Online Safety for Kids

The Internet has a world of information and entertainment to offer. But how can kids make sure they’re behaving safely? Our Online Safety for Kids program is designed to help.

About Our Online Safety for Kids Program

Intel IT Information Security is pleased to offer a do-it-yourself program designed to help teach children (ages 5-18) how to stay safe online.1 2 3

It’s important for kids of all ages—young children, pre-teens, and teenagers—to know how to use the Internet safely and responsibly. We provide presentations to help you build your loved ones’ understanding of online safety with age-appropriate discussion topics. These include:

  • How to protect your personal information to help prevent identity theft or dangerous situations
  • How to avoid viruses that infect your computer, phone, tablet, or other device
  • How what you say, do, and post online can have a lasting impact
  • How to identify and avoid cyber bullying

The goal of this program is simple: to encourage your kids to stop and think about cyber risks before, during, and after they get online.

How to Get Started

Are you ready to start a discussion about online safety with your child? Just follow these easy steps.

Step 1: Prepare

Browse our online safety tips to prepare yourself for a discussion about why safe behavior online matters.

Step 2: Choose

Find the appropriate presentation based on the age of your child: young children (5-8), pre-teen (8-13), or teenager (13-18).

Step 3: Download

Download the presentation and a matching script with talking points and prompts that keep kids engaged.

Step 4: Celebrate

Celebrate your child’s accomplishment by awarding them a certificate of completion. Encourage them to practice cyber safety to protect the whole family.

Find Everything You Need Here

What Did You Think?

Once your family has completed the training, we invite you to take a moment to share your feedback. Your input will help us continually improve our program.

Provide your feedback

제품 및 성능 정보


인텔® 기술은 지원되는 하드웨어, 소프트웨어 또는 서비스 활성화를 요구할 수 있습니다.


어떤 제품 또는 구성 요소도 절대적으로 안전할 수는 없습니다.


비용과 결과는 다를 수 있습니다.