{"id":29392,"date":"2014-06-25T08:58:38","date_gmt":"2014-06-25T15:58:38","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=29392"},"modified":"2017-01-06T15:51:08","modified_gmt":"2017-01-06T23:51:08","slug":"infographic-teen-internet-use-and-parental-controls","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/","title":{"rendered":"Infographic \u2013 Teen Internet Use and Parental Controls"},"content":{"rendered":"<p>These days, children of all ages can access the Internet from all sorts of devices. Do your kids have their own computers or smartphones? Well, if so, chances are good you won\u2019t always be around to monitor their online activities.<\/p>\n<p>It\u2019s up to parents to make the decisions in their households, putting you in charge of protecting your children online. To better understand how teens access the Internet and to see whether or not they are monitored by parental controls, Intego surveyed over 490 parents this month. Check out the infographic below for statistics on teen Internet use and how parents use parental controls.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-41602\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/Teen-Internet-Use-Parental-Controls-Infographic.png\" alt=\"Infographic teen Internet use and parental controls statistics\" width=\"560\" height=\"1623\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/Teen-Internet-Use-Parental-Controls-Infographic.png 560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/Teen-Internet-Use-Parental-Controls-Infographic-103x300.png 103w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/Teen-Internet-Use-Parental-Controls-Infographic-353x1024.png 353w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/p>\n<p style=\"text-align: left;\">Intego ContentBarrier\u00a0continues to be the premier solution for keeping your family safe from the dangers of the Internet. Our\u00a0<a title=\"Mac Informer Reviews Family Protector\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-informer-reviews-family-protector\/\" target=\"_blank\">award-winning parental controls<\/a> for Mac makes it easy to shield your kids from inappropriate content and predatory strangers, and acts as your eyes and ears with always-on monitoring of your teens Internet use.<\/p>\n<hr>\n<div><\/div>\n<div>Keep your family&#8217;s digital world safe, secure, and appropriate:\u00a0<strong><a title=\"Mac Parental Control Software - Family Protector\" href=\"https:\/\/www.intego.com\/mac-parental-control-software\" target=\"_blank\">Download ContentBarrier<\/a><\/strong>.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>These days, children of all ages can access the Internet from all sorts of devices. Do your kids have their own computers or smartphones? Well, if so, chances are good you won\u2019t always be around to monitor their online activities. It\u2019s up to parents to make the decisions in their households, putting you in charge [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":8765,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[3],"tags":[159,413,1213,1210],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"These days, children of all ages can access the Internet from all sorts of devices. Do your kids have their own computers or smartphones? Well, if so,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infographic \u2013 Teen Internet Use and Parental Controls - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"These days, children of all ages can access the Internet from all sorts of devices. Do your kids have their own computers or smartphones? Well, if so,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-25T15:58:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T23:51:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/IntegoIcon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/IntegoIcon.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/IntegoIcon.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"intego mac security icon\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/\",\"name\":\"Infographic \\u2013 Teen Internet Use and Parental Controls - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#primaryimage\"},\"datePublished\":\"2014-06-25T15:58:38+00:00\",\"dateModified\":\"2017-01-06T23:51:08+00:00\",\"description\":\"These days, children of all ages can access the Internet from all sorts of devices. Do your kids have their own computers or smartphones? Well, if so,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infographic \\u2013 Teen Internet Use and Parental Controls\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Infographic \\u2013 Teen Internet Use and Parental Controls\",\"datePublished\":\"2014-06-25T15:58:38+00:00\",\"dateModified\":\"2017-01-06T23:51:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#webpage\"},\"wordCount\":176,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/IntegoIcon.jpg\",\"keywords\":[\"Infographic\",\"Parental Controls\",\"Statistics\",\"Teen Internet Use\"],\"articleSection\":[\"Intego\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"These days, children of all ages can access the Internet from all sorts of devices. Do your kids have their own computers or smartphones? Well, if so,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/","og_locale":"en_US","og_type":"article","og_title":"Infographic \u2013 Teen Internet Use and Parental Controls - The Mac Security Blog","og_description":"These days, children of all ages can access the Internet from all sorts of devices. Do your kids have their own computers or smartphones? Well, if so,","og_url":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-06-25T15:58:38+00:00","article_modified_time":"2017-01-06T23:51:08+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/IntegoIcon.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/IntegoIcon.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/IntegoIcon.jpg","width":"400","height":"260","caption":"intego mac security icon"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/","name":"Infographic \u2013 Teen Internet Use and Parental Controls - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#primaryimage"},"datePublished":"2014-06-25T15:58:38+00:00","dateModified":"2017-01-06T23:51:08+00:00","description":"These days, children of all ages can access the Internet from all sorts of devices. Do your kids have their own computers or smartphones? Well, if so,","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Infographic \u2013 Teen Internet Use and Parental Controls"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Infographic \u2013 Teen Internet Use and Parental Controls","datePublished":"2014-06-25T15:58:38+00:00","dateModified":"2017-01-06T23:51:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#webpage"},"wordCount":176,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/IntegoIcon.jpg","keywords":["Infographic","Parental Controls","Statistics","Teen Internet Use"],"articleSection":["Intego"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/IntegoIcon.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-7E4","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/29392"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=29392"}],"version-history":[{"count":26,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/29392\/revisions"}],"predecessor-version":[{"id":29464,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/29392\/revisions\/29464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8765"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=29392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=29392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=29392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}