Protecting Yourself


As with e-mail, blogs, discussion boards, or any other online communica-tion, the first step to staying safe online with IM is to take the time to think about who you're communicating with and what information or images you are putting out there or opening yourself up to receive. Specifically, use these tips to become a safer IM user:

  • Think about what you pick as a screen name and consider keeping it neutral. Don't give away personal information. Susie14smallville tells too much; pick something that doesn't help somebody identify or locate you.

  • Consider who you want to communicate with via IM. Some people only want to communicate with close friends and family, and others use the service more openly. Decide what you are comfortable with and set appropriate limits. Remember that just because someone sends a request to you to be added to your contact list doesn't mean you want to or need to add them.

  • Keep in mind that if someone has access to you through IM, they can also see your e-mail address.

  • For younger children, limiting access to a safe list of buddies is advisable. Use a service that allows you to limit your child's contacts and allows you to get an overview of whom they are conversing with to ensure their safety. With teens, set boundaries that match your family's values and their age, and reassess the boundaries periodically as they mature. If the instant messaging program allows others to see your child's friends (called "friends of friends" functionality), and allows your child to be seen by all of his friend's friends, discuss what level of interaction is right for your situation and make sure the program settings reflect your comfort level. Hold a discussion with your kids about whom they communicate with and what they talk about. A good rule of thumb for anybody using IM is to not list your IM contact information publicly on blogs, discussion boards, social networking sites, and so on.

  • Public computersin libraries, Internet cafes, or even the computer at a friend's housecan pose a safety risk. Never select the feature that automatically logs you on to services and look to see that this is not the default on any machine you are using. When you log on to a public computer (or one that isn't your own) and it asks if you want to store your password or automatically log on, say "no." If you say "yes," the next person who logs on might be automatically signed in as you and have access to your account and your friends. Most likely, the next person to use the computer will just log off and open their own account, but they might not. If that person has ill intent, you will not only put yourself at risk, but also place all of your friends at risk. Imagine someone who wants to ruin your friendship by saying hurtful things while pretending to be you, or worse, somebody posing as you and asking your friend to meet somewhere. Your friend might go without realizing that she is actually meeting someone whose intentions are possibly dangerous.

  • Not all IM features are appropriate for all ages. You should use features selectively with a clear understanding of how to use them safely. For example, some games might be more mature in content than is appropriate; you might want to decline voice and video interactions with people you haven't met; giving another person remote access to your computer should only be done when you have a specific problem that you want a trusted person to help you fix. Kids should never give their online friends remote access to a family computer.

  • Be very cautious about meeting in person someone who you know only through IM. Everything they've told you about themselves and their motivation for meeting you might be completely trueor it could all be a lie. They might feel like a close friend, but they are still a stranger. If you do decide to meet an online-only contact, never go alone, make sure others know where you are going, and always have your cell phone handy.

  • It is never safe to share sensitive personal information through unencrypted IM, and unless you know for sure that yours is encrypted, you should assume it is not. Never share passwords or credit card information over IM, for example.

    Think About It

    Look for a messaging provider that has good abuse-reporting and prevention tools. Many providers such as MSN/Windows Live are building more safety features into IM, and expanding their cooperation with authorities to stop abuses such as IM spam attacks, harassment, and illegal image distribution, as well as providing anti-virus protection services in their programs.


  • Sharing photos and links in IM is an easy and convenient way to share with others, but while companies try hard to protect their IM users, spam and viruses can be a problem. To help keep your device safe from malicious attacks, don't open pictures, download files, or click links in messages from people you don't know. Sometimes links or photos might even look like they are sent by a friend, but if you aren't in the middle of a conversation when you get a file or link, double-check with the sender before you open anything. Remember that some viruses can automatically spread through your contact and buddy lists. Some types of content are always inappropriate and illegal. For example, it is illegal to possess or even view child pornography.

    Think About It

    If anyone sends you or your children inappropriate or illegal material, report it. Instruct your children not to shut down the computer but to turn off the monitor and walk away, and then to tell you as soon as possible. Tell your ISP and the police, if appropriate. Let the police instruct you about what to do with your computer to help them to collect evidence.


  • Anything you say in IM can be forwarded to othersor monitored by employers if you use IM at work or on work machines. Consider what you are saying and how you would feel if the information were shared.

  • Harassment and bullying can and do occur online. This is unacceptable behavior and in some cases can be illegal. Encourage your children to report such harassment to you. You can then, in turn, report harassment or abuse to your ISP and law enforcement if appropriate.

    Find Out More

    Chapter 16, "Step 13: Act to Avoid Harassment and Bullying," discusses the problem of online harassment and bullying and how to avoid it.


  • Make conscious choices about the information you give away. Consider who can see this information. If both close friends and not-so-close friends or a network of friends of friends can view your profile or messages, you might want to be more conservative in showing emotions or saying that you're on vacation, as these can be useful pieces of information to people who want to exploit you or your property.

Figure 8-2 shows two examples of IM profiles. The IM profile on the left identifies the subject only to those who know him, while the one on the right reveals too much personal information.

Figure 8-2. Two examples of instant message profiles


If you think of IM as being like holding a quick conversation on a street corner, you'll probably make good choices about who to talk to, what to tell them, and whether you want that person to be able to follow you home or to a friend's house. Don't let the anonymity of an online text message make you forget that there is a person on the other end who might be a friend or a foe.



Look Both Ways. Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
ISBN: 0735623473
EAN: 2147483647
Year: 2004
Pages: 157
Authors: Linda Criddle

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net