Section Branding
Header Content
Three Lessons the Celebrity Photo Hacking Scandal Teaches Kids
Primary Content
This may sound cliche, but the recent celebrity photo hacking scandal offers a perfect opportunity for parents to discuss the do’s and don’ts of Internet behavior and their consequences with their kids.
This goes beyond the “don’t post racy photos of yourself on Facebook” talks. The impact of phones, text messages and the cloud should be factored into the conversation now. Plus new technology will always be introduced. Parents and children should consider how those new applications will impact what they do online.
To spur those conversations, I’ve listed three lessons the hacking scandal teaches kids.
1.) Nothing digital disappears: With the introduction of iCloud and other online back-up sites, this breach illustrates even more than ever that nothing digital ever disappears. It doesn’t matter whether a photo was deleted from a Facebook post or a phone. Online storage sites automatically make copies of pictures and other pieces of data. That is their reason for being. Duplicates will likely always be in circulation. Kids should take that into consideration before taking a questionable photo.
2.) Accounts can and are being hacked: No account is completely secure. The hackers that stole images of Jennifer Lawrence and Kate Upton in states of undress, snuck into Apple’s iCloud. Apple products are considered the most airtight when it comes to security. But even it was vulnerable. All types of accounts can be breached: phone accounts, email accounts, computer accounts. Creating strong passwords can help safeguard these accounts to a degree. But being judicious about what is placed on these devices and accounts is the better remedy.
3.) Privacy settings are critical: While gifted hackers can pry into the most buttoned up accounts, lay people can get into them if privacy settings are not configured properly. Make sure kids are familiar with the privacy settings of all of their digital accounts: social media, email, phone, cloud and laptop and know how to maximize them.
For more fodder for this discussion, check out our video Cyber safety in the Age of Cyber bullying from the GBI .