Friday, June 27, 2008

Sue Scheff: SAFE EYES - Protecting Your Kids In Cyberspace!


Safe Eyes 5.0 Parental Control Software Receives Parents’ Choice Award

Safe Eyes™ 5.0, the latest edition of Internet parental control software from InternetSafety.com, has earned a 2008 Parents’ Choice Approved award from the Parents’ Choice Foundation. The award is the latest in a series of honors for the parental monitoring software, including two consecutive Editors’ Choice awards from PC Magazine.

“If you think your family’s safety requires Internet filtering and monitoring, whatever level, this program provides an array of options to get it done,” said the Parents’ Choice Foundation in its recognition of the Safe Eyes product. The 30-year-old foundation is the nation’s oldest non-profit program created to recognize quality children’s media, including books, toys, music and storytelling, software, videogames, television and websites.

“This commendation from the Parents’ Choice Foundation reflects the growing concern that parents have over their children’s Internet use as well as the wide range of control choices that Safe Eyes offers,” said Forrest Collier, CEO of InternetSafety.com. “Every child and every family is different, so flexibility is essential. The product lets parents decide how their children use the Internet.”

Safe Eyes is a comprehensive program that enables parents to easily block objectionable websites, control Internet use by length of time as well as time of day and day of the week, block or record instant messenger chats, and block peer-to-peer file sharing programs that may expose children to dangerous material. It also allows parents to limit email use to certain addresses, and receive alerts when children post inappropriate or personal information on social networking sites like MySpace and Facebook.

The software provides broader controls than any other filtering product, including the ability to define which websites will be blocked by category, URL and keyword; receive instant alerts about inappropriate online behavior by email, text message or phone call; and remotely change program settings or view reports from any Internet-enabled computer.

Safe Eyes is also the only program of its kind that can be used in mixed Mac/PC households. A single $49.95 annual subscription covers up to three Mac and/or PC computers with the ability to customize settings for each child and enforce them on any machine. The product’s website blacklist is updated automatically every day, eliminating the need for manual updates. Safe Eyes can be downloaded at SAFE EYES.

All Parents’ Choice Awards winners are posted to the Parents’ Choice Foundation website (http://www.parents-choice.org/).

About InternetSafety.com

Established in 1999, InternetSafety.com specializes in providing Internet safety solutions. Its flagship software, Safe Eyes, is the two-time recipient of the PC Magazine Editors’ Choice Award and was rated as the #1 parental control solution by America’s leading consumer advocacy publication. The company’s Safe Eyes and EtherShield products are providing online protection for PCs and Macs in homes, businesses and schools across more than 125 countries.

Thursday, June 26, 2008

Sue Scheff: E-Venge a Growing Concern Online

It seems Internet Harassment, Online Slander, Cyberbullying and other abuses in the World Wide Web is growing! I am contacted on a daily basis from victims of today's newest lethal & legal weapon to harm others - keystrokes!

You have to wonder what possesses people to feel the need to hurt others so maliciously. With all of today's critical issues such as hunger, the war, homeless people etc....

We have a new group of people that simply have too much time on their hands - and take pleasure in hurting others. E-Venge seems like a good name for it.

If you think about it - it is a cowardly act. They hide out behind their computers and just strike their keypads - usually anonymously.

Read through this Blog and you will see that free speech is still in place but it will not condone defamation.

Blogging is fun, the Internet can be educational - but remember, what you post today can come back to haunt you tomorrow. And could be costly to you!

Visit my new updated Podcast website on E-Venge at http://www.suescheffpodcasts.com/

Wednesday, June 25, 2008

Sue Scheff - Live On Purpose Radio - Wit's End!




Hello Parents!


Thanks to all of you who were on our call today. We had Sue Scheff on as our guest, who shared some remarkable resources and her personal story about dealing with her out-of-control teen daughter. You just may want to save a copy of today’s call for future reference, or to share with people you know who might be dealing with this right now. Our association with each other is one of our greatest resources – thank you for being part of this community of parents!


Visit http://www.parentalpower.wordpress.com/ to pick up the audio content – we are getting close to having this available through iTunes so you can just subscribe and get it automatically. Stay tuned.

Tuesday, June 24, 2008

Sue Scheff: Parents Need to Learn How to Protect Their Kids In Cyberspace



This Press Release is posted with the permission of InternetSafety.com - Visit SafeEyes Internet Safety for more vital information to protect your children online. After winning my unprecedented lawsuit against Internet Defamation, I am very active in helping parents and adults alike to stay safe online. New laws are slowly being introduced, but in the meantime we need practice safe cyber surfing.


10 Tips For Keeping Your Kids Safe On Social Networks


ATLANTA, GA — May 28, 2008 — June is Internet Safety month. With hundred of millions of teens, pre-teens—and adults—around the world using social networking sites, there’s no better time for parents to be aware of the fun, the benefits, the powerful attractions, and the potential risks that MySpace, Facebook and other similar sites offer their children.

InternetSafety.com, the recognized leader in Internet safety solutions, has assembled a list of practical tips parents can use to ensure a safe networking environment for kids:

Show Interest — Ask questions about how your child’s preferred social networking site or sites work. Kids are generally happy to demonstrate their knowledge if you show genuine interest. You can even ask your teen to show you how to set up your own social networking site—a great way to visit your child’s page and see what’s been posted there.



Encourage Instinctive Responses — Kids often can instinctively do the right thing, which makes them their own first defense against those who may take advantage online. Encourage your children to avoid contact with people they “feel funny about.” Tell them to not reveal anything online they would not want a stranger to know. Limit the posting of pictures and remind them that once something is placed online, it can never be taken back.



Know Your Kids’ Passwords — If your child changes his or her password suddenly and refuses to share it with you, that’s trouble. Insist on knowing how to access his or her accounts—then keep their confidence by not sharing the information with their friends or siblings.



Set Hours for When Kids Can Access Social Networks — Late nights are the favorite time for predators to seek out their adolescent prey. Set firm limits not only for the time of day, but also the total amount of time, that your children may access social networking sites.



Be Aware of Alternate Access Points — Kids don’t have to access their social networks at home. Libraries, friends’ houses, even cell phones make the Internet easy to reach today. Keep up with what’s happening on your child’s social networking page and be aware when changes have been made despite the lack of access from home.



Exercise Your Parental Right to Supervise — There’s a difference between being snoopy and ensuring safe activity. You don’t have to read every last word of a personal message your son or daughter sends to a friend. But you do have the right—and the obligation—to see who your kids are talking to, and to know the general subject matter.



Check for Photos — By clicking on the Windows “Start” button, you’ll find the “Search” tool. Click on “Pictures, Music or Video,” the box next to “Pictures and Photos,” and finally “Search”. Ask your child to identify any photos of strangers, or any other pictures you find questionable.
Install Filtering Software — PC products like Safe Eyes allow parents to block or record Instant Messenger chats, limit email use to prescribed addresses, block objectionable Web sites (including peer-to-peer file sharing programs that often expose kids to inappropriate material), and receive alerts when kids post personal information on social networking sites.



Watch for CyberBullying — Encourage your children to tell you immediately if they are being harassed online. Children also need to know that it is not acceptable to be a party to cyberbullying—or to remain silent when they know others are being harassed.




Visit StopCyberBullying.org or StopBullyingNow.hrsa.gov for excellent tips and information.
Don’t Lecture — Finally, if you should find reasons for concern, don’t browbeat, insult or condescend to your child. Have a discussion about values and why they are important. Respect your child but be firm. And most of all, lead by example. Parents have a powerful ability to influence their child’s behavior—and nothing is more powerful than someone who not only talks values, but lives them.



“Parents should never feel that their level of involvement in their child’s social network activity is excessive. Since 1998, the National Center for Missing and Exploited Children’s CyberTipline has logged over 33,000 tips about children being enticed online for sexual acts,” said Shane Kenny, President and COO of InternetSafety.com. “Better that the parent error on the side of intrusion, rather than bear the consequences of doing nothing.”


About InternetSafety.com
Established in 1999, InternetSafety.com specializes in providing Internet safety solutions. Its flagship software, Safe Eyes, is the two-time recipient of the PC Magazine Editors’ Choice Award and was rated as the #1 parental control solution by America’s leading consumer advocacy publication. The company’s Safe Eyes and EtherShield products are providing online protection for PCs and Macs in homes, businesses and schools across more than 125 countries.

# # # #

http://www.helpyourteens.com/
http://www.suescheff.com/
http://www.witsendbook.com/

Sunday, June 22, 2008

Sue Scheff Proving Free Speech will Not Support Internet Defamation and Invasion of Privacy

My case and the unprecedented jury verdict for damages of over $11M has gained national and international attention. There are more and more people now fighting back against Cyberbullying and Internet Harassment. Take a moment to find out more about Internet Defamation and Invasion of Privacy.

Friday, June 20, 2008

Sue Scheff: Help Protect Your Children in Cyberspace


On Tuesday, June 17th Dr. Paul featured Michael Fertik, CEO of Reputation Defender. If you are a parent of a child that surfs online - this is an important Podcast for your to listen to.



Michael Fertik is a repeat Internet entrepreneur and CEO with experience in technology and law. After law school, he clerked for Chief Judge Danny J. Boggs of the Sixth Circuit Court of Appeals of the United States. He is a graduate of Harvard College and Harvard Law School. His company, Reputation Defender, helps parents to know what is online about their children, and provides services to find and eliminate potentially dangerous or damaging content.




On this call, Michael discusses some important information and resources to help parents become more proactive about knowing what is out there about their family, and doing something about it.

Wednesday, June 18, 2008

Sue Scheff: Learn To Maintain Your Online Image



Reputation Defender has expanded again - Now many people can take advantage of their MyEdge services!


I have used MyEdge for almost 2 years now have been extremely happy with their team of professionals. I was very excited to hear they have recently offered to a wider audience with reasonable costs.


Maintaining your Online Image has become a priority for so many people. As someone that was nearly destroyed in Cyberspace - I know how critical it is to be aware of what is looming on the World Wide Web.


After winning a jury verdict for over $11M for Internet Damages to my organization, my family and myself online - I will continue to use be a voice for others that are being maligned online - and continue to encourage people to look to the future - and know it will be safer online with services like ReputationDefender on your side.


Remember what you post today can haunt you tomorrow!

Sunday, June 15, 2008

Sue Scheff: Legal Victories and More

Read through this Blog and you will see that free speech is still in place but it will not condone defamation.

Blogging is fun, the Internet can be educational - but remember, what you post today can come back to haunt you tomorrow. And could be costly to you!

Friday, June 13, 2008

Sue Scheff: Carolina Springs Academy, Darrington Academy, Midwest Academy, Academy of Ivy Ridge, Spring Creek Lodge, Royal Gorge Academy, WWASPS etc..

Are you considering any of the following programs for your child? Take a moment to read my experiences - www.aparentstruestory.com as well as my book where you can hear my daughter's experiences for the first time - order today at www.witsendbook.com.

Choosing a program is not only a huge emotional decision, it is a major financial decision - do your homework! Learn from my mistakes - Gain from my knowledge!

Academy of Ivy Ridge, NY (withdrew their affiliation with WWASPS)
Canyon View Park, MT
Camas Ranch, MT
Carolina Springs Academy, SC
Cross Creek Programs, UT (Cross Creek Center and Cross Creek Manor)
Darrington Academy, GA
Help My Teen, UT (Adolescent Services Adolescent Placement) Promotes and markets these programs.
Gulf Coast Academy, MS
Horizon Academy, NV
Lisa Irvin (Helpmyteen)
Lifelines Family Services, UT (Promotes and markets these programs) Jane Hawley
Majestic Ranch, UT
Midwest Academy, IA (Brian Viafanua, formerly the Director of Paradise Cove as shown on Primetime, is the current Director here)
Parent Teen Guide (Promotes and markets these programs)
Pillars of Hope, Costa Rica
Pine View Christian Academy (Borders FL, AL, MS)
Reality Trek, UT
Red River Academy, LA (Borders TX)
Royal Gorge Academy, CO
Sky View Academy, NV
Spring Creek Lodge, MT
Teen Help, UT (Promotes and markets these programs)
Teens In Crisis
Tranquility Bay, Jamaica

Wednesday, June 11, 2008

Sue Scheff - Internet Abuse is Growing

It seems Internet Harassment, Online Slander, Cyberbullying and other abuses in the World Wide Web is growing! I am contacted on a daily basis from victims of today's newest lethal & legal weapon to harm others - keystrokes!

You have to wonder what possesses people to feel the need to hurt others so maliciously. With all of today's critical issues such as hunger, the war, homeless people etc.... We have a new group of people that simply have too much time on their hands - and take pleasure in hurting others. E-Venge seems like a good name for it. If you think about it - it is a cowardly act. They hide out behind their computers and just strike their keypads - usually anonymously.

Read through this Blog and you will see that free speech is still in place but it will not condone defamation.

Blogging is fun, the Internet can be educational - but remember, what you post today can come back to haunt you tomorrow. And could be costly to you!

Visit my new updated Podcast website on E-Venge at http://www.suescheffpodcasts.com/

Saturday, June 7, 2008

Sue Scheff Podcast Website on E-Venge is Updated!


Visit www.suescheffpodcasts.com for the latest updates including The Rachael Ray Show! The hot topic of Cyber Slander and Online Harassment was discussed including my unprecedented jury verdict for damages of over $11M for Internet Defamation.

Friday, June 6, 2008

Sue Scheff: Top Ten Blogger Personas: The Mobosphere Unveiled by Attorney John Dozier

This has been one of my favorite Blogs and Articles describing a variety of personalities of people that simply have nothing better to do than harm others with their evil keystrokes.

Top Ten Blogger Personas: The Mobosphere Unveiled

By John Dozier, Esq.


Ever since Congress passed Section 230 of the Communications Decency Act giving immunity to interactive service providers for publishing the defamation of others, a wide range of characters has arisen and infiltrated the mainstream blogosphere. Instead of becoming a source for obtaining reliable information, the blogosphere, and user generated content, is at risk of becoming a less credible information source. Dozier Internet Law defamation lawyers are constantly battling these “black hat” forces and over the past several years we have acquired quite an insight into this underworld; an anonymous and covert society bent on terrorizing businesses. These are our internal thoughts on the matter, and not scientific analyses. We are not psychiatrists; just defamation lawyers and trial lawyers trained for almost fifty years to figure out the human nature of clients, witnesses, and juries.

All too often blog attacks are simply protection rackets and extortion schemes in disguise. We have been working on documenting the organizational structure and operational methodologies used by these racketeers. For now, let’s take a look at the entire panoply of characters we seem, as business defamation lawyers, to run into. For those businesses under attack, it is essential that you first identify the publisher’s persona and motivation before beginning to identify the proper strategies for addressing his often seemingly legitimate posts. We don’t go into details on how we work with clients to deal with each type of personality, but the tools vary considerably from being passive, to utilizing SEO services, to implementing reputation management initiatives, to pre-litigation and lawsuit actions.

Defamation Lawyers Pursue Bloggers

Pickpocket

This is the guy who used to wait on street corners for elderly ladies to pass. He enjoys attacking defenseless people and stealing covertly using deception. This type of blogger will steal your copyright protected content, have the search engines push your prospective clients to his site, and then run ads and otherwise direct the traffic to your competitors. He could be an affiliate marketer for a competitor getting a share of the revenue, or he could simply be running Google or Yahoo ads on his site. Pickpockets also take great pleasure in stealing your trademarks…surreptitiously using your mark in hidden tags, meta tags, hidden redirect pages, or through a myriad of search engine optimization techniques, all in the hopes of re-directing your prospects to a competitor and taking money from you.

Wacko

We usually identify a wacko situation quickly. There are distinctive characteristics of his communications. The wacko is usually a “follower”, someone looking to gain attention and recognition, but escalates what may have started as fair criticism into more and more outrageous claims. Most sophisticated business people immediately view the poster as a “nut case”, particularly when an excessive amount of time or energy disproportionate to the merits of the subject is expended. But it is not easy for the typical browser on the web to see the pattern, usually spread over multiple web properties.

Druggie

Or, maybe “liquid courage” would be more appropriate. This guy is exactly what comes to mind. During the day this blogger is a normal guy, but at night he returns to the sanctity of his home, gets drunk or high, and goes out on the web looking for “hook-ups” and blogging on his “hang-ups”. This guy is hard to detect as a fraudster, and sometimes won’t recall what he said online the next day while under the influence. He posts aggressive, false and arbitrary attacks on whatever issue of the day (or night) catches his fancy.

Alien

No, not from another world. But from overseas. In a far, far away place, without any treaty with the US, in a country without an effective legal system and no notion of business or personal property ownership rights. Many of these types operate out of certain Russian provinces, but the blogs, postings and communications appear to be from the customer down the street. This individual usually has an ulterior motive, often working with the criminal discussed below. He has no fear, until he takes a vacation to Turkey and US federal agents grab him for extradition, which is exactly what happened on a case in the not so recent past.

Nerd

This is the guy who is scared to talk with a girl, but behind the keyboard, all alone, morphs into a Casanova. This empowerment of anonymity creates an omnipotent persona, and for the first time the nerd feels the effect of power and control, gets an adrenaline buzz when he exercises it, and he exercises it often, usually creating or perpetuating a volatile situation in which he feels he can outsmart the “opposition”. There is no principle involved. His blog postings are all about the adrenaline. It is hard to know if you are dealing with this type online…his posts are intelligent and on their face credible. But, once you identify the nerd blogger, he cowers and goes away, usually forever.

Rookie

Enjoy debating a thirteen year old? They are out on the net acting like adults, posting statements and play-acting like a grown-up. The challenge, of course, is that most people reading the posts have no idea these are coming from a kid. The tip off can be the utter immaturity of the posts, but most often the kids can sound credible criticizing, for instance, a CPA's method of calculating RIO on REIT holdings, because they can mimic earlier posts. There is no insidious motive here; just kids having fun as the hormones kick in. But the readers of the blog posting don’t know that.

Sadist

This person attacks others, causes pain, and revels in the results in ways not worthy of mention. He loves to create, direct, control, and unleash a firestorm of criticism about a company just to create pain and damage. This type of person may often by the prime instigator of the online attacks, and tightens the noose by escalating the attack rapidly, almost as if in an obsessive state. You will find a sadist going to many sites and blogging, and he usually lets you know it was him because he uses his real moniker. He has characteristics of a stalker, and he is most likely to be the one that starts recommending direct physical violence against the executives of a company. This person is not motivated by money, but by the pure enjoyment of pain being visited upon innocent parties.

Bankrupt

No, not morally bankrupt. Actually bankrupt…no money, no assets, no prospects for work, and nothing to lose. These bloggers post without fear of the consequences or any regard for the truth because you “can’t get blood out of a turnip”, you “can’t get water from a rock”, and all these other sayings handed down, we surmise, through his generations. This is usually not a smart guy, but his postings are damaging and inflammatory. Many will own and control blogs without any concern about the consequences of liabilities that might arise through the perpetuation and “enhancement” of posts, and sometimes will post to their own blog and act like it was from a third party.

Criminal

Career criminals, no less. Like the convicted felon running a sophisticated extortion scheme against a very prominent business. Or the owner of an open blog avoiding service of process with guard dogs protecting his compound. The thieves and crooks of the world are online today; and the criminals often have both an organization and a highly effective and surprisingly coordinated operational plan in place to target a business. Rumors of $500,000 a year payoffs seem to promote this problem, which emanates from more of a “mobosphere” than the blogosphere.

Mis-Leader

This person is in no manner a leader. This blogger has a hidden agenda, but he just makes it sound like he is a totally objective commentator. He can create an appearance of authority and the casual visitor to his blog does not question the legitimacy. This type of persona is hard to figure out. One of the most pervasive practices is to control a blog and allow negative posts against all except his generous advertisers. Another common technique involves omission; not disclosing conflicts of interest or the existence of a business or personal relationship because the readers of the blog would totally discount the commentator’s posts as unreliable and biased.

Dozier Internet Law Defamation Lawyers

In closing, most of the blogosphere is legitimate, offers honest opinions and comments that add value to an open dialogue, and is an excellent example of the exercise of constitutionally protected free speech. As business defamation lawyers, we seen another side. The “mobosphere”, on the other hand, operates outside of the spotlight and often uses reckless, irresponsible, false and defamatory statements for personal or professional gain, all too often focused on self gratification and pecuniary benefits. As businesses attempt to leverage user generated content (“UGC”) into a valuable tool in the Web 2.0 environment, the proliferation of the scofflaws interrupting the free flow of credible speech in the online world puts at risk the reputation and integrity of UGC and raises the very real risk that consumers will begin viewing web content with disdain and suspicion.

Dozier Internet Law defamation lawyers offer a free consultation to qualified businesses and professionals undergoing attacks from the scofflaws of the web.


Thursday, June 5, 2008

Sue Scheff: Internet Gossip




After chat rooms, instant messaging, and social forums became popular, a new word entered our vocabulary: cyber-bullying. It's been a problem almost since the Internet was invented but studies now show that online harassment and bullying has increased over 50 percent since 2000.

Wednesday, June 4, 2008

Sue Scheff - Legal Victories and More

Read through this Blog and you will see that free speech is still in place but it will not condone defamation.

Blogging is fun, the Internet can be educational - but remember, what you post today can come back to haunt you tomorrow. And could be costly to you!

Monday, June 2, 2008

Sue Scheff: The Web is Not Anonymous

My case and the unprecedented jury verdict for damages of over $11M has gained national and international attention. There are more and more people now fighting back against Cyberbullying and Internet Harassment.Take a moment to find out more about Internet Defamation and Invasion of Privacy.

Read More about how The Web is Not Anonymous by Dozier Internet Law:


The Web is Not Anonymous

Dozier Internet Law chases a lot of scofflaws. Sometimes the subject matter is copyright infringement, sometimes trademark infringement, often hacking and defamation. A reporter interviewing me last week was surprised to learn that individuals posting information online were not entitled to absolute anonymity and was surprised that you could subpoena information to identify the source of the publication of defamatory information in the airline industry. That got me to thinking a little about the knowledge base of most netizens.

Yes, you can be identified. For every instance in which Public Citizen wins a case preventing the disclosure of the identity, I suspect they turn down dozens of cases they know they can't win. There is no absolute right to privacy or anonymity online. Identities are disclosed everyday in litigation through a process called "discovery". And most people leave pretty good tracks. If the plaintiff is obviously going to lose the case, the courts won't let the plaintiff use discovery to identify a defendant. But if the case is arguably valid, there is no problem with issuing extensive and far ranging discovery to locate and identify a defendant. And it is a process used often by lawyers, but an issue not publicized by the extreme left wingers very often. That way, each "victory" they claim sounds significant. But most, frankly, are irrelevant or at least not significant.

At Dozier Internet Law we go after these anonymous types often, and with great success. Rarely does Public Citizen get involved. When they do, their involvement is an anomaly. We don't publicize all of the cases in which we are identifying, through discovery, anonymous scofflaws, but from the volume of press release type emails and blog entries flowing from Public Citizen, I can understand this reporter's misunderstanding.

Sunday, June 1, 2008

Sue Scheff: Free Speech Won't Support Online Defamation - $11.3M Jury Verdict for Damages

Since winning my unprecedented case against Internet Defamation, many people contact me looking for lawyers that specialize in Internet Law.

David Pollack, Miami, FL - was my attorney that won the $11.3M jury verdict for damages. Visit his website at http://www.davidpollacklaw.com/

John Dozier, Washington D.C. and offices in NY and CA- specializes in Internet Law and more. Visit his comprehensive website at http://www.cybertriallawyer.com/Internet Law is a growing area - and more and more lawyers are learning more about this.

http://www.myfloridahouse.gov/Sections/Documents/loaddoc.aspx?FileName=_h0479er.doc&DocumentType=Bill&BillNumber=0479&Session=2003

http://www.myfloridahouse.gov/Sections/Bills/billsdetail.aspx?BillId=9976

Thanks to the new Cyberbullying laws, this can help more plaintiffs take a strong stand against being harassed online without infringing on their first amendment.If you don't need a lawyer, I continue to recommend ReputationDefender as an alternative or in combination with a lawyer.