Discussing Online Impersonation with Your Kids

The use of someone else’s name to send email, post material, create social networking accounts, or contact other people in any way is called online impersonation or e-personation, and parents should be aware of how online impersonation can be used to harass adults (e.g. teacher, principal, coach) and children.

Since there’s currently no way for most online platforms to verify account information, it’s easy to make an email or social networking account in someone else’s name. Using someone else’s name is a powerful tool for damaging reputations and harassing others. An account made under someone else’s name, especially if its a trusted individual, can be used for everything from cyberbullying to phishing to extortion.

As parents discuss internet safety with their children, they should include discussions about making fake and impersonating profiles online. Show children how to report a fake account (most email or social networking platforms have a "report abuse" option). Discuss the consequences both ethical and legal for impersonating someone else. For example, California passed recently legislation which makes e-personation punishable by a $1,000 fine and up to one year in jail. Parents should also use the topic to reinforce the importance of never sharing personal information online with anyone and reporting incidents of cyber-abuse to an adult.

News Stories:

INTERNET SAFETY TIPS

Online Shopping & Banking
10 Tips to Safer Shopping
Avoiding Internet Crooks
Bank Online Safely
Benefits of E-books
Identity Theft Rights
Identity Theft Tax Scams
Online Auction Sites
Online Classifieds - Buying
Online Classifieds - Selling
Secure Social Engineering
Digital Family Life
Addictions and ADHD
Betrayal Online
Child Online Privacy
Children & Anorexia
Children & Inappropriate YouTube Videos
Children and Internet Advertising
Children's Photos Online
Cyberbullying Tips
Dating Online Safely
Digital Dating
Digital Literacy
Family Time
Healthy Digital Family Life
High Risk Behaviors
Impact On Children
Internet Gambling
Internet Pornography
Kids & Online Gaming
Kids Posting on YouTube
Kids’ Mobile Apps
Make Money Websites
Online Gaming & Children
Online Quizzes & Surveys
Oversharing Information Online
Protecting from Predators
Read the Fine Print
Respect Online
Risky Behavior
Safe Online Photo Sharing
Safety & Social Networks
Social Networking and Friction
Teaching Privacy
Teen Asking for Validation?
Too Much Time Online
Video Games
PC Security
Argument with a troll
Block Pornography
Bots, Botnets And Zombies
Coupon Safety
Safe Linking & Attachments
Safe URLs
Search & Collected Info
Search vs Research
Secure Websites
What is Antivirus?
What is Phishing?
Getting Started
Beginners Tips
Email Hacking
Identify Theft
Malicious Software
Organize Net News
Sending Email
Strong Passwords
Technology Overload
Cyberbullying & Online Predators
Bullying
Cyberbullied
Cyberbullying Help
Cyberincident Response
Family Blogging
Harassed Online
Online Predators
Online Safety
Recognize a Cyberbully
Report Cyberbullying to Police
Report Cyberbullying to Schools
Safety: Pornography
Mobile Security
Cell Phone & Driving
Cell Phone Theft
Mobile Law Enforcement
Mobile Protection
Mobile Sexting
Parents & Cell Phones
Sexting
Tweets Archived
Ethics & Legal
Cheating & Technology
Cite Sources and Avoid Plagiarism
Download Music & Videos
Ethics
Facebook Passwords
Internet Addiction
Internet Content Copyrights
Kids & Impersonation
Netiquette
Online Impersonation
Societal Digital Piracy Costs
Managing your Online Reputation
Online Reputation
Protect Your Online Content
Protecting Privacy on Google
Teens & Reputation