Feeds

40% of kids regularly visit forbidden sites

Many parents unaware of their nippers' online jaunts

High performance access to file storage

Children under the age of 16 are regularly visiting websites that have been prohibited by their parents, divulge personal details to strangers, and meet up with people they met online, according to research published today.

Online identity firm Garlik commissioned research among 500 children aged 8-15 and 500 parents across the UK. Its findings suggest that 40 per cent of children regularly visit websites that are prohibited by their parents. Many divulge personal details without parental consent, including full name (30 per cent), home address (12 per cent), mobile number (20 per cent), home telephone number (10 per cent), school details (46 per cent), and family photos (9 per cent).

One in five children in Britain has met up with someone first encountered online and five per cent do so on a regular basis. Only seven per cent of parents are aware that their children are doing this.

Eleven per cent of children have been bullied online - with victims intimidated by email or on chat-rooms - yet only half have spoken to their parents about their ordeals.

Despite 90 per cent of parents monitoring their offspring's internet activities, more than half of the 8-15 year-olds questioned admitted to surfing the internet when their parents didn't know, often late at night.

Garlik CEO Tom Ilube said: "Our research is a shocking wake-up call to all parents in the UK to sit down with their children and talk about how to keep safe online. The web is a wonderful place to explore but young people continue to make themselves vulnerable by not applying the same caution online as they would in person."

Garlik's top tips for parents

  1. Keep internet-connected computers in a central and open location, particularly for younger children.
  2. Sit down and talk to your children about their online activity. You should know everyone on your children's contact list.
  3. For younger kids, make sure you know all their passwords. Don't intrude, but let them know that you know, just in case.
  4. Tell your children not to provide personal details online. No full names, addresses, or telephone numbers.
  5. Devise a code of conduct - list of internet rules - that you and your children agree to sign up to.

Copyright © 2007, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.