1 / 32

Staying safe in a digital world.

Staying safe in a digital world. Why we are here & why I do this job. Outcomes. To know the “Key Words” in e-safety. Reporting inappropriate use on the internet, mobile phones games consoles, etc. To examine what e-safety in the home is. But above all…… TO BE EMPOWERED. Grooming

scout
Download Presentation

Staying safe in a digital world.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Staying safe in a digital world.

  2. Why we are here & why I do this job.

  3. Outcomes • To know the “Key Words” in e-safety. • Reporting inappropriate use on the internet, mobile phones games consoles, etc. • To examine what e-safety in the home is. • But above all…… TO BE EMPOWERED

  4. Grooming • Cyberbullying • Sexting • Trolling • Hacking • Cyber-sniping • Grunging • ….e-safety vocabulary changes rapidly. • (Glossary of e-safety terms) It’s all in a word – or rather, several

  5. POS • WMM • ASL?? • WC? • TTO • Language changes – what was once perfectly harmless now yields surprises. It’s all in a word – things they type

  6. Aggression. • Unexplained behavioural changes • Disturbed sleep pattern. • Secrecy • Sexualised behaviour/language • Change in dress sense • Signs of addiction – won’t leave the PC alone • The most telling EWS of all – YOU feeling that something isn’t quite right. Signs and Symptoms.

  7. The Good News! • Far more benefits to working, learning and playing online than risks. • WE can be in control! • You will only ever hear the “Dark Side Of The Force” in the media…BUT this can be useful! • EVERYONE who wants to abuse on the internet relies on the fact that it is usually embarrassing to talk about it. • The more we talk about e-safety the better!

  8. Where do I start? • First, identify WHAT you have and WHERE it is. (you might want to think about portable/mobile devices.) • Next, WHO uses it (mainly), and for what PURPOSE? • You may be surprised at just how much connectible equipment you have in your home. DON’T FORGET THE “MAN DRAWER”

  9. Where do I start? • Next up is YOUR OWN PERSONAL E-SAFETY. • Do you have online shopping accounts? • Do you have Social Networking accounts? • Do any of the above share a password? • Do you have any general interest accounts? • (Accounts where NO personal information exists and no financial transactions take place are low-level in terms of security)

  10. Where do I start? • Does anyone else in your home know your passwords/PIN numbers/Secret Word(s)? • Do you know anyone else’s? (It’s OK to know your child’s) • Have you ever encouraged your child to “log on as you?” • Fact:- in 145 Primary school visits, at least 40% of Y5s know mum or dad’s PIN number. • Fact:- 92% of year 10s say they know and have used Mum/Dad’s username, password or PIN number.

  11. Then what? • Once you know what you have, where it is, what it does, who uses it and what for, you are in a good place to have a family discussion… • WHAT IS IT OK TO DO WITH CONNECTED TECHNOLOGY AT HOME? • Make a list of do’s and don’ts • This becomes your home “Acceptable Use Policy, or “Trust Agreement”.

  12. The Home Acceptable Use Policy? • The school has one • Colleges and Universities have one • All workplaces have one. • Agreed – worded in their language.

  13. Here’s mine. • This is MY phone. I paid for it, and I am lending it to you. • To help you use it safely, this phone must not be used:- i) To send nasty messages ii) To take or download any image you would not want me to see …..etc…etc….

  14. Here’s mine. • 10) Finally, if you mess up, and you will mess up, we will talk about it, and there will be a consequence. That consequence will be less if you tell me about it rather than let me find out about it.

  15. Filtering • A logon with appropriate age-related settings, plus the activation of parental controls is a start…….. • Children WILL, eventually, see material that you would rather they didn’t. • Make it “OK TO TELL.” • http://www.NetNanny.com • NO filter is 100% effective – especially with regard to images. • NOTHING replaces vigilance.

  16. Filtering

  17. Filtering • A logon with appropriate age-related settings, plus the activation of parental controls is a start…….. • Children WILL, eventually, see material that you would rather they didn’t. • Make it “OK TO TELL.” • http://www.NetNanny.com

  18. Filtering • NO SYSTEM CAN 100% guarantee that your child will never come across anything inappropriate – beware the “security blanket”. • NOTHING beats regular discussions • Use the News.

  19. Now the first “Tough one” • Let’s talk about monitoring. • Do you feel the need to? • How would you go about it? • When does caring overseeing become spying? • What about the old “I need my privacy” argument?

  20. How To Take A look” • Internet History can be deleted. • Temporary files can be deleted. • Most young people will think they can hide files by putting files within folders within folders. • You CAN search a computer for images and videos.

  21. How To Take A look” • Start|Search • *.jpg (pulls up ALL photographs stored) • *.avi (pulls up most videos) • *.wmv (pulls up a different format of video)

  22. If you do monitor a PC or phone…. PLEASE REMEMBER…. Images found on computers may NOT have been put there deliberately. They may even PRE-DATE your ownership of the computer. It may be perfectly OK, but you DO need to know what is on your machine. Killing spouses/children/ is usually frowned upon!!!

  23. A few facts of connected life… • In general terms – there is no such thing as privacy – every electronic contact leaves a trace. • Once an image is posted online, you loose control of it – forever. • Young people find hacking highly attractive. • Young children can and do experiment sexually online.

  24. Blu-jacking

  25. To Block, or Not To Block….. • Your rules, and your comfort are important! • Some parents/carers block, others do not. • If you ban without discussion, it drives the activity underground. • Youngsters need to understand why something is not good. • You need a “non-verbal” means of them telling you they have had a problem.

  26. Reporting Abuse • If your child is being affected by any kind of online abuse, your child’s teacher will want to know.

  27. Reporting Abuse • 99% of SN suppliers offer some kind of reporting tools.

  28. Reporting Abuse • 99% of SN suppliers offer some kind of reporting tools.

  29. Reasons to be cheerful….

  30. Hardware Essentials…. • A good, all round anti-virus, anti-spyware, anti-malware package installed and regularly updated. • A WPA2 secured wireless network…(If you use one) • Windows Update configured to download and apply updates regularly. • A plan for how old equipment will be disposed off – including destroying information stored on it. (Old Mobile Phone Companies!)

  31. The Future (the other “F” word. • Faster, better, more, technology AND pace of change. • A good idea not to be the first in the queue. • Let new technology settle into the market – even release candidates have been found to have serious bugs. • NOTHING IS FREE – THERE IS ALWAYS A COST – EVEN IF IT IS ONLY YOUR EMAIL ACCOUNT NAME.

  32. Over To You…. Q & A

More Related