{"id":61567,"date":"2017-02-07T11:24:37","date_gmt":"2017-02-07T19:24:37","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=61567"},"modified":"2018-06-13T14:51:46","modified_gmt":"2018-06-13T21:51:46","slug":"how-to-balance-internet-access-and-parental-control-by-age","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/","title":{"rendered":"How to Balance Internet Access and Parental Control by Age"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-62233\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/parental-control-by-age.jpg\" alt=\"How to Balance Internet Access and Parental Control by Age\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/parental-control-by-age.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/parental-control-by-age-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/parental-control-by-age-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>For parents, the Internet can be as much of a curse as it is a blessing. Whether you worry about how much screen time to give your toddler or how to oversee your teenager\u2019s online presence, these recommendations will help you navigate Internet access for kids from age one to eighteen.<\/p>\n<h3>Infants: 0-2 Years<\/h3>\n<p>At this stage of your child\u2019s life, limit Internet access as much as possible. In fact, the American Academy of Pediatrics recommends <a href=\"http:\/\/pediatrics.aappublications.org\/content\/132\/5\/958.full\" target=\"_blank\">no screen time<\/a> for children under the age of two. Instead, engage your child with stimulating activities such as conversation, singing, reading, and other play.<\/p>\n<p>This may seem surprising, considering the number of apps designed for infants and the growing amount of entertainment targeted at young children. However,\u00a0programs and apps marketed as educational have actually been <a href=\"http:\/\/www.mayoclinic.org\/healthy-lifestyle\/infant-and-toddler-health\/expert-answers\/baby-einstein\/faq-20058099\" target=\"_blank\">debunked<\/a> in recent years as they don\u2019t prove effective for infant learning.<\/p>\n<p>Of course, complete isolation from screens is impossible with the amount of time adults spend on phones and the number of screens visible everywhere we go. Babies will undoubtedly begin to recognize the influence of screens around them, but your baby will benefit more if you explain these curiosities to her rather than giving her time alone with a screen.<\/p>\n<p>Instead of removing the smartphone from your baby\u2019s hand as she begins to scroll through photos, try to stay positive. Say something like, \u201cLook, you\u2019re making the pictures move with your finger just like me!\u201d and proceed to replace it with an approved distraction.<\/p>\n<p>The first two years of a child\u2019s life can be challenging. With so many adjustments\u2014from teething to sleep training\u2014infants demand attention at every turn. These critical months and years should be spent focused on your child\u2019s needs, rather than a computer screen.<\/p>\n<h3>Toddlers: 2-5 Years<\/h3>\n<p>Although your child will become more involved in day-to-day activities when she is a toddler, Internet access should continue to be minimal, shared, and interactive.<\/p>\n<p>Setting these limitations may be difficult if you\u2019re accustomed to spending hours on your cellphone or other devices daily. It is natural to fill your child\u2019s schedule with the same entertainment\u2014but try to use alternatives instead.<\/p>\n<p>The American Academy of Pediatrics recommends that toddlers have no more than two hours of screen time a day. These cognitive years are crucial to brain development and interaction, and decades of studies on the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-kids-screen-time-interferes-with-daily-activities-infographic\/\" target=\"_blank\">effects of excessive screen time<\/a>\u00a0show that overexposure to screens can lead to obesity, poor performance in school, sleep disruption, and decreased attention span.<\/p>\n<p>While smart devices may seem like a great distraction for your toddler\u2014and a way to get a moment of peace\u2014it\u2019s important not to let screens become babysitters. If your child is interested in a specific game or app, be present and involved in her interaction.<\/p>\n<p>Skype and FaceTime are other examples of healthy screen time experiences you can share. It\u2019s common to expose babies and toddlers to these apps when you communicate with distant family members. As long as you\u2019re involved and don\u2019t spend more than two hours a day video chatting, your child can benefit from the experience. Using the Internet with your toddler as a shared learning experience will benefit her more than alone time with the device.<\/p>\n<h3>School-Age Children: 6-12 Years<\/h3>\n<p>This is a great age to introduce your child to the Internet, as they will likely have supervised digital learning at school. With this increased exposure to the Internet, educate your kids on proper online etiquette and the various dangers of the web.<\/p>\n<p>As a parent, a primary concern for your child on the Internet is cyberbullying. Even children who wouldn\u2019t do so in person sometimes feel more comfortable making harsh remarks about others when they\u2019re behind a computer screen. This kind of behavior can begin as soon as children get a cellphone or social media accounts. It may seem young to worry about cyberbullying, but <a href=\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/\" target=\"_blank\">by age six<\/a>, nearly all children have their own cellphones\u2014and thus, access to the Internet.<\/p>\n<p>According to the Cyberbullying Research Center, an average of <a href=\"http:\/\/cyberbullying.org\/summary-of-our-cyberbullying-research\" target=\"_blank\">27\u00a0percent\u00a0of children<\/a> have been cyberbullied. However, NoBullying.com <a href=\"https:\/\/nobullying.com\/facts-about-cyber-bullying\/\" target=\"_blank\">states<\/a> that only 10\u00a0percent\u00a0of kids report these incidents to their parents. As your children begin using smartphones or social media, teach them to treat others with respect and to report any hurtful or inappropriate messages.<\/p>\n<p><strong>RELATED: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/10-things-to-tell-your-kids-before-giving-them-a-smartphone-checklist\/\" target=\"_blank\">10 Things to Tell Your Kids Before Giving Them a Smartphone [Checklist]<\/a><\/strong><\/p>\n<p>Predators are another concern once children gain more Internet access. They can use social media to find out children\u2019s interests, places of residence, schools, and specific locations. Often, these people will pose as children on social media in attempt to connect with other children, so teach your kids to communicate with only people they have met in person.<\/p>\n<h3>Teenagers: 13-18 Years<\/h3>\n<p>At this age, Internet access is almost a social necessity, but you should still play a role in your teenager\u2019s online safety. This is an appropriate time to get your child a phone with Internet access and educate them on the dangers of identity theft and inappropriate content.<\/p>\n<p>As teenagers get jobs and bank accounts, they can become extremely vulnerable to online theft and credit fraud. Though many teenagers aren\u2019t concerned about identity theft, they are still at risk. Make sure your child knows not to give out her Social Security number or debit card information.<\/p>\n<p>Another difficulty with teenagers is the role Internet access plays in romantic relationships. Sexting and other inappropriate messaging can lead to devastating cyberbullying, especially as relationships end. Make sure your children understand the risks of oversharing pictures and personal information with their peers.<\/p>\n<p>According to one study, parents more closely monitor the web use of <a href=\"http:\/\/www.pewinternet.org\/2016\/01\/07\/how-parents-monitor-their-teens-digital-behavior\/\" target=\"_blank\">younger teens<\/a>, but it\u2019s important not to neglect your older teen\u2019s online behavior. If you choose to look at web histories or install parental control programs, such as <a href=\"https:\/\/www.intego.com\/contentbarrier-secure\">Intego ContentBarrier<\/a>\u00a0(also included with <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Mac Premium Bundle<\/a>), discuss these actions with your teenager beforehand. With a heads up, she\u2019s less likely to feel her trust has been betrayed and may be more cautious online.<\/p>\n<p>Whatever age your child is, rest assured that you have all the tools you need to create a safe and healthy environment for them online.<\/p>\n<p><strong>Further Reading:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-does-intego-content-barrier-compare-to-mac-os-xs-built-in-parental-controls\/?cid=4001&amp;cc=CBSDEAL&amp;utm_medium=email&amp;utm_source=rolling_offers&amp;utm_campaign=rolling_offers_03_reminder&amp;utm_content=cbsx9_features\" target=\"_blank\">How Does Intego ContentBarrier Compare to Mac OS X&#8217;s Built-In Parental Controls?<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-macos-parental-controls-and-intego-contentbarrier\/\" target=\"_blank\">What&#8217;s the Difference Between macOS Parental Controls and Intego ContentBarrier?<\/a><\/li>\n<li><a class=\"row-title\" href=\"https:\/\/www.intego.com\/mac-security-blog\/infographic-teen-internet-use-and-parental-controls\/\" target=\"_blank\">Infographic \u2013 Teen Internet Use and Parental Controls<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>For parents, the Internet can be as much of a curse as it is a blessing. Whether you worry about how much screen time to give your toddler or how to oversee your teenager\u2019s online presence, these recommendations will help you navigate Internet access for kids from age one to eighteen. Infants: 0-2 Years At [&hellip;]<\/p>\n","protected":false},"author":73,"featured_media":62239,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[94,335],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"For parents, the Internet can be as much of a curse as it is a blessing. Whether you worry about how much screen time to give your toddler or how to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Balance Internet Access and Parental Control by Age - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"For parents, the Internet can be as much of a curse as it is a blessing. Whether you worry about how much screen time to give your toddler or how to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-07T19:24:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-13T21:51:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/internet-access-parental-control.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sarah Brown\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/internet-access-parental-control.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/internet-access-parental-control.jpg\",\"width\":400,\"height\":260,\"caption\":\"Balance Internet Access and Parental Control by Age\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/\",\"name\":\"How to Balance Internet Access and Parental Control by Age - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#primaryimage\"},\"datePublished\":\"2017-02-07T19:24:37+00:00\",\"dateModified\":\"2018-06-13T21:51:46+00:00\",\"description\":\"For parents, the Internet can be as much of a curse as it is a blessing. Whether you worry about how much screen time to give your toddler or how to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Balance Internet Access and Parental Control by Age\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/29e6fd6586794288cfe316cdf036c329\"},\"headline\":\"How to Balance Internet Access and Parental Control by Age\",\"datePublished\":\"2017-02-07T19:24:37+00:00\",\"dateModified\":\"2018-06-13T21:51:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#webpage\"},\"wordCount\":1093,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/internet-access-parental-control.jpg\",\"keywords\":[\"Parental Control\",\"Safer Internet Day\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/29e6fd6586794288cfe316cdf036c329\",\"name\":\"Sarah Brown\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adc4498cd331a76e356e4ad85fb15536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adc4498cd331a76e356e4ad85fb15536?s=96&d=mm&r=g\",\"caption\":\"Sarah Brown\"},\"description\":\"Sarah Brown is a tech specialist with a love of all topics relating to the IoT. She writes about upcoming technologies, internet safety cyber security. Sarah believes that the through technology and the written word, we can all stay connected to each other and create a safe environment out in the ether.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/sarah-brown\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"For parents, the Internet can be as much of a curse as it is a blessing. Whether you worry about how much screen time to give your toddler or how to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/","og_locale":"en_US","og_type":"article","og_title":"How to Balance Internet Access and Parental Control by Age - The Mac Security Blog","og_description":"For parents, the Internet can be as much of a curse as it is a blessing. Whether you worry about how much screen time to give your toddler or how to","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-02-07T19:24:37+00:00","article_modified_time":"2018-06-13T21:51:46+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/internet-access-parental-control.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sarah Brown","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/internet-access-parental-control.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/internet-access-parental-control.jpg","width":400,"height":260,"caption":"Balance Internet Access and Parental Control by Age"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/","name":"How to Balance Internet Access and Parental Control by Age - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#primaryimage"},"datePublished":"2017-02-07T19:24:37+00:00","dateModified":"2018-06-13T21:51:46+00:00","description":"For parents, the Internet can be as much of a curse as it is a blessing. Whether you worry about how much screen time to give your toddler or how to","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How to Balance Internet Access and Parental Control by Age"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/29e6fd6586794288cfe316cdf036c329"},"headline":"How to Balance Internet Access and Parental Control by Age","datePublished":"2017-02-07T19:24:37+00:00","dateModified":"2018-06-13T21:51:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#webpage"},"wordCount":1093,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/internet-access-parental-control.jpg","keywords":["Parental Control","Safer Internet Day"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-balance-internet-access-and-parental-control-by-age\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/29e6fd6586794288cfe316cdf036c329","name":"Sarah Brown","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/adc4498cd331a76e356e4ad85fb15536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adc4498cd331a76e356e4ad85fb15536?s=96&d=mm&r=g","caption":"Sarah Brown"},"description":"Sarah Brown is a tech specialist with a love of all topics relating to the IoT. She writes about upcoming technologies, internet safety cyber security. Sarah believes that the through technology and the written word, we can all stay connected to each other and create a safe environment out in the ether.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/sarah-brown\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/internet-access-parental-control.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-g11","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/61567"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/73"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=61567"}],"version-history":[{"count":17,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/61567\/revisions"}],"predecessor-version":[{"id":80047,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/61567\/revisions\/80047"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/62239"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=61567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=61567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=61567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}