your location and other personal data to the websites you visit.

The Tor Browser Bundle is the easiest and most secure way to get started; simply download it, and start surfing the web with the Tor Browser. It’s available for Windows, Mac, and Linux.

Learn more about and download the Tor Browser Bundle here

2. Duck Duck Go

If you want privacy, don’t search with Google.

Google store all of your searches to customize ads for you, but even worse, they can hand over the whole list of searches to any government agency that are curious about what you’ve been looking at for the last couple years.

A better alternative is Duck Duck Go, a completely anonymous search engine that does not store any information about you or your searches. The search results are essentially identical to Google’s, so there’s no loss of quality.

Search with Duck Duck Go here

3. HTTPS Everywhere

HTTPS Everywhere is a plug-in for Firefox and Google Chrome that tries to force a website to connect in secure mode, thus encrypting your traffic with the website you are visiting. This makes your browsing more secure because it prevents eavesdropping thieves or state-mafia from intercepting your unencrypted Internet traffic.

Download HTTPS Everywhere here

4. Cryptocat

Cryptocat is an encrypted chat that beats Facebook and Skype when it comes to security and privacy. If you want to chat in private then this is one simple solution. It’s also open source, which means you can see the full code and be sure there are no government “backdoors” built in.

Read more of this article on his site…..